IOC Report
f5ATZ1i5CU.exe

loading gif

Files

File Path
Type
Category
Malicious
f5ATZ1i5CU.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Chrome.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\M2.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Metin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Chrome.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0k0xn3ek.amf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ktbwd4q.4jq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1x0stnic.mzk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1y2bsoc0.oxx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ogslxj1.xos.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aoxj2dvt.fn0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b15j4e3o.ng3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evwygwp4.xs2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hqrmomki.skr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hsq31iiu.33a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbsyvx5f.4rs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mtppn12k.moc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_niyysnoz.fxl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrrdshmf.0su.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ou3jmx03.vsz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxexeleb.bq5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rxgiaa1v.yfc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scyhx4ro.0ke.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ub2z3zoy.wij.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5yzuhyb.goi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Dec 9 09:06:04 2024, mtime=Mon Dec 9 09:06:04 2024, atime=Mon Dec 9 09:06:04 2024, length=52736, window=hide
modified
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\f5ATZ1i5CU.exe
"C:\Users\user\Desktop\f5ATZ1i5CU.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHcAYwB3ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AYgBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAYgB2ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHgAegB6ACMAPgA="
malicious
C:\Users\user\AppData\Roaming\M2.exe
"C:\Users\user\AppData\Roaming\M2.exe"
malicious
C:\Users\user\AppData\Roaming\Metin.exe
"C:\Users\user\AppData\Roaming\Metin.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Metin.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Metin.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Chrome.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Chrome.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Chrome" /tr "C:\Users\user\AppData\Roaming\Chrome.exe"
malicious
C:\Users\user\AppData\Roaming\Chrome.exe
C:\Users\user\AppData\Roaming\Chrome.exe
malicious
C:\Users\user\AppData\Roaming\Chrome.exe
"C:\Users\user\AppData\Roaming\Chrome.exe"
malicious
C:\Users\user\AppData\Roaming\Chrome.exe
"C:\Users\user\AppData\Roaming\Chrome.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://duclog23.duckdns.org:37552/
192.169.69.26
malicious
duclog23.duckdns.org
malicious
duclog23.duckdns.org:37552
malicious
http://tempuri.org/Endpoint/CheckConnectLR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
https://aka.ms/pscore6
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsLR
unknown
http://duclog23.duckdns.org:37552
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://tempuri.org/Endpoint/GetUpdatesLR
unknown
https://aka.ms/pscore6lB
unknown
http://crl.m2
unknown
http://tempuri.org/Endpoint/VerifyUpdateLR
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.m9
unknown
http://ip-api.com
unknown
http://tempuri.org/Endpoint/
unknown
http://tempuri.org/0
unknown
http://crl.micft.cMicRosof
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.microsoft.co$
unknown
https://ipinfo.io/ip%appdata%
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://duclog23.duckdns.org
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://github.com/Pester/Pester
unknown
http://tempuri.org/Endpoint/SetEnvironmentLR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.microsoft.cos
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/CheckConnectT
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
duclog23.duckdns.org
192.169.69.26
malicious
bg.microsoft.map.fastly.net
199.232.214.172
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
192.169.69.26
duclog23.duckdns.org
United States
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M2_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Metin_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Chrome
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CC2000
trusted library allocation
page read and write
malicious
2C01000
trusted library allocation
page read and write
malicious
972000
unkown
page readonly
malicious
2F2000
unkown
page readonly
malicious
2E70000
heap
page read and write
malicious
5596000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
14F0000
heap
page read and write
7FF7C130D000
trusted library allocation
page execute and read and write
251102F3000
trusted library allocation
page read and write
28ACB794000
trusted library allocation
page read and write
1B19E000
stack
page read and write
4ED1000
trusted library allocation
page read and write
ACD000
trusted library allocation
page execute and read and write
4BBC137000
stack
page read and write
2510130D000
trusted library allocation
page read and write
7FF7C1770000
trusted library allocation
page read and write
7FF7C14B0000
trusted library allocation
page execute and read and write
2C9C000
trusted library allocation
page read and write
147453C6000
heap
page read and write
1200000
heap
page read and write
76C64FE000
stack
page read and write
5E64000
heap
page read and write
7FF7C1450000
trusted library allocation
page execute and read and write
9C360E000
stack
page read and write
1473D26B000
trusted library allocation
page read and write
8A72000
heap
page read and write
1473D1AC000
trusted library allocation
page read and write
10D6000
heap
page read and write
1473D1BA000
trusted library allocation
page read and write
7FF7C131B000
trusted library allocation
page execute and read and write
1472B3D4000
heap
page read and write
76C6077000
stack
page read and write
9C380C000
stack
page read and write
14C5000
heap
page read and write
22EA1747000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
C5BC319000
stack
page read and write
7B09000
heap
page read and write
1472B390000
heap
page read and write
28AE33D2000
heap
page read and write
546E000
stack
page read and write
7FF7C15B0000
trusted library allocation
page read and write
123D000
heap
page read and write
50C0000
trusted library allocation
page execute and read and write
7FF7C15B0000
trusted library allocation
page read and write
1472E0D1000
trusted library allocation
page read and write
1472DAC7000
trusted library allocation
page read and write
251696C3000
heap
page read and write
7FF7C1736000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
7E6000
heap
page read and write
28AE32BD000
heap
page read and write
14745661000
heap
page read and write
28ACAB80000
heap
page read and write
4F80000
trusted library allocation
page read and write
7FF7C1766000
trusted library allocation
page read and write
1472ECE4000
trusted library allocation
page read and write
25167810000
trusted library section
page read and write
28AE3395000
heap
page read and write
1472CC40000
heap
page readonly
1472B375000
heap
page read and write
4E0E000
stack
page read and write
8BE2000
trusted library allocation
page read and write
22EB85C0000
heap
page read and write
28ACAA60000
trusted library allocation
page read and write
1472CDB5000
heap
page read and write
5495000
trusted library allocation
page read and write
1473CEF1000
trusted library allocation
page read and write
25101011000
trusted library allocation
page read and write
AF7000
trusted library allocation
page execute and read and write
902E000
stack
page read and write
1472B1E0000
heap
page read and write
7DE0000
trusted library allocation
page read and write
A21000
heap
page read and write
22EB84B4000
heap
page read and write
4BBBDFE000
stack
page read and write
5B69000
trusted library allocation
page read and write
2516767F000
heap
page read and write
12A0000
heap
page read and write
76C5EFE000
stack
page read and write
1472CD00000
heap
page read and write
28ACC993000
trusted library allocation
page read and write
76C714B000
stack
page read and write
7FF7C1430000
trusted library allocation
page execute and read and write
22E9E45C000
heap
page read and write
D70000
heap
page read and write
35D2000
trusted library allocation
page read and write
8A22000
heap
page read and write
25100BEE000
trusted library allocation
page read and write
7FF7C1610000
trusted library allocation
page read and write
34AE000
heap
page read and write
1472CC80000
trusted library allocation
page read and write
25101A8B000
trusted library allocation
page read and write
22E9E3E3000
heap
page read and write
7FF7C1630000
trusted library allocation
page read and write
8A6B000
heap
page read and write
7C60000
trusted library allocation
page read and write
7FF7C1620000
trusted library allocation
page read and write
7DF46E600000
trusted library allocation
page execute and read and write
A1E000
heap
page read and write
22E9E620000
heap
page read and write
7FF7C1790000
trusted library allocation
page read and write
28AE3083000
heap
page read and write
2CA6000
trusted library allocation
page read and write
1BAA7000
heap
page read and write
7FF7C1410000
trusted library allocation
page execute and read and write
7FF7C131D000
trusted library allocation
page execute and read and write
28AC90D5000
heap
page read and write
25101218000
trusted library allocation
page read and write
76C70CC000
stack
page read and write
7FF7C1314000
trusted library allocation
page read and write
3610000
trusted library allocation
page execute and read and write
14744ECA000
heap
page read and write
4EBC000
stack
page read and write
534D000
stack
page read and write
355E000
stack
page read and write
7FF7C1730000
trusted library allocation
page read and write
8A47000
heap
page read and write
5C22000
trusted library allocation
page read and write
7FF7C133B000
trusted library allocation
page read and write
28AE3052000
heap
page read and write
1AFF0000
heap
page execute and read and write
22EAFF51000
trusted library allocation
page read and write
7FF7C1670000
trusted library allocation
page read and write
7FF7C1660000
trusted library allocation
page read and write
BCBBF0D000
stack
page read and write
1228000
heap
page read and write
2C6F000
trusted library allocation
page read and write
28ADAF15000
trusted library allocation
page read and write
251102A2000
trusted library allocation
page read and write
89F4000
heap
page read and write
7FF7C1310000
trusted library allocation
page read and write
7FF7C16A0000
trusted library allocation
page read and write
5E48000
heap
page read and write
1472CE30000
heap
page execute and read and write
995000
heap
page read and write
7FF7C1770000
trusted library allocation
page read and write
28AC91F0000
trusted library allocation
page read and write
121B000
heap
page read and write
22EA11CB000
trusted library allocation
page read and write
7FF7C1590000
trusted library allocation
page read and write
1472CD97000
heap
page execute and read and write
1472B360000
trusted library allocation
page read and write
7FF7C1323000
trusted library allocation
page execute and read and write
25169132000
heap
page read and write
AA9000
heap
page read and write
28ACAB10000
heap
page read and write
1125000
heap
page read and write
28AC91B0000
heap
page read and write
2D6C000
stack
page read and write
7FF7C13F6000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
22E9FF15000
heap
page read and write
28AC9098000
heap
page read and write
7FF7C1520000
trusted library allocation
page read and write
4D5F000
stack
page read and write
500A000
trusted library allocation
page read and write
22EB8416000
heap
page execute and read and write
7FF7C14D0000
trusted library allocation
page execute and read and write
7FF7C15B0000
trusted library allocation
page read and write
8F2E000
stack
page read and write
1472DEF2000
trusted library allocation
page read and write
28ACBDE2000
trusted library allocation
page read and write
76C637E000
stack
page read and write
1C9CC000
stack
page read and write
4C5E000
stack
page read and write
2AD8C449000
heap
page read and write
1100000
heap
page read and write
22E9E5B0000
heap
page read and write
2FB7000
stack
page read and write
28AE334D000
heap
page read and write
2C8B000
trusted library allocation
page read and write
28ADAE81000
trusted library allocation
page read and write
28ACC483000
trusted library allocation
page read and write
AE6000
trusted library allocation
page execute and read and write
28AE3126000
heap
page execute and read and write
7FF7C1620000
trusted library allocation
page read and write
22EA0E9B000
trusted library allocation
page read and write
25167895000
heap
page read and write
7FF7C16A0000
trusted library allocation
page read and write
4BBC079000
stack
page read and write
2516964A000
heap
page read and write
22EA0E86000
trusted library allocation
page read and write
CF4000
stack
page read and write
251012AB000
trusted library allocation
page read and write
76C657C000
stack
page read and write
22E9FEE0000
heap
page execute and read and write
28ACC9B3000
trusted library allocation
page read and write
7FF7C1560000
trusted library allocation
page read and write
22E9E432000
heap
page read and write
1472CC30000
trusted library allocation
page read and write
1260000
heap
page read and write
165F000
stack
page read and write
28ACBBC2000
trusted library allocation
page read and write
12C08000
trusted library allocation
page read and write
7FF7C132D000
trusted library allocation
page execute and read and write
A0B000
heap
page read and write
8E1F000
stack
page read and write
2681000
trusted library allocation
page read and write
BCBB43E000
stack
page read and write
28ADAF3C000
trusted library allocation
page read and write
79D2000
heap
page read and write
7FF7C14A0000
trusted library allocation
page execute and read and write
7BF0000
trusted library allocation
page read and write
1B9D0000
heap
page read and write
5C35000
trusted library allocation
page read and write
22EAFF21000
trusted library allocation
page read and write
5E52000
heap
page read and write
5430000
heap
page execute and read and write
7FF7C1690000
trusted library allocation
page read and write
25169260000
heap
page execute and read and write
1B8DE000
stack
page read and write
22EA17AD000
trusted library allocation
page read and write
1472B3DC000
heap
page read and write
28AE30BD000
heap
page read and write
7FF7C177D000
trusted library allocation
page read and write
480000
heap
page read and write
28AE305C000
heap
page read and write
8A8F000
heap
page read and write
7FF7C133D000
trusted library allocation
page execute and read and write
7FF7C1610000
trusted library allocation
page read and write
400000
unkown
page readonly
7FF7C1330000
trusted library allocation
page read and write
7FF7C1600000
trusted library allocation
page read and write
7FF7C1720000
trusted library allocation
page read and write
8990000
trusted library allocation
page read and write
7FF7C1720000
trusted library allocation
page read and write
7FF7C1611000
trusted library allocation
page read and write
7FF7C13C6000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
26CF000
trusted library allocation
page read and write
22E9FDD0000
heap
page read and write
1C8CE000
stack
page read and write
22EB84D0000
heap
page read and write
2F1C000
trusted library allocation
page read and write
7FF7C1760000
trusted library allocation
page read and write
1B65D000
stack
page read and write
4BBBD7F000
stack
page read and write
89E0000
heap
page read and write
AEA000
trusted library allocation
page execute and read and write
53F5000
heap
page execute and read and write
7FF7C1688000
trusted library allocation
page read and write
7FF7C1590000
trusted library allocation
page read and write
28ACAB70000
trusted library allocation
page read and write
25169C50000
heap
page read and write
286E000
stack
page read and write
7FF7C1303000
trusted library allocation
page execute and read and write
28AC91E0000
trusted library section
page read and write
7FF7C14A2000
trusted library allocation
page read and write
251018BE000
trusted library allocation
page read and write
7B53000
heap
page read and write
2C9A000
trusted library allocation
page read and write
1472B41A000
heap
page read and write
22EA0E93000
trusted library allocation
page read and write
28ACBCB4000
trusted library allocation
page read and write
7FF7C134B000
trusted library allocation
page read and write
1225000
heap
page read and write
7E60000
trusted library allocation
page read and write
7FF7C1678000
trusted library allocation
page read and write
1209000
heap
page read and write
22EA1048000
trusted library allocation
page read and write
64AF000
trusted library allocation
page read and write
7750000
heap
page read and write
2C5D000
trusted library allocation
page read and write
7FF7C14C2000
trusted library allocation
page read and write
BCBBE8F000
stack
page read and write
8C00000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
14745634000
heap
page read and write
2F11000
trusted library allocation
page read and write
7FF7C136C000
trusted library allocation
page execute and read and write
7FF7C1780000
trusted library allocation
page read and write
DB0000
heap
page read and write
28AC9285000
heap
page read and write
1B18D000
stack
page read and write
E1D000
heap
page read and write
6449000
trusted library allocation
page read and write
22EB8517000
heap
page read and write
7FF7C15D0000
trusted library allocation
page read and write
26E4000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
7FF7C1334000
trusted library allocation
page read and write
5E10000
heap
page read and write
7FF7C168C000
trusted library allocation
page read and write
7F458000
trusted library allocation
page execute and read and write
12F11000
trusted library allocation
page read and write
7FF7C1600000
trusted library allocation
page read and write
7FF7C16A0000
trusted library allocation
page read and write
22EA0E8A000
trusted library allocation
page read and write
7FF7C1689000
trusted library allocation
page read and write
1472DCA9000
trusted library allocation
page read and write
28AE3342000
heap
page read and write
28ACB05D000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
7FF7C1610000
trusted library allocation
page read and write
7FF7C1670000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
1474553C000
heap
page read and write
7FF7C14F8000
trusted library allocation
page read and write
7FF7C1530000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
4BBD00C000
stack
page read and write
130C3000
trusted library allocation
page read and write
14AE000
stack
page read and write
28ACBB29000
trusted library allocation
page read and write
1472E74D000
trusted library allocation
page read and write
22EAFF96000
trusted library allocation
page read and write
7FF7C1790000
trusted library allocation
page read and write
1473D254000
trusted library allocation
page read and write
1472B370000
heap
page read and write
7FF7C14B2000
trusted library allocation
page read and write
25169648000
heap
page read and write
2E20000
trusted library allocation
page read and write
2A90000
heap
page execute and read and write
22EB8590000
heap
page execute and read and write
76C5FFE000
stack
page read and write
7FF7C167C000
trusted library allocation
page read and write
7FF7C1314000
trusted library allocation
page read and write
7FF7C1520000
trusted library allocation
page read and write
7FF7C1314000
trusted library allocation
page read and write
7FF7C1330000
trusted library allocation
page read and write
28ACAB85000
heap
page read and write
25100A55000
trusted library allocation
page read and write
7D6D000
stack
page read and write
28AC91D0000
trusted library section
page read and write
39C000
stack
page read and write
22EA1D40000
trusted library allocation
page read and write
28AC9116000
heap
page read and write
7FF7C1570000
trusted library allocation
page read and write
7CEF000
stack
page read and write
7FF7C135C000
trusted library allocation
page execute and read and write
1472ECBF000
trusted library allocation
page read and write
DE4000
stack
page read and write
2516997C000
heap
page read and write
450000
heap
page read and write
89EC000
heap
page read and write
BCBB3BF000
stack
page read and write
4E9E000
stack
page read and write
7FF7C1730000
trusted library allocation
page read and write
22EA1D45000
trusted library allocation
page read and write
7FF7C15C0000
trusted library allocation
page read and write
1269000
heap
page read and write
AFB000
trusted library allocation
page execute and read and write
7FF7C15E0000
trusted library allocation
page read and write
DDB000
heap
page read and write
7FF7C1710000
trusted library allocation
page read and write
22EA10FF000
trusted library allocation
page read and write
7FF7C13EC000
trusted library allocation
page execute and read and write
AF5000
trusted library allocation
page execute and read and write
251676CB000
heap
page read and write
22EB85F3000
heap
page read and write
E21000
heap
page read and write
7FF7C13B0000
trusted library allocation
page execute and read and write
22EB87E3000
heap
page read and write
7FF7C1690000
trusted library allocation
page read and write
7FF7C1750000
trusted library allocation
page read and write
DEF000
heap
page read and write
7DF4A7FB0000
trusted library allocation
page execute and read and write
8840000
trusted library allocation
page execute and read and write
22E9E5D0000
heap
page read and write
268C000
trusted library allocation
page read and write
7FF7C14F4000
trusted library allocation
page read and write
12688000
trusted library allocation
page read and write
1C3B8000
stack
page read and write
7FF7C1500000
trusted library allocation
page execute and read and write
2E00000
heap
page read and write
22EB86D4000
heap
page read and write
35B9000
trusted library allocation
page read and write
1472DABD000
trusted library allocation
page read and write
7FF7C1692000
trusted library allocation
page read and write
9C267A000
stack
page read and write
22EA0F57000
trusted library allocation
page read and write
89E8000
heap
page read and write
7FF7C1313000
trusted library allocation
page execute and read and write
7FF7C1530000
trusted library allocation
page read and write
22EB86C0000
heap
page read and write
75CE000
stack
page read and write
1B9D4000
heap
page read and write
22EB8410000
heap
page execute and read and write
22EA1082000
trusted library allocation
page read and write
25167900000
heap
page read and write
22EB882F000
heap
page read and write
22EA0B16000
trusted library allocation
page read and write
4F87000
heap
page read and write
7FF7C1770000
trusted library allocation
page read and write
35D5000
trusted library allocation
page execute and read and write
9C257E000
stack
page read and write
2780000
heap
page read and write
DD0000
heap
page read and write
5010000
trusted library allocation
page read and write
7FF7C1620000
trusted library allocation
page read and write
1473CEE1000
trusted library allocation
page read and write
7FF7C13D0000
trusted library allocation
page read and write
5DDE000
stack
page read and write
251690F0000
trusted library allocation
page read and write
28ACBE39000
trusted library allocation
page read and write
28AC9070000
heap
page read and write
1550000
heap
page read and write
1472B2E0000
heap
page read and write
54AE000
stack
page read and write
7DF475310000
trusted library allocation
page execute and read and write
296F000
stack
page read and write
7FF7C16B0000
trusted library allocation
page read and write
7FF7C14F8000
trusted library allocation
page read and write
7FF7C13E0000
trusted library allocation
page execute and read and write
22E9FE70000
trusted library allocation
page read and write
28AE2FE0000
heap
page read and write
758E000
stack
page read and write
DE4000
heap
page read and write
7FF7C14C1000
trusted library allocation
page read and write
251678D0000
heap
page execute and read and write
7FF7C1310000
trusted library allocation
page read and write
25167870000
trusted library allocation
page read and write
7FF7C1550000
trusted library allocation
page read and write
28AC90A2000
heap
page read and write
7FF7C1698000
trusted library allocation
page read and write
7FF7C13CC000
trusted library allocation
page execute and read and write
7FF7C15F0000
trusted library allocation
page read and write
1B8CE000
stack
page read and write
7FF7C1580000
trusted library allocation
page read and write
28AC9050000
heap
page read and write
22EA014A000
trusted library allocation
page read and write
26C3000
trusted library allocation
page read and write
50BE000
stack
page read and write
789000
heap
page read and write
2516767D000
heap
page read and write
7DF4E6750000
trusted library allocation
page execute and read and write
BCBB07D000
stack
page read and write
7FF7C1303000
trusted library allocation
page read and write
7FF7C1580000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
7FF7C137C000
trusted library allocation
page execute and read and write
BCBC08C000
stack
page read and write
7FF7C1630000
trusted library allocation
page read and write
8900000
heap
page read and write
7FF7C138C000
trusted library allocation
page execute and read and write
BCBAAE3000
stack
page read and write
1473D1B2000
trusted library allocation
page read and write
76C6279000
stack
page read and write
7FF7C13C0000
trusted library allocation
page read and write
4BBBFFE000
stack
page read and write
7FF7C1664000
trusted library allocation
page read and write
28AC90ED000
heap
page read and write
7FF7C1650000
trusted library allocation
page read and write
14745310000
heap
page read and write
797E000
stack
page read and write
760E000
stack
page read and write
22EA0971000
trusted library allocation
page read and write
28ACBB2F000
trusted library allocation
page read and write
1AC30000
trusted library allocation
page read and write
66A000
heap
page read and write
401000
unkown
page execute read
251011DF000
trusted library allocation
page read and write
7FF7C130D000
trusted library allocation
page execute and read and write
5441000
trusted library allocation
page read and write
28AC90CF000
heap
page read and write
10C3000
trusted library allocation
page read and write
22E9E41D000
heap
page read and write
5E00000
heap
page read and write
7FF7C172C000
trusted library allocation
page read and write
7FF7C15A0000
trusted library allocation
page read and write
1555000
heap
page read and write
7FF7C1512000
trusted library allocation
page read and write
28ACBC81000
trusted library allocation
page read and write
25167910000
heap
page read and write
8D93000
trusted library allocation
page read and write
28ADABB1000
trusted library allocation
page read and write
7FF7C1640000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
251690C0000
trusted library allocation
page read and write
7FF7C131D000
trusted library allocation
page execute and read and write
7AF0000
heap
page read and write
768E000
stack
page read and write
1AC0D000
stack
page read and write
76C7049000
stack
page read and write
25167890000
heap
page read and write
7C50000
trusted library allocation
page read and write
28AC90CD000
heap
page read and write
476E000
stack
page read and write
7FF7C1332000
trusted library allocation
page read and write
1472CE80000
trusted library allocation
page read and write
25169A1C000
heap
page read and write
8C10000
trusted library allocation
page read and write
339E000
stack
page read and write
1472E283000
trusted library allocation
page read and write
1040000
heap
page read and write
7FF7C15D0000
trusted library allocation
page read and write
2AD8C3C0000
heap
page read and write
7DF0000
trusted library allocation
page read and write
28AE32A0000
heap
page read and write
12681000
trusted library allocation
page read and write
130C8000
trusted library allocation
page read and write
7FF7C1540000
trusted library allocation
page read and write
22EB84AB000
heap
page read and write
6B2000
heap
page read and write
7BFB000
trusted library allocation
page read and write
7C4E000
stack
page read and write
3600000
heap
page readonly
7FF7C1550000
trusted library allocation
page read and write
22E9E457000
heap
page read and write
1B5CB000
stack
page read and write
BCBBF8E000
stack
page read and write
2D2F000
stack
page read and write
26BB000
trusted library allocation
page read and write
14745558000
heap
page read and write
7FF7C14E0000
trusted library allocation
page execute and read and write
DF1000
heap
page read and write
7FF7C13A0000
trusted library allocation
page read and write
BCBB1B6000
stack
page read and write
25167620000
heap
page read and write
7FF7C1650000
trusted library allocation
page read and write
22EA0E82000
trusted library allocation
page read and write
1472B3B1000
heap
page read and write
BCBC10E000
stack
page read and write
4F20000
trusted library allocation
page read and write
774B000
stack
page read and write
1070000
heap
page read and write
7FF7C1776000
trusted library allocation
page read and write
FE0000
heap
page read and write
747000
heap
page read and write
251698EE000
heap
page read and write
72E000
heap
page read and write
5E5B000
heap
page read and write
7FF7C1340000
trusted library allocation
page read and write
28ACBF55000
trusted library allocation
page read and write
4EFC000
stack
page read and write
25167915000
heap
page read and write
28AE2B96000
heap
page read and write
22E9FE30000
heap
page readonly
1472E098000
trusted library allocation
page read and write
7F440000
trusted library allocation
page execute and read and write
7FF7C1780000
trusted library allocation
page read and write
7FF7C1320000
trusted library allocation
page read and write
7DF4A7FC0000
trusted library allocation
page execute and read and write
1472E1FA000
trusted library allocation
page read and write
7F400000
trusted library allocation
page execute and read and write
28AC9240000
heap
page execute and read and write
7FF7C1790000
trusted library allocation
page read and write
22EB8824000
heap
page read and write
AC0000
heap
page read and write
7FF7C14DA000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
BCBB13F000
stack
page read and write
4D9E000
stack
page read and write
7FF7C1555000
trusted library allocation
page read and write
7B49000
heap
page read and write
7FF7C1663000
trusted library allocation
page read and write
251019CA000
trusted library allocation
page read and write
12F13000
trusted library allocation
page read and write
2D50000
heap
page execute and read and write
1098000
heap
page read and write
7FF7C13C0000
trusted library allocation
page read and write
466E000
stack
page read and write
4F60000
trusted library allocation
page execute and read and write
7C57000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
7C5A000
trusted library allocation
page read and write
7B5A000
heap
page read and write
7FF7C1420000
trusted library allocation
page execute and read and write
35A3000
trusted library allocation
page execute and read and write
7FF7C1518000
trusted library allocation
page read and write
7FF7C170C000
trusted library allocation
page read and write
8970000
trusted library allocation
page read and write
7FF7C1323000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
7FF7C15A0000
trusted library allocation
page read and write
9C368C000
stack
page read and write
147455BD000
heap
page read and write
22EB87F2000
heap
page read and write
7B70000
heap
page read and write
28ACBC4F000
trusted library allocation
page read and write
7FF7C1560000
trusted library allocation
page read and write
7B9F000
heap
page read and write
750D000
stack
page read and write
28ACBE9A000
trusted library allocation
page read and write
22EB84E4000
heap
page read and write
7FF7C15A0000
trusted library allocation
page read and write
2AD8C710000
heap
page read and write
7FF7C12F4000
trusted library allocation
page read and write
76C62F7000
stack
page read and write
530E000
stack
page read and write
970000
unkown
page readonly
28AC8F70000
heap
page read and write
7FF7C1310000
trusted library allocation
page read and write
7FF7C14F4000
trusted library allocation
page read and write
5DE000
stack
page read and write
747E000
stack
page read and write
E70000
heap
page read and write
2AD8C3A0000
heap
page read and write
76C714E000
stack
page read and write
2C96000
trusted library allocation
page read and write
3455000
heap
page read and write
BDF000
stack
page read and write
9AE000
stack
page read and write
251698A0000
heap
page read and write
1B39E000
stack
page read and write
7FF7C1570000
trusted library allocation
page read and write
59B6000
trusted library allocation
page read and write
660000
heap
page read and write
7FF7C15C0000
trusted library allocation
page read and write
25100FA4000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
9C3789000
stack
page read and write
1BCEE000
stack
page read and write
1472B2C0000
heap
page read and write
1CCCE000
stack
page read and write
22EB846F000
heap
page read and write
14D0000
heap
page read and write
1472ECDF000
trusted library allocation
page read and write
F84000
stack
page read and write
1114000
heap
page read and write
12F18000
trusted library allocation
page read and write
22EA01DA000
trusted library allocation
page read and write
22E9E625000
heap
page read and write
1BB10000
heap
page read and write
2AAF000
stack
page read and write
76C5BBE000
stack
page read and write
7FF7C15E0000
trusted library allocation
page read and write
1472E641000
trusted library allocation
page read and write
22EB846D000
heap
page read and write
76C5B3E000
stack
page read and write
2CA2000
trusted library allocation
page read and write
28AE332F000
heap
page read and write
7BED000
heap
page read and write
754B000
stack
page read and write
7FF7C14D0000
trusted library allocation
page execute and read and write
251696BB000
heap
page read and write
1510000
heap
page read and write
28ADAFE9000
trusted library allocation
page read and write
1095000
heap
page read and write
14745646000
heap
page read and write
7E90000
trusted library allocation
page read and write
7FF7C132B000
trusted library allocation
page read and write
25110031000
trusted library allocation
page read and write
4BBC2BF000
stack
page read and write
1B49E000
stack
page read and write
51D0000
trusted library allocation
page read and write
7B5E000
heap
page read and write
7FF7C15F0000
trusted library allocation
page read and write
4BBCE0E000
stack
page read and write
8A87000
heap
page read and write
7FF7C14CA000
trusted library allocation
page read and write
7FF7C1420000
trusted library allocation
page execute and read and write
1474564A000
heap
page read and write
2C71000
trusted library allocation
page read and write
3620000
heap
page read and write
507D000
stack
page read and write
7FF7C1540000
trusted library allocation
page read and write
2516769D000
heap
page read and write
22EB845F000
heap
page read and write
7FF7C1560000
trusted library allocation
page read and write
28ACAC16000
trusted library allocation
page read and write
4E5E000
stack
page read and write
25100D78000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
7FF7C1324000
trusted library allocation
page read and write
1472CDB0000
heap
page read and write
251010C7000
trusted library allocation
page read and write
2AEE000
stack
page read and write
2CA9000
trusted library allocation
page read and write
1472E726000
trusted library allocation
page read and write
22E9E42F000
heap
page read and write
7FF7C15A0000
trusted library allocation
page read and write
9C2777000
stack
page read and write
22EB8455000
heap
page read and write
7FF7C1304000
trusted library allocation
page read and write
2F7C000
stack
page read and write
2BFE000
stack
page read and write
7FF7C1678000
trusted library allocation
page read and write
4BBBC73000
stack
page read and write
28AC90D9000
heap
page read and write
25100C38000
trusted library allocation
page read and write
7FF7C13F6000
trusted library allocation
page execute and read and write
7FF7C136C000
trusted library allocation
page execute and read and write
7FF7C1750000
trusted library allocation
page read and write
33E0000
heap
page read and write
9C2C3C000
stack
page read and write
1C54E000
stack
page read and write
28AE3345000
heap
page read and write
1BF0D000
stack
page read and write
5030000
trusted library allocation
page execute and read and write
25167683000
heap
page read and write
AC4000
trusted library allocation
page read and write
1BA1C000
heap
page read and write
4EE0000
trusted library allocation
page read and write
7B2E000
heap
page read and write
4BBCE8C000
stack
page read and write
2620000
heap
page execute and read and write
4BBBE79000
stack
page read and write
1BABA000
heap
page read and write
7FF7C132D000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
7FF7C1674000
trusted library allocation
page read and write
BCBAE7E000
stack
page read and write
28ACC314000
trusted library allocation
page read and write
7FF7C15B0000
trusted library allocation
page read and write
35AD000
trusted library allocation
page execute and read and write
7DF4E6740000
trusted library allocation
page execute and read and write
22EA0F54000
trusted library allocation
page read and write
22EA16A1000
trusted library allocation
page read and write
2516767B000
heap
page read and write
7E80000
trusted library allocation
page read and write
28ADAC03000
trusted library allocation
page read and write
25169600000
heap
page read and write
7FF7C1750000
trusted library allocation
page read and write
7FF7C1560000
trusted library allocation
page read and write
25100BFE000
trusted library allocation
page read and write
22E9FF10000
heap
page read and write
DC0000
heap
page read and write
9E0000
heap
page read and write
AE2000
trusted library allocation
page read and write
764A000
stack
page read and write
1472CD90000
heap
page execute and read and write
251675E0000
heap
page read and write
7FF7C1620000
trusted library allocation
page read and write
7FF7C1643000
trusted library allocation
page read and write
26BE000
trusted library allocation
page read and write
7FF7C1640000
trusted library allocation
page read and write
28AC911A000
heap
page read and write
22EB0215000
trusted library allocation
page read and write
1B49D000
stack
page read and write
9B000
stack
page read and write
ADD000
trusted library allocation
page execute and read and write
28AE31D3000
heap
page read and write
7FF7C1670000
trusted library allocation
page read and write
1C5C0000
heap
page read and write
C5BC67F000
stack
page read and write
6460000
trusted library allocation
page read and write
7B3F000
heap
page read and write
700000
heap
page read and write
7FF7C1770000
trusted library allocation
page read and write
7FF7C135C000
trusted library allocation
page execute and read and write
7FF7C131D000
trusted library allocation
page execute and read and write
7FF7C1580000
trusted library allocation
page read and write
7FF7C1570000
trusted library allocation
page read and write
7FF7C1590000
trusted library allocation
page read and write
7FF7C1690000
trusted library allocation
page read and write
A13000
heap
page read and write
7FF7C1720000
trusted library allocation
page read and write
76C6F4F000
stack
page read and write
22EB0213000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
7FF7C13AC000
trusted library allocation
page execute and read and write
76C63FE000
stack
page read and write
894E000
stack
page read and write
7D2E000
stack
page read and write
2F21000
trusted library allocation
page read and write
28ADAE83000
trusted library allocation
page read and write
7FF7C13D6000
trusted library allocation
page execute and read and write
7FF7C1690000
trusted library allocation
page read and write
251698C8000
heap
page read and write
25167640000
heap
page read and write
2C4C000
trusted library allocation
page read and write
25167820000
trusted library section
page read and write
1472B3EE000
heap
page read and write
4BBBF77000
stack
page read and write
7FF7C1675000
trusted library allocation
page read and write
26CC000
trusted library allocation
page read and write
7FF7C14D1000
trusted library allocation
page read and write
7FF7C14A2000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
28ACADB8000
trusted library allocation
page read and write
7FF7C15F0000
trusted library allocation
page read and write
7FF7C1684000
trusted library allocation
page read and write
8FAE000
stack
page read and write
7FF7C1740000
trusted library allocation
page execute and read and write
7FF7C14C1000
trusted library allocation
page read and write
25167652000
heap
page read and write
4F70000
trusted library allocation
page read and write
7FF7C14D0000
trusted library allocation
page read and write
14745510000
heap
page read and write
29AE000
stack
page read and write
7FF7C1790000
trusted library allocation
page read and write
7FF7C1324000
trusted library allocation
page read and write
1030000
heap
page read and write
25100001000
trusted library allocation
page read and write
7FF7C1682000
trusted library allocation
page read and write
574000
stack
page read and write
7FF7C14C2000
trusted library allocation
page read and write
4EB6000
trusted library allocation
page read and write
9C2939000
stack
page read and write
28AE30C2000
heap
page read and write
7FF7C1703000
trusted library allocation
page read and write
7FF7C1660000
trusted library allocation
page read and write
7E70000
trusted library allocation
page read and write
7FF7C1750000
trusted library allocation
page execute and read and write
28ACB902000
trusted library allocation
page read and write
28ADAE9B000
trusted library allocation
page read and write
8830000
heap
page read and write
1472B3CD000
heap
page read and write
885000
heap
page read and write
8DDE000
stack
page read and write
AC0000
trusted library allocation
page read and write
4F90000
trusted library allocation
page execute and read and write
1078000
heap
page read and write
9EC000
heap
page read and write
BCBABEE000
stack
page read and write
22E9E415000
heap
page read and write
7AE0000
trusted library allocation
page read and write
251019A3000
trusted library allocation
page read and write
25101F3D000
trusted library allocation
page read and write
7FF7C13DC000
trusted library allocation
page execute and read and write
A5A000
heap
page read and write
7FF7C1502000
trusted library allocation
page read and write
7FF7C137C000
trusted library allocation
page execute and read and write
7DD0000
trusted library allocation
page read and write
C5BC39F000
unkown
page read and write
7FF7C13D0000
trusted library allocation
page read and write
A51000
heap
page read and write
28ADABA0000
trusted library allocation
page read and write
25101F5D000
trusted library allocation
page read and write
25167689000
heap
page read and write
7D90000
trusted library allocation
page read and write
7CAE000
stack
page read and write
4FE0000
trusted library allocation
page read and write
147455F1000
heap
page read and write
28AE3120000
heap
page execute and read and write
DD5000
heap
page read and write
7FF7C14B0000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
33E8000
heap
page read and write
7FF7C13B0000
trusted library allocation
page read and write
9C2B3E000
stack
page read and write
4BBC43B000
stack
page read and write
1BD1F000
stack
page read and write
7FF7C1322000
trusted library allocation
page read and write
2FBD000
stack
page read and write
59DC000
trusted library allocation
page read and write
76C5F79000
stack
page read and write
28ACBD6A000
trusted library allocation
page read and write
22E9FE20000
trusted library allocation
page read and write
79BE000
stack
page read and write
251699E0000
heap
page read and write
5AA4000
trusted library allocation
page read and write
22EB8469000
heap
page read and write
25169A3A000
heap
page read and write
7FF7C1310000
trusted library allocation
page read and write
25167850000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
89FC000
heap
page read and write
7FF7C15C0000
trusted library allocation
page read and write
251696BF000
heap
page read and write
25169A60000
heap
page read and write
1472E80E000
trusted library allocation
page read and write
1BBEF000
stack
page read and write
22EAFF30000
trusted library allocation
page read and write
7FF7C134C000
trusted library allocation
page execute and read and write
35CA000
trusted library allocation
page execute and read and write
7FF7C1740000
trusted library allocation
page execute and read and write
1472CEC1000
trusted library allocation
page read and write
1120000
heap
page read and write
7FF7C131D000
trusted library allocation
page execute and read and write
7FF7C1630000
trusted library allocation
page read and write
33FE000
heap
page read and write
4BBCF89000
stack
page read and write
28ADAB91000
trusted library allocation
page read and write
88FE000
stack
page read and write
2AD8C440000
heap
page read and write
22E9E3D8000
heap
page read and write
251696D3000
heap
page read and write
10AD000
heap
page read and write
7FF7C1320000
trusted library allocation
page read and write
7FF7C12F0000
trusted library allocation
page read and write
53CE000
stack
page read and write
76C5E7E000
stack
page read and write
7FF7C1492000
trusted library allocation
page read and write
7FF7C14C0000
trusted library allocation
page read and write
1BAAD000
heap
page read and write
2510022A000
trusted library allocation
page read and write
22EB881D000
heap
page read and write
10AA000
heap
page read and write
1472B3B5000
heap
page read and write
7FF7C132B000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
CDE000
stack
page read and write
7FF7C13C6000
trusted library allocation
page read and write
28ACC96E000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
7FF7C1330000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
7FF7C1669000
trusted library allocation
page read and write
7FF7C167C000
trusted library allocation
page read and write
28AC9210000
trusted library allocation
page read and write
5CDE000
stack
page read and write
6441000
trusted library allocation
page read and write
22EB8826000
heap
page read and write
7FF7C1640000
trusted library allocation
page read and write
14745518000
heap
page read and write
24D0000
trusted library allocation
page read and write
4BF8000
trusted library allocation
page read and write
28AE3570000
heap
page read and write
BCBB23B000
stack
page read and write
25169698000
heap
page read and write
22EB84A8000
heap
page read and write
25110022000
trusted library allocation
page read and write
2A50000
heap
page execute and read and write
22E9FF9B000
trusted library allocation
page read and write
720000
heap
page read and write
7FF7C1510000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
7FF7C176D000
trusted library allocation
page read and write
251675B0000
heap
page read and write
1472EC9A000
trusted library allocation
page read and write
28ACBB96000
trusted library allocation
page read and write
22E9E4D0000
heap
page read and write
10B0000
trusted library allocation
page read and write
1472E1C7000
trusted library allocation
page read and write
25101964000
trusted library allocation
page read and write
9C2473000
stack
page read and write
22EB020F000
trusted library allocation
page read and write
7FF7C1530000
trusted library allocation
page read and write
251004D0000
trusted library allocation
page read and write
26C8000
trusted library allocation
page read and write
4EAB000
trusted library allocation
page read and write
22E9FF00000
heap
page read and write
7FF481420000
trusted library allocation
page execute and read and write
7FF7C1669000
trusted library allocation
page read and write
1472DEC6000
trusted library allocation
page read and write
22EA0E97000
trusted library allocation
page read and write
123A000
heap
page read and write
3230000
heap
page read and write
7FF7C1600000
trusted library allocation
page read and write
19A000
stack
page read and write
7FF7C1340000
trusted library allocation
page read and write
147455D1000
heap
page read and write
5BE1000
trusted library allocation
page read and write
7DF4A7FD0000
trusted library allocation
page execute and read and write
22EA1CFB000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
BCBC009000
stack
page read and write
251102F9000
trusted library allocation
page read and write
28AE301F000
heap
page read and write
95E000
stack
page read and write
22EA0F4E000
trusted library allocation
page read and write
7FF7C1640000
trusted library allocation
page read and write
88BD000
stack
page read and write
428000
unkown
page readonly
7FF7C1406000
trusted library allocation
page execute and read and write
25110301000
trusted library allocation
page read and write
1C4C0000
heap
page read and write
22EB7F2C000
heap
page read and write
1472DF7F000
trusted library allocation
page read and write
7FF7C1510000
trusted library allocation
page execute and read and write
2BEF000
stack
page read and write
7FF7C1313000
trusted library allocation
page execute and read and write
22EB8605000
heap
page read and write
7FF7C12F3000
trusted library allocation
page execute and read and write
14745575000
heap
page read and write
1472B320000
heap
page read and write
2AD8C715000
heap
page read and write
A4B000
heap
page read and write
251696CF000
heap
page read and write
251697C0000
heap
page read and write
6459000
trusted library allocation
page read and write
485000
heap
page read and write
1BE1E000
stack
page read and write
7FF7C13E6000
trusted library allocation
page read and write
BCBC10B000
stack
page read and write
4BFA000
trusted library allocation
page read and write
25100C04000
trusted library allocation
page read and write
22EA0E8E000
trusted library allocation
page read and write
7FF7C12FD000
trusted library allocation
page execute and read and write
4BBC33F000
stack
page read and write
22EB021D000
trusted library allocation
page read and write
14745430000
heap
page read and write
7FF7C1780000
trusted library allocation
page read and write
22EB8420000
heap
page read and write
7FF7C1416000
trusted library allocation
page execute and read and write
428000
unkown
page readonly
25100C0C000
trusted library allocation
page read and write
460000
heap
page read and write
1B6CE000
stack
page read and write
4BBD08E000
stack
page read and write
25167830000
trusted library allocation
page read and write
22EA0FE5000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
22EB85E0000
heap
page read and write
4BF4000
trusted library allocation
page read and write
59E000
stack
page read and write
1140000
heap
page read and write
130C1000
trusted library allocation
page read and write
7FF7C1350000
trusted library allocation
page read and write
1472E4C2000
trusted library allocation
page read and write
1472DFE2000
trusted library allocation
page read and write
7FF7C13D6000
trusted library allocation
page read and write
7FF7C13C0000
trusted library allocation
page execute and read and write
7FF7C15D0000
trusted library allocation
page read and write
7FF7C170A000
trusted library allocation
page read and write
22EAFF41000
trusted library allocation
page read and write
22E9FE40000
trusted library allocation
page read and write
7FF7C1530000
trusted library allocation
page read and write
12683000
trusted library allocation
page read and write
335E000
stack
page read and write
7FF7C1440000
trusted library allocation
page execute and read and write
1474555D000
heap
page read and write
9C2BBE000
stack
page read and write
9C26FE000
stack
page read and write
147453D9000
heap
page read and write
22EB877B000
heap
page read and write
7FF7C1440000
trusted library allocation
page execute and read and write
500D000
trusted library allocation
page read and write
1472E243000
trusted library allocation
page read and write
7C00000
trusted library allocation
page execute and read and write
950000
trusted library allocation
page read and write
420000
unkown
page readonly
8F69000
stack
page read and write
28AC9090000
heap
page read and write
251102F7000
trusted library allocation
page read and write
A09000
heap
page read and write
7FF7C1330000
trusted library allocation
page read and write
25169790000
trusted library allocation
page read and write
7FF7C14CA000
trusted library allocation
page read and write
7E50000
heap
page read and write
251699EF000
heap
page read and write
28ACB5E2000
trusted library allocation
page read and write
1240000
heap
page read and write
7B4C000
heap
page read and write
251675C0000
heap
page read and write
BCBAB6D000
stack
page read and write
5BDF000
stack
page read and write
8FEF000
stack
page read and write
13AE000
stack
page read and write
2F0000
unkown
page readonly
1473D1B0000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
1472E164000
trusted library allocation
page read and write
D40000
heap
page read and write
28ADAE8B000
trusted library allocation
page read and write
A30000
heap
page read and write
7FF7C14C0000
trusted library allocation
page read and write
22EA03ED000
trusted library allocation
page read and write
51CE000
stack
page read and write
7FF7C1430000
trusted library allocation
page execute and read and write
35F0000
trusted library allocation
page read and write
7FF7C15F0000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
25101F62000
trusted library allocation
page read and write
1472E021000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
53F0000
heap
page execute and read and write
7B45000
heap
page read and write
4BBBEFE000
stack
page read and write
25EE000
stack
page read and write
FD0000
heap
page read and write
A4D000
heap
page read and write
7FF7C14F2000
trusted library allocation
page read and write
710000
heap
page read and write
25110001000
trusted library allocation
page read and write
4C10000
heap
page execute and read and write
251678D7000
heap
page execute and read and write
22EB022D000
trusted library allocation
page read and write
76C6179000
stack
page read and write
9C388E000
stack
page read and write
7FF7C1406000
trusted library allocation
page execute and read and write
251696CB000
heap
page read and write
22EB8759000
heap
page read and write
7FF7C1580000
trusted library allocation
page read and write
7FF7C13A6000
trusted library allocation
page read and write
1B9EE000
stack
page read and write
1472D913000
trusted library allocation
page read and write
147455CD000
heap
page read and write
9C25FE000
stack
page read and write
1472CF46000
trusted library allocation
page read and write
E8E000
heap
page read and write
241E000
stack
page read and write
22EB89F0000
heap
page read and write
8C30000
trusted library allocation
page read and write
7FF7C1504000
trusted library allocation
page read and write
7BCB000
heap
page read and write
980000
unkown
page readonly
22EA1138000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
22E9E459000
heap
page read and write
22EA0C93000
trusted library allocation
page read and write
7FF7C1740000
trusted library allocation
page execute and read and write
8FED000
stack
page read and write
28AE3021000
heap
page read and write
5D0000
heap
page read and write
7FF7C1334000
trusted library allocation
page read and write
22E9FE00000
trusted library allocation
page read and write
3240000
heap
page read and write
25169A50000
heap
page read and write
251013DC000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
76C647B000
stack
page read and write
28ADABC1000
trusted library allocation
page read and write
BCBB0F8000
stack
page read and write
7FF7C1333000
trusted library allocation
page execute and read and write
BCBB33E000
stack
page read and write
7FF7C15E0000
trusted library allocation
page read and write
34A3000
heap
page read and write
401000
unkown
page execute read
25101F18000
trusted library allocation
page read and write
8F0000
heap
page read and write
76C6FCC000
stack
page read and write
340E000
heap
page read and write
2C89000
trusted library allocation
page read and write
7FF7C1780000
trusted library allocation
page read and write
1267000
heap
page read and write
7FF7C167A000
trusted library allocation
page read and write
22E9E3D0000
heap
page read and write
25100FD6000
trusted library allocation
page read and write
22EB86F9000
heap
page read and write
28ACC3FA000
trusted library allocation
page read and write
7FF7C16A0000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
7FF7C1590000
trusted library allocation
page read and write
760000
heap
page read and write
251696F9000
heap
page read and write
5420000
heap
page execute and read and write
990000
heap
page read and write
BCBB2B9000
stack
page read and write
1474564C000
heap
page read and write
D40000
heap
page execute and read and write
906E000
stack
page read and write
7FF7C1514000
trusted library allocation
page read and write
22EA1D20000
trusted library allocation
page read and write
251013C8000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
251696AA000
heap
page read and write
4BBCF0E000
stack
page read and write
8C20000
trusted library allocation
page read and write
28AC9220000
heap
page readonly
3246000
heap
page read and write
ABA000
heap
page read and write
22EA12E8000
trusted library allocation
page read and write
341A000
heap
page read and write
6F8000
stack
page read and write
76C60FD000
stack
page read and write
9E6000
heap
page read and write
33A0000
heap
page read and write
7FF7C1760000
trusted library allocation
page read and write
538B000
stack
page read and write
9C27FD000
stack
page read and write
22EB8839000
heap
page read and write
7FF7C1664000
trusted library allocation
page read and write
7FF7C14E0000
trusted library allocation
page execute and read and write
4EF1000
trusted library allocation
page read and write
7FF7C1783000
trusted library allocation
page read and write
76CB000
stack
page read and write
7FF7C1643000
trusted library allocation
page read and write
AF2000
trusted library allocation
page read and write
28ACBBF5000
trusted library allocation
page read and write
28AC9230000
trusted library allocation
page read and write
6469000
trusted library allocation
page read and write
25100D81000
trusted library allocation
page read and write
E1B000
heap
page read and write
7DB0000
trusted library allocation
page read and write
24E0000
heap
page read and write
4E10000
heap
page read and write
7DC0000
trusted library allocation
page read and write
BCBAEFA000
stack
page read and write
7FF7C1720000
trusted library allocation
page read and write
351E000
stack
page read and write
4BBC23A000
stack
page read and write
22EA0E7E000
trusted library allocation
page read and write
4BBC0BF000
stack
page read and write
1472D0E9000
trusted library allocation
page read and write
7FF7C13E6000
trusted library allocation
page execute and read and write
22EA0CDA000
trusted library allocation
page read and write
28AC90D1000
heap
page read and write
754000
heap
page read and write
8A76000
heap
page read and write
271E000
stack
page read and write
10D8000
heap
page read and write
7FF7C1638000
trusted library allocation
page read and write
1103000
heap
page read and write
7FF7C1570000
trusted library allocation
page read and write
1472CEB0000
heap
page execute and read and write
22EB8741000
heap
page read and write
7FF7C1314000
trusted library allocation
page read and write
12C01000
trusted library allocation
page read and write
7FF7C15C0000
trusted library allocation
page read and write
22E9FEB0000
trusted library allocation
page read and write
7FF7C1500000
trusted library allocation
page execute and read and write
1BA66000
heap
page read and write
7FF7C14F0000
trusted library allocation
page execute and read and write
7BFD000
trusted library allocation
page read and write
22EB85B0000
trusted library allocation
page read and write
22EA0F48000
trusted library allocation
page read and write
7FF7C1760000
trusted library allocation
page read and write
2AF0000
heap
page read and write
1473CF32000
trusted library allocation
page read and write
28ACC4E2000
trusted library allocation
page read and write
7FF7C1300000
trusted library allocation
page read and write
2AD8C390000
heap
page read and write
1B090000
heap
page read and write
2E6C000
stack
page read and write
14C0000
heap
page read and write
2F0F000
stack
page read and write
D45000
heap
page read and write
35A4000
trusted library allocation
page read and write
4BBC3BE000
stack
page read and write
7FF7C13CC000
trusted library allocation
page execute and read and write
7FF7C1710000
trusted library allocation
page read and write
1472DAF7000
trusted library allocation
page read and write
34A8000
heap
page read and write
930000
trusted library allocation
page read and write
7FF7C1520000
trusted library allocation
page execute and read and write
66E000
heap
page read and write
28ADAE7C000
trusted library allocation
page read and write
4F5E000
stack
page read and write
5B8C000
trusted library allocation
page read and write
2C2E000
stack
page read and write
402000
unkown
page readonly
7FF7C1680000
trusted library allocation
page read and write
7FF7C1520000
trusted library allocation
page read and write
1473CEC1000
trusted library allocation
page read and write
1BD0E000
stack
page read and write
1BE0E000
stack
page read and write
7FF7C1311000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
10A0000
heap
page read and write
7FF7C1303000
trusted library allocation
page execute and read and write
85F000
stack
page read and write
1CACA000
stack
page read and write
1472B416000
heap
page read and write
7FF7C13E6000
trusted library allocation
page execute and read and write
25169770000
heap
page execute and read and write
1BAE0000
heap
page execute and read and write
1472DAF5000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
7FF7C173C000
trusted library allocation
page read and write
7FF7C131D000
trusted library allocation
page execute and read and write
345C000
heap
page read and write
22EB87DF000
heap
page read and write
7DF475320000
trusted library allocation
page execute and read and write
9C2877000
stack
page read and write
7FF7C15E0000
trusted library allocation
page read and write
7FF7C14EA000
trusted library allocation
page read and write
26DC000
trusted library allocation
page read and write
2E70000
heap
page execute and read and write
1472D38D000
trusted library allocation
page read and write
22EA0B2D000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
25167860000
heap
page readonly
7FF7C1679000
trusted library allocation
page read and write
30BE000
stack
page read and write
7FF7C1314000
trusted library allocation
page read and write
25100088000
trusted library allocation
page read and write
3560000
heap
page read and write
7FF7C169C000
trusted library allocation
page read and write
1473D1CA000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
76C5BFE000
stack
page read and write
251676C6000
heap
page read and write
7FF7C1510000
trusted library allocation
page read and write
7FF7C17A0000
trusted library allocation
page read and write
76C5AB3000
stack
page read and write
880000
heap
page read and write
28ACBB5D000
trusted library allocation
page read and write
7FF7C14F0000
trusted library allocation
page execute and read and write
1C00D000
stack
page read and write
1B29F000
stack
page read and write
7FF7C1317000
trusted library allocation
page read and write
30CC000
trusted library allocation
page read and write
7FF7C1320000
trusted library allocation
page read and write
7FF7C1680000
trusted library allocation
page read and write
7FF7C1700000
trusted library allocation
page read and write
12A5000
heap
page read and write
7DF46E5F0000
trusted library allocation
page execute and read and write
2711000
trusted library allocation
page read and write
22EB86FC000
heap
page read and write
9C2ABE000
stack
page read and write
28AC9280000
heap
page read and write
4F30000
trusted library allocation
page read and write
7FF7C14F2000
trusted library allocation
page read and write
1B8E0000
heap
page read and write
28AE31C0000
heap
page read and write
7FF7C14E0000
trusted library allocation
page execute and read and write
35C0000
trusted library allocation
page read and write
DB6000
heap
page read and write
C30000
heap
page read and write
7FF7C1312000
trusted library allocation
page read and write
28AE33FC000
heap
page read and write
89F0000
heap
page read and write
9C24FD000
stack
page read and write
BCBAF7F000
stack
page read and write
35B0000
trusted library allocation
page read and write
728000
heap
page read and write
400000
unkown
page readonly
76C61F7000
stack
page read and write
7FF7C1680000
trusted library allocation
page read and write
7FF7C1630000
trusted library allocation
page read and write
4BBC1B8000
stack
page read and write
4E68000
trusted library allocation
page read and write
692000
heap
page read and write
25101129000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
402000
unkown
page readonly
1BA9E000
stack
page read and write
4BF0000
trusted library allocation
page read and write
7FF7C1730000
trusted library allocation
page read and write
7FF7C1740000
trusted library allocation
page read and write
7FF7C1550000
trusted library allocation
page read and write
7FF7C130D000
trusted library allocation
page execute and read and write
7D70000
trusted library allocation
page execute and read and write
4ECE000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
770D000
stack
page read and write
147458E0000
heap
page read and write
9C2A3C000
stack
page read and write
22E9E40E000
heap
page read and write
22EB86C3000
heap
page read and write
2ED0000
heap
page read and write
2CB8000
trusted library allocation
page read and write
22EA1786000
trusted library allocation
page read and write
22EB8810000
heap
page read and write
7FF7C15D0000
trusted library allocation
page read and write
7FF7C1508000
trusted library allocation
page read and write
28ACAB91000
trusted library allocation
page read and write
7FF7C1320000
trusted library allocation
page read and write
7FF7C1680000
trusted library allocation
page read and write
7FF7C1600000
trusted library allocation
page read and write
22EA122C000
trusted library allocation
page read and write
267E000
stack
page read and write
7FF7C1540000
trusted library allocation
page read and write
9C28BE000
stack
page read and write
1C58F000
stack
page read and write
7FF7C1500000
trusted library allocation
page execute and read and write
B10000
heap
page read and write
4BBBCFD000
stack
page read and write
3628000
heap
page read and write
8D0000
heap
page read and write
630000
heap
page read and write
7B39000
heap
page read and write
9C29BB000
stack
page read and write
14745368000
heap
page read and write
2516773D000
heap
page read and write
24C0000
trusted library allocation
page execute and read and write
28AE3374000
heap
page read and write
22E9E419000
heap
page read and write
7FF7C14D2000
trusted library allocation
page read and write
7FF7C1435000
trusted library allocation
page execute and read and write
1515000
heap
page read and write
7FF7C1540000
trusted library allocation
page read and write
28ACAB40000
heap
page execute and read and write
7FF7C16C0000
trusted library allocation
page read and write
AC3000
trusted library allocation
page execute and read and write
DBC000
heap
page read and write
28AE31E4000
heap
page read and write
22EB021B000
trusted library allocation
page read and write
22E9FF21000
trusted library allocation
page read and write
2FB0000
heap
page execute and read and write
8D80000
trusted library allocation
page read and write
7FF7C16B0000
trusted library allocation
page read and write
7B6A000
heap
page read and write
14745653000
heap
page read and write
28ACC420000
trusted library allocation
page read and write
7FF7C1653000
trusted library allocation
page read and write
1B9D2000
heap
page read and write
7FF7C13E0000
trusted library allocation
page read and write
7FF7C1340000
trusted library allocation
page read and write
1472CCC0000
trusted library allocation
page read and write
25F0000
heap
page read and write
1230000
heap
page read and write
793E000
stack
page read and write
2511007A000
trusted library allocation
page read and write
7FF7C1550000
trusted library allocation
page read and write
2510103C000
trusted library allocation
page read and write
14745612000
heap
page read and write
BCBAFF7000
stack
page read and write
7FF7C14E1000
trusted library allocation
page read and write
28AE33EF000
heap
page read and write
78FE000
stack
page read and write
9C370E000
stack
page read and write
28ACC9B8000
trusted library allocation
page read and write
BCBB4BB000
stack
page read and write
7FF7C133D000
trusted library allocation
page execute and read and write
4F80000
heap
page read and write
4EA0000
trusted library allocation
page read and write
22EA186E000
trusted library allocation
page read and write
7FF7C1672000
trusted library allocation
page read and write
1C2BA000
stack
page read and write
14CF000
stack
page read and write
There are 1372 hidden memdumps, click here to show them.