IOC Report
e2kLb2J2Y7.exe

loading gif

Files

File Path
Type
Category
Malicious
e2kLb2J2Y7.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\xddtyli.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\zhtyxulkfny.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\RevisionNumber\Values.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Key.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Values.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e2kLb2J2Y7.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xddtyli.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\zhtyxulkfny.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_142zoxi1.oib.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3cvdoh0g.iaz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4nvtqfku.ri2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fwyl4it1.mvo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lhtdv54i.3nm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnvtic2h.ien.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwhf1zdc.h5s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmh0k21e.rgz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_slbckglv.hdn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_solqoxdo.avw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tnpdzbff.jpy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y3zy0y5e.cma.ps1
ASCII text, with no line terminators
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e2kLb2J2Y7.exe
C:\Users\user\Desktop\e2kLb2J2Y7.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
malicious
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
malicious
C:\Users\user\AppData\Local\Temp\xddtyli.exe
C:\Users\user\AppData\Local\Temp\xddtyli.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
malicious
C:\Users\user\AppData\Roaming\RevisionNumber\Values.exe
C:\Users\user\AppData\Roaming\RevisionNumber\Values.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\zhtyxulkfny.exe
C:\Users\user\AppData\Local\Temp\zhtyxulkfny.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
C:\Users\user\AppData\Local\IsInvalid\koeogrk\Key.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 163.123.142.171:8383 -u 44K2HL2woi2893k79NHDxhSdmL8vLcCcDX5HDn2F3d7fGrUkkCcQutFNXM5FtKq8SKUEjnCioyXVgNqSRMHUC9qX268CRGw.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.m
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://163.123.142.171:8080/file/1699834997-Prvrec.exe
163.123.142.171
malicious
http://163.123.142.171:8080/file/1699833590-plugin3.dll
163.123.142.171
malicious
http://schemas.microsoft
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://xmrig.com/wizard%s
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://xmrig.com/wizard
unknown
https://github.com/Pester/Pester
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://xmrig.com/docs/algorithms
unknown
https://xmrig.com/benchmark/%s
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 16 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
163.123.142.171
unknown
Reserved
malicious
91.92.244.36
unknown
Bulgaria

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\CD933EBD60597A8B2BC8
CD933EBD60597A8B2BC8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\cd933ebd60597a8b2bc8cd020020c0c6
9c73252fca15bab77cb7b7121f99df79
HKEY_CURRENT_USER\SOFTWARE\cd933ebd60597a8b2bc8cd020020c0c6
FC9641F0F232AB74D864F4AC14A0DB49
There are 21 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23277B60000
trusted library allocation
page read and write
malicious
1EEBF780000
trusted library section
page read and write
malicious
23277AE8000
trusted library allocation
page read and write
malicious
3A81000
trusted library allocation
page read and write
malicious
3581000
trusted library allocation
page read and write
malicious
140481000
remote allocation
page execute and read and write
malicious
1EEB753D000
trusted library allocation
page read and write
malicious
13EB9000
trusted library allocation
page read and write
malicious
1404B1000
remote allocation
page execute and read and write
malicious
23277B10000
trusted library allocation
page read and write
malicious
1407AE000
remote allocation
page execute and read and write
malicious
34C0000
trusted library section
page read and write
malicious
1EEA7447000
trusted library allocation
page read and write
malicious
23277C00000
trusted library allocation
page read and write
malicious
1EEA6FF0000
trusted library section
page read and write
malicious
1EEA70C1000
trusted library allocation
page read and write
malicious
1EEB77A0000
trusted library allocation
page read and write
malicious
2326752E000
trusted library allocation
page read and write
malicious
14288000
trusted library allocation
page read and write
malicious
35E0000
trusted library section
page read and write
malicious
3A01000
trusted library allocation
page read and write
malicious
13A98000
trusted library allocation
page read and write
malicious
3D71000
trusted library allocation
page read and write
malicious
232676F7000
trusted library allocation
page read and write
2326595F000
heap
page read and write
1EEA759D000
trusted library allocation
page read and write
2372648B000
trusted library allocation
page read and write
1C700000
heap
page read and write
1402E6000
remote allocation
page execute and read and write
1C6D3000
heap
page read and write
EF43907000
stack
page read and write
3F5C000
trusted library allocation
page read and write
BD4E5E1000
stack
page read and write
7FFD349C4000
trusted library allocation
page read and write
2326773C000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
232002CA000
heap
page read and write
29DEC4AE000
heap
page read and write
1D55000
heap
page read and write
7FFD349D9000
trusted library allocation
page read and write
23267521000
trusted library allocation
page read and write
1D788000
heap
page read and write
2373DBE0000
heap
page read and write
E90000
heap
page read and write
7FFD349D3000
trusted library allocation
page read and write
7FFD34AFC000
trusted library allocation
page read and write
39FF000
stack
page read and write
23200443000
heap
page read and write
1EEA56D5000
heap
page read and write
23267AE3000
trusted library allocation
page read and write
93859E1000
stack
page read and write
E30000
trusted library allocation
page read and write
270D6701000
trusted library allocation
page read and write
2C8B55C0000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
191C000
heap
page read and write
13C59000
trusted library allocation
page read and write
4018000
trusted library allocation
page read and write
1BE0F000
heap
page read and write
270C6540000
heap
page readonly
1403EF000
remote allocation
page execute and read and write
3BD8000
trusted library allocation
page read and write
1EEBFABB000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
270C747F000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD347FC000
trusted library allocation
page execute and read and write
EF42CBE000
stack
page read and write
1EEBFBB0000
heap
page read and write
1545000
heap
page read and write
F63000
heap
page read and write
7FFD3494A000
trusted library allocation
page read and write
1BE0D000
stack
page read and write
7FFD34B20000
trusted library allocation
page read and write
2C93906D000
heap
page read and write
23265AA0000
heap
page execute and read and write
7FFD34920000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
FBE000
heap
page read and write
1C6F0000
heap
page execute and read and write
1C741000
heap
page read and write
7FFD3495A000
trusted library allocation
page read and write
14006B000
remote allocation
page execute and read and write
1D7D0000
heap
page read and write
23725220000
heap
page readonly
1EEBF998000
heap
page read and write
1D5CD000
heap
page read and write
1B7E000
stack
page read and write
140204000
remote allocation
page execute and read and write
1EEBFBE1000
heap
page read and write
23200609000
heap
page read and write
1335000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
23200153000
heap
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
151F000
stack
page read and write
1EEB7365000
trusted library allocation
page read and write
1EEBF0F0000
trusted library allocation
page read and write
270C6928000
trusted library allocation
page read and write
2326591D000
heap
page read and write
232000F9000
heap
page read and write
14046C000
unkown
page execute and read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
29DEC3F0000
heap
page read and write
23200137000
heap
page read and write
1EEA7261000
trusted library allocation
page read and write
1EEA76CA000
trusted library allocation
page read and write
1EEA7508000
trusted library allocation
page read and write
BD4F5FC000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
EF42C3E000
stack
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
1CF8E000
stack
page read and write
7FFD34BB0000
trusted library allocation
page read and write
93871FF000
stack
page read and write
7FFD347A4000
trusted library allocation
page read and write
1EEBFE35000
heap
page read and write
1115000
heap
page read and write
7FFD34AF4000
trusted library allocation
page read and write
3D93000
trusted library allocation
page read and write
23200151000
heap
page read and write
29DD38CA000
heap
page read and write
270C78D5000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
23200632000
heap
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
7FFD349AD000
trusted library allocation
page read and write
BD4F1FF000
stack
page read and write
3670000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
148C000
heap
page read and write
29DE42AA000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
23200090000
heap
page read and write
13B61000
trusted library allocation
page read and write
29DEC7B5000
heap
page read and write
1EEA7523000
trusted library allocation
page read and write
1EEA754B000
trusted library allocation
page read and write
2373D962000
heap
page read and write
EE6000
heap
page read and write
270C5FF0000
heap
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1C7C0000
heap
page execute and read and write
1B90D000
heap
page read and write
1EEBF960000
heap
page execute and read and write
7FFD34A00000
trusted library allocation
page read and write
3E8D000
trusted library allocation
page read and write
3FA4000
trusted library allocation
page read and write
270C74E2000
trusted library allocation
page read and write
9386DFE000
stack
page read and write
23265840000
heap
page read and write
1EEA52A0000
unkown
page readonly
93861FF000
stack
page read and write
798E178000
stack
page read and write
2373DC1C000
heap
page read and write
23200435000
heap
page read and write
F3A000
heap
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
14397000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
1D80A000
heap
page read and write
137F000
heap
page read and write
2320045D000
heap
page read and write
7FFD34974000
trusted library allocation
page read and write
1EEA5360000
heap
page read and write
14CC000
heap
page read and write
23725276000
heap
page execute and read and write
7FFD349BB000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
270C7476000
trusted library allocation
page read and write
1404C6000
remote allocation
page execute and read and write
1EEBFE42000
heap
page read and write
412F000
trusted library allocation
page read and write
23200334000
heap
page read and write
14046D000
remote allocation
page execute and read and write
7FFD347EC000
trusted library allocation
page execute and read and write
1D628000
heap
page read and write
23200472000
heap
page read and write
3D1B000
trusted library allocation
page read and write
140242000
remote allocation
page execute and read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34A8F000
trusted library allocation
page read and write
270C7FEC000
trusted library allocation
page read and write
7FFD3497F000
trusted library allocation
page read and write
7FFD34932000
trusted library allocation
page read and write
3C15000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page execute and read and write
1402C8000
unkown
page execute and read and write
232003EA000
heap
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
29DEC7E1000
heap
page read and write
798E27E000
stack
page read and write
2320065D000
heap
page read and write
1EEBFE2D000
heap
page read and write
1EEBFB70000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
1EEB7927000
trusted library allocation
page read and write
1EEBF9A7000
heap
page read and write
1C702000
heap
page read and write
7FFD34BED000
trusted library allocation
page read and write
7FFD34B30000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
23267846000
trusted library allocation
page read and write
23726D1B000
trusted library allocation
page read and write
7DF42FE00000
trusted library allocation
page execute and read and write
1D74F000
heap
page read and write
1C6D0000
heap
page read and write
29DD4FA2000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
29DEC580000
heap
page execute and read and write
237252A0000
trusted library allocation
page read and write
23724BE0000
heap
page read and write
2373D95E000
heap
page read and write
1403AC000
remote allocation
page execute and read and write
23265860000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
1D893000
heap
page read and write
EFD000
heap
page read and write
1EEA76FA000
trusted library allocation
page read and write
1EEBFC40000
heap
page read and write
2373DBAE000
heap
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
1C31C000
stack
page read and write
1EEA763F000
trusted library allocation
page read and write
232000B1000
heap
page read and write
1D3CE000
stack
page read and write
D889E7E000
stack
page read and write
1C7AE000
heap
page read and write
232002CC000
heap
page read and write
1403B2000
unkown
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
1C340000
heap
page read and write
7FFD34B93000
trusted library allocation
page read and write
14013D000
unkown
page execute and read and write
270DED80000
heap
page execute and read and write
3BA2000
trusted library allocation
page read and write
F55000
heap
page read and write
1C1F0000
heap
page execute and read and write
270C790E000
trusted library allocation
page read and write
1EEA7351000
trusted library allocation
page read and write
232676A8000
trusted library allocation
page read and write
7FFD349B8000
trusted library allocation
page read and write
29DEC7E8000
heap
page read and write
270C7F63000
trusted library allocation
page read and write
29DD523F000
trusted library allocation
page read and write
7DF445580000
trusted library allocation
page execute and read and write
1EEBFA2E000
heap
page read and write
798DEFE000
stack
page read and write
14013C000
remote allocation
page execute and read and write
7FFD34AB0000
trusted library allocation
page read and write
23265930000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
EF429F9000
stack
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
7FFD347B0000
trusted library allocation
page read and write
1EEB7900000
trusted library allocation
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
1C70D000
heap
page read and write
1EEA72C8000
trusted library allocation
page read and write
EF4398C000
stack
page read and write
1C9AD000
heap
page read and write
1D679000
heap
page read and write
23726C33000
trusted library allocation
page read and write
1EEBFAC9000
heap
page read and write
1770000
heap
page read and write
1EEA71C8000
trusted library allocation
page read and write
1D4EE000
heap
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD347A3000
trusted library allocation
page execute and read and write
3C9D000
trusted library allocation
page read and write
270DEDB4000
heap
page read and write
EF427F9000
stack
page read and write
140411000
unkown
page execute and read and write
1EEBFA88000
heap
page read and write
191F000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
1EEBFE0F000
heap
page read and write
7FFD3494A000
trusted library allocation
page read and write
270C66F0000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
1D400000
heap
page read and write
232676B5000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
42BC000
trusted library allocation
page read and write
D88A0FD000
stack
page read and write
232776C1000
trusted library allocation
page read and write
270C7731000
trusted library allocation
page read and write
29DD3E30000
trusted library allocation
page read and write
2373D95A000
heap
page read and write
270DEEE2000
heap
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
7FFD34900000
trusted library allocation
page read and write
23267853000
trusted library allocation
page read and write
29DE4290000
trusted library allocation
page read and write
4345000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
2C8B56C4000
heap
page read and write
DA0000
heap
page read and write
798EECE000
stack
page read and write
29DEC432000
heap
page read and write
142D9000
trusted library allocation
page read and write
1EEBFC8D000
heap
page read and write
270D69F9000
trusted library allocation
page read and write
270C7301000
trusted library allocation
page read and write
23277D07000
trusted library allocation
page read and write
1B5B0000
trusted library allocation
page read and write
270C6185000
heap
page read and write
1401EB000
unkown
page execute and read and write
2C8B54B0000
heap
page read and write
2327789D000
trusted library allocation
page read and write
29DEC488000
heap
page read and write
7FFD347A2000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
1D0B1000
heap
page read and write
1EEA7675000
trusted library allocation
page read and write
1D83F000
heap
page read and write
1D720000
heap
page read and write
23725210000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
145E000
stack
page read and write
1EEBFBA0000
heap
page read and write
1EEBFD70000
heap
page read and write
7FFD349D4000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
232000B4000
heap
page read and write
13CB9000
trusted library allocation
page read and write
13587000
trusted library allocation
page read and write
EBD000
heap
page read and write
23277CB8000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
23267A43000
trusted library allocation
page read and write
29DD3F90000
heap
page read and write
1EEA53EC000
heap
page read and write
232002F4000
heap
page read and write
7FFD3492A000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
232659F0000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
1EEA58BB000
heap
page read and write
798EFCC000
stack
page read and write
798E079000
stack
page read and write
14029000
trusted library allocation
page read and write
7FFD34AE4000
trusted library allocation
page read and write
1C708000
heap
page read and write
1361B000
trusted library allocation
page read and write
3EA7000
trusted library allocation
page read and write
1EEBFBDB000
heap
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
270C6BCE000
trusted library allocation
page read and write
232005F7000
heap
page read and write
1EEBFB8C000
heap
page read and write
1EEA75AA000
trusted library allocation
page read and write
13D71000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
7DF445570000
trusted library allocation
page execute and read and write
270C851C000
trusted library allocation
page read and write
3510000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
232005AA000
heap
page read and write
7D0000
heap
page read and write
140368000
remote allocation
page execute and read and write
2372678C000
trusted library allocation
page read and write
29DD3A30000
heap
page read and write
760000
heap
page read and write
1D878000
heap
page read and write
7FFD347CB000
trusted library allocation
page execute and read and write
1C8C0000
heap
page read and write
1D634000
heap
page read and write
270C6580000
trusted library allocation
page read and write
1CBCE000
stack
page read and write
DC0000
heap
page read and write
14079A000
unkown
page execute and read and write
140367000
unkown
page execute and read and write
7FFD34AA0000
trusted library allocation
page read and write
2320017E000
heap
page read and write
3DA7000
trusted library allocation
page read and write
4105000
trusted library allocation
page read and write
1EEBFC1E000
heap
page read and write
23200658000
heap
page read and write
29DD4B96000
trusted library allocation
page read and write
270DEF41000
heap
page read and write
F03000
heap
page read and write
1300000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
1EEA7241000
trusted library allocation
page read and write
798DCFF000
stack
page read and write
232676C8000
trusted library allocation
page read and write
1EEBFAEF000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
3F6F000
trusted library allocation
page read and write
23267AA0000
trusted library allocation
page read and write
1EEBFD64000
heap
page read and write
270DEEF8000
heap
page read and write
23267A7F000
trusted library allocation
page read and write
3CE0000
trusted library allocation
page read and write
232777C5000
trusted library allocation
page read and write
EF42D3E000
stack
page read and write
1330000
heap
page read and write
29DEC5C0000
heap
page read and write
23200669000
heap
page read and write
2320068B000
heap
page read and write
F86000
heap
page read and write
270C72FF000
trusted library allocation
page read and write
1EEA75C4000
trusted library allocation
page read and write
EF4267F000
stack
page read and write
1EEA5430000
heap
page read and write
3C2E000
trusted library allocation
page read and write
23277C93000
trusted library allocation
page read and write
13B7A000
trusted library allocation
page read and write
1D57F000
heap
page read and write
7FFD3478B000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
270C5E10000
heap
page read and write
270D6731000
trusted library allocation
page read and write
232005EB000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
23726705000
trusted library allocation
page read and write
23277A99000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
270DEFD0000
trusted library allocation
page read and write
2373D94E000
heap
page read and write
1D825000
heap
page read and write
7FFD34772000
trusted library allocation
page read and write
7DF47B7A0000
trusted library allocation
page execute and read and write
D88B00E000
stack
page read and write
1C71D000
heap
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
23265A50000
heap
page execute and read and write
F8D13FF000
stack
page read and write
7FFD3493A000
trusted library allocation
page read and write
7FFD349B9000
trusted library allocation
page read and write
7FFD34978000
trusted library allocation
page read and write
1EEBFE29000
heap
page read and write
1EEA71B4000
trusted library allocation
page read and write
270C7309000
trusted library allocation
page read and write
2320049C000
heap
page read and write
2326769B000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
29DD3FA1000
trusted library allocation
page read and write
232658F6000
heap
page read and write
7FFD34792000
trusted library allocation
page read and write
2372589F000
trusted library allocation
page read and write
1C730000
heap
page read and write
270DEC90000
heap
page read and write
1D52E000
heap
page read and write
23277C3D000
trusted library allocation
page read and write
1C6E7000
heap
page read and write
1EEBF9C8000
heap
page read and write
232678B4000
trusted library allocation
page read and write
270DEDBC000
heap
page read and write
140329000
remote allocation
page execute and read and write
2C8B6F10000
heap
page read and write
270C7337000
trusted library allocation
page read and write
F8D16FE000
stack
page read and write
1EEA70B0000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
270DEF2E000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
1EEA6EDF000
heap
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
270C6170000
trusted library allocation
page read and write
1401D2000
remote allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
23726B4E000
trusted library allocation
page read and write
270C6787000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
3DB5000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
1EEA7290000
trusted library allocation
page read and write
29DE4298000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
EB0000
heap
page read and write
1445D000
trusted library allocation
page read and write
237271F1000
trusted library allocation
page read and write
270D69F1000
trusted library allocation
page read and write
2320055D000
heap
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
7FFD34BF0000
trusted library allocation
page read and write
270DEDB0000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
23726388000
trusted library allocation
page read and write
1EEBFAD0000
heap
page read and write
7FFD347BB000
trusted library allocation
page execute and read and write
1EEA56D0000
heap
page read and write
7FFD347BC000
trusted library allocation
page execute and read and write
1C75D000
heap
page read and write
7FFD34AC3000
trusted library allocation
page read and write
1C990000
heap
page read and write
7FFD34846000
trusted library allocation
page read and write
140140000
remote allocation
page execute and read and write
1D7DB000
heap
page read and write
7FFD349B4000
trusted library allocation
page read and write
2327F550000
trusted library allocation
page read and write
2373D966000
heap
page read and write
270C5E65000
heap
page read and write
140439000
remote allocation
page execute and read and write
23267893000
trusted library allocation
page read and write
7FFD34974000
trusted library allocation
page read and write
1EEA765A000
trusted library allocation
page read and write
FDC000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
13E1000
stack
page read and write
3DA0000
trusted library allocation
page read and write
140241000
unkown
page execute and read and write
7FFD349B2000
trusted library allocation
page read and write
798E2FE000
stack
page read and write
1EEBFC0C000
heap
page read and write
10B0000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
237353F1000
trusted library allocation
page read and write
1EEA73CB000
trusted library allocation
page read and write
18C0000
heap
page read and write
1D869000
heap
page read and write
29DEC71B000
heap
page read and write
1C660000
trusted library section
page read and write
270C6160000
trusted library section
page read and write
29DD3EA0000
trusted library allocation
page read and write
2326777E000
trusted library allocation
page read and write
14006A000
unkown
page execute and read and write
1D75E000
heap
page read and write
790000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
DE0000
heap
page read and write
2320032D000
heap
page read and write
7FFD34B90000
trusted library allocation
page read and write
D88A43F000
stack
page read and write
270C5E20000
heap
page read and write
7FFD34763000
trusted library allocation
page execute and read and write
F8D0DCC000
stack
page read and write
1EEA538E000
heap
page read and write
29DD5829000
trusted library allocation
page read and write
1403AF000
unkown
page execute and read and write
270DEB93000
heap
page read and write
7FFD34984000
trusted library allocation
page read and write
140784000
remote allocation
page execute and read and write
23267612000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
F45000
heap
page read and write
2372670A000
trusted library allocation
page read and write
EF423C3000
stack
page read and write
140296000
remote allocation
page execute and read and write
232677DA000
trusted library allocation
page read and write
1EEB7893000
trusted library allocation
page read and write
7FFD34998000
trusted library allocation
page read and write
2373DC24000
heap
page read and write
140315000
unkown
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
270C7152000
trusted library allocation
page read and write
2326798A000
trusted library allocation
page read and write
7FFD347B4000
trusted library allocation
page read and write
23725458000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
2373D8DB000
heap
page read and write
270DEDAC000
heap
page read and write
7FFD34988000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
237356CB000
trusted library allocation
page read and write
7FFD34982000
trusted library allocation
page read and write
1386000
heap
page read and write
13E0B000
trusted library allocation
page read and write
7FF419E80000
trusted library allocation
page execute and read and write
2C8B56A7000
heap
page read and write
30D0000
trusted library allocation
page read and write
23200562000
heap
page read and write
1100000
trusted library allocation
page read and write
18C5000
heap
page read and write
270C6530000
trusted library allocation
page read and write
2326783F000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
357E000
stack
page read and write
4032000
trusted library allocation
page read and write
1EEA729E000
trusted library allocation
page read and write
1402BA000
remote allocation
page execute and read and write
14043A000
unkown
page execute and read and write
232000E6000
heap
page read and write
2373D3D5000
heap
page read and write
3D65000
trusted library allocation
page read and write
11E1000
stack
page read and write
2326772F000
trusted library allocation
page read and write
7FFD34994000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
F20000
heap
page read and write
1D7A3000
heap
page read and write
2326595B000
heap
page read and write
3EC8000
trusted library allocation
page read and write
1EEBFCF6000
heap
page read and write
29DD58EA000
trusted library allocation
page read and write
7FFD349B3000
trusted library allocation
page read and write
D88A4BC000
stack
page read and write
410B000
trusted library allocation
page read and write
4072000
trusted library allocation
page read and write
1C890000
heap
page read and write
1D885000
heap
page read and write
7FFD347A4000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
1720000
heap
page read and write
232004B0000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
1EEA5391000
heap
page read and write
232004F3000
heap
page read and write
40CB000
trusted library allocation
page read and write
2320063C000
heap
page read and write
23724C10000
heap
page read and write
7FFD34941000
trusted library allocation
page read and write
29DD3F77000
heap
page execute and read and write
14061000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
7FFD347B4000
trusted library allocation
page read and write
7FFD3495A000
trusted library allocation
page read and write
2320041A000
heap
page read and write
1D475000
heap
page read and write
7FFD34836000
trusted library allocation
page read and write
270C5E61000
heap
page read and write
D88A07A000
stack
page read and write
1D790000
heap
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
EF428F9000
stack
page read and write
23265BC0000
heap
page read and write
270C5E6D000
heap
page read and write
23267AFE000
trusted library allocation
page read and write
1403AD000
unkown
page execute and read and write
23725320000
heap
page read and write
7FFD34B80000
trusted library allocation
page read and write
23200487000
heap
page read and write
4164000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
1EEA76B1000
trusted library allocation
page read and write
29DD4028000
trusted library allocation
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
13A81000
trusted library allocation
page read and write
7FFD34917000
trusted library allocation
page read and write
23265B4E000
heap
page read and write
7FFD3491A000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page execute and read and write
1C6CC000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
1EEA5362000
heap
page read and write
798DDFE000
stack
page read and write
237356C1000
trusted library allocation
page read and write
1EEA7380000
trusted library allocation
page read and write
1EEA5550000
heap
page read and write
3F24000
trusted library allocation
page read and write
1D5B3000
heap
page read and write
23200573000
heap
page read and write
29DEC4CC000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
23267867000
trusted library allocation
page read and write
23724C98000
heap
page read and write
232677E1000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
1EEA5202000
unkown
page readonly
3110000
heap
page read and write
D88B18E000
stack
page read and write
140365000
remote allocation
page execute and read and write
1403F2000
remote allocation
page execute and read and write
2373D93E000
heap
page read and write
232679DB000
trusted library allocation
page read and write
270DEBA2000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
1EEA7220000
trusted library allocation
page read and write
2373DBF5000
heap
page read and write
2326761F000
trusted library allocation
page read and write
153F000
heap
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
270C84FC000
trusted library allocation
page read and write
232003DB000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
2326790B000
trusted library allocation
page read and write
3DD8000
trusted library allocation
page read and write
1469000
heap
page read and write
29DEC736000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1EEBFD6E000
heap
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
2373D890000
heap
page read and write
23267A25000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
23724B00000
heap
page read and write
1D660000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
29DD5172000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
270C6120000
heap
page read and write
2C8B5678000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
270DEDF9000
heap
page read and write
270C7ABD000
trusted library allocation
page read and write
1401C5000
remote allocation
page execute and read and write
7FFD34BF0000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page read and write
270C5E7F000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
3170000
heap
page execute and read and write
7DF47B790000
trusted library allocation
page execute and read and write
23200647000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
1D7E0000
heap
page execute and read and write
7FFD34A30000
trusted library allocation
page read and write
14013E000
remote allocation
page execute and read and write
23725290000
heap
page read and write
232677E7000
trusted library allocation
page read and write
D88A5BB000
stack
page read and write
10E0000
heap
page read and write
3D21000
trusted library allocation
page read and write
1EEBFBBF000
heap
page read and write
1C28D000
stack
page read and write
1EEA5326000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
270DEDA8000
heap
page read and write
7FFD34992000
trusted library allocation
page read and write
1EEBF9C1000
heap
page read and write
29DD446D000
trusted library allocation
page read and write
2373D8FF000
heap
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
232004B7000
heap
page read and write
3BC3000
trusted library allocation
page read and write
232002DC000
heap
page read and write
2C939A6D000
heap
page read and write
1EEBFA3A000
heap
page read and write
2373D9B0000
heap
page read and write
7FFD3493E000
trusted library allocation
page read and write
270DEE0E000
heap
page read and write
1EEBFAA1000
heap
page read and write
232005F0000
heap
page read and write
13832000
trusted library allocation
page read and write
1EEA724E000
trusted library allocation
page read and write
7FFD349C9000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
1460000
heap
page read and write
2C8B6F50000
heap
page read and write
1403B0000
remote allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
3C40000
trusted library allocation
page read and write
141A9000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
1EEBFC68000
heap
page read and write
139B000
heap
page read and write
23725E23000
trusted library allocation
page read and write
1EEBFBE6000
heap
page read and write
7FFD348BA000
trusted library allocation
page execute and read and write
1C8C5000
heap
page read and write
270D69ED000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
E96000
heap
page read and write
14047F000
unkown
page execute and read and write
1D697000
heap
page read and write
1EEA739C000
trusted library allocation
page read and write
140314000
remote allocation
page execute and read and write
1EEA7358000
trusted library allocation
page read and write
1C6E1000
heap
page read and write
7FFD347A2000
trusted library allocation
page read and write
798EE4E000
stack
page read and write
1D4F7000
heap
page read and write
1400B3000
remote allocation
page execute and read and write
1EEBFA46000
heap
page read and write
237353D1000
trusted library allocation
page read and write
29DD3F70000
heap
page execute and read and write
29DEC803000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
29DD3840000
heap
page read and write
7FFD349C2000
trusted library allocation
page read and write
1C786000
heap
page read and write
232659C4000
heap
page read and write
1EEBFA98000
heap
page read and write
7FFD34792000
trusted library allocation
page read and write
29DD38C7000
heap
page read and write
3EDA000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
1EEA58B5000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
7FFD34972000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
270DEDA0000
heap
page read and write
1EEBFE08000
heap
page read and write
EF42A3E000
stack
page read and write
1C8D7000
heap
page read and write
237356BD000
trusted library allocation
page read and write
7FFD34914000
trusted library allocation
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
29DE4013000
trusted library allocation
page read and write
798E3FF000
stack
page read and write
270C5E69000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
270C7A36000
trusted library allocation
page read and write
1BD87000
heap
page read and write
F8D10FF000
stack
page read and write
1EEA538C000
heap
page read and write
7FFD34984000
trusted library allocation
page read and write
1400B9000
unkown
page execute and read and write
7FFD34980000
trusted library allocation
page read and write
1531000
heap
page read and write
7FFD3493C000
trusted library allocation
page read and write
798E47B000
stack
page read and write
7FFD34934000
trusted library allocation
page read and write
7DF445590000
trusted library allocation
page execute and read and write
23277C79000
trusted library allocation
page read and write
1D09E000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
1340000
heap
page read and write
237255F9000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
23277521000
trusted library allocation
page read and write
1775000
heap
page read and write
1EEBFA6E000
heap
page read and write
1382A000
trusted library allocation
page read and write
29DD4F3F000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
1BA30000
trusted library allocation
page read and write
1EEA74F4000
trusted library allocation
page read and write
2C8B55E0000
direct allocation
page execute read
140453000
remote allocation
page execute and read and write
140438000
remote allocation
page execute and read and write
232679AC000
trusted library allocation
page read and write
1D66D000
heap
page read and write
140115000
unkown
page execute and read and write
93875FE000
stack
page read and write
23277D87000
trusted library allocation
page read and write
3F62000
trusted library allocation
page read and write
2372614C000
trusted library allocation
page read and write
1398000
heap
page read and write
1D596000
heap
page read and write
1D80E000
heap
page read and write
1EEBFD56000
heap
page read and write
1400ED000
unkown
page execute and read and write
1D689000
heap
page read and write
140177000
remote allocation
page execute and read and write
7FFD34940000
trusted library allocation
page read and write
13AE9000
trusted library allocation
page read and write
40FE000
trusted library allocation
page read and write
14034D000
unkown
page execute and read and write
1C8DB000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD3477A000
trusted library allocation
page read and write
140252000
remote allocation
page execute and read and write
29DD3720000
heap
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
1EEBFDAC000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
3AFF000
trusted library allocation
page read and write
13839000
trusted library allocation
page read and write
1D5AB000
heap
page read and write
232004AA000
heap
page read and write
140113000
remote allocation
page execute and read and write
270DEE3F000
heap
page read and write
7FFD34946000
trusted library allocation
page read and write
29DEC4A8000
heap
page read and write
1C6F4000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
642000
unkown
page readonly
29DD5DC1000
trusted library allocation
page read and write
10E5000
heap
page read and write
232003F1000
heap
page read and write
13CB2000
trusted library allocation
page read and write
29DD3E60000
heap
page read and write
F4C000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1EEBFD8A000
heap
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
1EEA5630000
heap
page execute and read and write
29DD5D76000
trusted library allocation
page read and write
1C8BB000
heap
page read and write
270D69FB000
trusted library allocation
page read and write
7FFD34BD0000
trusted library allocation
page read and write
7FFD349A2000
trusted library allocation
page read and write
29DD49F2000
trusted library allocation
page read and write
29DE3FC1000
trusted library allocation
page read and write
23724C6F000
heap
page read and write
29DE3FD1000
trusted library allocation
page read and write
1EEA534B000
heap
page read and write
798DF79000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
23724C5D000
heap
page read and write
1411F000
trusted library allocation
page read and write
29DEC5E0000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
23200122000
heap
page read and write
1EEA58B0000
heap
page read and write
1CC3E000
stack
page read and write
2320010F000
heap
page read and write
DE1000
stack
page read and write
BD4E9FF000
stack
page read and write
7FFD34AF2000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
1440F000
trusted library allocation
page read and write
140397000
remote allocation
page execute and read and write
E21000
stack
page read and write
1450000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
140292000
remote allocation
page execute and read and write
7FFD349E0000
trusted library allocation
page read and write
1403AE000
remote allocation
page execute and read and write
1EEBFE19000
heap
page read and write
29DE428C000
trusted library allocation
page read and write
4047000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
23265B40000
heap
page read and write
1404F5000
remote allocation
page execute and read and write
237251B0000
heap
page read and write
270C7E7D000
trusted library allocation
page read and write
798F04E000
stack
page read and write
14007D000
unkown
page execute and read and write
7FFD347A2000
trusted library allocation
page read and write
13581000
trusted library allocation
page read and write
2373D98C000
heap
page read and write
1EEBFD13000
heap
page read and write
270C65EA000
heap
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
ED0000
heap
page read and write
1EEB78A8000
trusted library allocation
page read and write
1C6B0000
heap
page read and write
14047C000
remote allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
1EEA72F0000
trusted library allocation
page read and write
23267510000
heap
page read and write
140000000
remote allocation
page execute and read and write
7FFD34970000
trusted library allocation
page execute and read and write
2326768E000
trusted library allocation
page read and write
1EEBFDE4000
heap
page read and write
1EEBFDB2000
heap
page read and write
1401D3000
remote allocation
page execute and read and write
29DEC73A000
heap
page read and write
29DD5D9C000
trusted library allocation
page read and write
7FFD34764000
trusted library allocation
page read and write
7FFD3494B000
trusted library allocation
page read and write
3C53000
trusted library allocation
page read and write
23267962000
trusted library allocation
page read and write
1CFCF000
stack
page read and write
1EEA7337000
trusted library allocation
page read and write
29DD50BC000
trusted library allocation
page read and write
1EEBFD9E000
heap
page read and write
29DD3A70000
trusted library allocation
page read and write
2C93A46D000
heap
page read and write
7FFD34816000
trusted library allocation
page read and write
7FFD34988000
trusted library allocation
page read and write
29DD3A85000
heap
page read and write
7FFD34C00000
trusted library allocation
page read and write
7FFD34AF9000
trusted library allocation
page read and write
23724C59000
heap
page read and write
29DEBFA8000
heap
page read and write
1EEBFBBC000
heap
page read and write
3E18000
trusted library allocation
page read and write
ED2000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
640000
unkown
page readonly
140293000
unkown
page execute and read and write
D88AF8E000
stack
page read and write
3E86000
trusted library allocation
page read and write
1EEA7331000
trusted library allocation
page read and write
1EEA7490000
trusted library allocation
page read and write
2373DB0C000
heap
page read and write
138B9000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
7FFD34886000
trusted library allocation
page execute and read and write
1D775000
heap
page read and write
EF4388E000
stack
page read and write
7FFD3491E000
trusted library allocation
page read and write
1EEB7869000
trusted library allocation
page read and write
7FFD34982000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
29DD3F95000
heap
page read and write
7FFD349C6000
trusted library allocation
page read and write
29DD389F000
heap
page read and write
23267832000
trusted library allocation
page read and write
23265880000
heap
page read and write
36AA000
trusted library allocation
page read and write
23267A2B000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
1D66F000
heap
page read and write
23200305000
heap
page read and write
23725270000
heap
page execute and read and write
EF42DBB000
stack
page read and write
139B9000
trusted library allocation
page read and write
23724D45000
heap
page read and write
1EEBFA55000
heap
page read and write
23735444000
trusted library allocation
page read and write
1EEA75BE000
trusted library allocation
page read and write
232004E4000
heap
page read and write
1EEBFC51000
heap
page read and write
232658D0000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
2373D8AD000
heap
page read and write
1557000
heap
page read and write
1D4FF000
heap
page read and write
1400B2000
unkown
page execute and read and write
1EEA746E000
trusted library allocation
page read and write
1EEBF9F0000
heap
page read and write
7FFD349A9000
trusted library allocation
page read and write
1EEBFE01000
heap
page read and write
232005B0000
heap
page read and write
1404B0000
unkown
page execute and read and write
29DD3F00000
heap
page execute and read and write
40E5000
trusted library allocation
page read and write
36EA000
trusted library allocation
page read and write
232005F3000
heap
page read and write
2373DAB0000
heap
page read and write
1860000
heap
page read and write
270C5EA5000
heap
page read and write
1EEA75CA000
trusted library allocation
page read and write
1C8B6000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
3EBB000
trusted library allocation
page read and write
140A9000
trusted library allocation
page read and write
1EEA71B2000
trusted library allocation
page read and write
1EEBFC66000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
1D03F000
stack
page read and write
232005B6000
heap
page read and write
23726143000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
1EEBFB96000
heap
page read and write
29DEC7AD000
heap
page read and write
2373DAE4000
heap
page read and write
23267AF8000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
1EEB7845000
trusted library allocation
page read and write
D889EFE000
stack
page read and write
7FFD34784000
trusted library allocation
page read and write
3D6F000
stack
page read and write
270DEDA4000
heap
page read and write
1D855000
heap
page read and write
7FFD347A4000
trusted library allocation
page read and write
7FFD34BD0000
trusted library allocation
page execute and read and write
1D7B8000
heap
page read and write
140396000
unkown
page execute and read and write
1430000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
23267650000
trusted library allocation
page read and write
1C83F000
stack
page read and write
1D762000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34836000
trusted library allocation
page read and write
232002C4000
heap
page read and write
EF4287E000
stack
page read and write
7FFD34946000
trusted library allocation
page read and write
1404F9000
unkown
page execute and read and write
D88A179000
stack
page read and write
2373D956000
heap
page read and write
23267A49000
trusted library allocation
page read and write
29DEC76A000
heap
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
14034F000
unkown
page execute and read and write
D88A337000
stack
page read and write
BD501FE000
stack
page read and write
29DD57C3000
trusted library allocation
page read and write
23277D32000
trusted library allocation
page read and write
1466000
heap
page read and write
3E9A000
trusted library allocation
page read and write
1EEA74BD000
trusted library allocation
page read and write
23265B45000
heap
page read and write
7FFD349C4000
trusted library allocation
page read and write
2326591B000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
23200651000
heap
page read and write
1D78F000
stack
page read and write
232002D8000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
270C6180000
heap
page read and write
3B2A000
trusted library allocation
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
1EEA534E000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
2320068D000
heap
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
13A9B000
trusted library allocation
page read and write
1EEA72DC000
trusted library allocation
page read and write
29DEC808000
heap
page read and write
140298000
unkown
page execute and read and write
1EEA5510000
heap
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
7FFD348BF000
trusted library allocation
page execute and read and write
270DEBF0000
heap
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
1EEA53EF000
heap
page read and write
1710000
heap
page execute and read and write
D889B63000
stack
page read and write
237251F0000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
232679C6000
trusted library allocation
page read and write
237271A7000
trusted library allocation
page read and write
232003E0000
heap
page read and write
7FFD34B9C000
trusted library allocation
page read and write
270C75FF000
trusted library allocation
page read and write
29DD3820000
heap
page read and write
13A07000
trusted library allocation
page read and write
23267A3D000
trusted library allocation
page read and write
2373D990000
heap
page read and write
237252D0000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
29DD4F33000
trusted library allocation
page read and write
7FFD34951000
trusted library allocation
page read and write
270C804B000
trusted library allocation
page read and write
14034A000
remote allocation
page execute and read and write
3B8E000
trusted library allocation
page read and write
1110000
heap
page read and write
14047E000
remote allocation
page execute and read and write
7FFD348B0000
trusted library allocation
page execute and read and write
13A87000
trusted library allocation
page read and write
1EEA71F6000
trusted library allocation
page read and write
1427000
heap
page read and write
1D88E000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
1EEA5530000
heap
page read and write
1D784000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
1434000
heap
page read and write
EF4277E000
stack
page read and write
23200483000
heap
page read and write
23277D03000
trusted library allocation
page read and write
1C9EE000
heap
page read and write
BD4F9FF000
stack
page read and write
1C8CD000
heap
page read and write
23265AA3000
heap
page execute and read and write
7FFD3499D000
trusted library allocation
page read and write
EE0000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
1EEBFE21000
heap
page read and write
7FFD3481C000
trusted library allocation
page execute and read and write
237271EC000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD3495A000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
270DEF4B000
heap
page read and write
1BAB0000
trusted library allocation
page read and write
270C8521000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
14032B000
remote allocation
page execute and read and write
798DFFD000
stack
page read and write
1EEA7234000
trusted library allocation
page read and write
1EEBFA17000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
EF426FF000
stack
page read and write
1D50000
heap
page read and write
23265BC5000
heap
page read and write
13D32000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
270DEB40000
heap
page read and write
270DEDB8000
heap
page read and write
2320066E000
heap
page read and write
1C720000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
2373DC6D000
heap
page read and write
7FFD34792000
trusted library allocation
page read and write
2326785A000
trusted library allocation
page read and write
270C65C0000
trusted library allocation
page read and write
1EEA753E000
trusted library allocation
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
7FFD34856000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
D889FFE000
stack
page read and write
7FFD34964000
trusted library allocation
page read and write
2326737B000
heap
page read and write
23267791000
trusted library allocation
page read and write
29DEC6C4000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
270C7705000
trusted library allocation
page read and write
232678DD000
trusted library allocation
page read and write
29DD52A0000
trusted library allocation
page read and write
1D44E000
heap
page read and write
1D7F7000
heap
page read and write
798DD7F000
stack
page read and write
2373D952000
heap
page read and write
1EEBFA77000
heap
page read and write
3C28000
trusted library allocation
page read and write
7FFD34BC0000
trusted library allocation
page read and write
1404EA000
remote allocation
page execute and read and write
1CA61000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
29DD3A80000
heap
page read and write
140273000
remote allocation
page execute and read and write
29DE3FA1000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
7FFD34B8A000
trusted library allocation
page read and write
7FFD34978000
trusted library allocation
page read and write
270D6774000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
3E4F000
trusted library allocation
page read and write
29DEC7EB000
heap
page read and write
23724C4E000
heap
page read and write
433B000
trusted library allocation
page read and write
1D457000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
780000
heap
page read and write
3C34000
trusted library allocation
page read and write
23200619000
heap
page read and write
237264EE000
trusted library allocation
page read and write
1EEBF994000
heap
page read and write
798E1FD000
stack
page read and write
23726B00000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
23724C19000
heap
page read and write
14351000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1388000
heap
page read and write
1404FC000
remote allocation
page execute and read and write
1EEBFAE4000
heap
page read and write
7FFD349BE000
trusted library allocation
page read and write
13D77000
trusted library allocation
page read and write
1D441000
heap
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
7FFD34980000
trusted library allocation
page read and write
1D643000
heap
page read and write
1EEA7366000
trusted library allocation
page read and write
185F000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
23724D10000
heap
page read and write
7FFD349E6000
trusted library allocation
page read and write
3D08000
trusted library allocation
page read and write
237265DD000
trusted library allocation
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
2373DC86000
heap
page read and write
7FFD34A30000
trusted library allocation
page execute and read and write
23200080000
heap
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
140272000
remote allocation
page execute and read and write
E80000
heap
page read and write
F6E000
heap
page read and write
23726C5A000
trusted library allocation
page read and write
23277DC8000
trusted library allocation
page read and write
270DEAB7000
heap
page execute and read and write
23724C96000
heap
page read and write
2320014A000
heap
page read and write
23267AAD000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
7FFD347B2000
trusted library allocation
page read and write
1EEA71E9000
trusted library allocation
page read and write
2326760D000
trusted library allocation
page read and write
1EEBFD06000
heap
page read and write
1400E8000
remote allocation
page execute and read and write
232777BD000
trusted library allocation
page read and write
23265932000
heap
page read and write
23267750000
trusted library allocation
page read and write
29DD5DBC000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
29DD5802000
trusted library allocation
page read and write
35F0000
heap
page execute and read and write
7B0000
heap
page read and write
1D78C000
heap
page read and write
D88A53F000
stack
page read and write
237253B0000
trusted library allocation
page read and write
23200497000
heap
page read and write
D88A236000
stack
page read and write
29DEC742000
heap
page read and write
1D7AC000
heap
page read and write
7FFD34B00000
trusted library allocation
page read and write
23724D0B000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
1910000
heap
page read and write
23277D83000
trusted library allocation
page read and write
3ECE000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD3485C000
trusted library allocation
page execute and read and write
3F17000
trusted library allocation
page read and write
1EEA5409000
heap
page read and write
EF4378E000
stack
page read and write
BD4EDFF000
stack
page read and write
232679E2000
trusted library allocation
page read and write
1EEBFD82000
heap
page read and write
23200673000
heap
page read and write
F23000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
1CFFE000
stack
page read and write
EF42BB8000
stack
page read and write
7FFD34C00000
trusted library allocation
page read and write
1D045000
heap
page read and write
EF4297D000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
1401D1000
remote allocation
page execute and read and write
1400B1000
remote allocation
page execute and read and write
1EEA5320000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
EEC000
heap
page read and write
2320030C000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
785000
heap
page read and write
3D58000
trusted library allocation
page read and write
23724D40000
heap
page read and write
D88A1BE000
stack
page read and write
1C9BB000
heap
page read and write
7FFD347BB000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
13FC9000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
93869FC000
stack
page read and write
1EEBFBD4000
heap
page read and write
1D5D0000
trusted library section
page read and write
23200409000
heap
page read and write
29DEC7C4000
heap
page read and write
7FFD34982000
trusted library allocation
page read and write
14032A000
remote allocation
page execute and read and write
7FFD34AF8000
trusted library allocation
page read and write
270D6721000
trusted library allocation
page read and write
3B6A000
trusted library allocation
page read and write
270D69F3000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
1EEA74AA000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
29DD3887000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
1C793000
heap
page read and write
7FFD34BC0000
trusted library allocation
page execute and read and write
23277814000
trusted library allocation
page read and write
232005C0000
heap
page read and write
1EEBF9FC000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
EBB000
heap
page read and write
1EEA76F4000
trusted library allocation
page read and write
798E0F6000
stack
page read and write
14047A000
unkown
page execute and read and write
7FFD3478D000
trusted library allocation
page execute and read and write
1D471000
heap
page read and write
29DD3800000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
2320013E000
heap
page read and write
346F000
stack
page read and write
1401A000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
1EEB7975000
trusted library allocation
page read and write
232004C0000
heap
page read and write
434E000
trusted library allocation
page read and write
1EEB78D7000
trusted library allocation
page read and write
1D59B000
heap
page read and write
1EEA7297000
trusted library allocation
page read and write
23267969000
trusted library allocation
page read and write
35D0000
heap
page execute and read and write
1EEBFA7C000
heap
page read and write
1EEA722E000
trusted library allocation
page read and write
140479000
remote allocation
page execute and read and write
232009F0000
heap
page execute and read and write
7FFD34A20000
trusted library allocation
page read and write
3774000
heap
page read and write
23726FE6000
trusted library allocation
page read and write
D889F79000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
1D639000
heap
page read and write
13C9000
heap
page read and write
14013B000
remote allocation
page execute and read and write
7FFD3476D000
trusted library allocation
page execute and read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34BE6000
trusted library allocation
page read and write
1D747000
heap
page read and write
2320057C000
heap
page read and write
1EEBFA1F000
heap
page read and write
1C9B8000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
F8D15FF000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
EF4380C000
stack
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
EF42B3E000
stack
page read and write
2C8B7040000
heap
page read and write
23724C55000
heap
page read and write
7FFD348FF000
trusted library allocation
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
270C65D0000
heap
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
270DEAB0000
heap
page execute and read and write
23267712000
trusted library allocation
page read and write
232004CD000
heap
page read and write
D88A2BB000
stack
page read and write
1D739000
heap
page read and write
2326781F000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
232659BC000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
7FFD349C3000
trusted library allocation
page read and write
3EEE000
trusted library allocation
page read and write
13B11000
trusted library allocation
page read and write
7FFD34939000
trusted library allocation
page read and write
1EEBFC71000
heap
page read and write
232679B2000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
270DEDE2000
heap
page read and write
93865FE000
stack
page read and write
7FFD347A4000
trusted library allocation
page read and write
798DE7A000
stack
page read and write
1EEA5200000
unkown
page readonly
3EF5000
trusted library allocation
page read and write
7FFD34932000
trusted library allocation
page read and write
23200173000
heap
page read and write
1C700000
heap
page read and write
1D786000
heap
page read and write
270C6140000
heap
page read and write
2C8B5670000
heap
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
1EEBFA5C000
heap
page read and write
270C6150000
trusted library section
page read and write
29DD3E40000
heap
page readonly
232000C1000
heap
page read and write
232004C2000
heap
page read and write
23200665000
heap
page read and write
1402BB000
remote allocation
page execute and read and write
1EEBFA68000
heap
page read and write
232005BE000
heap
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
1EEA55A0000
trusted library allocation
page read and write
1D38E000
stack
page read and write
1EEBFAE7000
heap
page read and write
4135000
trusted library allocation
page read and write
F8D12FD000
stack
page read and write
2373D92E000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
14013F000
unkown
page execute and read and write
270C79A1000
trusted library allocation
page read and write
232004BE000
heap
page read and write
1EEBF970000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
270DEE8E000
heap
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
1D85E000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
232002C0000
heap
page read and write
1D3FE000
stack
page read and write
7FFD34951000
trusted library allocation
page read and write
1EEB7954000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
2373DC35000
heap
page read and write
23200421000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
23267991000
trusted library allocation
page read and write
23265760000
heap
page read and write
3A7E000
stack
page read and write
29DD571D000
trusted library allocation
page read and write
232003C0000
heap
page read and write
23725325000
heap
page read and write
140141000
remote allocation
page execute and read and write
1EEBF9D8000
heap
page read and write
23724D00000
heap
page read and write
185F000
stack
page read and write
7FFD349F0000
trusted library allocation
page read and write
14041F000
unkown
page execute and read and write
270C7A03000
trusted library allocation
page read and write
140454000
remote allocation
page execute and read and write
798DC73000
stack
page read and write
29DD3E50000
trusted library allocation
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
232677B8000
trusted library allocation
page read and write
1D1E000
stack
page read and write
29DD41C9000
trusted library allocation
page read and write
1EEA75EF000
trusted library allocation
page read and write
EF43A0C000
stack
page read and write
29DEC7F9000
heap
page read and write
29DE429A000
trusted library allocation
page read and write
F8D14FE000
stack
page read and write
29DEC768000
heap
page read and write
1D620000
heap
page read and write
232678D6000
trusted library allocation
page read and write
1EEBFC4C000
heap
page read and write
23200684000
heap
page read and write
F0C000
heap
page read and write
2327781D000
trusted library allocation
page read and write
149F000
heap
page read and write
137B000
heap
page read and write
40A2000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
232658F0000
heap
page read and write
270C6145000
heap
page read and write
140262000
unkown
page execute and read and write
7FFD34AB2000
trusted library allocation
page read and write
1EEB70C1000
trusted library allocation
page read and write
23267911000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
1EEA75D6000
trusted library allocation
page read and write
23267917000
trusted library allocation
page read and write
BD4FDFF000
stack
page read and write
2326762B000
trusted library allocation
page read and write
232679D4000
trusted library allocation
page read and write
237356DB000
trusted library allocation
page read and write
270C77BC000
trusted library allocation
page read and write
7FFD349A2000
trusted library allocation
page read and write
237253D1000
trusted library allocation
page read and write
270DEE19000
heap
page read and write
29DD5059000
trusted library allocation
page read and write
29DD388D000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
1EEBFCFD000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD3499A000
trusted library allocation
page read and write
29DEC6C0000
heap
page read and write
23277CC9000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
14A2000
heap
page read and write
7FFD34BA0000
trusted library allocation
page read and write
3E05000
trusted library allocation
page read and write
7FFD34B08000
trusted library allocation
page read and write
1EEBFC5D000
heap
page read and write
FC8000
heap
page read and write
270DEC30000
heap
page read and write
14022000
trusted library allocation
page read and write
7FFD3493E000
trusted library allocation
page read and write
7FFD34942000
trusted library allocation
page read and write
139D000
heap
page read and write
7FFD34C10000
trusted library allocation
page read and write
13CAA000
trusted library allocation
page read and write
3CE7000
trusted library allocation
page read and write
2327799D000
trusted library allocation
page read and write
1EEA72FD000
trusted library allocation
page read and write
7FFD349E9000
trusted library allocation
page read and write
1EEA73F3000
trusted library allocation
page read and write
232005FC000
heap
page read and write
3F90000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
7FFD349B4000
trusted library allocation
page read and write
237266D2000
trusted library allocation
page read and write
270C6010000
heap
page read and write
7FFD34B90000
trusted library allocation
page read and write
1D79F000
heap
page read and write
1EEBFA70000
heap
page read and write
1D4D1000
heap
page read and write
2373D8D3000
heap
page read and write
1BDA0000
trusted library allocation
page read and write
23200521000
heap
page read and write
1EEA72BA000
trusted library allocation
page read and write
1EEA75B1000
trusted library allocation
page read and write
1D658000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
1D7E1000
heap
page read and write
13C7000
heap
page read and write
F8D11FF000
stack
page read and write
7FFD34846000
trusted library allocation
page read and write
270C5EAA000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
7FFD349CD000
trusted library allocation
page read and write
29DEC8E0000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page read and write
232000F1000
heap
page read and write
1D83A000
heap
page read and write
136FA000
trusted library allocation
page read and write
7FFD34926000
trusted library allocation
page read and write
215E000
stack
page read and write
D88B087000
stack
page read and write
137D9000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
1360000
heap
page read and write
2320017A000
heap
page read and write
1EEA766E000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
1D86C000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
F4E000
heap
page read and write
1D55E000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
2320044E000
heap
page read and write
23265B4B000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
1EEBFDA2000
heap
page read and write
3C22000
trusted library allocation
page read and write
1EEBFCA6000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34AD3000
trusted library allocation
page read and write
1220000
heap
page read and write
7FFD34958000
trusted library allocation
page read and write
23725FD2000
trusted library allocation
page read and write
140412000
remote allocation
page execute and read and write
29DD4FCE000
trusted library allocation
page read and write
23200467000
heap
page read and write
EB3000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
1EEBFBFD000
heap
page read and write
23200611000
heap
page read and write
1EEB7805000
trusted library allocation
page read and write
23200339000
heap
page read and write
14037F000
remote allocation
page execute and read and write
232676DB000
trusted library allocation
page read and write
D88B10C000
stack
page read and write
140179000
unkown
page execute and read and write
14047D000
unkown
page execute and read and write
1EEA72D5000
trusted library allocation
page read and write
1D6A9000
heap
page read and write
140799000
remote allocation
page execute and read and write
798D9DE000
stack
page read and write
7FFD34960000
trusted library allocation
page read and write
1402CC000
remote allocation
page execute and read and write
1EEA73B8000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
29DD535B000
trusted library allocation
page read and write
1EEA7697000
trusted library allocation
page read and write
798E37C000
stack
page read and write
29DD4F3D000
trusted library allocation
page read and write
7FFD347C4000
trusted library allocation
page read and write
1EEB78A6000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
1D630000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
1EEBFA73000
heap
page read and write
7FFD34A15000
trusted library allocation
page read and write
3C3A000
trusted library allocation
page read and write
1D850000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
270DEF1C000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
1D3D0000
heap
page read and write
1EEB77F1000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page read and write
1EEBFA32000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
1D040000
heap
page read and write
270C5E5F000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
7FFD34B0C000
trusted library allocation
page read and write
140294000
remote allocation
page execute and read and write
2C8B5625000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
1EEBFDD8000
heap
page read and write
1EEA58BE000
heap
page read and write
29DEC41A000
heap
page read and write
7FFD34984000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
270D6A0B000
trusted library allocation
page read and write
9385DFF000
stack
page read and write
7FFD349D0000
trusted library allocation
page read and write
1EEA55C0000
trusted library allocation
page read and write
2C8B5590000
heap
page read and write
1EEBF9CF000
heap
page read and write
232000DE000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
23277D0F000
trusted library allocation
page read and write
2373DB18000
heap
page read and write
232659D6000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
23735401000
trusted library allocation
page read and write
13EEA000
trusted library allocation
page read and write
1C72A000
heap
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
D88A3BE000
stack
page read and write
232000B7000
heap
page read and write
13A01000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page read and write
14047B000
remote allocation
page execute and read and write
7FFD34780000
trusted library allocation
page read and write
1C4EC000
stack
page read and write
2326778B000
trusted library allocation
page read and write
3CA3000
trusted library allocation
page read and write
1EEBFAE2000
heap
page read and write
EF42AB7000
stack
page read and write
237253C0000
heap
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
1CAF5000
heap
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
237271CC000
trusted library allocation
page read and write
143BF000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD349A6000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
3BAF000
trusted library allocation
page read and write
14034E000
remote allocation
page execute and read and write
40B0000
trusted library allocation
page read and write
2C8B5620000
heap
page read and write
7DF42FE10000
trusted library allocation
page execute and read and write
23724C57000
heap
page read and write
1EEA74B0000
trusted library allocation
page read and write
7FFD34C20000
trusted library allocation
page read and write
1D62D000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
23726762000
trusted library allocation
page read and write
270C781F000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
270C7F89000
trusted library allocation
page read and write
140465000
remote allocation
page execute and read and write
798EF47000
stack
page read and write
2373DA90000
heap
page execute and read and write
29DEC4EA000
heap
page read and write
7FFD349E9000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page execute and read and write
7FFD34876000
trusted library allocation
page execute and read and write
23725230000
trusted library allocation
page read and write
7FFD34AE9000
trusted library allocation
page read and write
7FFD349A4000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
29DEC764000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
1713000
heap
page execute and read and write
3E79000
trusted library allocation
page read and write
140297000
remote allocation
page execute and read and write
29DEC434000
heap
page read and write
23726670000
trusted library allocation
page read and write
14301000
trusted library allocation
page read and write
1EEA75D0000
trusted library allocation
page read and write
D889BEF000
stack
page read and write
3D4B000
trusted library allocation
page read and write
237265A4000
trusted library allocation
page read and write
270C84D7000
trusted library allocation
page read and write
1915000
heap
page read and write
232775C5000
trusted library allocation
page read and write
29DD387F000
heap
page read and write
EAF000
heap
page read and write
270DEB95000
heap
page read and write
270C6701000
trusted library allocation
page read and write
1EEA74A4000
trusted library allocation
page read and write
3960000
heap
page execute and read and write
There are 1714 hidden memdumps, click here to show them.