IOC Report
lJ4EzPSKMj.exe

loading gif

Files

File Path
Type
Category
Malicious
lJ4EzPSKMj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\tdrpl[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\nxmr[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1114023610.exe
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\1428024550.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\15714163.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\2573513776.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\28849683.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\415511255.exe
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\513318274.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5232.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\jacrzswcvuml.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Google\Libs\WR64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\sysppvrdnvs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\513318274.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\3[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\5[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\2[2]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\4[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\1[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2g0ovzba.ck4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zdkoxb0.4wm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xrglguq.euj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_atmyihj1.4kz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_au04gmkt.xfz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cciqgpxe.5gk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cg3cn0q3.kvs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dngmtvlm.xdq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5eiy2yb.lui.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehqiestd.4zy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_emvog3gr.zdd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eotr4mrw.tzh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_izpjwpkt.phw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oaw40m54.qnu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ox0yghyy.krn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t02w1jsi.wsp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tekviu5v.iod.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uf1fpcmy.w44.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulen12qk.qzk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vlcaedjg.vnr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\tbtnds.dat
OpenPGP Public Key
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lJ4EzPSKMj.exe
"C:\Users\user\Desktop\lJ4EzPSKMj.exe"
malicious
C:\Users\user\AppData\Local\Temp\5232.scr
"C:\Users\user\AppData\Local\Temp\5232.scr" /S
malicious
C:\Windows\sysppvrdnvs.exe
C:\Windows\sysppvrdnvs.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
malicious
C:\Windows\SysWOW64\sc.exe
sc stop UsoSvc
malicious
C:\Windows\SysWOW64\sc.exe
sc stop WaaSMedicSvc
malicious
C:\Windows\SysWOW64\sc.exe
sc stop wuauserv
malicious
C:\Windows\SysWOW64\sc.exe
sc stop DoSvc
malicious
C:\Windows\SysWOW64\sc.exe
sc stop BITS /wait
malicious
C:\Windows\sysppvrdnvs.exe
"C:\Windows\sysppvrdnvs.exe"
malicious
C:\Users\user\AppData\Local\Temp\513318274.exe
C:\Users\user\AppData\Local\Temp\513318274.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\schtasks.exe
schtasks /delete /f /tn "Windows Upgrade Manager"
malicious
C:\Users\user\AppData\Local\Temp\2573513776.exe
C:\Users\user\AppData\Local\Temp\2573513776.exe
malicious
C:\Users\user\AppData\Local\Temp\28849683.exe
C:\Users\user\AppData\Local\Temp\28849683.exe
malicious
C:\Users\user\AppData\Local\Temp\15714163.exe
C:\Users\user\AppData\Local\Temp\15714163.exe
malicious
C:\Users\user\AppData\Local\Temp\1428024550.exe
C:\Users\user\AppData\Local\Temp\1428024550.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
"C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\System32\conhost.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\dwm.exe
C:\Windows\System32\dwm.exe
malicious
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
"C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\reg.exe
reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.202.233.141/
unknown
malicious
http://185.215.113.66/
unknown
malicious
http://185.215.113.66/tdrpl.exe
185.215.113.66
malicious
http://185.215.113.66/5;
unknown
http://185.215.113.66/reg.php?s=%s
unknown
http://185.215.113.84/nxmr.exe
unknown
http://91.202.233.141/ALLBSTATAASASDMozilla/5.0
unknown
http://91.202.233.141/ALLBSTATAASASD00wWP
unknown
http://185.215.113.66/1F
unknown
http://185.215.113.84/nxmr.exeh
unknown
http://91.202.233.141/#
unknown
https://contoso.com/License
unknown
http://185.215.113.84/nxmr.exeP0
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://91.202.233.141/1
unknown
http://91.202.233.141/2
unknown
http://185.215.113.66/tdrpl.execrC:
unknown
http://91.202.233.141/ALLBSTATAASASDX
unknown
http://185.215.113.66/2C:
unknown
http://91.202.233.141/5
unknown
http://91.202.233.141/3
unknown
http://91.202.233.141/4
unknown
http://185.215.113.66/4C:
unknown
http://185.215.113.66/tdrpl.exe#
unknown
http://91.202.233.141/3M
unknown
http://91.202.233.141/ALLBSTATAASASD_6
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.66/2D
unknown
http://91.202.233.141/ALLBSTATAASASD
unknown
http://91.202.233.141/2a
unknown
http://185.215.113.66/4ystem32
unknown
http://185.215.113.66/tdrpl.exe658-3693405117-2476756634-1003D9
unknown
http://www.microsoft.c
unknown
http://91.202.233.141/TLOADEDBROMozilla/5.0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://91.202.233.141/ALLBSTATAASASD3
unknown
http://185.215.113.66/tdrpl.exeLMEM
unknown
http://185.215.113.66/q9
unknown
http://185.215.113.66/tdrpl.exe;
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://185.215.113.66/2_
unknown
http://91.202.233.141/ALLBSTATAASASD)
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://91.202.233.141/ALLBSTATAASASDui
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://185.215.113.66/http://91.202.233.141/12345%s%s%s:Zone.Identifier%userprofile%%windir%%s
unknown
http://185.215.113.66/2a
unknown
http://185.215.113.66/tdrpl.exeB
unknown
http://185.215.113.66/tdrpl.exeSSC:
unknown
https://contoso.com/Icon
unknown
http://185.215.113.66/5
unknown
http://185.215.113.84/nxmr.exe:
unknown
http://185.215.113.66/4
unknown
http://185.215.113.66/3
unknown
http://185.215.113.66/2
unknown
http://185.215.113.84/nxmr.exeP0A
unknown
http://185.215.113.66/2M
unknown
http://185.215.113.66/tdrpl.exeN
unknown
http://185.215.113.66/2P
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.66/1
unknown
http://185.215.113.66/5z
unknown
http://185.215.113.66/reg.php?s=%sMozilla/5.0
unknown
http://185.215.113.84/nxmr.exe5
unknown
http://185.215.113.66/1s
unknown
http://185.215.113.66/tdrp.exe%s:Zone.Identifier/c
unknown
http://185.215.113.84/nxmr.exeystem32
unknown
http://185.215.113.66/5C:
unknown
http://91.202.233.141/2)
unknown
http://185.215.113.84/
unknown
http://185.215.113.66/1KKC:
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://xmrig.com/docs/algorithms
unknown
https://aka.ms/pscore68
unknown
http://185.215.113.66/tdrp.exe
unknown
http://185.215.113.66/2s
unknown
http://91.202.233.141/ALLBSTATAASASDyi2
unknown
http://91.202.233.141/6122658-3693405117-2476756634-1003
unknown
http://185.215.113.84/nxmr.exeW
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
twizthash.net
185.215.113.66
malicious
15.164.165.52.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.66
twizthash.net
Portugal
malicious
198.163.192.16
unknown
United States
malicious
91.202.233.141
unknown
Russian Federation
malicious
89.218.184.42
unknown
Kazakhstan
malicious
94.230.236.63
unknown
Uzbekistan
malicious
5.133.123.159
unknown
Russian Federation
malicious
217.30.162.161
unknown
Uzbekistan
malicious
90.156.162.72
unknown
Russian Federation
malicious
95.58.91.70
unknown
Kazakhstan
malicious
92.46.174.254
unknown
Kazakhstan
malicious
94.230.235.140
unknown
Uzbekistan
malicious
187.133.73.5
unknown
Mexico
malicious
117.236.188.177
unknown
India
malicious
95.56.76.10
unknown
Kazakhstan
malicious
90.156.160.86
unknown
Russian Federation
malicious
5.202.213.167
unknown
Iran (ISLAMIC Republic Of)
malicious
46.100.182.167
unknown
Iran (ISLAMIC Republic Of)
malicious
5.232.31.242
unknown
Iran (ISLAMIC Republic Of)
malicious
92.46.228.246
unknown
Kazakhstan
malicious
198.163.193.230
unknown
United States
5.76.120.41
unknown
Kazakhstan
78.137.95.224
unknown
Yemen
185.131.95.169
unknown
Iran (ISLAMIC Republic Of)
2.178.73.57
unknown
Iran (ISLAMIC Republic Of)
185.203.237.228
unknown
Russian Federation
95.59.165.102
unknown
Kazakhstan
59.91.192.122
unknown
India
198.163.193.96
unknown
United States
213.206.39.40
unknown
Uzbekistan
185.215.113.84
unknown
Portugal
37.254.242.74
unknown
Iran (ISLAMIC Republic Of)
45.248.160.159
unknown
India
145.249.227.150
unknown
Russian Federation
178.90.122.209
unknown
Kazakhstan
124.109.48.132
unknown
Pakistan
151.244.52.254
unknown
Iran (ISLAMIC Republic Of)
239.255.255.250
unknown
Reserved
2.181.31.167
unknown
Iran (ISLAMIC Republic Of)
80.191.218.209
unknown
Iran (ISLAMIC Republic Of)
There are 29 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
FirewallOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
FirewallDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiSpywareOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiVirusOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiVirusDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
UpdatesOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
UpdatesDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Windows Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DisableWindowsUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AlwaysAutoUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
OverrideNotice
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BITS
Start
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
496000
heap
page read and write
malicious
2595CEF2000
heap
page read and write
malicious
410000
unkown
page readonly
malicious
410000
unkown
page readonly
malicious
410000
unkown
page readonly
malicious
410000
unkown
page readonly
malicious
2595CF00000
heap
page read and write
malicious
410000
unkown
page readonly
malicious
132C000
heap
page read and write
malicious
7FF6687FB000
unkown
page read and write
malicious
410000
unkown
page readonly
malicious
F3D000
stack
page read and write
26E80A00000
trusted library allocation
page read and write
E5DBFE000
stack
page read and write
2595E7CA000
heap
page read and write
7FF68E6E9000
unkown
page readonly
7FFB4AF30000
trusted library allocation
page read and write
156CF2C6000
heap
page read and write
107E000
stack
page read and write
1DB4E000
stack
page read and write
7FFB4AAE4000
trusted library allocation
page read and write
26E81B7D000
trusted library allocation
page read and write
348E000
stack
page read and write
7FFB4AAD2000
trusted library allocation
page read and write
465F000
stack
page read and write
32E7000
heap
page read and write
24BEDBE000
stack
page read and write
24BED78000
stack
page read and write
B524B0E000
stack
page read and write
B523FBE000
stack
page read and write
7DF428280000
trusted library allocation
page execute and read and write
26EEAF61000
heap
page read and write
289A8982000
trusted library allocation
page read and write
26EEA550000
heap
page read and write
EFB000
stack
page read and write
9C000
stack
page read and write
A72DA73000
stack
page read and write
400000
unkown
page readonly
1E1AFF76000
heap
page read and write
269216A0000
heap
page read and write
3314000
heap
page read and write
A72D7CF000
stack
page read and write
156B69D0000
trusted library allocation
page read and write
17CF000
stack
page read and write
26E90304000
trusted library allocation
page read and write
156CF2F8000
heap
page read and write
B523F3E000
stack
page read and write
26EEAFDD000
heap
page read and write
7FF68E6F5000
unkown
page write copy
7FFB4AE70000
trusted library allocation
page read and write
E5E57B000
stack
page read and write
302F000
stack
page read and write
156C6E42000
trusted library allocation
page read and write
1E198C04000
trusted library allocation
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
7FFB4AE3A000
trusted library allocation
page read and write
289BFDA2000
heap
page read and write
156B5170000
heap
page read and write
A90000
unkown
page readonly
1E195CA0000
heap
page read and write
1E195F55000
heap
page read and write
7FF454450000
trusted library allocation
page execute and read and write
156CF09C000
heap
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
156C6E36000
trusted library allocation
page read and write
289BFE14000
heap
page read and write
289BFE9D000
heap
page read and write
7BA000
heap
page read and write
289BFC20000
heap
page read and write
7FFB4AAEB000
trusted library allocation
page execute and read and write
331A000
heap
page read and write
7FFB4ACE0000
trusted library allocation
page execute and read and write
1E198CA0000
trusted library allocation
page read and write
299D000
stack
page read and write
7BE000
heap
page read and write
365E000
stack
page read and write
289C021E000
heap
page read and write
3C5F000
stack
page read and write
25960A8A000
heap
page read and write
2595E7F4000
heap
page read and write
156CEFFF000
heap
page read and write
401000
unkown
page execute read
26EE8C40000
heap
page read and write
E5E47E000
stack
page read and write
7FFB4ADF0000
trusted library allocation
page read and write
7FFB4AD10000
trusted library allocation
page read and write
32FB000
heap
page read and write
3315000
heap
page read and write
7FFB4AE48000
trusted library allocation
page read and write
7FFB4AD60000
trusted library allocation
page read and write
7FF668D72000
unkown
page read and write
1E197BE8000
trusted library allocation
page read and write
343E000
stack
page read and write
81D000
heap
page read and write
26EEA540000
trusted library allocation
page read and write
7B5000
heap
page read and write
289A9217000
trusted library allocation
page read and write
26EE8CDD000
heap
page read and write
400000
unkown
page readonly
1E1AFDB5000
heap
page read and write
26EEB396000
heap
page read and write
A91000
unkown
page execute read
7FF668D76000
unkown
page readonly
B523DB7000
stack
page read and write
7FFB4ACA7000
trusted library allocation
page read and write
2DA0000
heap
page read and write
414000
unkown
page write copy
D0D000
stack
page read and write
7FFB4AB10000
trusted library allocation
page read and write
156B6D78000
trusted library allocation
page read and write
7FFB4AF27000
trusted library allocation
page read and write
1E1977DB000
heap
page read and write
7E5000
unkown
page readonly
7FF6687FB000
unkown
page write copy
7FFB4AE64000
trusted library allocation
page read and write
149F000
stack
page read and write
AA4000
unkown
page read and write
12FC000
heap
page read and write
26E812E6000
trusted library allocation
page read and write
47A000
heap
page read and write
2596288A000
heap
page read and write
A72E0FE000
stack
page read and write
7FFB4AD60000
trusted library allocation
page read and write
26E80D1D000
trusted library allocation
page read and write
26EE8C8F000
heap
page read and write
7FFB4AE20000
trusted library allocation
page read and write
1E1AFEA4000
heap
page read and write
1E1B0002000
heap
page read and write
3390000
heap
page read and write
289A74E0000
trusted library allocation
page read and write
25961E8A000
heap
page read and write
26EE8C10000
heap
page read and write
289A7440000
trusted library section
page read and write
B523BFB000
stack
page read and write
7FF668D75000
unkown
page write copy
7DF4BDCC0000
trusted library allocation
page execute and read and write
7FFB4AD70000
trusted library allocation
page read and write
156B4EF0000
heap
page read and write
2595CF5C000
heap
page read and write
7FFB4AE40000
trusted library allocation
page read and write
9B000
stack
page read and write
156C6E3A000
trusted library allocation
page read and write
2595E7D2000
heap
page read and write
1E1A7A2C000
trusted library allocation
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
289A9193000
trusted library allocation
page read and write
7DF4A3520000
trusted library allocation
page execute and read and write
1520000
heap
page read and write
1E1A7CC3000
trusted library allocation
page read and write
289BFBC0000
heap
page execute and read and write
7E3000
heap
page read and write
3B1F000
stack
page read and write
289A5A65000
heap
page read and write
FF0000
heap
page read and write
3324000
heap
page read and write
7FFB4AD10000
trusted library allocation
page read and write
289BFA70000
heap
page read and write
7FFB4AB76000
trusted library allocation
page read and write
A93000
unkown
page write copy
156B7698000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
26EEAC60000
unkown
page read and write
7FF6687E1000
unkown
page execute read
26EEA6C0000
heap
page read and write
7FFB4AE6C000
trusted library allocation
page read and write
2595CF85000
heap
page read and write
3C9E000
stack
page read and write
7FFB4AE30000
trusted library allocation
page read and write
11BE000
stack
page read and write
7FFB4AB1C000
trusted library allocation
page execute and read and write
7FF668D69000
unkown
page readonly
7FFB4AADD000
trusted library allocation
page execute and read and write
1304000
heap
page read and write
7FFB4ACF0000
trusted library allocation
page read and write
8F6000
stack
page read and write
7FFB4AAC3000
trusted library allocation
page execute and read and write
156B7E51000
trusted library allocation
page read and write
2750000
heap
page read and write
26E81AE3000
trusted library allocation
page read and write
7C9000
heap
page read and write
B52413B000
stack
page read and write
1E1AFD9D000
heap
page read and write
26EEA640000
heap
page execute and read and write
26EE8AD0000
heap
page read and write
1CA20000
heap
page execute and read and write
11CF000
stack
page read and write
289A7410000
heap
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
7FFB4AD30000
trusted library allocation
page read and write
156B827C000
trusted library allocation
page read and write
156B5140000
trusted library section
page read and write
47E000
heap
page read and write
7FFB4AB14000
trusted library allocation
page read and write
32E0000
heap
page read and write
2EBB000
stack
page read and write
81B000
heap
page read and write
CB114FC000
stack
page read and write
3D9F000
stack
page read and write
30F0000
heap
page read and write
7FF68E161000
unkown
page execute read
3448000
heap
page read and write
7FFB4AC90000
trusted library allocation
page read and write
7FFB4AAF3000
trusted library allocation
page execute and read and write
7FFB4ACF0000
trusted library allocation
page read and write
E4E000
stack
page read and write
289A5C25000
heap
page read and write
E5E3FE000
stack
page read and write
7FFB4AF20000
trusted library allocation
page read and write
26EEACA0000
heap
page execute and read and write
A40000
heap
page read and write
7FFB4AB0D000
trusted library allocation
page execute and read and write
289A74D0000
heap
page execute and read and write
7DF428290000
trusted library allocation
page execute and read and write
7FFB4AC8A000
trusted library allocation
page read and write
289A8980000
trusted library allocation
page read and write
1E195F20000
trusted library allocation
page read and write
7FFB4ABA6000
trusted library allocation
page read and write
412000
unkown
page readonly
EF6000
stack
page read and write
7FFB4AAEB000
trusted library allocation
page read and write
331D000
heap
page read and write
A72EC4E000
stack
page read and write
32E5000
heap
page read and write
7FFB4AD50000
trusted library allocation
page read and write
8DE386D000
stack
page read and write
7E2000
unkown
page readonly
7FFB4ADC0000
trusted library allocation
page read and write
7FFB4AF31000
trusted library allocation
page read and write
156B86D4000
trusted library allocation
page read and write
2595E7D7000
heap
page read and write
2D4D000
stack
page read and write
11FE000
stack
page read and write
315F000
stack
page read and write
1E1A79F1000
trusted library allocation
page read and write
7FFB4ACC0000
trusted library allocation
page execute and read and write
24BFB0E000
stack
page read and write
7FFB4AE38000
trusted library allocation
page read and write
10EF000
stack
page read and write
7FFB4AE42000
trusted library allocation
page read and write
331C000
heap
page read and write
156CEB50000
heap
page read and write
103E000
stack
page read and write
7FFB4ACB7000
trusted library allocation
page read and write
32E1000
heap
page read and write
1E1993C7000
trusted library allocation
page read and write
7FFB4AAC4000
trusted library allocation
page read and write
289A5C30000
heap
page read and write
26EEA870000
heap
page read and write
32E9000
heap
page read and write
1E1979B0000
heap
page execute and read and write
7FFB4ACF0000
trusted library allocation
page read and write
400000
unkown
page readonly
AA5000
unkown
page readonly
156C6B71000
trusted library allocation
page read and write
2595E775000
heap
page read and write
CB118FF000
stack
page read and write
7C1000
heap
page read and write
331D000
heap
page read and write
BFC000
stack
page read and write
405E000
stack
page read and write
2595E7D5000
heap
page read and write
2DD0000
heap
page read and write
414000
unkown
page write copy
156CF013000
heap
page read and write
2595CF5B000
heap
page read and write
7FFB4AECC000
trusted library allocation
page read and write
310F000
stack
page read and write
12C5000
heap
page read and write
7FFB4AE60000
trusted library allocation
page read and write
32F5000
heap
page read and write
156B6BD0000
trusted library allocation
page read and write
2DFE000
stack
page read and write
2FA0000
heap
page read and write
289BFE85000
heap
page read and write
7FFB4AF10000
trusted library allocation
page execute and read and write
289A91D9000
trusted library allocation
page read and write
E8E000
stack
page read and write
156C6E54000
trusted library allocation
page read and write
156B4F59000
heap
page read and write
26EE8C9D000
heap
page read and write
7FFB4AB00000
trusted library allocation
page read and write
7FFB4AB2C000
trusted library allocation
page execute and read and write
1E1977C0000
heap
page read and write
CB113FF000
stack
page read and write
3398000
heap
page read and write
11000
unkown
page execute read
7FFB4AEE0000
trusted library allocation
page read and write
24BEEB9000
stack
page read and write
289B798A000
trusted library allocation
page read and write
26EEA430000
heap
page readonly
803000
heap
page read and write
24EBE2D0000
unkown
page read and write
7FFB4AD90000
trusted library allocation
page read and write
7FFB4AE34000
trusted library allocation
page read and write
156C6B51000
trusted library allocation
page read and write
289A9252000
trusted library allocation
page read and write
43DF000
stack
page read and write
1E197780000
trusted library allocation
page read and write
455E000
stack
page read and write
1090000
heap
page read and write
1E197740000
trusted library allocation
page read and write
7E0000
heap
page read and write
81D000
heap
page read and write
A72DCFA000
stack
page read and write
1E1B0152000
heap
page read and write
156CF35F000
heap
page read and write
7FFB4ACB0000
trusted library allocation
page execute and read and write
24BEE37000
stack
page read and write
3EAE000
stack
page read and write
7FFB4AADB000
trusted library allocation
page read and write
289A8978000
trusted library allocation
page read and write
1E1A79E1000
trusted library allocation
page read and write
23069870000
heap
page read and write
7FFB4ABB6000
trusted library allocation
page execute and read and write
156B6960000
trusted library allocation
page read and write
A91000
heap
page read and write
7FFB4AD10000
trusted library allocation
page read and write
26E902EC000
trusted library allocation
page read and write
313E000
stack
page read and write
1C62D000
stack
page read and write
28AF000
stack
page read and write
7FFB4ADD0000
trusted library allocation
page read and write
289A90A9000
trusted library allocation
page read and write
7CF000
heap
page read and write
7FFB4AAF4000
trusted library allocation
page read and write
3720000
heap
page read and write
2595CF85000
heap
page read and write
7E0000
heap
page read and write
9EF000
stack
page read and write
162A6A90000
unkown
page read and write
32E5000
heap
page read and write
156B4F5D000
heap
page read and write
156B859A000
trusted library allocation
page read and write
294E000
stack
page read and write
2596328A000
heap
page read and write
B523CF9000
stack
page read and write
670000
heap
page read and write
7FFB4AB1B000
trusted library allocation
page execute and read and write
7FFB4AE90000
trusted library allocation
page read and write
12AA000
heap
page read and write
29E0000
heap
page read and write
289A5A20000
heap
page read and write
7FFB4AE32000
trusted library allocation
page read and write
156B5190000
trusted library allocation
page read and write
414000
unkown
page read and write
7FFB4AD30000
trusted library allocation
page read and write
2595E750000
direct allocation
page execute read
26E80088000
trusted library allocation
page read and write
32CF000
stack
page read and write
2595E770000
heap
page read and write
12AE000
heap
page read and write
DD5000
heap
page read and write
7FFB4ADA0000
trusted library allocation
page read and write
2595CED6000
heap
page read and write
7FFB4ADD0000
trusted library allocation
page read and write
7FFB4AE29000
trusted library allocation
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
7FFB4ADE0000
trusted library allocation
page read and write
7FFB4ACA7000
trusted library allocation
page read and write
7BE000
heap
page read and write
B99000
heap
page read and write
32FE000
stack
page read and write
7FFB4AF20000
trusted library allocation
page read and write
93E000
stack
page read and write
3F1E000
stack
page read and write
2595E7FC000
heap
page read and write
7FFB4AE40000
trusted library allocation
page read and write
7FFB4ADE0000
trusted library allocation
page read and write
32EF000
stack
page read and write
6FD000
stack
page read and write
B523D3E000
stack
page read and write
32E3000
heap
page read and write
2D9F000
stack
page read and write
11000
unkown
page execute read
5F0000
heap
page read and write
10B5000
heap
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
1E195CDE000
heap
page read and write
9EB07ED000
stack
page read and write
1E1986E2000
trusted library allocation
page read and write
7FFB4ADB0000
trusted library allocation
page read and write
720000
heap
page read and write
2595CF2A000
heap
page read and write
26921400000
heap
page read and write
1E195D2B000
heap
page read and write
26EEACA7000
heap
page execute and read and write
2D5E000
stack
page read and write
1E195D27000
heap
page read and write
7FF68E6F5000
unkown
page write copy
7FFB4AEDA000
trusted library allocation
page read and write
26EEA520000
trusted library allocation
page read and write
7BE000
heap
page read and write
9EB07FD000
stack
page read and write
1E1AFF90000
heap
page read and write
156B6A30000
heap
page execute and read and write
26EEB359000
heap
page read and write
33E0000
heap
page read and write
156B7D43000
trusted library allocation
page read and write
7FFB4AF5D000
trusted library allocation
page read and write
24BEFBE000
stack
page read and write
1E195EF5000
heap
page read and write
24BECFD000
stack
page read and write
7FFB4AAFB000
trusted library allocation
page execute and read and write
26EE8C59000
heap
page read and write
289BFC57000
heap
page read and write
289A94E1000
trusted library allocation
page read and write
26EE8C30000
trusted library section
page read and write
7FFB4ADC0000
trusted library allocation
page read and write
243E000
stack
page read and write
7FFB4AD50000
trusted library allocation
page read and write
A72DE7D000
stack
page read and write
7FFB4ADF0000
trusted library allocation
page read and write
1E1B0042000
heap
page read and write
8FC000
stack
page read and write
289A5AA6000
heap
page read and write
289C0203000
heap
page read and write
11F5000
stack
page read and write
156B8424000
trusted library allocation
page read and write
7FFB4AB7C000
trusted library allocation
page execute and read and write
2CE0000
heap
page read and write
31BD000
stack
page read and write
23069860000
heap
page read and write
7FFB4AF40000
trusted library allocation
page read and write
1E195CFE000
heap
page read and write
162A6B40000
heap
page read and write
289B7985000
trusted library allocation
page read and write
3270000
heap
page read and write
7FFB4AB76000
trusted library allocation
page read and write
80B000
heap
page read and write
156B8293000
trusted library allocation
page read and write
12C5000
heap
page read and write
7FFB4AD20000
trusted library allocation
page read and write
156CF386000
heap
page read and write
2595E7CC000
heap
page read and write
2B7E000
stack
page read and write
7FFB4AE24000
trusted library allocation
page read and write
7FFB4AD30000
trusted library allocation
page read and write
7FFB4ADE0000
trusted library allocation
page read and write
940000
heap
page read and write
156B50E0000
heap
page read and write
81B000
heap
page read and write
1E1AFE93000
heap
page read and write
F7977FF000
stack
page read and write
156B5160000
trusted library allocation
page read and write
7FF6E699A000
unkown
page read and write
7CC000
heap
page read and write
2595E780000
heap
page read and write
32F1000
heap
page read and write
600000
heap
page read and write
12257ED000
stack
page read and write
1E197976000
heap
page execute and read and write
7FFB4AF62000
trusted library allocation
page read and write
156B86A9000
trusted library allocation
page read and write
289A5A29000
heap
page read and write
1E1A79C1000
trusted library allocation
page read and write
2DFE000
stack
page read and write
7FFB4ADBF000
trusted library allocation
page read and write
156CF3A5000
heap
page read and write
7FFB4AF70000
trusted library allocation
page read and write
1E195E90000
heap
page read and write
7E3000
heap
page read and write
26E90001000
trusted library allocation
page read and write
156B85BB000
trusted library allocation
page read and write
8EE000
stack
page read and write
331C000
heap
page read and write
156B7E5B000
trusted library allocation
page read and write
414000
unkown
page readonly
7FFB4AB70000
trusted library allocation
page read and write
24EBE0D0000
heap
page read and write
12E8000
heap
page read and write
26EEAFFE000
heap
page read and write
289BFABB000
heap
page read and write
156CF3E0000
trusted library allocation
page read and write
7FFB4AC71000
trusted library allocation
page read and write
451F000
stack
page read and write
26921610000
unkown
page read and write
289A7575000
heap
page read and write
156B825F000
trusted library allocation
page read and write
289A5AEA000
heap
page read and write
7FF6E6980000
unkown
page readonly
7FFB4AACD000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
B5239FE000
stack
page read and write
81B000
heap
page read and write
1E1983BF000
trusted library allocation
page read and write
EFA000
stack
page read and write
1E197970000
heap
page execute and read and write
7FFB4AF65000
trusted library allocation
page read and write
7FFB4AAE0000
trusted library allocation
page read and write
289BFDFF000
heap
page read and write
7FFB4AAD0000
trusted library allocation
page read and write
13EB3000
trusted library allocation
page read and write
7FFB4AD90000
trusted library allocation
page read and write
3250000
heap
page read and write
7FFB4AB7C000
trusted library allocation
page execute and read and write
26EE8CAF000
heap
page read and write
7FFB4AADB000
trusted library allocation
page read and write
2596468A000
heap
page read and write
15000
unkown
page readonly
7FFB4AAC0000
trusted library allocation
page read and write
7FF6687E0000
unkown
page readonly
A72DBFE000
stack
page read and write
7FF6687E1000
unkown
page execute read
289A7470000
trusted library allocation
page read and write
2D0D000
stack
page read and write
7FFB4AAD2000
trusted library allocation
page read and write
E5DF7E000
stack
page read and write
126E000
stack
page read and write
1E1AFD79000
heap
page read and write
26E90031000
trusted library allocation
page read and write
7B2000
heap
page read and write
1E1AFDF6000
heap
page read and write
289BFC3A000
heap
page read and write
331A000
heap
page read and write
29E8000
heap
page read and write
7FFB4AD80000
trusted library allocation
page read and write
A72E17E000
stack
page read and write
12A0000
heap
page read and write
1E1979C1000
trusted library allocation
page read and write
FAE000
stack
page read and write
808000
heap
page read and write
7FFB4AB80000
trusted library allocation
page read and write
7FFB4AC72000
trusted library allocation
page read and write
7FFB4AB1C000
trusted library allocation
page execute and read and write
7FFB4AF00000
trusted library allocation
page execute and read and write
7FFB4AAE0000
trusted library allocation
page read and write
7FFB4AE00000
trusted library allocation
page read and write
26AD000
stack
page read and write
7FFB4ACE0000
trusted library allocation
page read and write
DBE000
stack
page read and write
7FFB4AC90000
trusted library allocation
page execute and read and write
26E81974000
trusted library allocation
page read and write
156B4F22000
heap
page read and write
35CB000
stack
page read and write
24BEAFE000
stack
page read and write
429F000
stack
page read and write
437DF9C000
stack
page read and write
30BE000
stack
page read and write
7FFB4AF00000
trusted library allocation
page read and write
1E199535000
trusted library allocation
page read and write
7FFB4AC92000
trusted library allocation
page read and write
7FFB4AD00000
trusted library allocation
page read and write
32FA000
heap
page read and write
1E1B0190000
trusted library allocation
page read and write
1E198553000
trusted library allocation
page read and write
3AA0000
heap
page execute and read and write
A72DB7E000
stack
page read and write
7FFB4AAC3000
trusted library allocation
page execute and read and write
7E1000
unkown
page execute read
7FFB4AE62000
trusted library allocation
page read and write
7FFB4AAD4000
trusted library allocation
page read and write
7FF6E69A5000
unkown
page read and write
7FFB4AF00000
trusted library allocation
page read and write
7FFB4AE13000
trusted library allocation
page read and write
7FFB4AF60000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
307E000
stack
page read and write
400000
unkown
page readonly
7FFB4AADD000
trusted library allocation
page execute and read and write
1E198CAA000
trusted library allocation
page read and write
156B51A0000
heap
page readonly
24EBE310000
unkown
page read and write
7FFB4ACE0000
trusted library allocation
page read and write
7FFB4AE35000
trusted library allocation
page read and write
7C3000
heap
page read and write
7FFB4AC90000
trusted library allocation
page execute and read and write
7FF668D69000
unkown
page readonly
7FFB4ACA0000
trusted library allocation
page execute and read and write
28B0000
heap
page read and write
E5DE7E000
stack
page read and write
7FFB4AD00000
trusted library allocation
page read and write
7FFB4AD80000
trusted library allocation
page read and write
289A5A6D000
heap
page read and write
289BFDDB000
heap
page read and write
5E7000
heap
page read and write
31D0000
heap
page read and write
1040000
heap
page read and write
33F0000
heap
page read and write
3301000
heap
page read and write
7FFB4AE00000
trusted library allocation
page read and write
7FFB4AC60000
trusted library allocation
page read and write
7FFB4ADD0000
trusted library allocation
page read and write
156C6BBC000
trusted library allocation
page read and write
162A6A70000
heap
page read and write
11CE000
stack
page read and write
289A757A000
heap
page read and write
7FFB4AB1C000
trusted library allocation
page execute and read and write
12000
unkown
page readonly
9C0000
heap
page read and write
7FF6687FB000
unkown
page read and write
32FF000
heap
page read and write
26E812EF000
trusted library allocation
page read and write
7FFB4AF20000
trusted library allocation
page read and write
5A0000
heap
page read and write
353C000
stack
page read and write
7FFB4ABA6000
trusted library allocation
page execute and read and write
156B4F2F000
heap
page read and write
7FFB4AC81000
trusted library allocation
page read and write
1E1AFD00000
heap
page read and write
53E000
stack
page read and write
414000
unkown
page write copy
7DF4282A0000
trusted library allocation
page execute and read and write
E5F0CA000
stack
page read and write
FEE000
stack
page read and write
B5240BE000
stack
page read and write
A91000
unkown
page execute read
26EEA500000
trusted library allocation
page read and write
A72E27C000
stack
page read and write
CB112FE000
stack
page read and write
1E195E70000
heap
page read and write
B07000
heap
page read and write
5E0000
heap
page read and write
7C9000
heap
page read and write
280E000
stack
page read and write
401F000
stack
page read and write
30FE000
stack
page read and write
290F000
stack
page read and write
289BFB37000
heap
page execute and read and write
803000
heap
page read and write
B523C7D000
stack
page read and write
7FFB4AD90000
trusted library allocation
page read and write
5AE000
stack
page read and write
7FFB4AAD0000
trusted library allocation
page read and write
7FFB4AE29000
trusted library allocation
page read and write
2595CF60000
heap
page read and write
7FFB4AAE4000
trusted library allocation
page read and write
B1D000
heap
page read and write
7FF68E17B000
unkown
page write copy
1350000
trusted library allocation
page read and write
1E1997FD000
trusted library allocation
page read and write
2FB0000
heap
page read and write
CB10FC9000
stack
page read and write
358E000
stack
page read and write
1E1B0066000
heap
page read and write
247E000
stack
page read and write
A72DAFE000
stack
page read and write
26EEADD0000
heap
page read and write
5FE000
stack
page read and write
CB116FE000
stack
page read and write
2E1E000
stack
page read and write
A72E1FE000
stack
page read and write
7CB000
heap
page read and write
1E1B00AB000
heap
page read and write
156B83DA000
trusted library allocation
page read and write
3260000
heap
page read and write
7FF68E6F2000
unkown
page write copy
7FFB4AE38000
trusted library allocation
page read and write
1E1B00E9000
heap
page read and write
CB1197E000
stack
page read and write
401000
unkown
page execute read
7CF000
heap
page read and write
2595E890000
heap
page readonly
26EE8C91000
heap
page read and write
159E000
stack
page read and write
7FFB4AACD000
trusted library allocation
page execute and read and write
7E2000
unkown
page readonly
E5EF4E000
stack
page read and write
26E812F8000
trusted library allocation
page read and write
1E1AFD3F000
heap
page read and write
14000
unkown
page read and write
F90000
heap
page read and write
7E3000
unkown
page write copy
1E19946D000
trusted library allocation
page read and write
156B4EE0000
heap
page read and write
26E902F2000
trusted library allocation
page read and write
3314000
heap
page read and write
7FF68E6F6000
unkown
page readonly
1250000
heap
page read and write
38DE000
stack
page read and write
19D000
stack
page read and write
1E1A7CA5000
trusted library allocation
page read and write
7FFB4ACE0000
trusted library allocation
page read and write
289A5A7F000
heap
page read and write
26EE000
stack
page read and write
2FBF000
stack
page read and write
156B6990000
trusted library allocation
page read and write
156B81F6000
trusted library allocation
page read and write
C4E000
heap
page read and write
7FFB4AE4C000
trusted library allocation
page read and write
289A7726000
trusted library allocation
page read and write
7FFB4ACD2000
trusted library allocation
page read and write
12E8000
heap
page read and write
1310000
heap
page read and write
1E199570000
trusted library allocation
page read and write
26E812D9000
trusted library allocation
page read and write
1290000
heap
page read and write
410000
unkown
page readonly
7FFB4AE60000
trusted library allocation
page read and write
A72DDFA000
stack
page read and write
E5E07E000
stack
page read and write
7FFB4AB8C000
trusted library allocation
page execute and read and write
289A8604000
trusted library allocation
page read and write
1E1B015C000
heap
page read and write
24BF03F000
stack
page read and write
2595CE90000
heap
page read and write
3314000
heap
page read and write
331C000
heap
page read and write
32E7000
heap
page read and write
7FFB4ABE6000
trusted library allocation
page execute and read and write
479F000
stack
page read and write
26EEB002000
heap
page read and write
156CEFA0000
heap
page read and write
24BFC8A000
stack
page read and write
7FFB4AE24000
trusted library allocation
page read and write
1326000
heap
page read and write
230698D8000
heap
page read and write
26EEB0AA000
heap
page read and write
120E000
stack
page read and write
26EE8C50000
heap
page read and write
B52397E000
stack
page read and write
156B7A6F000
trusted library allocation
page read and write
7FFB4AE3C000
trusted library allocation
page read and write
ECE000
stack
page read and write
7FFB4AADD000
trusted library allocation
page execute and read and write
156CF312000
heap
page read and write
E5DEFE000
stack
page read and write
42DE000
stack
page read and write
AE8000
heap
page read and write
7FFB4AC80000
trusted library allocation
page execute and read and write
7FFB4ABE0000
trusted library allocation
page execute and read and write
7FFB4AE10000
trusted library allocation
page read and write
289A80A0000
trusted library allocation
page read and write
7FFB4AE3C000
trusted library allocation
page read and write
B49000
heap
page read and write
289A914F000
trusted library allocation
page read and write
2B8F000
stack
page read and write
230698B0000
heap
page read and write
687000
heap
page read and write
16DE000
stack
page read and write
2595E7C8000
heap
page read and write
81D000
heap
page read and write
10000
unkown
page readonly
384C000
stack
page read and write
7FFB4AAFD000
trusted library allocation
page execute and read and write
756000
heap
page read and write
26E902E5000
trusted library allocation
page read and write
26EEAD03000
heap
page read and write
1F0000
heap
page read and write
26E811A7000
trusted library allocation
page read and write
A72DEF8000
stack
page read and write
7FFB4AD90000
trusted library allocation
page read and write
1359000
heap
page read and write
7FFB4AF10000
trusted library allocation
page read and write
269213A0000
heap
page read and write
7E1000
unkown
page execute read
24BEA7E000
stack
page read and write
1E1AFF70000
heap
page read and write
7FFB4AE70000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
9FB000
stack
page read and write
13EB1000
trusted library allocation
page read and write
156B85A1000
trusted library allocation
page read and write
24BF13B000
stack
page read and write
156B8668000
trusted library allocation
page read and write
B523EBA000
stack
page read and write
7FFB4ACD0000
trusted library allocation
page read and write
1E195CE4000
heap
page read and write
289BFEA1000
heap
page read and write
D70000
heap
page read and write
305D000
stack
page read and write
289A883C000
trusted library allocation
page read and write
289BFE7A000
heap
page read and write
25AD000
stack
page read and write
7FFB4AAED000
trusted library allocation
page execute and read and write
26EE8C45000
heap
page read and write
26E80F6F000
trusted library allocation
page read and write
24BE753000
stack
page read and write
7FFB4ADF0000
trusted library allocation
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
230698B5000
heap
page read and write
33FE000
stack
page read and write
1E1A7CB3000
trusted library allocation
page read and write
199000
stack
page read and write
289A5B20000
heap
page read and write
10CE000
stack
page read and write
289A5C20000
heap
page read and write
156CF060000
heap
page read and write
361F000
stack
page read and write
5B0000
heap
page read and write
7FFB4ACC0000
trusted library allocation
page execute and read and write
81B000
heap
page read and write
B9B000
heap
page read and write
1E198C0E000
trusted library allocation
page read and write
A50000
unkown
page readonly
26EEB01F000
heap
page read and write
1F0000
heap
page read and write
7AE000
stack
page read and write
26EE8BD0000
heap
page read and write
7FFB4AC90000
trusted library allocation
page execute and read and write
23069890000
heap
page read and write
3A1E000
stack
page read and write
7FFB4AF72000
trusted library allocation
page read and write
26EEACB0000
heap
page read and write
26EEA530000
heap
page readonly
32A0000
heap
page read and write
7FFB4AF70000
trusted library allocation
page read and write
53C000
stack
page read and write
26E90021000
trusted library allocation
page read and write
7FFB4AAEB000
trusted library allocation
page execute and read and write
7FFB4ABD6000
trusted library allocation
page execute and read and write
7BF000
heap
page read and write
2E7F000
stack
page read and write
8DE387D000
stack
page read and write
414000
unkown
page write copy
2E73000
heap
page read and write
B523B7F000
stack
page read and write
7DF4BDCD0000
trusted library allocation
page execute and read and write
9C000
stack
page read and write
B47000
heap
page read and write
156B86E6000
trusted library allocation
page read and write
1E1B0360000
heap
page read and write
156B8657000
trusted library allocation
page read and write
26EEABC0000
trusted library allocation
page read and write
7FFB4AE50000
trusted library allocation
page read and write
309E000
stack
page read and write
7FFB4AD70000
trusted library allocation
page read and write
26EEB1F0000
heap
page read and write
2595CD70000
heap
page read and write
289B770C000
trusted library allocation
page read and write
7FFB4AE10000
trusted library allocation
page read and write
156CF1C0000
heap
page read and write
269215D0000
unkown
page read and write
7FFB4AAC4000
trusted library allocation
page read and write
125E000
heap
page read and write
24BEF38000
stack
page read and write
7FFB4AE40000
trusted library allocation
page read and write
32EF000
heap
page read and write
1E197A45000
trusted library allocation
page read and write
289BFF20000
trusted library allocation
page read and write
E5E2FA000
stack
page read and write
7FFB4AB70000
trusted library allocation
page read and write
1E195EFA000
heap
page read and write
3340000
heap
page read and write
7FFB4AAC4000
trusted library allocation
page read and write
410000
unkown
page readonly
400000
unkown
page readonly
26EEA6B3000
heap
page read and write
289A5A5E000
heap
page read and write
2596648A000
heap
page read and write
419E000
stack
page read and write
2595E7D9000
heap
page read and write
A72EDCA000
stack
page read and write
1F0000
heap
page read and write
7DF44B1E0000
trusted library allocation
page execute and read and write
BAB000
stack
page read and write
289A78C9000
trusted library allocation
page read and write
7FFB4AF90000
trusted library allocation
page read and write
1E1A7CAA000
trusted library allocation
page read and write
E0F000
stack
page read and write
330E000
stack
page read and write
7FF668D69000
unkown
page readonly
CB1157E000
stack
page read and write
7FFB4AE54000
trusted library allocation
page read and write
2596148A000
heap
page read and write
7E3000
unkown
page write copy
26E80001000
trusted library allocation
page read and write
2596508A000
heap
page read and write
7DF000
stack
page read and write
7FFB4AAD4000
trusted library allocation
page read and write
156B5009000
heap
page read and write
12000
unkown
page readonly
1BCE000
stack
page read and write
2595EC8A000
heap
page read and write
AE0000
heap
page read and write
289A76A1000
trusted library allocation
page read and write
7FFB4AD40000
trusted library allocation
page read and write
7FFB4ADB0000
trusted library allocation
page read and write
7C3000
heap
page read and write
1E1AFDC8000
heap
page read and write
7FF68E17C000
unkown
page write copy
156CF088000
heap
page read and write
156CF38D000
heap
page read and write
3EB1000
trusted library allocation
page read and write
36CC000
stack
page read and write
7FFB4AC60000
trusted library allocation
page read and write
7FFB4AF40000
trusted library allocation
page read and write
7FFB4AE03000
trusted library allocation
page read and write
1E1AFDD6000
heap
page read and write
804000
heap
page read and write
8AE000
stack
page read and write
401000
unkown
page execute read
7FFB4ACB0000
trusted library allocation
page execute and read and write
F7975FE000
stack
page read and write
7FFB4AE57000
trusted library allocation
page read and write
2595E7C9000
heap
page read and write
289A7570000
heap
page read and write
32E1000
heap
page read and write
7FF668D76000
unkown
page readonly
12D0000
heap
page read and write
7FF68E161000
unkown
page execute read
26EEA670000
unkown
page read and write
331A000
heap
page read and write
401000
unkown
page execute read
7FF6E69A3000
unkown
page read and write
7FFB4AF60000
trusted library allocation
page read and write
7FFB4ACA4000
trusted library allocation
page read and write
24BF0BE000
stack
page read and write
156B6AC0000
heap
page execute and read and write
289BFD1E000
heap
page read and write
32E9000
heap
page read and write
3440000
heap
page read and write
7FFB4AAC0000
trusted library allocation
page read and write
289A7490000
trusted library allocation
page read and write
E5E277000
stack
page read and write
3314000
heap
page read and write
7FF668D75000
unkown
page write copy
7FFB4AACD000
trusted library allocation
page execute and read and write
28E0000
heap
page read and write
803000
heap
page read and write
156B6E5E000
trusted library allocation
page read and write
131A000
heap
page read and write
7FFB4ACB4000
trusted library allocation
page read and write
289BFA7E000
heap
page read and write
156C6E3C000
trusted library allocation
page read and write
289A7450000
trusted library allocation
page read and write
7FFB4AEFA000
trusted library allocation
page read and write
289A7510000
trusted library allocation
page read and write
32AE000
stack
page read and write
7FFB4AD00000
trusted library allocation
page read and write
7FFB4ABA0000
trusted library allocation
page read and write
24BE7DD000
stack
page read and write
1E1B016E000
heap
page read and write
7FFB4AD60000
trusted library allocation
page read and write
803000
heap
page read and write
32FC000
heap
page read and write
289BFEDF000
heap
page read and write
7FFB4ACA1000
trusted library allocation
page read and write
26EEB091000
heap
page read and write
7FF668D69000
unkown
page readonly
1E1994B2000
trusted library allocation
page read and write
2E40000
heap
page read and write
26EEAEE7000
heap
page read and write
A4A000
heap
page read and write
7F9000
heap
page read and write
289A83B9000
trusted library allocation
page read and write
2595E7EC000
heap
page read and write
7FF668D76000
unkown
page readonly
169F000
stack
page read and write
7DF44B1D0000
trusted library allocation
page execute and read and write
7FFB4ABE0000
trusted library allocation
page execute and read and write
7FFB4AB80000
trusted library allocation
page execute and read and write
2595F68A000
heap
page read and write
26E902F4000
trusted library allocation
page read and write
7FF6687E0000
unkown
page readonly
980000
heap
page read and write
7FFB4AD70000
trusted library allocation
page read and write
2C3F000
stack
page read and write
26EEA570000
trusted library allocation
page read and write
7FF668D72000
unkown
page write copy
156B4F57000
heap
page read and write
7F9000
heap
page read and write
7FFB4ABA6000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
156B4F10000
heap
page read and write
400000
unkown
page readonly
7FFB4AAF2000
trusted library allocation
page read and write
26EE8BB0000
heap
page read and write
7FFB4AF70000
trusted library allocation
page read and write
7FFB4ACAA000
trusted library allocation
page read and write
3B4B000
stack
page read and write
7FF668D70000
unkown
page read and write
162A6990000
heap
page read and write
7CD000
heap
page read and write
26E81E43000
trusted library allocation
page read and write
7FFB4AAD0000
trusted library allocation
page read and write
26E81BB7000
trusted library allocation
page read and write
300F000
stack
page read and write
7FFB4AC10000
trusted library allocation
page execute and read and write
7FFB4AC70000
trusted library allocation
page read and write
2E70000
heap
page read and write
A72ECCC000
stack
page read and write
2D7F000
stack
page read and write
305E000
stack
page read and write
156C6B81000
trusted library allocation
page read and write
156B5175000
heap
page read and write
2595E7D8000
heap
page read and write
24EBE1D0000
heap
page read and write
289A5AE4000
heap
page read and write
7FFB4AAE0000
trusted library allocation
page read and write
2ECF000
stack
page read and write
7FF6687E0000
unkown
page readonly
289BFE95000
heap
page read and write
7C9000
heap
page read and write
7FFB4ABE0000
trusted library allocation
page execute and read and write
25963C8A000
heap
page read and write
7FFB4AD50000
trusted library allocation
page read and write
156B5120000
heap
page read and write
26E80DC0000
trusted library allocation
page read and write
289BFC23000
heap
page read and write
7FFB4AED0000
trusted library allocation
page read and write
7E0000
unkown
page readonly
2C40000
heap
page read and write
2595E7E4000
heap
page read and write
12F0000
heap
page read and write
1370000
trusted library allocation
page read and write
9EB09FF000
stack
page read and write
289BFE4D000
heap
page read and write
118E000
stack
page read and write
7FFB4AF40000
trusted library allocation
page read and write
286E000
stack
page read and write
A93000
unkown
page write copy
7FFB4AE00000
trusted library allocation
page read and write
10000
unkown
page readonly
26E80B7F000
trusted library allocation
page read and write
7FF68E17B000
unkown
page read and write
26EEA830000
heap
page execute and read and write
7FFB4AEF0000
trusted library allocation
page read and write
7FFB4ACA2000
trusted library allocation
page read and write
1E195CE0000
heap
page read and write
289A7690000
heap
page read and write
156B7696000
trusted library allocation
page read and write
1E198B63000
trusted library allocation
page read and write
437E2FF000
stack
page read and write
7FFB4AB7C000
trusted library allocation
page execute and read and write
156B51B0000
heap
page read and write
1E199795000
trusted library allocation
page read and write
156B6B40000
heap
page read and write
A72E07E000
stack
page read and write
7FFB4AF56000
trusted library allocation
page read and write
7FFB4AD20000
trusted library allocation
page read and write
289A9108000
trusted library allocation
page read and write
DD0000
heap
page read and write
24BF1BE000
stack
page read and write
289BFED0000
heap
page read and write
7FFB4AC80000
trusted library allocation
page execute and read and write
289B79A4000
trusted library allocation
page read and write
26EEAD58000
heap
page read and write
CB115FF000
stack
page read and write
797000
heap
page read and write
289C01D0000
heap
page read and write
2595CF89000
heap
page read and write
24EBE1B0000
heap
page read and write
344E000
stack
page read and write
7FF6E699C000
unkown
page readonly
38E0000
heap
page read and write
CB1147D000
stack
page read and write
414000
unkown
page write copy
131B000
heap
page read and write
156B4F6F000
heap
page read and write
1E197710000
trusted library allocation
page read and write
7FFB4ADE0000
trusted library allocation
page read and write
7FFB4AB4C000
trusted library allocation
page execute and read and write
7FFB4AF00000
trusted library allocation
page execute and read and write
7FF668D75000
unkown
page write copy
1FCE000
stack
page read and write
7FFB4ACF0000
trusted library allocation
page read and write
24BFB8C000
stack
page read and write
C92000
heap
page read and write
469E000
stack
page read and write
156B8034000
trusted library allocation
page read and write
7FFB4AF50000
trusted library allocation
page read and write
156B7DE3000
trusted library allocation
page read and write
26E81A0F000
trusted library allocation
page read and write
156CF3B4000
heap
page read and write
7FF6687E1000
unkown
page execute read
394E000
stack
page read and write
289BFD00000
heap
page read and write
7FFB4AF3D000
trusted library allocation
page read and write
26921650000
unkown
page read and write
2D2C000
stack
page read and write
2595E930000
heap
page read and write
EF0000
heap
page read and write
1080000
heap
page read and write
7FFB4AE30000
trusted library allocation
page read and write
7FFB4ADA5000
trusted library allocation
page read and write
7FFB4AB0B000
trusted library allocation
page read and write
2E60000
heap
page read and write
26AD000
stack
page read and write
7FFB4ADA0000
trusted library allocation
page read and write
7E5000
unkown
page readonly
380E000
stack
page read and write
7FFB4AF0C000
trusted library allocation
page read and write
7FFB4ACD7000
trusted library allocation
page read and write
7FFB4ADC2000
trusted library allocation
page read and write
7FFB4AD80000
trusted library allocation
page read and write
320E000
stack
page read and write
7FFB4ACD4000
trusted library allocation
page read and write
26E902EA000
trusted library allocation
page read and write
7FF6687E1000
unkown
page execute read
32F8000
heap
page read and write
7FFB4AD30000
trusted library allocation
page read and write
28C0000
heap
page read and write
1DF4F000
stack
page read and write
269213B0000
heap
page read and write
7F9000
heap
page read and write
7E1000
heap
page read and write
156B7827000
trusted library allocation
page read and write
289BFDFA000
heap
page read and write
26EEA6A5000
heap
page read and write
156C6E44000
trusted library allocation
page read and write
7FFB4AE59000
trusted library allocation
page read and write
289C0080000
heap
page read and write
A4E000
heap
page read and write
3314000
heap
page read and write
7FF68E6F2000
unkown
page read and write
24EBE370000
heap
page read and write
7FFB4AEF6000
trusted library allocation
page read and write
8DF000
stack
page read and write
48E0000
heap
page read and write
156B8365000
trusted library allocation
page read and write
7FFB4AF30000
trusted library allocation
page execute and read and write
3110000
heap
page read and write
420000
heap
page read and write
289A8681000
trusted library allocation
page read and write
A7A000
heap
page read and write
7FFB4ACA2000
trusted library allocation
page read and write
1CD70000
heap
page read and write
289BFEEF000
heap
page read and write
156CF500000
heap
page read and write
BA2000
heap
page read and write
1E1B0136000
heap
page read and write
7FFB4ADB0000
trusted library allocation
page read and write
230698D0000
heap
page read and write
2595E730000
heap
page read and write
156B8029000
trusted library allocation
page read and write
9F6000
stack
page read and write
7FFB4AECA000
trusted library allocation
page read and write
7FFB4AF2E000
trusted library allocation
page read and write
A0E000
stack
page read and write
7FF6E69A8000
unkown
page readonly
289BFDA0000
heap
page read and write
7FFB4AF30000
trusted library allocation
page read and write
F7D000
stack
page read and write
370E000
stack
page read and write
375F000
stack
page read and write
AA5000
unkown
page readonly
26E81AB4000
trusted library allocation
page read and write
E5DFF9000
stack
page read and write
32BD000
stack
page read and write
19C000
stack
page read and write
7FFB4AAED000
trusted library allocation
page execute and read and write
7FFB4ADC0000
trusted library allocation
page read and write
7FF6687FC000
unkown
page write copy
7FFB4AF92000
trusted library allocation
page read and write
B524C09000
stack
page read and write
156B84D8000
trusted library allocation
page read and write
3314000
heap
page read and write
13A0000
heap
page read and write
12FC000
heap
page read and write
156B8305000
trusted library allocation
page read and write
156CF0D5000
heap
page read and write
156B81DE000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
289BFA7C000
heap
page read and write
803000
heap
page read and write
7FFB4AE30000
trusted library allocation
page read and write
24BEBFF000
stack
page read and write
156B6B51000
trusted library allocation
page read and write
2595E8A0000
direct allocation
page execute and read and write
7FF668D72000
unkown
page write copy
7FFB4AEF0000
trusted library allocation
page read and write
26E80229000
trusted library allocation
page read and write
7FFB4AD50000
trusted library allocation
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
24BEC7A000
stack
page read and write
7E0000
unkown
page readonly
F10000
heap
page read and write
32EC000
heap
page read and write
7FFB4AF40000
trusted library allocation
page read and write
156B4F97000
heap
page read and write
F7975EE000
stack
page read and write
351E000
stack
page read and write
804000
heap
page read and write
640000
heap
page read and write
2E3F000
stack
page read and write
3C4C000
stack
page read and write
7FFB4ABA6000
trusted library allocation
page execute and read and write
7FFB4AD40000
trusted library allocation
page read and write
289BFC43000
heap
page read and write
46E000
stack
page read and write
26EEB05B000
heap
page read and write
289B76D1000
trusted library allocation
page read and write
2A8E000
stack
page read and write
289BFAC1000
heap
page read and write
8FA000
stack
page read and write
B0B000
heap
page read and write
414000
unkown
page readonly
379E000
stack
page read and write
7FFB4AC71000
trusted library allocation
page read and write
25965A8A000
heap
page read and write
5A0000
heap
page read and write
26EEB03D000
heap
page read and write
803000
heap
page read and write
7FFB4AC7A000
trusted library allocation
page read and write
7FFB4AF67000
trusted library allocation
page read and write
3315000
heap
page read and write
13000
unkown
page write copy
441E000
stack
page read and write
470000
heap
page read and write
2FFE000
stack
page read and write
26EEAF59000
heap
page read and write
7FFB4AAD3000
trusted library allocation
page execute and read and write
B523A7E000
stack
page read and write
26EEA5B0000
trusted library allocation
page read and write
3324000
heap
page read and write
24BEB79000
stack
page read and write
7FF6687FB000
unkown
page write copy
B523AF9000
stack
page read and write
1E1A79D0000
trusted library allocation
page read and write
26EEA350000
heap
page read and write
156B6A37000
heap
page execute and read and write
162A6DB0000
heap
page read and write
7FFB4AE50000
trusted library allocation
page read and write
1120000
heap
page read and write
289B798C000
trusted library allocation
page read and write
389F000
stack
page read and write
26EEB05F000
heap
page read and write
1E195CE8000
heap
page read and write
B5238FE000
stack
page read and write
437E27F000
stack
page read and write
B523E38000
stack
page read and write
26E81A6D000
trusted library allocation
page read and write
A72DD7E000
stack
page read and write
1E19892C000
trusted library allocation
page read and write
7FFB4AD70000
trusted library allocation
page read and write
2FEE000
stack
page read and write
2C7E000
stack
page read and write
1323000
heap
page read and write
289BFAF5000
heap
page read and write
7FFB4AC62000
trusted library allocation
page read and write
3314000
heap
page read and write
2CA0000
heap
page read and write
289A758A000
heap
page read and write
9C5000
heap
page read and write
815000
heap
page read and write
39DF000
stack
page read and write
7FFB4AE20000
trusted library allocation
page read and write
32EF000
heap
page read and write
125A000
heap
page read and write
81B000
heap
page read and write
B0F000
heap
page read and write
156B7501000
trusted library allocation
page read and write
26EEB063000
heap
page read and write
A72DF77000
stack
page read and write
7FF68E6F6000
unkown
page readonly
3EDF000
stack
page read and write
156B769D000
trusted library allocation
page read and write
12257FE000
stack
page read and write
331C000
heap
page read and write
678000
heap
page read and write
2DCF000
stack
page read and write
7FFB4AE68000
trusted library allocation
page read and write
A92000
unkown
page readonly
156B7CA8000
trusted library allocation
page read and write
13C0000
heap
page read and write
24BFC0A000
stack
page read and write
7FFB4AE00000
trusted library allocation
page read and write
E5F04B000
stack
page read and write
26E9006C000
trusted library allocation
page read and write
32F4000
heap
page read and write
289A7480000
heap
page readonly
289B76A1000
trusted library allocation
page read and write
7FFB4ACB0000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
1E195ED0000
heap
page read and write
53E000
stack
page read and write
2E70000
heap
page read and write
26EEA450000
heap
page read and write
7F9000
heap
page read and write
A72DFF9000
stack
page read and write
7FFB4AAF4000
trusted library allocation
page read and write
7FFB4AAC3000
trusted library allocation
page execute and read and write
289BFC33000
heap
page read and write
29DD000
stack
page read and write
7FFB4AE50000
trusted library allocation
page read and write
289A5C00000
heap
page read and write
7FFB4AEC3000
trusted library allocation
page read and write
13EB7000
trusted library allocation
page read and write
2595CF02000
heap
page read and write
E5E17D000
stack
page read and write
134A000
heap
page read and write
26EE8CDA000
heap
page read and write
7FFB4AD40000
trusted library allocation
page read and write
7FFB4AE50000
trusted library allocation
page read and write
A72ED4B000
stack
page read and write
2E2C000
stack
page read and write
7C1000
heap
page read and write
BBB000
heap
page read and write
26EEA4F0000
trusted library section
page read and write
2F7C000
stack
page read and write
CB1167E000
stack
page read and write
7FF668D67000
unkown
page read and write
7FF6687E0000
unkown
page readonly
4F0000
heap
page read and write
7E2000
heap
page read and write
401000
unkown
page execute read
323F000
stack
page read and write
156B8334000
trusted library allocation
page read and write
13EB9000
trusted library allocation
page read and write
31BE000
stack
page read and write
26E81AF9000
trusted library allocation
page read and write
E5DBB3000
stack
page read and write
AAA000
heap
page read and write
7FFB4AD20000
trusted library allocation
page read and write
2595CF1B000
heap
page read and write
72A000
heap
page read and write
CB117FF000
stack
page read and write
2E5F000
stack
page read and write
2596008A000
heap
page read and write
C4A000
heap
page read and write
7F9000
heap
page read and write
15000
unkown
page readonly
2595CF2B000
heap
page read and write
156B4F4F000
heap
page read and write
156B5150000
trusted library section
page read and write
A72DC7E000
stack
page read and write
809000
heap
page read and write
1E195CB2000
heap
page read and write
3DDE000
stack
page read and write
7FFB4AB86000
trusted library allocation
page read and write
7CA000
heap
page read and write
2E78000
heap
page read and write
156B82D2000
trusted library allocation
page read and write
7FF668D76000
unkown
page readonly
B52403C000
stack
page read and write
72E000
heap
page read and write
CA7000
heap
page read and write
E5E0F9000
stack
page read and write
EF6000
stack
page read and write
7FFB4AB70000
trusted library allocation
page read and write
7FF68E160000
unkown
page readonly
26EEAD6F000
heap
page read and write
324F000
stack
page read and write
289BFE3B000
heap
page read and write
2595CE99000
heap
page read and write
289A5AA8000
heap
page read and write
156CF0C0000
heap
page read and write
26EEAD8A000
heap
page read and write
BE0000
heap
page read and write
3140000
heap
page read and write
7FFB4AE03000
trusted library allocation
page read and write
1E34B000
stack
page read and write
2FB8000
heap
page read and write
81D000
heap
page read and write
156B7DED000
trusted library allocation
page read and write
7FFB4AE94000
trusted library allocation
page read and write
1100000
heap
page read and write
156B84BD000
trusted library allocation
page read and write
7B5000
heap
page read and write
7FFB4AAF0000
trusted library allocation
page read and write
26E812DD000
trusted library allocation
page read and write
14E0000
heap
page read and write
26EEB340000
heap
page read and write
7FFB4AED0000
trusted library allocation
page read and write
156B51B5000
heap
page read and write
156B862E000
trusted library allocation
page read and write
32E8000
heap
page read and write
11E0000
heap
page read and write
E5E1F9000
stack
page read and write
2C7D000
stack
page read and write
1E197980000
heap
page execute and read and write
7FFB4ACB2000
trusted library allocation
page read and write
B1B000
heap
page read and write
7FF668D75000
unkown
page write copy
7CD000
heap
page read and write
1E195CEA000
heap
page read and write
80A000
heap
page read and write
2DB0000
heap
page read and write
7FF68E160000
unkown
page readonly
47DE000
stack
page read and write
289BFEA5000
heap
page read and write
26EEA6A0000
heap
page read and write
1E199426000
trusted library allocation
page read and write
48DF000
stack
page read and write
2595E7C0000
heap
page read and write
B40000
heap
page read and write
7FFB4AAED000
trusted library allocation
page execute and read and write
E5E378000
stack
page read and write
289A85F0000
trusted library allocation
page read and write
26EEA6D0000
unkown
page read and write
1E195EF0000
heap
page read and write
411000
unkown
page execute read
7FFB4ADB0000
trusted library allocation
page read and write
4F0000
heap
page read and write
808000
heap
page read and write
1E197700000
heap
page readonly
7FFB4AEEC000
trusted library allocation
page read and write
289BFE8D000
heap
page read and write
7FFB4AE33000
trusted library allocation
page read and write
26EEAED2000
heap
page read and write
32FB000
heap
page read and write
7FFB4AE39000
trusted library allocation
page read and write
1E198558000
trusted library allocation
page read and write
7FF68E6E7000
unkown
page read and write
13C5000
heap
page read and write
7FFB4AAF0000
trusted library allocation
page read and write
7FFB4AAD0000
trusted library allocation
page read and write
412000
unkown
page readonly
7FF68E6E9000
unkown
page readonly
7FFB4AF36000
trusted library allocation
page read and write
A92000
unkown
page readonly
156CEFDB000
heap
page read and write
7FFB4AE60000
trusted library allocation
page read and write
E5E4FE000
stack
page read and write
7FFB4AD00000
trusted library allocation
page read and write
289A7430000
trusted library section
page read and write
7FFB4AADD000
trusted library allocation
page execute and read and write
7FF6E6981000
unkown
page execute read
7FFB4AB1D000
trusted library allocation
page execute and read and write
7FFB4ADD0000
trusted library allocation
page read and write
24A0000
heap
page read and write
156CF1A0000
heap
page execute and read and write
26EEB04D000
heap
page read and write
A52000
unkown
page readonly
5F5000
heap
page read and write
10B0000
heap
page read and write
156B82F1000
trusted library allocation
page read and write
411000
unkown
page execute read
7FFB4AE80000
trusted library allocation
page read and write
7FF668D72000
unkown
page read and write
7FFB4AAC2000
trusted library allocation
page read and write
2F0E000
stack
page read and write
415F000
stack
page read and write
7FFB4AD10000
trusted library allocation
page read and write
401000
unkown
page execute read
3EBA000
trusted library allocation
page read and write
7DF4A3510000
trusted library allocation
page execute and read and write
B524B8A000
stack
page read and write
C40000
heap
page read and write
156B822D000
trusted library allocation
page read and write
3314000
heap
page read and write
7FFB4ADF0000
trusted library allocation
page read and write
7FFB4AC7A000
trusted library allocation
page read and write
24EBE480000
unkown
page read and write
3B5E000
stack
page read and write
2595CE50000
heap
page read and write
2595CF89000
heap
page read and write
2C3D000
stack
page read and write
7FFB4AF50000
trusted library allocation
page read and write
B523873000
stack
page read and write
13000
unkown
page write copy
156CF3A9000
heap
page read and write
2595CEA3000
heap
page read and write
63F000
stack
page read and write
13A5000
heap
page read and write
E5EFCC000
stack
page read and write
26EEB06B000
heap
page read and write
A90000
unkown
page readonly
7E4000
unkown
page read and write
26E812E2000
trusted library allocation
page read and write
1D74D000
stack
page read and write
7FFB4ADA0000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FFB4ABF0000
trusted library allocation
page execute and read and write
289BFB30000
heap
page execute and read and write
289B76C1000
trusted library allocation
page read and write
26EEAFC4000
heap
page read and write
32E4000
heap
page read and write
1E195F50000
heap
page read and write
26EEAEB0000
heap
page read and write
1E195F40000
trusted library allocation
page read and write
1E1AFE90000
heap
page read and write
7FFB4ABAC000
trusted library allocation
page execute and read and write
289BFA30000
heap
page read and write
1CF40000
heap
page read and write
7E3000
heap
page read and write
269216A5000
heap
page read and write
7FFB4AAFD000
trusted library allocation
page execute and read and write
7FFB4ACA4000
trusted library allocation
page read and write
2A4F000
stack
page read and write
7C3000
heap
page read and write
1E195C90000
heap
page read and write
There are 1453 hidden memdumps, click here to show them.