IOC Report
UH7iNNKgPW.exe

loading gif

Files

File Path
Type
Category
Malicious
UH7iNNKgPW.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UH7iNNKgPW.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\ADWASl.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\KUPAL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0laiuu5a.43r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0q1o4an5.5xs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3qhksazs.y2i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4rjljiwu.x1w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55pkjazo.w12.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5axlstur.qxb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cfyfzqj0.3xz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3orsoly.e4g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3umcrtz.wcy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpyndwbw.qgo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3znqaiw.sbj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fezj51pd.lfs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ha4qrnbm.wdr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huvki03i.bg3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hz5lerdo.ij2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5bs2wk2.svb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k5h3poes.q1x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdiva3sm.osh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_msa4nzto.d4u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nyeksvtm.nqj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qsxdcpbk.wnw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvxsy0z5.bim.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qzo4arj3.2gi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rdwq2z1i.jwe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tihjq4gb.off.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmqovp4e.hxh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrioal35.3nl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vyo5mbyo.2va.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vysfs1ih.zqi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbaiktln.csg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xsnyxakx.03b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z23u4h5e.be3.psm1
ASCII text, with no line terminators
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UH7iNNKgPW.exe
"C:\Users\user\Desktop\UH7iNNKgPW.exe"
malicious
C:\Users\user\AppData\Roaming\KUPAL.exe
"C:\Users\user\AppData\Roaming\KUPAL.exe"
malicious
C:\Users\user\AppData\Roaming\ADWASl.exe
"C:\Users\user\AppData\Roaming\ADWASl.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\KUPAL.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ADWASl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'KUPAL.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ADWASl.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\system user'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\system user'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system user'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system user'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
plant-serial.gl.at.ply.gg
malicious
147.185.221.18
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
127.0.0.1
http://crl.mi
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\KUPAL_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ADWASl_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12CF8000
trusted library allocation
page read and write
malicious
E92000
unkown
page readonly
malicious
682000
unkown
page readonly
malicious
18C4F2A3000
trusted library allocation
page read and write
1FFFF96E000
heap
page read and write
D88AC7E000
stack
page read and write
1FF831BF000
trusted library allocation
page read and write
1FF9A0EB000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
D2715F9000
stack
page read and write
18C66640000
trusted library allocation
page read and write
22F24335000
heap
page read and write
1FF83198000
trusted library allocation
page read and write
23A6253A000
trusted library allocation
page read and write
22BDEF72000
heap
page read and write
7FFD34AF0000
trusted library allocation
page read and write
225CBC70000
trusted library allocation
page read and write
7FFD34AF9000
trusted library allocation
page read and write
22BC750A000
trusted library allocation
page read and write
20DAE394000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
1FFFF9AD000
heap
page read and write
D27127F000
stack
page read and write
24020010000
heap
page read and write
20DB1080000
trusted library allocation
page read and write
240200CC000
heap
page read and write
24022C4D000
trusted library allocation
page read and write
7FFD34BE6000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
D88B9CD000
stack
page read and write
23A609E0000
heap
page readonly
23A6185A000
trusted library allocation
page read and write
20DB0BF6000
trusted library allocation
page read and write
81456C3000
stack
page read and write
22F25C90000
heap
page execute and read and write
2403A1E0000
heap
page read and write
24032038000
trusted library allocation
page read and write
18C4FF1B000
trusted library allocation
page read and write
225CB573000
trusted library allocation
page read and write
22F24370000
trusted library allocation
page read and write
20DAE359000
heap
page read and write
2403A5AC000
heap
page read and write
7FFD34AF8000
trusted library allocation
page read and write
240227A1000
trusted library allocation
page read and write
24021C16000
trusted library allocation
page read and write
D2712FF000
stack
page read and write
22BC7966000
trusted library allocation
page read and write
2403A56D000
heap
page read and write
7FFD34782000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
22BC77C6000
trusted library allocation
page read and write
1FF9A034000
heap
page read and write
1FF83736000
trusted library allocation
page read and write
20DAFC00000
trusted library allocation
page read and write
20DAE357000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
23A5F160000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
C13B57F000
stack
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
1FF83756000
trusted library allocation
page read and write
20DAE353000
heap
page read and write
7FFD34BC0000
trusted library allocation
page read and write
7DF4BB1F0000
trusted library allocation
page execute and read and write
1FF82A25000
trusted library allocation
page read and write
20DAE36D000
heap
page read and write
22F24420000
heap
page read and write
C13B8BE000
stack
page read and write
225CB6EF000
trusted library allocation
page read and write
24022B02000
trusted library allocation
page read and write
22BC4C22000
heap
page read and write
20DAE34B000
heap
page read and write
22F35D6D000
trusted library allocation
page read and write
22BDEB9A000
heap
page read and write
22F26C97000
trusted library allocation
page read and write
1FF815C0000
trusted library section
page read and write
7FFD34990000
trusted library allocation
page read and write
1FFFF950000
heap
page read and write
22BC7B4F000
trusted library allocation
page read and write
1BCAE0F000
stack
page read and write
240203F0000
trusted library allocation
page read and write
23A6255F000
trusted library allocation
page read and write
18C4C8A5000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
18C66660000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
18C4F9CD000
trusted library allocation
page read and write
23A61EE0000
trusted library allocation
page read and write
225CC751000
trusted library allocation
page read and write
22BC7A93000
trusted library allocation
page read and write
18C4FA30000
trusted library allocation
page read and write
C13B6FE000
stack
page read and write
20DAE3D3000
heap
page read and write
1FF82CF7000
trusted library allocation
page read and write
D88A87F000
stack
page read and write
7FFD347A2000
trusted library allocation
page read and write
7FFD34BD3000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
18C4C800000
heap
page readonly
6C0A98C000
stack
page read and write
1FF91C19000
trusted library allocation
page read and write
22BC77BE000
trusted library allocation
page read and write
7FFD34B9C000
trusted library allocation
page read and write
24039B9E000
heap
page read and write
2403A4A1000
heap
page read and write
22F24257000
heap
page read and write
18C4ED4D000
trusted library allocation
page read and write
1BC9E7A000
stack
page read and write
22BC78B0000
trusted library allocation
page read and write
8145FBE000
stack
page read and write
24021DB9000
trusted library allocation
page read and write
1FF815D0000
trusted library section
page read and write
22F24252000
heap
page read and write
7FFD34B30000
trusted library allocation
page read and write
1BC9CFE000
stack
page read and write
7FFD34BC0000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
24023968000
trusted library allocation
page read and write
7FFD34988000
trusted library allocation
page read and write
22BC8080000
trusted library allocation
page read and write
1BC3E000
stack
page read and write
6C0A70E000
stack
page read and write
7FFD34962000
trusted library allocation
page read and write
18C66656000
heap
page execute and read and write
18C4F4C5000
trusted library allocation
page read and write
2403A11E000
heap
page read and write
20DAE321000
heap
page read and write
20DAE2F0000
trusted library section
page read and write
4186513000
stack
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
240200B2000
heap
page read and write
7FFD34AA3000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
24022AFA000
trusted library allocation
page read and write
22BDF0CD000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
D88ADFC000
stack
page read and write
7FFD3494A000
trusted library allocation
page read and write
22BD6BD8000
trusted library allocation
page read and write
18C4FA8E000
trusted library allocation
page read and write
E54000
heap
page read and write
C6E53BF000
stack
page read and write
7FFD34BF0000
trusted library allocation
page read and write
E26000
heap
page read and write
20DAFCB1000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
18C4F503000
trusted library allocation
page read and write
D2717FE000
stack
page read and write
C6E52BA000
stack
page read and write
18C4C8A0000
heap
page read and write
7FFD34AC9000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
20DB0BEE000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD34780000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
225E3030000
heap
page read and write
24021AD0000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
18C4FF40000
trusted library allocation
page read and write
23A5F1A5000
heap
page read and write
7FFD34BF6000
trusted library allocation
page read and write
6C099BE000
stack
page read and write
D88A8FE000
stack
page read and write
23A60A20000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
C13BABE000
stack
page read and write
C6E4EF9000
stack
page read and write
22F3E56A000
heap
page read and write
225E33AA000
heap
page read and write
225E2EA0000
heap
page read and write
6C0967F000
stack
page read and write
7FFD34B60000
trusted library allocation
page read and write
225C8FCA000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
23A6259C000
trusted library allocation
page read and write
1FF81931000
trusted library allocation
page read and write
1FF99FB6000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
24022C7D000
trusted library allocation
page read and write
1B948000
heap
page read and write
18C5E446000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
2403A4C3000
heap
page read and write
18C66906000
heap
page read and write
22BC4BD0000
trusted library allocation
page read and write
C6E4FF7000
stack
page read and write
24022D68000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
7FFD34B80000
trusted library allocation
page read and write
7FFD34972000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34AE8000
trusted library allocation
page read and write
1FF99CBA000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD34982000
trusted library allocation
page read and write
7FFD34AE5000
trusted library allocation
page read and write
1BC9D7F000
stack
page read and write
22F3E160000
heap
page read and write
1FFFFA47000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
225CC203000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
225CC776000
trusted library allocation
page read and write
C6E5F89000
stack
page read and write
2403A0BF000
heap
page read and write
24022B0B000
trusted library allocation
page read and write
18C4C580000
heap
page read and write
7FFD34BA0000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
22F27483000
trusted library allocation
page read and write
20DAFBE0000
heap
page execute and read and write
18C4C750000
heap
page read and write
7FFD34A9F000
trusted library allocation
page read and write
1FF91961000
trusted library allocation
page read and write
4186CF9000
stack
page read and write
225C90E0000
trusted library allocation
page read and write
22BC4C55000
heap
page read and write
20DAE3C9000
heap
page read and write
22F3DD0F000
heap
page read and write
23A5EFD9000
heap
page read and write
24031B91000
trusted library allocation
page read and write
23A61BCF000
trusted library allocation
page read and write
225CAB99000
trusted library allocation
page read and write
8146C07000
stack
page read and write
20DAE170000
heap
page read and write
7FFD34BB0000
trusted library allocation
page execute and read and write
1FF82BDB000
trusted library allocation
page read and write
2402341B000
trusted library allocation
page read and write
18C4F3E7000
trusted library allocation
page read and write
225E32B1000
heap
page read and write
23A5EFDB000
heap
page read and write
20DB0C3C000
trusted library allocation
page read and write
C6E543C000
stack
page read and write
225E2E90000
heap
page execute and read and write
23A5EF98000
heap
page read and write
23A61A41000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD3478D000
trusted library allocation
page execute and read and write
23A61BBA000
trusted library allocation
page read and write
C6E50F9000
stack
page read and write
2403A489000
heap
page read and write
418794C000
stack
page read and write
D2724C9000
stack
page read and write
18C669CA000
heap
page read and write
C6E608E000
stack
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD34AB3000
trusted library allocation
page read and write
1FF99FAE000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
22F24425000
heap
page read and write
225CAE3D000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page read and write
22BC4C9C000
heap
page read and write
18C6674B000
heap
page read and write
225CBB43000
trusted library allocation
page read and write
22F3E650000
heap
page read and write
225E2F87000
heap
page read and write
22F3603C000
trusted library allocation
page read and write
20DAE35D000
heap
page read and write
18C4E60D000
trusted library allocation
page read and write
1FF91C26000
trusted library allocation
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
7FFD34AB0000
trusted library allocation
page read and write
24022F51000
trusted library allocation
page read and write
22BDECA6000
heap
page execute and read and write
D88B7CF000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
7DF451C10000
trusted library allocation
page execute and read and write
24031BFD000
trusted library allocation
page read and write
C6E4E7E000
stack
page read and write
6C0A78D000
stack
page read and write
22BC7A32000
trusted library allocation
page read and write
7FFD34792000
trusted library allocation
page read and write
225C8F80000
heap
page read and write
20DAE34F000
heap
page read and write
24020070000
heap
page read and write
225C90F0000
heap
page execute and read and write
2401FFE0000
heap
page read and write
22BC4C51000
heap
page read and write
1FF99E56000
heap
page execute and read and write
22BC4B70000
heap
page read and write
22BDECA0000
heap
page execute and read and write
23A61BBE000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
22BC78EA000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
D88A673000
stack
page read and write
23A62584000
trusted library allocation
page read and write
225CB8D6000
trusted library allocation
page read and write
22F2703C000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
225C8FC4000
heap
page read and write
C6E54BE000
stack
page read and write
22BDF0D8000
heap
page read and write
22BC787D000
trusted library allocation
page read and write
225CC2C4000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
20DAE399000
heap
page read and write
6C09979000
stack
page read and write
22BC4C18000
heap
page read and write
C13BBBF000
stack
page read and write
18C5E141000
trusted library allocation
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
7FFD34AD4000
trusted library allocation
page read and write
7DF462CD0000
trusted library allocation
page execute and read and write
225E3291000
heap
page read and write
22BDEF6F000
heap
page read and write
7FFD34774000
trusted library allocation
page read and write
8145BF9000
stack
page read and write
225C91A0000
heap
page read and write
18C4F448000
trusted library allocation
page read and write
E60000
heap
page read and write
18C4C5C6000
heap
page read and write
7FFD34BF0000
trusted library allocation
page read and write
1FF82C3C000
trusted library allocation
page read and write
20DB0888000
trusted library allocation
page read and write
240200F3000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
22F2421B000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
225E32EE000
heap
page read and write
6C09A38000
stack
page read and write
225CBA29000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
18C66600000
heap
page execute and read and write
22BC7F11000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
8145DB6000
stack
page read and write
18C4F354000
trusted library allocation
page read and write
22BC4A30000
heap
page read and write
22F27568000
trusted library allocation
page read and write
7FFD34AF5000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
D88A77E000
stack
page read and write
7FFD34AE8000
trusted library allocation
page read and write
7FFD3495A000
trusted library allocation
page read and write
24022B06000
trusted library allocation
page read and write
7FFD34AE2000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
18C4C865000
heap
page read and write
D2714F7000
stack
page read and write
1BCB08C000
stack
page read and write
22BC737A000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
22F361A2000
trusted library allocation
page read and write
6C09B3A000
stack
page read and write
1FF828B4000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
8146D0E000
stack
page read and write
225E3261000
heap
page read and write
225CC19D000
trusted library allocation
page read and write
1BCAF0E000
stack
page read and write
24031E7B000
trusted library allocation
page read and write
7FFD34836000
trusted library allocation
page read and write
23A61BC3000
trusted library allocation
page read and write
2403A572000
heap
page read and write
22BC80DF000
trusted library allocation
page read and write
1FF99F78000
heap
page read and write
23A609F0000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
22F2422B000
heap
page read and write
22BC76FC000
trusted library allocation
page read and write
20DB0CFA000
trusted library allocation
page read and write
8145D3E000
stack
page read and write
22F3E579000
heap
page read and write
1FFFF8F0000
heap
page read and write
18C4C605000
heap
page read and write
22F3E483000
heap
page read and write
7FFD34B82000
trusted library allocation
page read and write
2BE0000
heap
page read and write
7FFD34AF2000
trusted library allocation
page read and write
225C9100000
heap
page readonly
22BC7395000
trusted library allocation
page read and write
22BD67C4000
trusted library allocation
page read and write
1FF826AA000
trusted library allocation
page read and write
22F35FEB000
trusted library allocation
page read and write
225DACF5000
trusted library allocation
page read and write
22BDF094000
heap
page read and write
1BCB007000
stack
page read and write
225E3289000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
18C4ED77000
trusted library allocation
page read and write
225C9110000
trusted library allocation
page read and write
18C4C810000
trusted library allocation
page read and write
D88BA4C000
stack
page read and write
8145CF8000
stack
page read and write
1BCAF8E000
stack
page read and write
E8F000
heap
page read and write
24021B30000
heap
page execute and read and write
7FFD3479B000
trusted library allocation
page read and write
22BC4C1F000
heap
page read and write
24031E85000
trusted library allocation
page read and write
225CB8DA000
trusted library allocation
page read and write
225C9006000
heap
page read and write
18C4C790000
heap
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
23A60B00000
heap
page read and write
22F3E4C2000
heap
page read and write
20DAE2E0000
trusted library section
page read and write
7FFD349A0000
trusted library allocation
page read and write
18C4FF65000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
18C4C60A000
heap
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
7FFD34BC0000
trusted library allocation
page read and write
22F3E54D000
heap
page read and write
22BC4C59000
heap
page read and write
23A609D0000
trusted library allocation
page read and write
22BC4B30000
heap
page read and write
2403A54D000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
23A620B6000
trusted library allocation
page read and write
7FFD34AEA000
trusted library allocation
page read and write
20DAE318000
heap
page read and write
20DAE250000
heap
page read and write
2CEE000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
1BD3F000
stack
page read and write
7FFD34A30000
trusted library allocation
page read and write
18C668F0000
heap
page read and write
7FFD34BA0000
trusted library allocation
page execute and read and write
23A60A90000
heap
page execute and read and write
7FFD3479B000
trusted library allocation
page read and write
D27137E000
stack
page read and write
D27197B000
stack
page read and write
1BCA43C000
stack
page read and write
4186DFE000
stack
page read and write
2403A58A000
heap
page read and write
24022B0F000
trusted library allocation
page read and write
7FFD34974000
trusted library allocation
page read and write
D80000
heap
page read and write
7FFD34846000
trusted library allocation
page read and write
C13C68D000
stack
page read and write
23A609B0000
trusted library allocation
page read and write
7DF462CC0000
trusted library allocation
page execute and read and write
1FF81755000
heap
page read and write
7DF4C8440000
trusted library allocation
page execute and read and write
23A619D2000
trusted library allocation
page read and write
2403A0A0000
heap
page read and write
18C4F264000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
22BC85B5000
trusted library allocation
page read and write
1FF99E8B000
heap
page read and write
D270FFE000
stack
page read and write
225CA971000
trusted library allocation
page read and write
22F35FED000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
1FF83751000
trusted library allocation
page read and write
20DAE300000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
24031E95000
trusted library allocation
page read and write
4186979000
stack
page read and write
1FF828CF000
trusted library allocation
page read and write
20DB0880000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
22F26D33000
trusted library allocation
page read and write
22F35F75000
trusted library allocation
page read and write
1FF99C74000
heap
page read and write
2403A545000
heap
page read and write
225DAC5D000
trusted library allocation
page read and write
20DAFD30000
trusted library allocation
page read and write
7FFD34AC3000
trusted library allocation
page read and write
1BC9C73000
stack
page read and write
20DB088D000
trusted library allocation
page read and write
1FF99FE0000
heap
page read and write
7FFD34BF0000
trusted library allocation
page read and write
7FFD34BED000
trusted library allocation
page read and write
1FF83732000
trusted library allocation
page read and write
1BCA23E000
stack
page read and write
C6E533E000
stack
page read and write
225CBC0F000
trusted library allocation
page read and write
7FFD34BDD000
trusted library allocation
page read and write
7FFD34968000
trusted library allocation
page read and write
E95000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
4187A47000
stack
page read and write
7FFD34BC0000
trusted library allocation
page read and write
23A5F019000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
22BC801D000
trusted library allocation
page read and write
225C9004000
heap
page read and write
22BDEFBA000
heap
page read and write
20DB0997000
trusted library allocation
page read and write
20DAE295000
heap
page read and write
4186BF7000
stack
page read and write
22F3E42B000
heap
page read and write
7FFD34BA0000
trusted library allocation
page read and write
22F27B01000
trusted library allocation
page read and write
24020078000
heap
page read and write
23A60B05000
heap
page read and write
9B2000
unkown
page readonly
240239B2000
trusted library allocation
page read and write
23A5EFB4000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
22F26752000
trusted library allocation
page read and write
22F25CF0000
heap
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
18C4C5DE000
heap
page read and write
2403A2E0000
trusted library allocation
page read and write
C13C809000
stack
page read and write
1FF81610000
heap
page readonly
8145B7F000
stack
page read and write
1BCA136000
stack
page read and write
1FF82B0F000
trusted library allocation
page read and write
22BC4E25000
heap
page read and write
E4A000
heap
page read and write
1FF81900000
heap
page execute and read and write
7FFD3494A000
trusted library allocation
page read and write
1B27C000
stack
page read and write
225CC796000
trusted library allocation
page read and write
22BC7700000
trusted library allocation
page read and write
22F3E47B000
heap
page read and write
1BCA33E000
stack
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD34782000
trusted library allocation
page read and write
DB0000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
7FFD34B0C000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
1FF99FBA000
heap
page read and write
7FFD34BD0000
trusted library allocation
page read and write
18C66780000
heap
page read and write
1BCB18E000
stack
page read and write
24031E76000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
2403A47D000
heap
page read and write
7FFD34B08000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
24022AF6000
trusted library allocation
page read and write
240225E2000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
225C8F88000
heap
page read and write
4186E7F000
stack
page read and write
7FFD34AF4000
trusted library allocation
page read and write
D88A7F9000
stack
page read and write
23A60970000
heap
page read and write
23A61C89000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page read and write
22F27B21000
trusted library allocation
page read and write
18C5E428000
trusted library allocation
page read and write
18C4C607000
heap
page read and write
22F3E49B000
heap
page read and write
22BD6B00000
trusted library allocation
page read and write
22F36005000
trusted library allocation
page read and write
22BD67B1000
trusted library allocation
page read and write
22F24213000
heap
page read and write
4186AFE000
stack
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD34B70000
trusted library allocation
page read and write
C6E4B4E000
stack
page read and write
7FFD34BE0000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page read and write
7FFD34974000
trusted library allocation
page read and write
225C8FBD000
heap
page read and write
1BC9DFF000
stack
page read and write
1FF99E86000
heap
page read and write
225E3140000
trusted library allocation
page read and write
22BD6A3E000
trusted library allocation
page read and write
22BD6A96000
trusted library allocation
page read and write
1FFFF98D000
heap
page read and write
225E3240000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD34C00000
trusted library allocation
page read and write
E62000
heap
page read and write
C6E553B000
stack
page read and write
6C093DE000
stack
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
7FFD34972000
trusted library allocation
page read and write
225CB8DF000
trusted library allocation
page read and write
D88B8CE000
stack
page read and write
C6E4BCF000
stack
page read and write
22BDF00A000
heap
page read and write
1195000
heap
page read and write
23A5EFCA000
heap
page read and write
7FFD34BD0000
trusted library allocation
page read and write
2403A46A000
heap
page read and write
1FF91940000
trusted library allocation
page read and write
1190000
heap
page read and write
225E339E000
heap
page read and write
20DAE396000
heap
page read and write
23A60A60000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
D88B94B000
stack
page read and write
1FF81920000
heap
page execute and read and write
22BC4C71000
heap
page read and write
18C66A3E000
heap
page read and write
C13B473000
stack
page read and write
18C66981000
heap
page read and write
22F25C00000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
1B83D000
stack
page read and write
1FF81620000
trusted library allocation
page read and write
18C4F0A0000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
6C09D3B000
stack
page read and write
7FFD34AF2000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
225C91B0000
heap
page read and write
23A620AD000
trusted library allocation
page read and write
18C4C7D0000
trusted library allocation
page read and write
225E3347000
heap
page read and write
E20000
heap
page read and write
22BDF0B1000
heap
page read and write
6C09779000
stack
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
225E338B000
heap
page read and write
6C09BBE000
stack
page read and write
23A5F1A0000
heap
page read and write
22BC4BB0000
trusted library allocation
page read and write
22BD6BA2000
trusted library allocation
page read and write
22F26DC2000
trusted library allocation
page read and write
12CF1000
trusted library allocation
page read and write
24021B85000
heap
page read and write
7FFD348B5000
trusted library allocation
page execute and read and write
7FFD347EC000
trusted library allocation
page execute and read and write
2403A5A0000
heap
page read and write
18C4C560000
heap
page read and write
4187B4E000
stack
page read and write
225CBD2B000
trusted library allocation
page read and write
18C4E141000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
12CF3000
trusted library allocation
page read and write
225C90C0000
trusted library allocation
page read and write
7FFD34BE7000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
225E33AE000
heap
page read and write
23A61A15000
trusted library allocation
page read and write
1BF3E000
stack
page read and write
7FFD34AFA000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34B8C000
trusted library allocation
page read and write
1FFFFC75000
heap
page read and write
23A60B11000
heap
page read and write
22BDEB13000
heap
page read and write
1FF81640000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
22F26F14000
trusted library allocation
page read and write
22BDEAD0000
heap
page read and write
18C4E0C0000
heap
page execute and read and write
6C098FD000
stack
page read and write
22F242D0000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
23A5EFED000
heap
page read and write
225DA9DF000
trusted library allocation
page read and write
225CB9A2000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page read and write
2403A0D9000
heap
page read and write
1BCAE8C000
stack
page read and write
22BC4E10000
heap
page execute and read and write
20DB0F12000
trusted library allocation
page read and write
18C4E080000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD34931000
trusted library allocation
page read and write
1FF8176E000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
1FF9A0F9000
heap
page read and write
22BC6791000
trusted library allocation
page read and write
20DB0C98000
trusted library allocation
page read and write
1FFFF958000
heap
page read and write
2403A0F1000
heap
page read and write
EE0000
heap
page read and write
7FFD34A9F000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD34C08000
trusted library allocation
page read and write
22BC69BA000
trusted library allocation
page read and write
814613B000
stack
page read and write
7FFD34B00000
trusted library allocation
page read and write
20DAFBD0000
heap
page readonly
18C6669D000
heap
page read and write
24021B80000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
6C0A80A000
stack
page read and write
7FFD349F0000
trusted library allocation
page read and write
C13B679000
stack
page read and write
C6E51B6000
stack
page read and write
1FF81670000
trusted library allocation
page read and write
18C4E369000
trusted library allocation
page read and write
7FFD34C00000
trusted library allocation
page read and write
240200AC000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
20DB0BE5000
trusted library allocation
page read and write
225E2F46000
heap
page read and write
18C5E1AF000
trusted library allocation
page read and write
225DA991000
trusted library allocation
page read and write
6C096FE000
stack
page read and write
225E2ED4000
heap
page read and write
7FFD34978000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
8145C7D000
stack
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
22F26D6B000
trusted library allocation
page read and write
7FFD34AB3000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
1FF8370C000
trusted library allocation
page read and write
1FF99F60000
heap
page read and write
20DAE270000
heap
page read and write
C13C88C000
stack
page read and write
1B690000
heap
page execute and read and write
18C4C550000
heap
page read and write
18C4F174000
trusted library allocation
page read and write
2403A440000
heap
page read and write
1FF819AA000
trusted library allocation
page read and write
225CB8E3000
trusted library allocation
page read and write
23A6257F000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
225CC79B000
trusted library allocation
page read and write
1FF9A0BA000
heap
page read and write
22F35D21000
trusted library allocation
page read and write
24021B60000
heap
page execute and read and write
7FFD34922000
trusted library allocation
page read and write
22BC65DA000
heap
page read and write
2403A430000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
7FFD34A40000
trusted library allocation
page read and write
7FFD34C00000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
1FF9A085000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
225CB57D000
trusted library allocation
page read and write
22BC4D10000
trusted library allocation
page read and write
225CBA8C000
trusted library allocation
page read and write
C13B9B9000
stack
page read and write
7FFD3493A000
trusted library allocation
page read and write
225DAC65000
trusted library allocation
page read and write
41865DE000
stack
page read and write
69F000
unkown
page readonly
7FFD34A70000
trusted library allocation
page read and write
22F3E1B1000
heap
page read and write
1FF830B3000
trusted library allocation
page read and write
D90000
heap
page read and write
23A5EFD3000
heap
page read and write
1FFFF9DA000
heap
page read and write
225DAC76000
trusted library allocation
page read and write
7DF430590000
trusted library allocation
page execute and read and write
D27157D000
stack
page read and write
814603C000
stack
page read and write
22F261CD000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
22BC6780000
heap
page read and write
22F2420B000
heap
page read and write
23A5F180000
heap
page read and write
7FFD34B8E000
trusted library allocation
page read and write
22F3E4EE000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
20DB0FF7000
trusted library allocation
page read and write
8145E39000
stack
page read and write
22BD6A78000
trusted library allocation
page read and write
1FF99FAA000
heap
page read and write
22F3E310000
heap
page read and write
7FFD34BE0000
trusted library allocation
page read and write
1FF99E80000
heap
page read and write
1BC9F7B000
stack
page read and write
22BD6972000
trusted library allocation
page read and write
18C4ED3F000
trusted library allocation
page read and write
225E2E70000
heap
page execute and read and write
18C5E42C000
trusted library allocation
page read and write
225E331E000
heap
page read and write
D27234E000
stack
page read and write
24022CEC000
trusted library allocation
page read and write
20DB10DF000
trusted library allocation
page read and write
1170000
heap
page read and write
D88BACE000
stack
page read and write
18C5E171000
trusted library allocation
page read and write
6C097FE000
stack
page read and write
225E3010000
heap
page read and write
20DB0C07000
trusted library allocation
page read and write
22F24330000
heap
page read and write
22BDF0D1000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
22F24380000
heap
page readonly
22F2758F000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
C13BB3F000
stack
page read and write
240239AD000
trusted library allocation
page read and write
1FF82381000
trusted library allocation
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
7FFD34B00000
trusted library allocation
page read and write
1FF99D25000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
7DF451C00000
trusted library allocation
page execute and read and write
7FFD34B70000
trusted library allocation
page read and write
7FFD34AD4000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
20DB0C8F000
trusted library allocation
page read and write
22F241A0000
heap
page read and write
7FFD34ADC000
trusted library allocation
page read and write
4186A79000
stack
page read and write
22BC784B000
trusted library allocation
page read and write
D27147E000
stack
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
1FFFF99D000
heap
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
22BC4C98000
heap
page read and write
23A60D07000
trusted library allocation
page read and write
225C91C0000
heap
page read and write
7FFD34B80000
trusted library allocation
page read and write
18C4C588000
heap
page read and write
6C09C3E000
stack
page read and write
1FF81DFD000
trusted library allocation
page read and write
22F26D07000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
2403A1C0000
heap
page read and write
2403A18A000
heap
page read and write
D88A9FD000
stack
page read and write
18C66650000
heap
page execute and read and write
D2723CC000
stack
page read and write
23A5EFCF000
heap
page read and write
22F3E19F000
heap
page read and write
225C9180000
trusted library allocation
page read and write
10EE000
stack
page read and write
7FFD34B02000
trusted library allocation
page read and write
22F25F29000
trusted library allocation
page read and write
22F243E0000
heap
page execute and read and write
1FF99E94000
heap
page read and write
1FF91C37000
trusted library allocation
page read and write
E8D000
heap
page read and write
C6E5238000
stack
page read and write
20DAE34D000
heap
page read and write
1B959000
heap
page read and write
20DAE32F000
heap
page read and write
7FFD34B70000
trusted library allocation
page read and write
1FFFF9D5000
heap
page read and write
22F26E25000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
18C4F0B5000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
22F27B16000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
22BDF005000
heap
page read and write
22BC739F000
trusted library allocation
page read and write
225C8FDE000
heap
page read and write
11B5000
heap
page read and write
22F270C3000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
225E3387000
heap
page read and write
1FF99C70000
heap
page read and write
23A60C81000
trusted library allocation
page read and write
18C5E436000
trusted library allocation
page read and write
22BD6A73000
trusted library allocation
page read and write
24020425000
heap
page read and write
22F25D01000
trusted library allocation
page read and write
20DB06DB000
trusted library allocation
page read and write
7FFD34AE9000
trusted library allocation
page read and write
C6E4F7F000
stack
page read and write
7FFD34BFD000
trusted library allocation
page read and write
225E2F43000
heap
page read and write
7FFD34941000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
22BC4C00000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
1FFFF995000
heap
page read and write
18C4F0AD000
trusted library allocation
page read and write
1FF82993000
trusted library allocation
page read and write
22BD67FF000
trusted library allocation
page read and write
22F3E290000
heap
page execute and read and write
22BC77C4000
trusted library allocation
page read and write
22BDF06A000
heap
page read and write
22F26FA7000
trusted library allocation
page read and write
22BC4C10000
heap
page read and write
225C9080000
heap
page read and write
D27254C000
stack
page read and write
2403A598000
heap
page read and write
7FFD34AF8000
trusted library allocation
page read and write
1FF91C1E000
trusted library allocation
page read and write
4186C7A000
stack
page read and write
C6E4AC3000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34AEC000
trusted library allocation
page read and write
41878CE000
stack
page read and write
7FFD34941000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
24031BB1000
trusted library allocation
page read and write
7FFD34AE9000
trusted library allocation
page read and write
1FF81630000
heap
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
18C4C7B0000
trusted library section
page read and write
C13C787000
stack
page read and write
22F27650000
trusted library allocation
page read and write
41879CE000
stack
page read and write
C13B936000
stack
page read and write
7FFD34A00000
trusted library allocation
page read and write
1FF82A21000
trusted library allocation
page read and write
F1C000
heap
page read and write
1BCA2BE000
stack
page read and write
7FFD34BD0000
trusted library allocation
page read and write
1BC9EFE000
stack
page read and write
225E33A6000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
6C09AB8000
stack
page read and write
1FF81600000
trusted library allocation
page read and write
41869FF000
stack
page read and write
225CB8E7000
trusted library allocation
page read and write
225C8FC8000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
18C666FE000
heap
page read and write
22BD6928000
trusted library allocation
page read and write
2403A0AA000
heap
page read and write
24022AFE000
trusted library allocation
page read and write
23A616AD000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
240200F8000
heap
page read and write
2403A5A4000
heap
page read and write
C13C60F000
stack
page read and write
2403A1B7000
heap
page execute and read and write
18C4E1C7000
trusted library allocation
page read and write
7FFD3478B000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
18C4C679000
heap
page read and write
1FF99CB3000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
1BCA1BA000
stack
page read and write
11B0000
heap
page read and write
C6E600C000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
18C4C5CC000
heap
page read and write
240233F4000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
225CA9EF000
trusted library allocation
page read and write
22F35D01000
trusted library allocation
page read and write
225E2F78000
heap
page read and write
1FF99D06000
heap
page read and write
18C66900000
heap
page read and write
24021B91000
trusted library allocation
page read and write
22BD6A17000
trusted library allocation
page read and write
7DF4305A0000
trusted library allocation
page execute and read and write
1B951000
heap
page read and write
7DF451BF0000
trusted library allocation
page execute and read and write
22BC7513000
trusted library allocation
page read and write
8145EBA000
stack
page read and write
23A60EA9000
trusted library allocation
page read and write
D27187E000
stack
page read and write
18C4C7F0000
trusted library allocation
page read and write
22F26EDB000
trusted library allocation
page read and write
24031BC1000
trusted library allocation
page read and write
7FFD34922000
trusted library allocation
page read and write
1FF91D95000
trusted library allocation
page read and write
23A61BC7000
trusted library allocation
page read and write
C13B7FE000
stack
page read and write
1FF82A57000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
225E32D3000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
7DF4C8430000
trusted library allocation
page execute and read and write
7DF4BB200000
trusted library allocation
page execute and read and write
D88A6FF000
stack
page read and write
7FF4E79B0000
trusted library allocation
page execute and read and write
1FFFF920000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1FFFFC70000
heap
page read and write
7FFD34962000
trusted library allocation
page read and write
1BC9FFD000
stack
page read and write
1FF815A0000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
4186D7E000
stack
page read and write
225CB56E000
trusted library allocation
page read and write
6C09CBE000
stack
page read and write
1BE3B000
stack
page read and write
2402330F000
trusted library allocation
page read and write
814574E000
stack
page read and write
1FF82935000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
1FF83280000
trusted library allocation
page read and write
22BDEF40000
heap
page read and write
7FFD34964000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
1BCB10C000
stack
page read and write
7FFD34B20000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
24031EFF000
trusted library allocation
page read and write
1FF82961000
trusted library allocation
page read and write
7FFD34AE4000
trusted library allocation
page read and write
20DAFBC0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
1FF815E0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
C13C70A000
stack
page read and write
7FFD34BF0000
trusted library allocation
page read and write
20DAFC30000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
2403A16E000
heap
page read and write
D88AB78000
stack
page read and write
22BDEF50000
heap
page read and write
1FF99FB2000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
22BC7FF7000
trusted library allocation
page read and write
225E33B1000
heap
page read and write
7FFD34958000
trusted library allocation
page read and write
D88AAF7000
stack
page read and write
22F25D86000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
240234DC000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
22BC4B10000
heap
page read and write
24022E95000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
C13C90E000
stack
page read and write
22BDEF94000
heap
page read and write
C13BC3B000
stack
page read and write
20DB0BFA000
trusted library allocation
page read and write
22BC76F8000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD34931000
trusted library allocation
page read and write
D270FB3000
stack
page read and write
1FF83159000
trusted library allocation
page read and write
2403A450000
heap
page read and write
1FF91931000
trusted library allocation
page read and write
22F3E473000
heap
page read and write
22F3E547000
heap
page read and write
7FFD34AFC000
trusted library allocation
page read and write
23A5EFCD000
heap
page read and write
22F27350000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34AD3000
trusted library allocation
page read and write
225E33B4000
heap
page read and write
7FFD34C0F000
trusted library allocation
page read and write
7FFD3493A000
trusted library allocation
page read and write
225DA9A1000
trusted library allocation
page read and write
D88ACFE000
stack
page read and write
7FFD34836000
trusted library allocation
page read and write
22F241D0000
heap
page read and write
4186B78000
stack
page read and write
418687F000
stack
page read and write
20DAE290000
heap
page read and write
23A61FEC000
trusted library allocation
page read and write
81460BE000
stack
page read and write
2402205D000
trusted library allocation
page read and write
2403A148000
heap
page read and write
23A60C70000
heap
page read and write
1FF91B74000
trusted library allocation
page read and write
24031E7D000
trusted library allocation
page read and write
225CC0F7000
trusted library allocation
page read and write
23A6204F000
trusted library allocation
page read and write
7FFD34772000
trusted library allocation
page read and write
22F3E1C1000
heap
page read and write
D88A977000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
DD0000
heap
page read and write
23A5EF80000
heap
page read and write
23A61BD8000
trusted library allocation
page read and write
22BD6A7C000
trusted library allocation
page read and write
225CB8CE000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
8146B8D000
stack
page read and write
22BC4C5F000
heap
page read and write
D88AA79000
stack
page read and write
7FFD347BB000
trusted library allocation
page read and write
20DAFCA0000
heap
page read and write
6C09352000
stack
page read and write
4186EFB000
stack
page read and write
22F26E29000
trusted library allocation
page read and write
D2725CE000
stack
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
1FF82536000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
20DAE2C0000
heap
page read and write
7FFD34921000
trusted library allocation
page read and write
18C4EEBB000
trusted library allocation
page read and write
22F24350000
trusted library allocation
page read and write
7FFD34AFC000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
20DAFBF0000
heap
page read and write
8145AFA000
stack
page read and write
1BCA0BE000
stack
page read and write
D88ABFD000
stack
page read and write
1110000
trusted library allocation
page read and write
2403A180000
heap
page read and write
225E3380000
heap
page read and write
22BDEBD0000
heap
page execute and read and write
1FF9A106000
heap
page read and write
1FF829EF000
trusted library allocation
page read and write
1FF99FA2000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
9B0000
unkown
page readonly
22F27B26000
trusted library allocation
page read and write
240200F5000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
24020420000
heap
page read and write
22F35FF5000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
C6E507E000
stack
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
6C09877000
stack
page read and write
24022E34000
trusted library allocation
page read and write
1B940000
heap
page read and write
22F27ADC000
trusted library allocation
page read and write
225CB8F4000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
4187ACC000
stack
page read and write
225DAC58000
trusted library allocation
page read and write
240227CD000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34BF0000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
7FFD34B80000
trusted library allocation
page read and write
22F3E410000
heap
page read and write
225E2973000
heap
page read and write
22F25CE0000
trusted library allocation
page read and write
24022BC0000
trusted library allocation
page read and write
22F241D8000
heap
page read and write
8146C8C000
stack
page read and write
7FFD34A80000
trusted library allocation
page read and write
18C4E050000
trusted library allocation
page read and write
24021A40000
heap
page readonly
22BC4E20000
heap
page read and write
22F3E4BC000
heap
page read and write
22BD6ACB000
trusted library allocation
page read and write
1FF82717000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
6C0A889000
stack
page read and write
1FFFF99B000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
1FFFF98F000
heap
page read and write
1FF9A310000
heap
page read and write
1FFFF999000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
22F26AC1000
trusted library allocation
page read and write
7FFD34AC4000
trusted library allocation
page read and write
D88B84C000
stack
page read and write
1FF81750000
heap
page read and write
C13B4FE000
stack
page read and write
18C4C860000
heap
page read and write
7FFD34954000
trusted library allocation
page read and write
22F26CCD000
trusted library allocation
page read and write
8146B0E000
stack
page read and write
23A6185E000
trusted library allocation
page read and write
22BC4D40000
trusted library allocation
page read and write
418659E000
stack
page read and write
18C4FF60000
trusted library allocation
page read and write
C6E513E000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
22F3E330000
heap
page read and write
240200BA000
heap
page read and write
22BC4BE0000
heap
page readonly
22F242B1000
heap
page read and write
C13B879000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
22F35D31000
trusted library allocation
page read and write
22BD6A86000
trusted library allocation
page read and write
6C0AA0E000
stack
page read and write
12BE000
stack
page read and write
20DB0BF2000
trusted library allocation
page read and write
1BCA079000
stack
page read and write
22F3E1B8000
heap
page read and write
81457CE000
stack
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34AC3000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
22BC76F3000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
22F240C0000
heap
page read and write
22F24300000
heap
page read and write
225E3397000
heap
page read and write
7FFD34BED000
trusted library allocation
page read and write
D88A3FE000
stack
page read and write
7FFD34932000
trusted library allocation
page read and write
41868FE000
stack
page read and write
2403A1B0000
heap
page execute and read and write
22BC8590000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
C13B77B000
stack
page read and write
22F26A7A000
trusted library allocation
page read and write
6C0A90D000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
2403A0EF000
heap
page read and write
22BC7704000
trusted library allocation
page read and write
7FFD34AD8000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
1FF82CBB000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
7FFD34876000
trusted library allocation
page execute and read and write
18C66910000
heap
page read and write
7FFD34BD6000
trusted library allocation
page read and write
22F3E236000
heap
page read and write
8145A7E000
stack
page read and write
225CB8D2000
trusted library allocation
page read and write
C13B5FE000
stack
page read and write
D2713F9000
stack
page read and write
23A5F014000
heap
page read and write
225CB3C2000
trusted library allocation
page read and write
2402294E000
trusted library allocation
page read and write
1FF81B58000
trusted library allocation
page read and write
7FFD34952000
trusted library allocation
page read and write
18C5E161000
trusted library allocation
page read and write
225DA971000
trusted library allocation
page read and write
22BD698A000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
22BC6C5D000
trusted library allocation
page read and write
13BE000
stack
page read and write
2403A594000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD34964000
trusted library allocation
page read and write
20DAFCA5000
heap
page read and write
22F35F24000
trusted library allocation
page read and write
225E2F1B000
heap
page read and write
23A61852000
trusted library allocation
page read and write
24022AF2000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
7FFD34B90000
trusted library allocation
page execute and read and write
D27244E000
stack
page read and write
18C66A6C000
heap
page read and write
1FFFF9D7000
heap
page read and write
225C8E40000
heap
page read and write
D88AD7E000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
18C66A4F000
heap
page read and write
1BB3E000
stack
page read and write
22F35FE6000
trusted library allocation
page read and write
D34000
stack
page read and write
22BD6C0F000
trusted library allocation
page read and write
18C4F0B1000
trusted library allocation
page read and write
18C4F8C1000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
1FFFF900000
heap
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
7FFD34AE4000
trusted library allocation
page read and write
D2718FF000
stack
page read and write
22F24254000
heap
page read and write
18C4C5BE000
heap
page read and write
225C8FC0000
heap
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
20DAE310000
heap
page read and write
24022CB2000
trusted library allocation
page read and write
7FFD34AD9000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
2401FFF0000
heap
page read and write
22BD6791000
trusted library allocation
page read and write
24031F6C000
trusted library allocation
page read and write
225C9009000
heap
page read and write
7FFD34942000
trusted library allocation
page read and write
225C8F40000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
18C669B0000
heap
page read and write
23A5EF90000
heap
page read and write
7FFD34BC0000
trusted library allocation
page execute and read and write
7FFD34783000
trusted library allocation
page execute and read and write
7FFD34AD9000
trusted library allocation
page read and write
D271677000
stack
page read and write
23A61BCB000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
225C91B5000
heap
page read and write
225C91C5000
heap
page read and write
18C4F0A9000
trusted library allocation
page read and write
22F3E297000
heap
page execute and read and write
7FFD3492A000
trusted library allocation
page read and write
7FFD34932000
trusted library allocation
page read and write
22BDEC20000
trusted library allocation
page read and write
22F26A71000
trusted library allocation
page read and write
20DAFED8000
trusted library allocation
page read and write
1FF919A0000
trusted library allocation
page read and write
22BC856B000
trusted library allocation
page read and write
22BC4C53000
heap
page read and write
1FF826A1000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
22BC4BF0000
trusted library allocation
page read and write
22BD6B35000
trusted library allocation
page read and write
225C9140000
trusted library allocation
page read and write
22F26D65000
trusted library allocation
page read and write
18C4F9A7000
trusted library allocation
page read and write
18C4F31B000
trusted library allocation
page read and write
7FFD34AE2000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
225CC1DC000
trusted library allocation
page read and write
680000
unkown
page readonly
24020050000
heap
page read and write
E2C000
heap
page read and write
23A61FC6000
trusted library allocation
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
240200B8000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
1FF99E50000
heap
page execute and read and write
18C6614A000
heap
page read and write
7FFD3492B000
trusted library allocation
page read and write
D2716F9000
stack
page read and write
22F24390000
trusted library allocation
page read and write
225CB72A000
trusted library allocation
page read and write
23A5F084000
heap
page read and write
225E335A000
heap
page read and write
7FFD34BE0000
trusted library allocation
page read and write
1FF8270D000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7DF4E5290000
trusted library allocation
page execute and read and write
7FFD348A0000
trusted library allocation
page execute and read and write
22F3E567000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34968000
trusted library allocation
page read and write
18C6675C000
heap
page read and write
7FFD34BD0000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
22BD6B6C000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
1140000
heap
page execute and read and write
C6E5F0E000
stack
page read and write
225E2E97000
heap
page execute and read and write
18C4EB92000
trusted library allocation
page read and write
24021A90000
heap
page read and write
22F3E554000
heap
page read and write
22F27009000
trusted library allocation
page read and write
7FFD34951000
trusted library allocation
page read and write
1BCA3BE000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
22BC76EF000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
7FFD34793000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
20DB0CA1000
trusted library allocation
page read and write
9B0000
unkown
page readonly
1FF91951000
trusted library allocation
page read and write
7DF4E5280000
trusted library allocation
page execute and read and write
7FFD34A20000
trusted library allocation
page read and write
E90000
unkown
page readonly
7FFD34A90000
trusted library allocation
page read and write
225CC465000
trusted library allocation
page read and write
225E3250000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
8145F3E000
stack
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
D271778000
stack
page read and write
7FFD349F0000
trusted library allocation
page read and write
22F3E1B5000
heap
page read and write
22BDECD0000
heap
page read and write
22F3E1F3000
heap
page read and write
7FFD34826000
trusted library allocation
page read and write
18C4F201000
trusted library allocation
page read and write
2402398E000
trusted library allocation
page read and write
18C66A75000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
23A5EFAE000
heap
page read and write
20DB101D000
trusted library allocation
page read and write
C13BA38000
stack
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD34978000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
1B93E000
stack
page read and write
24020410000
trusted library allocation
page read and write
24031DCA000
trusted library allocation
page read and write
24022BA9000
trusted library allocation
page read and write
1FF99DA0000
trusted library allocation
page read and write
18C4E130000
heap
page read and write
2403A446000
heap
page read and write
1FF9A082000
heap
page read and write
1FF99CFA000
heap
page read and write
20DB0BE9000
trusted library allocation
page read and write
7FFD34AEC000
trusted library allocation
page read and write
20DB10F0000
trusted library allocation
page read and write
7FFD34BD7000
trusted library allocation
page read and write
22BC6817000
trusted library allocation
page read and write
22BD67C1000
trusted library allocation
page read and write
18C4C7C0000
trusted library section
page read and write
7FFD34856000
trusted library allocation
page read and write
225C8F20000
heap
page read and write
7FFD34BC0000
trusted library allocation
page read and write
20DAFC70000
trusted library allocation
page read and write
7FFD34B8C000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
22F3E528000
heap
page read and write
22F3E545000
heap
page read and write
22BDECB0000
heap
page read and write
1FF9A0DE000
heap
page read and write
7FFD34BAC000
trusted library allocation
page read and write
18C66A17000
heap
page read and write
22F3E44D000
heap
page read and write
24021A50000
trusted library allocation
page read and write
1FF99FA6000
heap
page read and write
225E2F97000
heap
page read and write
22BDEB77000
heap
page read and write
22BC71E1000
trusted library allocation
page read and write
22BC85B0000
trusted library allocation
page read and write
22BC6785000
heap
page read and write
2403A0A3000
heap
page read and write
7FFD34BDB000
trusted library allocation
page read and write
There are 1408 hidden memdumps, click here to show them.