IOC Report
CTIPUPiILj.exe

loading gif

Files

File Path
Type
Category
Malicious
CTIPUPiILj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\System
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x5a2d7364, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_04mzi5c1.e2s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ii0eyct.03j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ip1nvfe.vhk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xrj5cw2.vjy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qmkzsdr.jpm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3bzyz3jz.teb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wv5ne0j.jxt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bngvm1dp.qnh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjwa5z33.qh5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ef2dv2v3.4gf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcqn3pmw.n3u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmjmlvdq.wht.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pe1h2ycy.ynr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rubsvzex.ru3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqsablrj.3xy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_suulfdin.mml.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 26 18:19:51 2024, mtime=Fri Jul 26 18:19:51 2024, atime=Fri Jul 26 18:19:51 2024, length=42496, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CTIPUPiILj.exe
"C:\Users\user\Desktop\CTIPUPiILj.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CTIPUPiILj.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'CTIPUPiILj.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\System'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\Users\user\AppData\Roaming\System"
malicious
C:\Users\user\AppData\Roaming\System
C:\Users\user\AppData\Roaming\System
malicious
C:\Users\user\AppData\Roaming\System
C:\Users\user\AppData\Roaming\System
malicious
C:\Users\user\AppData\Roaming\System
C:\Users\user\AppData\Roaming\System
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
usually-carolina.gl.at.ply.gg
malicious
https://g.live.com/odclientsettings/Prod/C:
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.mic_
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://osoft.co
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.microsoft.
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
usually-carolina.gl.at.ply.gg
147.185.221.20
malicious
15.164.165.52.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.20
usually-carolina.gl.at.ply.gg
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
System
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B82000
unkown
page readonly
malicious
2FB1000
trusted library allocation
page read and write
malicious
1F90D3F6000
heap
page read and write
20FAC22D000
trusted library allocation
page read and write
1F90D2E1000
heap
page read and write
2409F722000
trusted library allocation
page read and write
1D97235B000
heap
page read and write
7FF84915C000
trusted library allocation
page read and write
1D9F5560000
heap
page read and write
1D9743A5000
heap
page read and write
1D974219000
heap
page read and write
1F90B42E000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
1F90D32B000
heap
page read and write
7FF849008000
trusted library allocation
page read and write
F48D87B000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
C65000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
C60000
heap
page read and write
1D974224000
heap
page read and write
1D972348000
heap
page read and write
20FABD46000
trusted library allocation
page read and write
1D974203000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
2D6E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
A0B000
heap
page read and write
238AC9C0000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1D974221000
heap
page read and write
1D9F5815000
heap
page read and write
B0B2F7E000
stack
page read and write
1D974227000
heap
page read and write
1D9F55A5000
heap
page read and write
2409CAAC000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1F90D2F0000
heap
page read and write
F48E3FB000
stack
page read and write
1F90D33B000
heap
page read and write
1F90D46E000
heap
page read and write
15576657000
heap
page read and write
1F90D305000
heap
page read and write
1200000
heap
page read and write
7FF849123000
trusted library allocation
page read and write
1F90D46E000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1F90D32B000
heap
page read and write
1D974356000
heap
page read and write
F48EFFE000
unkown
page readonly
1D974225000
heap
page read and write
1D9741E8000
heap
page read and write
1D9F77D9000
heap
page read and write
1555EF54000
trusted library allocation
page read and write
238A7E00000
heap
page read and write
1F90D3FA000
heap
page read and write
1D974206000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
1D981E29000
trusted library allocation
page read and write
1D974210000
heap
page read and write
240B6E02000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1F90D327000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
20FC2D40000
heap
page read and write
1D9F559F000
heap
page read and write
20FC2DE8000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1D974219000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
238A7692000
heap
page read and write
1D9741D9000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
F64000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1D9F5510000
trusted library section
page read and write
1F90D3F1000
heap
page read and write
1F90B486000
heap
page read and write
2409CABE000
heap
page read and write
238A7600000
heap
page read and write
42F3279000
stack
page read and write
2D70000
trusted library allocation
page read and write
1D9741C2000
heap
page read and write
1F90D312000
heap
page read and write
1D97420C000
heap
page read and write
1555C2C8000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
1D9F74A2000
heap
page read and write
1F90D4A9000
heap
page read and write
1F90D46E000
heap
page read and write
F48F27E000
unkown
page readonly
1D974351000
heap
page read and write
1D9741D3000
heap
page read and write
7DF452780000
trusted library allocation
page execute and read and write
1D9742EA000
heap
page read and write
238ACA60000
trusted library allocation
page read and write
1D9F6F20000
heap
page read and write
1F90B4AE000
heap
page read and write
1F90D32F000
heap
page read and write
1D98130F000
trusted library allocation
page read and write
F48E97E000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
288F000
trusted library allocation
page read and write
1F90D3E9000
heap
page read and write
1D974300000
heap
page read and write
1D974219000
heap
page read and write
1555C1C0000
heap
page read and write
1D9741CF000
heap
page read and write
1D980DB9000
trusted library allocation
page read and write
240A04F9000
trusted library allocation
page read and write
1F90D324000
heap
page read and write
1F90D32F000
heap
page read and write
1F90D32B000
heap
page read and write
1D9741F8000
heap
page read and write
1D9813C9000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1D97421D000
heap
page read and write
1C38D000
stack
page read and write
1F90D307000
heap
page read and write
240AE760000
trusted library allocation
page read and write
7FF84916C000
trusted library allocation
page read and write
1F90D467000
heap
page read and write
7FF849008000
trusted library allocation
page read and write
F48ECFE000
unkown
page readonly
1F90D3E6000
heap
page read and write
240B6B50000
trusted library allocation
page read and write
1D974215000
heap
page read and write
1D976A10000
heap
page read and write
1555C301000
heap
page read and write
238A7F1A000
heap
page read and write
1D972280000
heap
page read and write
1D974215000
heap
page read and write
238ACC2C000
heap
page read and write
1D9F55E7000
heap
page read and write
7FF8491FC000
trusted library allocation
page read and write
1D9741FB000
heap
page read and write
F48F8FE000
unkown
page readonly
7FF848FA0000
trusted library allocation
page read and write
20FAAECD000
trusted library allocation
page read and write
1D9902EF000
trusted library allocation
page read and write
20FAB5F9000
trusted library allocation
page read and write
1D9F7060000
heap
page execute and read and write
1F90D3F1000
heap
page read and write
1555EC48000
trusted library allocation
page read and write
1F90D2E0000
heap
page read and write
1F90D326000
heap
page read and write
1D9F5540000
trusted library allocation
page read and write
1D9741E8000
heap
page read and write
240B6A30000
heap
page read and write
12D5000
heap
page read and write
1D973BD0000
heap
page read and write
1F90B45B000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
1D9743A5000
heap
page read and write
1D9F55BF000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
5C1000
stack
page read and write
7DF4615B0000
trusted library allocation
page execute and read and write
2409F788000
trusted library allocation
page read and write
238ACCCF000
heap
page read and write
1F90D31B000
heap
page read and write
20FA8F55000
heap
page read and write
1D974221000
heap
page read and write
DCC7BCC000
stack
page read and write
1D9741F2000
heap
page read and write
1F90D307000
heap
page read and write
1D976A05000
heap
page read and write
1557668E000
heap
page read and write
1D9741F7000
heap
page read and write
1D97421E000
heap
page read and write
1D97422D000
heap
page read and write
42F2EFE000
stack
page read and write
1F90D32F000
heap
page read and write
20FABDCD000
trusted library allocation
page read and write
1D9742B0000
heap
page read and write
1D9741DB000
heap
page read and write
1D9741C0000
heap
page read and write
1F90D339000
heap
page read and write
AB7000
heap
page read and write
1D9741D3000
heap
page read and write
FB6000
heap
page read and write
1D9741E4000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1D974216000
heap
page read and write
42F337E000
stack
page read and write
238A767B000
heap
page read and write
1F90D31B000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1B560000
heap
page execute and read and write
F48E6FE000
unkown
page readonly
1F90B45A000
heap
page read and write
1555C2FD000
heap
page read and write
3322F4E000
stack
page read and write
9F0000
heap
page read and write
1D974206000
heap
page read and write
20FA8F30000
trusted library allocation
page read and write
238A8001000
trusted library allocation
page read and write
1F90D480000
heap
page read and write
16CE000
stack
page read and write
1D97421D000
heap
page read and write
1F90D48F000
heap
page read and write
F20000
heap
page read and write
1080000
heap
page read and write
1D9741FB000
heap
page read and write
1F90D31B000
heap
page read and write
1F90D496000
heap
page read and write
1D9741EE000
heap
page read and write
2DDF000
heap
page read and write
1D974341000
heap
page read and write
1F90D31B000
heap
page read and write
F61000
heap
page read and write
1D976A14000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
1F90D336000
heap
page read and write
F48EB7E000
stack
page read and write
1F911911000
heap
page read and write
1D9F751D000
heap
page read and write
1F90D2F9000
heap
page read and write
1F911913000
heap
page read and write
1F90D413000
heap
page read and write
1D9741EF000
heap
page read and write
1D980001000
trusted library allocation
page read and write
1D9741D3000
heap
page read and write
1D9742DD000
heap
page read and write
238ACA30000
trusted library allocation
page read and write
1D9741E8000
heap
page read and write
1D9741E9000
heap
page read and write
3322176000
stack
page read and write
1F90B453000
heap
page read and write
1F90D30E000
heap
page read and write
123E000
stack
page read and write
1D9741C0000
heap
page read and write
DDA000
heap
page read and write
1F90D2E6000
heap
page read and write
1D974215000
heap
page read and write
1F90D2FE000
heap
page read and write
1F90D304000
heap
page read and write
238ACC1F000
heap
page read and write
1555C31D000
heap
page read and write
F26000
heap
page read and write
1F90D342000
heap
page read and write
20FC3127000
heap
page read and write
1130000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2409CAA2000
heap
page read and write
1F90D3FC000
heap
page read and write
1F90D4A5000
heap
page read and write
1555E0BA000
trusted library allocation
page read and write
240B6E4B000
heap
page read and write
1D97421D000
heap
page read and write
F48EDFE000
stack
page read and write
7DF48B9B0000
trusted library allocation
page execute and read and write
1F90B437000
heap
page read and write
1D976C60000
heap
page read and write
1D974388000
heap
page read and write
33223FE000
stack
page read and write
9A0000
heap
page read and write
1D9741EE000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1F90D30D000
heap
page read and write
238A769E000
heap
page read and write
1D97421A000
heap
page read and write
1D9741EF000
heap
page read and write
1D972364000
heap
page read and write
7FF849149000
trusted library allocation
page read and write
155762AB000
heap
page read and write
1D9741E8000
heap
page read and write
1D974202000
heap
page read and write
1555C3B6000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
1F90D42D000
heap
page read and write
20FABD13000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1D974223000
heap
page read and write
1D9742D0000
heap
page read and write
1D9F5810000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1D974202000
heap
page read and write
1F90D337000
heap
page read and write
1D974221000
heap
page read and write
7FF849162000
trusted library allocation
page read and write
1D9741DA000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1D9742DB000
heap
page read and write
12E8000
heap
page read and write
1F90D322000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
1D9742EA000
heap
page read and write
42F40CC000
stack
page read and write
1030000
trusted library allocation
page read and write
1D974212000
heap
page read and write
238ACB90000
trusted library allocation
page read and write
20FAC82A000
trusted library allocation
page read and write
1BB4E000
stack
page read and write
7FF8491F0000
trusted library allocation
page read and write
1F90D322000
heap
page read and write
1F90F520000
trusted library allocation
page read and write
1F90D32D000
heap
page read and write
12B43000
trusted library allocation
page read and write
20FA8FE0000
trusted library allocation
page read and write
1D974341000
heap
page read and write
1F90D460000
heap
page read and write
2409F816000
trusted library allocation
page read and write
20FAB970000
trusted library allocation
page read and write
20FAB77F000
trusted library allocation
page read and write
1F90D30D000
heap
page read and write
9F88DBE000
stack
page read and write
238A7671000
heap
page read and write
15576595000
heap
page read and write
1D9741D9000
heap
page read and write
1D97420C000
heap
page read and write
1F90D312000
heap
page read and write
1F90D413000
heap
page read and write
1555DC60000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
238A8630000
trusted library section
page readonly
33220F9000
stack
page read and write
145E000
stack
page read and write
59DB59000
stack
page read and write
1D97235E000
heap
page read and write
1F90D308000
heap
page read and write
1D973BDE000
heap
page read and write
238A8620000
trusted library section
page readonly
1555C440000
trusted library allocation
page read and write
1D9743A3000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1F90D32B000
heap
page read and write
1D9F5550000
heap
page readonly
1D9741C8000
heap
page read and write
1D9741D4000
heap
page read and write
1D9741DF000
heap
page read and write
1F90D2E0000
heap
page read and write
1D9742FF000
heap
page read and write
1D974345000
heap
page read and write
1F90D46E000
heap
page read and write
1F90D48D000
heap
page read and write
7FF849210000
trusted library allocation
page execute and read and write
1D9741D5000
heap
page read and write
1D974206000
heap
page read and write
1D9742E1000
heap
page read and write
A2A000
heap
page read and write
155765F0000
heap
page read and write
240AE9DD000
trusted library allocation
page read and write
1D974219000
heap
page read and write
240AE711000
trusted library allocation
page read and write
B0B2DFF000
stack
page read and write
2D80000
heap
page read and write
1D9F5500000
trusted library section
page read and write
1D9742F0000
heap
page read and write
1D9741FB000
heap
page read and write
1F90D467000
heap
page read and write
DCC6AFE000
stack
page read and write
F48F2FE000
unkown
page readonly
1F90D31B000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
1F90D3FC000
heap
page read and write
1D9F76C0000
heap
page read and write
1D9741DB000
heap
page read and write
1C6EA000
stack
page read and write
1D974225000
heap
page read and write
1F90D3FE000
heap
page read and write
20FA8FB0000
trusted library allocation
page read and write
1F90CCD5000
heap
page read and write
1D9741CA000
heap
page read and write
1D974226000
heap
page read and write
1F90D407000
heap
page read and write
1F90D2F6000
heap
page read and write
1D9742D9000
heap
page read and write
DCC697E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
1F90D333000
heap
page read and write
3322279000
stack
page read and write
12B0000
trusted library allocation
page read and write
7FF848FE4000
trusted library allocation
page read and write
238ACCCB000
heap
page read and write
1F90D3FA000
heap
page read and write
1556E186000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
20FA8C90000
heap
page read and write
1D974351000
heap
page read and write
1D972368000
heap
page read and write
1D990021000
trusted library allocation
page read and write
1D9742D7000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
1D974219000
heap
page read and write
1F90D480000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
FDF000
stack
page read and write
1F90D31B000
heap
page read and write
1D9F7480000
heap
page read and write
1F90D46E000
heap
page read and write
F48F0FE000
stack
page read and write
1F90D327000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1D9741C0000
heap
page read and write
20FA8E59000
heap
page read and write
20FC2DA9000
heap
page read and write
1D9741CB000
heap
page read and write
1555C2DE000
heap
page read and write
1555DC20000
heap
page readonly
1F90D30D000
heap
page read and write
1555F222000
trusted library allocation
page read and write
1D9741E4000
heap
page read and write
2409FF87000
trusted library allocation
page read and write
20FC2DD6000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
238A7DE1000
trusted library allocation
page read and write
1D974202000
heap
page read and write
1F90D311000
heap
page read and write
20FBACE9000
trusted library allocation
page read and write
1D976A10000
heap
page read and write
1F90CC50000
heap
page read and write
7FF849144000
trusted library allocation
page read and write
9F88B7D000
stack
page read and write
1F90D329000
heap
page read and write
F92000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1F90CCDE000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1F90D30D000
heap
page read and write
1D974221000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
1F90D2FA000
heap
page read and write
1D9F7466000
heap
page read and write
B0B31FC000
stack
page read and write
1F911F90000
heap
page readonly
DCC6DFE000
stack
page read and write
2409E76C000
trusted library allocation
page read and write
1D974390000
heap
page read and write
B80000
unkown
page readonly
1F90CCD0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
240B6A89000
heap
page read and write
188AC670000
heap
page read and write
1D9741EF000
heap
page read and write
1555F7E8000
trusted library allocation
page read and write
3321E7F000
stack
page read and write
1D9742E2000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1D974206000
heap
page read and write
900000
unkown
page readonly
7FF849170000
trusted library allocation
page read and write
1D990307000
trusted library allocation
page read and write
9F88BF6000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
C0CEA7F000
stack
page read and write
1D974356000
heap
page read and write
1F90D407000
heap
page read and write
1F90D3D2000
heap
page read and write
1D9741F7000
heap
page read and write
1F90D300000
heap
page read and write
1D972398000
heap
page read and write
20FA8DD0000
heap
page read and write
1F90D2E7000
heap
page read and write
1F911F80000
trusted library allocation
page read and write
2409E6F1000
trusted library allocation
page read and write
1F90D312000
heap
page read and write
10F0000
heap
page read and write
20FABD8F000
trusted library allocation
page read and write
1F90D4BE000
heap
page read and write
1F911928000
heap
page read and write
1F90D497000
heap
page read and write
42F32F8000
stack
page read and write
1555EE30000
trusted library allocation
page read and write
1D9F5520000
trusted library allocation
page read and write
20FA8D90000
heap
page read and write
1BD3E000
heap
page read and write
238ACB80000
trusted library allocation
page read and write
1F90B466000
heap
page read and write
1D974228000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
2409F142000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1D974388000
heap
page read and write
1D990031000
trusted library allocation
page read and write
F9A000
heap
page read and write
20FA8DF0000
trusted library section
page read and write
1D9741D5000
heap
page read and write
1F90D430000
heap
page read and write
1F90D2FE000
heap
page read and write
7FF849168000
trusted library allocation
page read and write
20FA9055000
heap
page read and write
238AE000000
heap
page read and write
1F90D2FD000
heap
page read and write
1555C400000
heap
page read and write
1555C34B000
heap
page read and write
1D9F76F4000
heap
page read and write
1555F0A6000
trusted library allocation
page read and write
20FC31CB000
heap
page read and write
1D9741FB000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
7FF849150000
trusted library allocation
page read and write
1F90D2F3000
heap
page read and write
1F90B42D000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1F911D30000
heap
page read and write
238A76A4000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1D9741E1000
heap
page read and write
238ACA84000
trusted library allocation
page read and write
1D974209000
heap
page read and write
20FAB611000
trusted library allocation
page read and write
F48EF7E000
stack
page read and write
1D9F6E60000
trusted library allocation
page read and write
1F90D341000
heap
page read and write
238ACA40000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
1D9741C2000
heap
page read and write
155764DC000
heap
page read and write
1540000
heap
page read and write
240AE9F7000
trusted library allocation
page read and write
238ACD00000
heap
page read and write
1F90D31B000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
15576529000
heap
page read and write
1F90D311000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1D981095000
trusted library allocation
page read and write
BEE000
stack
page read and write
2FF0000
heap
page read and write
20FAAA87000
trusted library allocation
page read and write
1F90D3F4000
heap
page read and write
2A30000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
9F89A8E000
stack
page read and write
F48DAFE000
unkown
page readonly
1D972348000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
42F3FCD000
stack
page read and write
7FF848E04000
trusted library allocation
page read and write
2409CAA6000
heap
page read and write
1F90D3E3000
heap
page read and write
1D974338000
heap
page read and write
1F90D3F4000
heap
page read and write
1D97420D000
heap
page read and write
F48E7FE000
unkown
page readonly
1B58C000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1D972377000
heap
page read and write
20FA8D70000
heap
page read and write
1D0BA000
stack
page read and write
1F90D2F3000
heap
page read and write
9F88C3E000
stack
page read and write
1D9722B0000
heap
page read and write
1D974202000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
240AE9E7000
trusted library allocation
page read and write
1F90D44C000
heap
page read and write
C0CEE7B000
stack
page read and write
1555DD00000
heap
page read and write
1D981892000
trusted library allocation
page read and write
1F90D3F6000
heap
page read and write
240A0519000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
238A8670000
trusted library section
page readonly
7DF433060000
trusted library allocation
page execute and read and write
1F90D329000
heap
page read and write
F48E2FE000
unkown
page readonly
1BCCE000
heap
page read and write
238ACB70000
trusted library allocation
page read and write
238ACA80000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
15576512000
heap
page read and write
1F90D32B000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1D974366000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1F90D2D0000
heap
page read and write
D10000
heap
page read and write
1D9743AA000
heap
page read and write
20FAA9D0000
trusted library allocation
page read and write
3321BCF000
stack
page read and write
240B6AA5000
heap
page read and write
1555EA97000
trusted library allocation
page read and write
1D981786000
trusted library allocation
page read and write
9F885E3000
stack
page read and write
1F90D460000
heap
page read and write
1F90D32F000
heap
page read and write
1F90D323000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
1D9902F7000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
7FF849170000
trusted library allocation
page read and write
1F90D31B000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
2409CC75000
heap
page read and write
1D9741CB000
heap
page read and write
240B6B2E000
heap
page read and write
2409CC20000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1D97437F000
heap
page read and write
1F90D333000
heap
page read and write
1D974390000
heap
page read and write
1F90D337000
heap
page read and write
1F90D322000
heap
page read and write
1D974206000
heap
page read and write
1D9F7464000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1D98112A000
trusted library allocation
page read and write
238A7E02000
heap
page read and write
1D9741D5000
heap
page read and write
1D974221000
heap
page read and write
42F347D000
stack
page read and write
1F90D467000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1F90D3F8000
heap
page read and write
155764D8000
heap
page read and write
20FA8E4F000
heap
page read and write
1D9741FB000
heap
page read and write
1555F21E000
trusted library allocation
page read and write
8F0000
heap
page read and write
1D9741E4000
heap
page read and write
F94000
heap
page read and write
C0CE7FE000
stack
page read and write
1D981219000
trusted library allocation
page read and write
240A04D4000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
1D974206000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
1D9741EE000
heap
page read and write
DCC6873000
stack
page read and write
2409CA9D000
heap
page read and write
1D9741C2000
heap
page read and write
1D974210000
heap
page read and write
1D974226000
heap
page read and write
12881000
trusted library allocation
page read and write
1F90D330000
heap
page read and write
1000000
heap
page read and write
2409FABD000
trusted library allocation
page read and write
1BCBB000
heap
page read and write
1BE4C000
stack
page read and write
9F88A7E000
stack
page read and write
1F90D335000
heap
page read and write
1D9F75B0000
heap
page execute and read and write
20FAA80C000
heap
page read and write
240B70C0000
heap
page read and write
332207D000
stack
page read and write
1F90B497000
heap
page read and write
1F90D450000
heap
page read and write
1F90D460000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
20FABCB1000
trusted library allocation
page read and write
238ACCF0000
heap
page read and write
20FAB979000
trusted library allocation
page read and write
1D9743A5000
heap
page read and write
1F90D322000
heap
page read and write
1F90D4A5000
heap
page read and write
240B6BD0000
heap
page execute and read and write
7FF849180000
trusted library allocation
page read and write
1D972348000
heap
page read and write
10E0000
heap
page execute and read and write
7FF849080000
trusted library allocation
page read and write
1D9F7472000
heap
page read and write
1D974338000
heap
page read and write
DCC6BFD000
stack
page read and write
F48DDFE000
stack
page read and write
1D976A10000
heap
page read and write
20FAB452000
trusted library allocation
page read and write
1D9741FB000
heap
page read and write
1D9902E8000
trusted library allocation
page read and write
DCC6EFD000
stack
page read and write
1D9F75E0000
heap
page read and write
A1F000
heap
page read and write
1D976A10000
heap
page read and write
1D974382000
heap
page read and write
2409CC50000
heap
page execute and read and write
1F90D31D000
heap
page read and write
2409FF60000
trusted library allocation
page read and write
1D9741FB000
heap
page read and write
1D9769E9000
heap
page read and write
9D0000
heap
page read and write
1D974386000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1D974206000
heap
page read and write
20FBAA70000
trusted library allocation
page read and write
1D990010000
trusted library allocation
page read and write
1D9742E2000
heap
page read and write
1F90D2FE000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1F90B49F000
heap
page read and write
1F90D2F3000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1F90CCDD000
heap
page read and write
1D97234D000
heap
page read and write
1F90D2F0000
heap
page read and write
238ACC00000
heap
page read and write
1D974386000
heap
page read and write
1F90B444000
heap
page read and write
1D9F7771000
heap
page read and write
1F90D308000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
1D981440000
trusted library allocation
page read and write
1F90D333000
heap
page read and write
1D9F7708000
heap
page read and write
1F90D31F000
heap
page read and write
1F90D480000
heap
page read and write
1D9743A5000
heap
page read and write
1F90B47D000
heap
page read and write
2409CB60000
heap
page read and write
1F90D312000
heap
page read and write
1D9742F4000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
15576539000
heap
page read and write
1D978AF2000
trusted library allocation
page read and write
332314E000
stack
page read and write
1D974215000
heap
page read and write
155762A1000
heap
page read and write
1F90B4AE000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1D976A05000
heap
page read and write
1F90D4BE000
heap
page read and write
DCC7A4D000
stack
page read and write
1F90B470000
heap
page read and write
1F90D33E000
heap
page read and write
33230CC000
stack
page read and write
1F90D32B000
heap
page read and write
238A7460000
heap
page read and write
1D97234D000
heap
page read and write
7FF849188000
trusted library allocation
page read and write
238A8340000
trusted library allocation
page read and write
1D97420C000
heap
page read and write
1F90D460000
heap
page read and write
238A76B1000
heap
page read and write
188AC930000
heap
page read and write
20FA8E00000
trusted library section
page read and write
238ACBE0000
remote allocation
page read and write
7DF443221000
trusted library allocation
page execute read
238ACBA0000
trusted library allocation
page read and write
1F90B467000
heap
page read and write
1F90D2ED000
heap
page read and write
D7D000
heap
page read and write
1D974202000
heap
page read and write
238A7F1A000
heap
page read and write
1F90D31B000
heap
page read and write
1F90D3F6000
heap
page read and write
42F31F7000
stack
page read and write
C0CE6F7000
stack
page read and write
1D97436F000
heap
page read and write
1D9F75B6000
heap
page execute and read and write
238ACA70000
trusted library allocation
page read and write
1D9741E8000
heap
page read and write
DCC6E7E000
stack
page read and write
1D9741DF000
heap
page read and write
238ACA20000
trusted library allocation
page read and write
D55000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1D9F785E000
heap
page read and write
1F90B43C000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
1F90D322000
heap
page read and write
20FAB968000
trusted library allocation
page read and write
DCC7C4E000
stack
page read and write
1BD07000
heap
page read and write
2409F6F6000
trusted library allocation
page read and write
1D9741FB000
heap
page read and write
7FF849185000
trusted library allocation
page read and write
1D974215000
heap
page read and write
1F90D31B000
heap
page read and write
DCC7ACE000
stack
page read and write
1F90D40F000
heap
page read and write
1F90B280000
heap
page read and write
1F90B48C000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
2409CBE0000
trusted library section
page read and write
F48E8FE000
unkown
page readonly
1D9741F3000
heap
page read and write
1D980C04000
trusted library allocation
page read and write
1F90D480000
heap
page read and write
1D9741FB000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
1F90D304000
heap
page read and write
238ACB90000
trusted library allocation
page read and write
DCC65EE000
stack
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1555F61B000
trusted library allocation
page read and write
15576260000
heap
page read and write
240B6D86000
heap
page read and write
F2C000
heap
page read and write
1F90D2FD000
heap
page read and write
7FF849153000
trusted library allocation
page read and write
9F8998E000
stack
page read and write
1F90D407000
heap
page read and write
980000
trusted library allocation
page read and write
DD6000
heap
page read and write
1D974221000
heap
page read and write
1555C450000
heap
page read and write
1F90D316000
heap
page read and write
15576569000
heap
page read and write
7DF4527A0000
trusted library allocation
page execute and read and write
F48FCFE000
unkown
page readonly
7FF848E3B000
trusted library allocation
page read and write
12883000
trusted library allocation
page read and write
3321FF9000
stack
page read and write
1F90D2F4000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
9E0000
heap
page read and write
1D9741F7000
heap
page read and write
1F90B46A000
heap
page read and write
1F90D322000
heap
page read and write
7FF849280000
trusted library allocation
page read and write
42F2FFF000
stack
page read and write
42F3079000
stack
page read and write
1D972390000
heap
page read and write
1F90D30D000
heap
page read and write
1F90D316000
heap
page read and write
1F90D2F9000
heap
page read and write
D50000
heap
page read and write
FE0000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848F06000
trusted library allocation
page execute and read and write
EF1000
stack
page read and write
7DF452790000
trusted library allocation
page execute and read and write
288C000
trusted library allocation
page read and write
20FA8F40000
heap
page readonly
131D000
heap
page read and write
7FF849240000
trusted library allocation
page execute and read and write
7FF849256000
trusted library allocation
page read and write
1F90D2FD000
heap
page read and write
1555F726000
trusted library allocation
page read and write
1555E8E3000
trusted library allocation
page read and write
1F90B471000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
D16000
heap
page read and write
7FF849002000
trusted library allocation
page read and write
1F90D312000
heap
page read and write
2B41000
trusted library allocation
page read and write
1D990363000
trusted library allocation
page read and write
1D981953000
trusted library allocation
page read and write
2409E91A000
trusted library allocation
page read and write
1D9F7788000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
135B000
heap
page read and write
930000
heap
page read and write
1D97235B000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
238ACC40000
heap
page read and write
9F89B09000
stack
page read and write
1D974341000
heap
page read and write
1D974206000
heap
page read and write
238ACBE0000
remote allocation
page read and write
1D974206000
heap
page read and write
1D974366000
heap
page read and write
D44000
heap
page read and write
42F33FE000
stack
page read and write
1555F19C000
trusted library allocation
page read and write
2FA0000
heap
page execute and read and write
1D97234F000
heap
page read and write
188AC699000
heap
page read and write
238A7713000
heap
page read and write
1D974356000
heap
page read and write
1D974225000
heap
page read and write
DCC6FFB000
stack
page read and write
1D9741FC000
heap
page read and write
1F90D330000
heap
page read and write
1D9741F2000
heap
page read and write
7FF84922E000
trusted library allocation
page read and write
238ACC61000
heap
page read and write
1D9F55A9000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
1555C3C0000
heap
page read and write
F48F6FE000
unkown
page readonly
238ACA80000
trusted library allocation
page read and write
1D981004000
trusted library allocation
page read and write
20FA8E51000
heap
page read and write
1D974210000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
1F90B44D000
heap
page read and write
1D97435F000
heap
page read and write
1D974351000
heap
page read and write
1556E17C000
trusted library allocation
page read and write
9F889F9000
stack
page read and write
1F90D491000
heap
page read and write
1D974221000
heap
page read and write
9F88D39000
stack
page read and write
1556E21D000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
20FAA9F0000
heap
page execute and read and write
1D9741DF000
heap
page read and write
238ACBE0000
remote allocation
page read and write
238A7480000
heap
page read and write
1F90B4AE000
heap
page read and write
1D9741E8000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
2409F7B3000
trusted library allocation
page read and write
DE3000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
9F88E3F000
stack
page read and write
1F90D31B000
heap
page read and write
F48E9FE000
unkown
page readonly
238A765A000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1B33E000
stack
page read and write
2409FA7D000
trusted library allocation
page read and write
1D9F7470000
heap
page read and write
DCC6F7E000
stack
page read and write
1555F25E000
trusted library allocation
page read and write
1D974215000
heap
page read and write
1F90B479000
heap
page read and write
1F90D30D000
heap
page read and write
13005000
trusted library allocation
page read and write
238A765C000
heap
page read and write
1D97437F000
heap
page read and write
1557669A000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
1F90D4C8000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
1D990001000
trusted library allocation
page read and write
20FAB97D000
trusted library allocation
page read and write
1F90D30D000
heap
page read and write
2B3F000
stack
page read and write
1F90D46E000
heap
page read and write
1F90D4CC000
heap
page read and write
1556DE91000
trusted library allocation
page read and write
12FB1000
trusted library allocation
page read and write
B0B2FFB000
stack
page read and write
1F90D2FD000
heap
page read and write
F48DCFE000
unkown
page readonly
1F90D3FE000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
238A7702000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
240B6AEE000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1F90D337000
heap
page read and write
1D9743A3000
heap
page read and write
1F90D3FE000
heap
page read and write
7FF84918C000
trusted library allocation
page read and write
1F90D467000
heap
page read and write
1F90D4BE000
heap
page read and write
1F90D305000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1D9741F7000
heap
page read and write
1D97420C000
heap
page read and write
DD1000
heap
page read and write
1C8F0000
heap
page read and write
59DE7F000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
DCC6C79000
stack
page read and write
20FAB641000
trusted library allocation
page read and write
1F90D341000
heap
page read and write
1D9741DF000
heap
page read and write
1D974210000
heap
page read and write
240B6D72000
heap
page read and write
1D973BD5000
heap
page read and write
1F90D322000
heap
page read and write
1D974221000
heap
page read and write
1D976A03000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF849159000
trusted library allocation
page read and write
238ACB20000
trusted library allocation
page read and write
2730000
heap
page read and write
2409FA00000
trusted library allocation
page read and write
1B950000
heap
page execute and read and write
B0B2CFE000
stack
page read and write
2409CAA8000
heap
page read and write
1D974382000
heap
page read and write
20FAC354000
trusted library allocation
page read and write
1F90D2E4000
heap
page read and write
1F90D407000
heap
page read and write
1F90B46E000
heap
page read and write
20FAC7E0000
trusted library allocation
page read and write
7FF848FD2000
trusted library allocation
page read and write
15C0000
heap
page read and write
1D974226000
heap
page read and write
1110000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
1D9810C1000
trusted library allocation
page read and write
810000
heap
page read and write
9F888FE000
stack
page read and write
1C28D000
stack
page read and write
1D974212000
heap
page read and write
FB4000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1F90D316000
heap
page read and write
1D9769EA000
heap
page read and write
20FC3094000
heap
page read and write
2870000
heap
page execute and read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page execute and read and write
1F90B472000
heap
page read and write
20FBAE02000
trusted library allocation
page read and write
1D972326000
heap
page read and write
1308000
heap
page read and write
1D9741E8000
heap
page read and write
1D9F57F0000
trusted library allocation
page read and write
1D97236B000
heap
page read and write
1D9769FE000
heap
page read and write
42F2E7E000
stack
page read and write
3322E4E000
stack
page read and write
1F90D337000
heap
page read and write
1F90FB90000
heap
page read and write
1F90D4A5000
heap
page read and write
1F90D30D000
heap
page read and write
42F4047000
stack
page read and write
1F90B45B000
heap
page read and write
1F911900000
heap
page read and write
910000
heap
page read and write
1F90D4A9000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1B50E000
stack
page read and write
12FB8000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
1D974210000
heap
page read and write
20FABAC5000
trusted library allocation
page read and write
20FC2E13000
heap
page read and write
155764D4000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849004000
trusted library allocation
page read and write
1D972398000
heap
page read and write
42F2F79000
stack
page read and write
1F90D30D000
heap
page read and write
7FF848E3B000
trusted library allocation
page read and write
FAC000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
12B48000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
1555F85C000
trusted library allocation
page read and write
1F90D30D000
heap
page read and write
238A76FE000
heap
page read and write
1D974388000
heap
page read and write
1010000
trusted library allocation
page read and write
1D97235B000
heap
page read and write
238A7622000
heap
page read and write
1F90B4AE000
heap
page read and write
1D9741CB000
heap
page read and write
2409EBBD000
trusted library allocation
page read and write
1D97421D000
heap
page read and write
155764E0000
heap
page read and write
1F90D33B000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
238A76BC000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1F90D467000
heap
page read and write
AB5000
heap
page read and write
20FA8E6D000
heap
page read and write
1F90D40E000
heap
page read and write
1D9741FB000
heap
page read and write
15576240000
trusted library allocation
page read and write
155762E6000
heap
page read and write
1D974221000
heap
page read and write
188AC590000
heap
page read and write
240B6BD6000
heap
page execute and read and write
7FF849160000
trusted library allocation
page read and write
1F90B443000
heap
page read and write
1F90D2E2000
heap
page read and write
1D974216000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
1555C2E4000
heap
page read and write
1D9741CC000
heap
page read and write
1F90D327000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
1D9741E8000
heap
page read and write
1D97421A000
heap
page read and write
1D974344000
heap
page read and write
1D972360000
heap
page read and write
1F90D341000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1F90B460000
heap
page read and write
1B76E000
stack
page read and write
1D9741D5000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1D97234D000
heap
page read and write
1F90B45B000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1D972378000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
1F90B44E000
heap
page read and write
1D972395000
heap
page read and write
7FF848FE8000
trusted library allocation
page read and write
1557651E000
heap
page read and write
20FBAA21000
trusted library allocation
page read and write
1D9741F7000
heap
page read and write
2409FE7B000
trusted library allocation
page read and write
F48EBFE000
unkown
page readonly
1D9742F8000
heap
page read and write
155764D0000
heap
page read and write
1F90D467000
heap
page read and write
1D974219000
heap
page read and write
1F90D307000
heap
page read and write
1D9F6F3D000
heap
page read and write
20FAB603000
trusted library allocation
page read and write
12E0000
heap
page read and write
1F90B43C000
heap
page read and write
F48EA7E000
stack
page read and write
1F90B44D000
heap
page read and write
1F90B47C000
heap
page read and write
20FAB981000
trusted library allocation
page read and write
1F90D311000
heap
page read and write
20FAC825000
trusted library allocation
page read and write
1D972360000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
1F90B46B000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
F48EAFE000
unkown
page readonly
1D97435F000
heap
page read and write
1D97436F000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
1D972160000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1D9F77DC000
heap
page read and write
1D974210000
heap
page read and write
1D974221000
heap
page read and write
1F90D335000
heap
page read and write
238A7F5A000
heap
page read and write
F48DA7D000
stack
page read and write
1556DEA0000
trusted library allocation
page read and write
1F90D496000
heap
page read and write
1F90D467000
heap
page read and write
1D972359000
heap
page read and write
1F90D460000
heap
page read and write
1D97432E000
heap
page read and write
1D9F750A000
heap
page read and write
1D9F7430000
heap
page read and write
1AFE0000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
238A76AD000
heap
page read and write
238ACB10000
trusted library allocation
page read and write
1F90D312000
heap
page read and write
1D9742D5000
heap
page read and write
7FF848DF2000
trusted library allocation
page read and write
1F90D322000
heap
page read and write
1F90D328000
heap
page read and write
D6F000
stack
page read and write
1CFBB000
stack
page read and write
1F90D496000
heap
page read and write
238A7F02000
heap
page read and write
188AC935000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
1D974206000
heap
page read and write
1D9722B9000
heap
page read and write
1F911B00000
heap
page read and write
F48D97E000
stack
page read and write
1D9742F8000
heap
page read and write
1D9F70D0000
trusted library allocation
page read and write
42F3F4E000
stack
page read and write
1D9742C1000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
1F90B4A3000
heap
page read and write
1F90D33B000
heap
page read and write
155765F8000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7DF433050000
trusted library allocation
page execute and read and write
1B940000
heap
page execute and read and write
1F90D460000
heap
page read and write
1555DCA0000
trusted library allocation
page read and write
1D974202000
heap
page read and write
E60000
heap
page read and write
DCC69FE000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
20FBACED000
trusted library allocation
page read and write
1F90D33B000
heap
page read and write
1D9769E0000
heap
page read and write
1D974202000
heap
page read and write
1557667F000
heap
page read and write
14A0000
heap
page read and write
1555DD45000
heap
page read and write
1F90D304000
heap
page read and write
1D976400000
trusted library allocation
page read and write
1F90D322000
heap
page read and write
9F8887D000
stack
page read and write
F48F5FD000
stack
page read and write
B0B2EFE000
stack
page read and write
1F911925000
heap
page read and write
1D9741EF000
heap
page read and write
1B42C000
stack
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1F90D4B1000
heap
page read and write
1D9769FE000
heap
page read and write
20FA8E57000
heap
page read and write
1F90D33B000
heap
page read and write
1D974366000
heap
page read and write
3322ECC000
stack
page read and write
1555EC3A000
trusted library allocation
page read and write
1D974382000
heap
page read and write
1F90D322000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
155762C4000
heap
page read and write
1D9742DF000
heap
page read and write
1D9742C9000
heap
page read and write
1F90D327000
heap
page read and write
A15000
heap
page read and write
1D974202000
heap
page read and write
C0CEDFC000
stack
page read and write
20FAAC28000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
238A89C0000
trusted library allocation
page read and write
7FF849213000
trusted library allocation
page read and write
1555F700000
trusted library allocation
page read and write
7FF84925D000
trusted library allocation
page read and write
1F90D4A5000
heap
page read and write
A2C000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
1D9741DF000
heap
page read and write
1310000
heap
page read and write
1F90B482000
heap
page read and write
3321EF9000
stack
page read and write
1F90B43F000
heap
page read and write
20FC30C9000
heap
page read and write
1F90D467000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1F90CD60000
heap
page read and write
1D97236D000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
1D972357000
heap
page read and write
1556DEB1000
trusted library allocation
page read and write
1F90D460000
heap
page read and write
1D9742EA000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1F90D3F4000
heap
page read and write
2409E450000
trusted library allocation
page read and write
1D974382000
heap
page read and write
42F30FD000
stack
page read and write
7FF849230000
trusted library allocation
page read and write
1555EEC3000
trusted library allocation
page read and write
1F90D330000
heap
page read and write
240B6CE0000
heap
page read and write
1F90D324000
heap
page read and write
14DE000
stack
page read and write
1555EBFF000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
1B66F000
stack
page read and write
1F90D2F9000
heap
page read and write
1D98102F000
trusted library allocation
page read and write
1F90D327000
heap
page read and write
20FAC187000
trusted library allocation
page read and write
1D974208000
heap
page read and write
1D981E24000
trusted library allocation
page read and write
1555C2C0000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF849120000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
1D9742F8000
heap
page read and write
1D9741D2000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
1D980072000
trusted library allocation
page read and write
20FAAA01000
trusted library allocation
page read and write
1F90D480000
heap
page read and write
1220000
heap
page read and write
1D974210000
heap
page read and write
1F90D32B000
heap
page read and write
1555E35E000
trusted library allocation
page read and write
1F90D46E000
heap
page read and write
1D973BDD000
heap
page read and write
42F2BBE000
stack
page read and write
1D9F79C0000
heap
page read and write
9F88CB9000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
F48FC7E000
stack
page read and write
20FA8F60000
trusted library allocation
page read and write
2409CC70000
heap
page read and write
7FF84920C000
trusted library allocation
page read and write
F48F17E000
stack
page read and write
1F90D413000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
1D972240000
heap
page read and write
1D97437F000
heap
page read and write
238A768C000
heap
page read and write
1D9F7700000
heap
page read and write
9A0000
trusted library allocation
page read and write
1D9741FB000
heap
page read and write
1D9F55AB000
heap
page read and write
7FF84927D000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
1F90D322000
heap
page read and write
DE5000
heap
page read and write
FAE000
heap
page read and write
1D9741F7000
heap
page read and write
E65000
heap
page read and write
B0B2E7E000
stack
page read and write
1556DEC1000
trusted library allocation
page read and write
1D9F53A0000
heap
page read and write
1F90D4BF000
heap
page read and write
1D9F772E000
heap
page read and write
9D0000
heap
page execute and read and write
1F90D31B000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
20FC2D43000
heap
page read and write
238ACCE6000
heap
page read and write
7FF849158000
trusted library allocation
page read and write
1D974215000
heap
page read and write
1556E178000
trusted library allocation
page read and write
1F90D4BE000
heap
page read and write
238A8640000
trusted library section
page readonly
9F88FBC000
stack
page read and write
240AE700000
trusted library allocation
page read and write
2409E504000
heap
page read and write
1F90D460000
heap
page read and write
20FC3080000
heap
page read and write
1D980A52000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF849152000
trusted library allocation
page read and write
F48F4FE000
unkown
page readonly
F48DBF7000
stack
page read and write
7FF849276000
trusted library allocation
page read and write
1D974366000
heap
page read and write
238A7676000
heap
page read and write
1F90D3DB000
heap
page read and write
1F90D316000
heap
page read and write
1F90D4A9000
heap
page read and write
1B23F000
stack
page read and write
1F90D2FF000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1F90D32D000
heap
page read and write
20FC2E1E000
heap
page read and write
188AC790000
heap
page read and write
7FF849174000
trusted library allocation
page read and write
1D97437F000
heap
page read and write
188AC690000
heap
page read and write
1F90D413000
heap
page read and write
1F90D4A9000
heap
page read and write
1F90D3FA000
heap
page read and write
1D9F54E0000
heap
page read and write
1CDBF000
stack
page read and write
1D9741CC000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
238A75A0000
trusted library section
page read and write
270E000
stack
page read and write
F48EC7E000
stack
page read and write
2F6E000
stack
page read and write
1D97421D000
heap
page read and write
1D9741CC000
heap
page read and write
1BD09000
heap
page read and write
7FF848FD1000
trusted library allocation
page read and write
15576636000
heap
page read and write
1D9741EB000
heap
page read and write
1D9743A3000
heap
page read and write
1F90D33B000
heap
page read and write
1D9741C2000
heap
page read and write
1D972360000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1F90D31B000
heap
page read and write
1F90D308000
heap
page read and write
1D9741D7000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1D9742B4000
heap
page read and write
1D99006F000
trusted library allocation
page read and write
20FC2ED0000
heap
page read and write
1555F21C000
trusted library allocation
page read and write
1D974219000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
1556E17E000
trusted library allocation
page read and write
1F90D33D000
heap
page read and write
1557661F000
heap
page read and write
2409CC40000
trusted library allocation
page read and write
1555C346000
heap
page read and write
20FAB964000
trusted library allocation
page read and write
1B86B000
stack
page read and write
2409CC00000
trusted library allocation
page read and write
59DBDE000
unkown
page read and write
1555F139000
trusted library allocation
page read and write
1D97421D000
heap
page read and write
7FF414FA0000
trusted library allocation
page execute and read and write
1F90D3F8000
heap
page read and write
1D974225000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
9F89A0C000
stack
page read and write
1D9741B0000
heap
page read and write
1B0CD000
stack
page read and write
12B41000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
2409E4F0000
heap
page read and write
20FABBE3000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
240B6E40000
heap
page read and write
1555FC99000
trusted library allocation
page read and write
1555FC74000
trusted library allocation
page read and write
1F90D32D000
heap
page read and write
1D974206000
heap
page read and write
1F90D312000
heap
page read and write
1D9F5480000
heap
page read and write
1D9741FB000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1F90D31B000
heap
page read and write
1F90D322000
heap
page read and write
42F414E000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
1F911921000
heap
page read and write
1F90B4AE000
heap
page read and write
1F90D322000
heap
page read and write
1F90D31B000
heap
page read and write
3321A83000
stack
page read and write
1F90B360000
heap
page read and write
2409CBC0000
heap
page read and write
20FA8E4D000
heap
page read and write
1F90D316000
heap
page read and write
1CA48000
heap
page read and write
3321F7E000
stack
page read and write
42F2BFE000
stack
page read and write
1F90D413000
heap
page read and write
1557655E000
heap
page read and write
1D9741DF000
heap
page read and write
238ACCE2000
heap
page read and write
12C0000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
20FABA38000
trusted library allocation
page read and write
1D974388000
heap
page read and write
20FA8E9A000
heap
page read and write
20FA8F50000
heap
page read and write
1F90D322000
heap
page read and write
1BA5F000
stack
page read and write
DCC68FE000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1F90D4B7000
heap
page read and write
C0CEAFE000
stack
page read and write
238A7F00000
heap
page read and write
2409F8CE000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1F90D4A9000
heap
page read and write
7FF849133000
trusted library allocation
page read and write
1D9741F2000
heap
page read and write
1F90D309000
heap
page read and write
1BA4E000
stack
page read and write
240B6A86000
heap
page read and write
20FBAA31000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
7FF849182000
trusted library allocation
page read and write
1F90D480000
heap
page read and write
1D9742CD000
heap
page read and write
238A768E000
heap
page read and write
1D974221000
heap
page read and write
F48DFFC000
stack
page read and write
1D974202000
heap
page read and write
1F90B47F000
heap
page read and write
238A8660000
trusted library section
page readonly
1D972360000
heap
page read and write
1D974206000
heap
page read and write
1F90D341000
heap
page read and write
240AE9D9000
trusted library allocation
page read and write
20FAC26C000
trusted library allocation
page read and write
20FA8E10000
heap
page read and write
2409C980000
heap
page read and write
1D9741C1000
heap
page read and write
1F90B424000
heap
page read and write
1555DF16000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
7FF84918A000
trusted library allocation
page read and write
240B6AFC000
heap
page read and write
B0B2C77000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
DCC6D78000
stack
page read and write
2D83000
heap
page read and write
155764EC000
heap
page read and write
C0CEBFB000
stack
page read and write
20FA9050000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
13003000
trusted library allocation
page read and write
1F90D316000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
2409F99D000
trusted library allocation
page read and write
1D9F70A0000
heap
page execute and read and write
20FAA980000
heap
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
1D974209000
heap
page read and write
1F90B448000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1F90D337000
heap
page read and write
238ACB10000
trusted library allocation
page read and write
1F90D491000
heap
page read and write
1BC50000
heap
page read and write
155764E8000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
1D97436F000
heap
page read and write
1D9812AE000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2409CA68000
heap
page read and write
1F90D32B000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
1D972366000
heap
page read and write
2409E4F5000
heap
page read and write
2FE0000
heap
page execute and read and write
7FF848FB1000
trusted library allocation
page read and write
1F90CCDE000
heap
page read and write
1F90D413000
heap
page read and write
1290000
trusted library allocation
page read and write
1D9F7777000
heap
page read and write
1130000
heap
page read and write
7FF848FDA000
trusted library allocation
page read and write
1D97421A000
heap
page read and write
1D974215000
heap
page read and write
7DF48B9A0000
trusted library allocation
page execute and read and write
1D974210000
heap
page read and write
1D97235B000
heap
page read and write
12C3000
trusted library allocation
page read and write
1340000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
1F90D46E000
heap
page read and write
1555C455000
heap
page read and write
1D97234A000
heap
page read and write
DCC6A7A000
stack
page read and write
1D974225000
heap
page read and write
1D98186B000
trusted library allocation
page read and write
1F90B443000
heap
page read and write
A57000
heap
page read and write
1555DE91000
trusted library allocation
page read and write
1555F06D000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
D3C000
heap
page read and write
1D980228000
trusted library allocation
page read and write
1D9F7704000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
1F90D480000
heap
page read and write
9F88EBE000
stack
page read and write
1F90D40E000
heap
page read and write
1D9741C5000
heap
page read and write
1F90CD63000
heap
page read and write
42F34FE000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
2409F9CE000
trusted library allocation
page read and write
1F90D2F4000
heap
page read and write
3001000
trusted library allocation
page read and write
1D9F70E0000
heap
page read and write
1F90D3F8000
heap
page read and write
1D974212000
heap
page read and write
1F90D3FC000
heap
page read and write
240B6AD3000
heap
page read and write
1555EF28000
trusted library allocation
page read and write
1F90D467000
heap
page read and write
20FC31F1000
heap
page read and write
1135000
heap
page read and write
1D974392000
heap
page read and write
1D9F74F9000
heap
page read and write
1D9804CD000
trusted library allocation
page read and write
F48E77E000
stack
page read and write
238A7560000
heap
page read and write
F48E87E000
stack
page read and write
1F90D3FF000
heap
page read and write
1F90D484000
heap
page read and write
238A7613000
heap
page read and write
238A7590000
trusted library allocation
page read and write
20FC31A8000
heap
page read and write
1F90D31B000
heap
page read and write
1ACFD000
stack
page read and write
1F90D496000
heap
page read and write
1D974210000
heap
page read and write
1556E196000
trusted library allocation
page read and write
1D9F76FC000
heap
page read and write
1D972360000
heap
page read and write
1F90D4BE000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
1F90D31B000
heap
page read and write
155763F0000
heap
page read and write
9D5000
heap
page read and write
1F90D322000
heap
page read and write
1D9741F7000
heap
page read and write
D1C000
heap
page read and write
1F90B466000
heap
page read and write
9F88F3E000
stack
page read and write
1D974221000
heap
page read and write
1555DD40000
heap
page read and write
1D974227000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
B0B2D7E000
stack
page read and write
7FF8492A0000
trusted library allocation
page read and write
238A7E15000
heap
page read and write
1F90D3E3000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
20FC3090000
heap
page read and write
1D974219000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
1D974202000
heap
page read and write
3321B0E000
stack
page read and write
238ACAB3000
trusted library allocation
page read and write
42F31FE000
stack
page read and write
240B6AF3000
heap
page read and write
1D9743A5000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
D39000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
2409CC30000
heap
page readonly
238ACA40000
trusted library allocation
page read and write
1D9741F7000
heap
page read and write
1D973BDE000
heap
page read and write
10F1000
stack
page read and write
7FF8491E0000
trusted library allocation
page read and write
1F90B3B0000
heap
page read and write
F48F7FD000
stack
page read and write
1555EE97000
trusted library allocation
page read and write
238A8450000
trusted library allocation
page read and write
7FF849154000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1D972365000
heap
page read and write
2409CBF0000
trusted library section
page read and write
1F90D2FE000
heap
page read and write
1D9F6F25000
heap
page read and write
1F90D491000
heap
page read and write
1D972360000
heap
page read and write
20FABB2A000
trusted library allocation
page read and write
12FB000
heap
page read and write
1F90D40F000
heap
page read and write
F48E5FB000
stack
page read and write
1D974206000
heap
page read and write
1D9742F0000
heap
page read and write
1F90D311000
heap
page read and write
42F357B000
stack
page read and write
1F90D330000
heap
page read and write
1D974226000
heap
page read and write
1D9F77C1000
heap
page read and write
1D9F76F8000
heap
page read and write
238A8650000
trusted library section
page readonly
1D972348000
heap
page read and write
1F90B44E000
heap
page read and write
7FF848FAA000
trusted library allocation
page read and write
1C7E8000
stack
page read and write
1C18E000
stack
page read and write
1D972381000
heap
page read and write
20FAB5FB000
trusted library allocation
page read and write
1D980D7C000
trusted library allocation
page read and write
20FA8E96000
heap
page read and write
15576870000
heap
page read and write
1D9742EA000
heap
page read and write
20FAA987000
heap
page execute and read and write
1D9741EF000
heap
page read and write
1D9741DF000
heap
page read and write
1D974215000
heap
page read and write
332247C000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
1BC4E000
stack
page read and write
1F90D333000
heap
page read and write
1F90D3D0000
heap
page read and write
1F90D460000
heap
page read and write
1F90D3E3000
heap
page read and write
131A000
heap
page read and write
1F90D480000
heap
page read and write
1305000
heap
page read and write
1D9F7833000
heap
page read and write
33222FE000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
240B6C00000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF84924D000
trusted library allocation
page read and write
1F90D40F000
heap
page read and write
1D972359000
heap
page read and write
12FC1000
trusted library allocation
page read and write
1F90B449000
heap
page read and write
1F90D2E8000
heap
page read and write
1F90B470000
heap
page read and write
1D974215000
heap
page read and write
1D9743A9000
heap
page read and write
2409CAEA000
heap
page read and write
1D974202000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
DCC6B77000
stack
page read and write
238ACC95000
heap
page read and write
238A8540000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
F48EEFE000
unkown
page readonly
B0B327B000
stack
page read and write
1557656E000
heap
page read and write
1555DD53000
heap
page read and write
1D9810F7000
trusted library allocation
page read and write
F48F3F9000
stack
page read and write
20FAC806000
trusted library allocation
page read and write
1555EFB7000
trusted library allocation
page read and write
240A051E000
trusted library allocation
page read and write
1F911920000
heap
page read and write
F48D9FE000
unkown
page readonly
1D9742C0000
heap
page read and write
1555FCB9000
trusted library allocation
page read and write
1D974386000
heap
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
15576524000
heap
page read and write
20FA8E22000
heap
page read and write
1CD7E000
stack
page read and write
13001000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
1135000
heap
page read and write
F48DEFE000
unkown
page readonly
1D980FA1000
trusted library allocation
page read and write
1F90D339000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
1D97235F000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
1D974227000
heap
page read and write
332237E000
stack
page read and write
240AE9DF000
trusted library allocation
page read and write
1F911902000
heap
page read and write
155762A3000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
1D97421A000
heap
page read and write
2D73000
trusted library allocation
page read and write
1F90D312000
heap
page read and write
1F90D3F1000
heap
page read and write
1F90D2FE000
heap
page read and write
1F90D33D000
heap
page read and write
1D9741FB000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
2B4C000
trusted library allocation
page read and write
12FBE000
trusted library allocation
page read and write
1D9811E0000
trusted library allocation
page read and write
D7B000
heap
page read and write
1F90D2FA000
heap
page read and write
12888000
trusted library allocation
page read and write
1F90D30D000
heap
page read and write
1D97235A000
heap
page read and write
1C5E5000
stack
page read and write
20FAA990000
heap
page execute and read and write
1D974206000
heap
page read and write
1F90D413000
heap
page read and write
1555C2A0000
heap
page read and write
7FF848FD4000
trusted library allocation
page read and write
9F8897E000
stack
page read and write
1F90D3D1000
heap
page read and write
CF1000
stack
page read and write
20FAB96C000
trusted library allocation
page read and write
1D973CA0000
heap
page read and write
1D974210000
heap
page read and write
15576696000
heap
page read and write
1D974206000
heap
page read and write
15C5000
heap
page read and write
D52000
heap
page read and write
1F90D312000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
20FBAD07000
trusted library allocation
page read and write
1555DE80000
heap
page execute and read and write
1D981DDF000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
1D972359000
heap
page read and write
1F90D330000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
1F90D333000
heap
page read and write
332304C000
stack
page read and write
1D9769E1000
heap
page read and write
1D974202000
heap
page read and write
1D974351000
heap
page read and write
20FABA99000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page execute and read and write
15576250000
heap
page execute and read and write
9F9000
heap
page read and write
2409F944000
trusted library allocation
page read and write
1D9741D8000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
15576675000
heap
page read and write
1F90D4B2000
heap
page read and write
1F90D322000
heap
page read and write
1D972371000
heap
page read and write
1B86E000
stack
page read and write
240AE9E5000
trusted library allocation
page read and write
C0CEB7E000
stack
page read and write
1F90D31B000
heap
page read and write
F10000
heap
page read and write
1B43E000
stack
page read and write
1D974356000
heap
page read and write
990000
heap
page read and write
1F90D2EF000
heap
page read and write
20FA8FA0000
heap
page read and write
155764E4000
heap
page read and write
20FAB975000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
20FBAA01000
trusted library allocation
page read and write
1555C30B000
heap
page read and write
238ACA70000
trusted library allocation
page read and write
1F90D304000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF849188000
trusted library allocation
page read and write
20FAC293000
trusted library allocation
page read and write
1D97233E000
heap
page read and write
2409CAE7000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1D9F7810000
heap
page read and write
1F90D4A5000
heap
page read and write
33221F8000
stack
page read and write
1D97420C000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1D97421A000
heap
page read and write
2891000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
1D9743A3000
heap
page read and write
7FF849246000
trusted library allocation
page read and write
1D974212000
heap
page read and write
1CA40000
heap
page read and write
1D97235B000
heap
page read and write
1D97421A000
heap
page read and write
238ACCFB000
heap
page read and write
12D0000
heap
page read and write
1F90B449000
heap
page read and write
C0CE77E000
stack
page read and write
1D9F55EB000
heap
page read and write
1F90D329000
heap
page read and write
9F89C0E000
stack
page read and write
238ACC92000
heap
page read and write
DCC6CF7000
stack
page read and write
238A7640000
heap
page read and write
1F90D305000
heap
page read and write
1F90D347000
heap
page read and write
7FF848ED6000
trusted library allocation
page read and write
1F90D480000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1F90D327000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
2409CA60000
heap
page read and write
1F90D46E000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1D974210000
heap
page read and write
1D974338000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1D97435F000
heap
page read and write
240B6E3A000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1557667A000
heap
page read and write
F4C000
heap
page read and write
240B6B60000
heap
page execute and read and write
1D972359000
heap
page read and write
1D974390000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1D97436F000
heap
page read and write
1D97236C000
heap
page read and write
1D974210000
heap
page read and write
1F90D31B000
heap
page read and write
7FF849280000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
20FBACF7000
trusted library allocation
page read and write
1555C348000
heap
page read and write
15576256000
heap
page execute and read and write
240B6A4C000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
1D9F7461000
heap
page read and write
1B13F000
stack
page read and write
134B000
heap
page read and write
238ACC4D000
heap
page read and write
F9C000
heap
page read and write
1F90D316000
heap
page read and write
1F90D40F000
heap
page read and write
1F90D335000
heap
page read and write
42F3179000
stack
page read and write
1F90D3F1000
heap
page read and write
1348000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
F96000
heap
page read and write
1555EA8D000
trusted library allocation
page read and write
1D981E04000
trusted library allocation
page read and write
1D9902ED000
trusted library allocation
page read and write
1D974206000
heap
page read and write
1555DC10000
trusted library allocation
page read and write
240B6B10000
heap
page read and write
7FF849002000
trusted library allocation
page read and write
15576629000
heap
page read and write
7DF4615C0000
trusted library allocation
page execute and read and write
1D9741EF000
heap
page read and write
1D97234B000
heap
page read and write
1D97435F000
heap
page read and write
238A7F13000
heap
page read and write
238ACCC0000
heap
page read and write
DCC79CE000
stack
page read and write
1F90D32E000
heap
page read and write
1D974392000
heap
page read and write
2409E6E0000
heap
page read and write
155765B7000
heap
page read and write
240AE6F1000
trusted library allocation
page read and write
240AE721000
trusted library allocation
page read and write
20FC309D000
heap
page read and write
3322FC7000
stack
page read and write
238ACAB0000
trusted library allocation
page read and write
240B6E24000
heap
page read and write
F48E4FE000
unkown
page readonly
238ACA41000
trusted library allocation
page read and write
238ACD02000
heap
page read and write
2409CB80000
heap
page read and write
1D974386000
heap
page read and write
1120000
heap
page read and write
1D974338000
heap
page read and write
1556DEFE000
trusted library allocation
page read and write
9F89B8D000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
1F90D312000
heap
page read and write
1490000
trusted library allocation
page read and write
2DC0000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
238A762B000
heap
page read and write
42F2B33000
stack
page read and write
238ACC54000
heap
page read and write
1C08E000
stack
page read and write
1D974206000
heap
page read and write
1D9741D0000
heap
page read and write
1F90B4AE000
heap
page read and write
7FF849153000
trusted library allocation
page read and write
1555DE60000
heap
page execute and read and write
1D9F54A0000
heap
page read and write
1D97432B000
heap
page read and write
240B6A7B000
heap
page read and write
1F90B477000
heap
page read and write
20FA8F10000
trusted library allocation
page read and write
1D974391000
heap
page read and write
1D9741FB000
heap
page read and write
1D97420C000
heap
page read and write
1D974390000
heap
page read and write
1D9741EF000
heap
page read and write
1D974389000
heap
page read and write
3321B8E000
stack
page read and write
300C000
trusted library allocation
page read and write
1D974202000
heap
page read and write
A10000
heap
page read and write
9F88AF7000
stack
page read and write
1F90B457000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1D9742B5000
heap
page read and write
1F90D407000
heap
page read and write
1D9741FB000
heap
page read and write
15576693000
heap
page read and write
14A5000
heap
page read and write
DCC7B49000
stack
page read and write
20FC30AA000
heap
page read and write
238ACCF9000
heap
page read and write
1F90D316000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
F48E0FE000
unkown
page readonly
F48E1FC000
stack
page read and write
1240000
heap
page read and write
7FF84918C000
trusted library allocation
page read and write
238A7678000
heap
page read and write
1D974225000
heap
page read and write
1F90D491000
heap
page read and write
1C930000
heap
page read and write
1F911902000
heap
page read and write
20FC31C6000
heap
page read and write
1D9743A3000
heap
page read and write
1D980D73000
trusted library allocation
page read and write
1D9769EA000
heap
page read and write
1F90D312000
heap
page read and write
240A0048000
trusted library allocation
page read and write
1D974206000
heap
page read and write
1D9741DF000
heap
page read and write
1F90D483000
heap
page read and write
29DE000
stack
page read and write
1F90B43C000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
9E0000
heap
page read and write
1D974341000
heap
page read and write
1555FCBE000
trusted library allocation
page read and write
There are 1961 hidden memdumps, click here to show them.