IOC Report
Fatality.exe

FilesProcessesURLsDomainsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
Fatality.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_220i22nz.zvr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bjqfjaye.bpf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bn1ala4h.lt5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_chyuccj0.ckw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cpcmh1dn.ypn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuts5adp.tul.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gx04bohc.k0g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inxdvao2.ijn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmhondth.ldb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pifmukfg.z0g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcnyno2w.j1e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qsszlsfc.cie.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_srntkzeu.2wi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_su40gg1o.3xn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmqahqsq.qma.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z4iu1sme.hr0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Jan 26 13:20:01 2025, mtime=Sun Jan 26 13:20:01 2025, atime=Sun Jan 26 13:20:01 2025, length=83456, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fatality.exe
"C:\Users\user\Desktop\Fatality.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Fatality.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Fatality.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
25.ip.gl.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.co;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.osoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).
unknown
https://github.com/Pester/Pester
unknown
http://crl.micros
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
25.ip.gl.ply.gg
147.185.221.25
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.25
25.ip.gl.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
252000
unkown
page readonly
malicious
12EE8000
trusted library allocation
page read and write
29BA1551000
trusted library allocation
page read and write
22AD8EF2000
trusted library allocation
page read and write
A27DCCF000
stack
page read and write
1131000
stack
page read and write
22AD64D0000
heap
page execute and read and write
2E38188F000
trusted library allocation
page read and write
E4D50F9000
stack
page read and write
2E381E27000
trusted library allocation
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
22AF064B000
heap
page read and write
C76F23E000
stack
page read and write
1190000
heap
page read and write
29B921F2000
trusted library allocation
page read and write
C76FD8E000
stack
page read and write
29B92FE5000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
3F0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1E6DA794000
trusted library allocation
page read and write
22AD8CA9000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
6C0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29B8F5A5000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
E4D507E000
stack
page read and write
1BBFF000
stack
page read and write
2E390307000
trusted library allocation
page read and write
A27D17E000
stack
page read and write
1BCFE000
stack
page read and write
800000
heap
page read and write
2E390001000
trusted library allocation
page read and write
12658000
trusted library allocation
page read and write
A27CF79000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9B912000
trusted library allocation
page read and write
1249000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1E6DA787000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9B941000
trusted library allocation
page read and write
1099000
heap
page read and write
840000
heap
page read and write
1B61D000
stack
page read and write
1B0F0000
heap
page execute and read and write
2E3FB40F000
heap
page read and write
C76EDFE000
stack
page read and write
102D000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
12CC000
heap
page read and write
1E6D7DC0000
heap
page read and write
A27D0F9000
stack
page read and write
14B1000
heap
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
1E6E988E000
trusted library allocation
page read and write
22AF0247000
heap
page read and write
1802000
heap
page read and write
22AD9CE5000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
29B90FF0000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
22AF0337000
heap
page execute and read and write
1264000
heap
page read and write
1E6DA8E2000
trusted library allocation
page read and write
620000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BB89000
trusted library allocation
page read and write
2E381097000
trusted library allocation
page read and write
C76E9EE000
stack
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2EF1000
trusted library allocation
page read and write
1E6DA9CB000
trusted library allocation
page read and write
22AD7CD4000
heap
page read and write
29B8F5A9000
heap
page read and write
22AE81C7000
trusted library allocation
page read and write
22AF050B000
heap
page read and write
22AE81AF000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1E6E9B0D000
trusted library allocation
page read and write
131A3000
trusted library allocation
page read and write
29B91015000
heap
page read and write
22AD909D000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
2E38134A000
trusted library allocation
page read and write
1AF00000
heap
page execute and read and write
29BA968C000
heap
page read and write
29B8F65C000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
990000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
22AF050F000
heap
page read and write
22AF02B3000
heap
page read and write
1E6F1D30000
heap
page execute and read and write
E4D517F000
stack
page read and write
6B0000
trusted library allocation
page read and write
29BA9923000
heap
page read and write
1330000
heap
page read and write
E4D52F8000
stack
page read and write
A27D1FE000
stack
page read and write
22AD7EB0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2E3902ED000
trusted library allocation
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
A27D078000
stack
page read and write
22AE7EC1000
trusted library allocation
page read and write
1025000
heap
page read and write
29BA14AD000
trusted library allocation
page read and write
1077000
heap
page read and write
1BB34000
stack
page read and write
22AF0591000
heap
page read and write
2E380C07000
trusted library allocation
page read and write
3A1000
stack
page read and write
22AF028C000
heap
page read and write
1E6D9CED000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
22AF04FF000
heap
page read and write
1E6E9821000
trusted library allocation
page read and write
29B92A52000
trusted library allocation
page read and write
C02000
heap
page read and write
1BA02000
heap
page read and write
29BA97E8000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
2E380F9D000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2E381DF4000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
88BA64E000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
132A3000
trusted library allocation
page read and write
1AED0000
heap
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
1E6F1D6C000
heap
page read and write
29B92B13000
trusted library allocation
page read and write
1E6F1E6F000
heap
page read and write
22AD6470000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
29B924D4000
trusted library allocation
page read and write
29BA962C000
heap
page read and write
1C1AA000
stack
page read and write
1E6E9841000
trusted library allocation
page read and write
1C3FF000
stack
page read and write
1041000
heap
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
22AD63C0000
heap
page read and write
1242000
heap
page read and write
AE5000
heap
page read and write
22AD63E0000
trusted library section
page read and write
902000
heap
page read and write
2B59EBA0000
heap
page read and write
1E6D9670000
heap
page execute and read and write
7FFD9B972000
trusted library allocation
page read and write
22AD9287000
trusted library allocation
page read and write
2E3F92A0000
trusted library allocation
page read and write
AFF000
stack
page read and write
EF4ACB9000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
29B923A3000
trusted library allocation
page read and write
A27C98E000
stack
page read and write
C76F2BC000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
13F0000
heap
page execute and read and write
7FFD9B954000
trusted library allocation
page read and write
29BA11D0000
trusted library allocation
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
22AD62DD000
heap
page read and write
7FFD9B974000
trusted library allocation
page read and write
2E380A51000
trusted library allocation
page read and write
1E6D97D0000
trusted library allocation
page read and write
29B8F785000
heap
page read and write
1C1B0000
heap
page read and write
22AD9CEA000
trusted library allocation
page read and write
2540000
heap
page read and write
22AF0658000
heap
page read and write
15CF000
stack
page read and write
29BA9A46000
heap
page read and write
29B91C11000
trusted library allocation
page read and write
2E3F9355000
heap
page read and write
1E6F1C00000
heap
page read and write
1E6F1FAF000
heap
page read and write
1320000
heap
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
730000
heap
page read and write
1BEFE000
stack
page read and write
29BA9A4D000
heap
page read and write
22AD6288000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
12EE3000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
29B929EC000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1E6F1F0D000
heap
page read and write
22AD6260000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
22AD91CA000
trusted library allocation
page read and write
15E0000
heap
page read and write
2E3FB3AD000
heap
page read and write
1E6F1C20000
heap
page read and write
29B92323000
trusted library allocation
page read and write
16FE000
stack
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
17FF000
stack
page read and write
1C0AB000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
822000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1E6D7D20000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1102000
heap
page read and write
2E3812AE000
trusted library allocation
page read and write
1E6F1D76000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
A27C902000
stack
page read and write
1229000
heap
page read and write
29B9258D000
trusted library allocation
page read and write
88BA6C9000
stack
page read and write
271C000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1602000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
22AE7F30000
trusted library allocation
page read and write
E4D53B8000
stack
page read and write
271F000
trusted library allocation
page read and write
1E6F1C3F000
heap
page read and write
E4D51F7000
stack
page read and write
22AD6309000
heap
page read and write
7FFD9B895000
trusted library allocation
page execute and read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
22AF061C000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
12FF000
stack
page read and write
29B92FA0000
trusted library allocation
page read and write
22AE81A9000
trusted library allocation
page read and write
2E3FB110000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
22AF04C2000
heap
page read and write
E4D610D000
stack
page read and write
A27DE49000
stack
page read and write
2E390263000
trusted library allocation
page read and write
1C2FF000
stack
page read and write
2E3F910C000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
12EE1000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
C76FF0C000
stack
page read and write
2E3F92D0000
heap
page read and write
22AD6180000
heap
page read and write
C76FF8C000
stack
page read and write
E4D5438000
stack
page read and write
22AD6400000
trusted library allocation
page read and write
2E381006000
trusted library allocation
page read and write
29B90F80000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
22AD9169000
trusted library allocation
page read and write
7DF4344C0000
trusted library allocation
page execute and read and write
29B913E8000
trusted library allocation
page read and write
29BA98D1000
heap
page read and write
2E3FACE0000
heap
page read and write
1E6D7B42000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1E6DAA38000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BA9D000
trusted library allocation
page read and write
842000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
82D000
heap
page read and write
7FFD9BA9F000
trusted library allocation
page read and write
22AD8F84000
trusted library allocation
page read and write
7DF4CDB90000
trusted library allocation
page execute and read and write
6EC000
heap
page read and write
29BA14B7000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
22AD9752000
trusted library allocation
page read and write
2E380BFB000
trusted library allocation
page read and write
1902000
heap
page read and write
8BF000
heap
page read and write
29B8F59B000
heap
page read and write
22AD63F0000
trusted library section
page read and write
8BA000
heap
page read and write
88BA74C000
stack
page read and write
1E6D7AD0000
trusted library section
page read and write
29BA14B5000
trusted library allocation
page read and write
1BA3A000
stack
page read and write
E4D4D6E000
stack
page read and write
2E3FB47A000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1B2A5000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
2E380F6F000
trusted library allocation
page read and write
7D0000
heap
page read and write
2E3FB38B000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
2E390031000
trusted library allocation
page read and write
22AD62CB000
heap
page read and write
1B960000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
22AE81AD000
trusted library allocation
page read and write
1702000
heap
page read and write
8BC000
heap
page read and write
7FFD9BA7C000
trusted library allocation
page read and write
88B9AFE000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
600000
heap
page read and write
3F0000
heap
page read and write
88B94FE000
stack
page read and write
1B935000
stack
page read and write
1370000
trusted library allocation
page read and write
732000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
22AD6293000
heap
page read and write
88B957E000
stack
page read and write
C76EF79000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
29BA98EC000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
29BA150C000
trusted library allocation
page read and write
22AF0507000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
22AF0503000
heap
page read and write
2EDF000
stack
page read and write
22AF0535000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
22AD6525000
heap
page read and write
22AD9646000
trusted library allocation
page read and write
1E6E9BC4000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page read and write
3D0000
heap
page read and write
22AD8912000
trusted library allocation
page read and write
1253000
heap
page read and write
22AD9021000
trusted library allocation
page read and write
22AF0330000
heap
page execute and read and write
C76FE0E000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
2E3F92E0000
heap
page readonly
2E3811E2000
trusted library allocation
page read and write
1B802000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
123A000
heap
page read and write
1502000
heap
page read and write
22AD8E63000
trusted library allocation
page read and write
1E6F1D60000
heap
page read and write
22AD62C1000
heap
page read and write
1C4FE000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
1046000
heap
page read and write
1E6DA41B000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
2E390010000
trusted library allocation
page read and write
12661000
trusted library allocation
page read and write
29B911C1000
trusted library allocation
page read and write
D02000
heap
page read and write
329F000
stack
page read and write
7FFD9B974000
trusted library allocation
page read and write
1C5FE000
stack
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
2E3F92C0000
trusted library allocation
page read and write
29B8F770000
trusted library section
page read and write
2E381951000
trusted library allocation
page read and write
2E3FB116000
heap
page execute and read and write
1E6DABE9000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
22AD62BD000
heap
page read and write
29B921C6000
trusted library allocation
page read and write
22AF04DB000
heap
page read and write
7FFD9BB02000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2E3F9090000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
2E3F90F8000
heap
page read and write
1B71D000
stack
page read and write
22AD9249000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
29B911A0000
trusted library allocation
page read and write
2E3F9030000
heap
page read and write
2E380D7B000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
22AE7EE1000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1E6DA798000
trusted library allocation
page read and write
1E6DB603000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9BA51000
trusted library allocation
page read and write
1E6D7B4C000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
2AE6000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
C76ED79000
stack
page read and write
2E3FB171000
heap
page read and write
A27D2FB000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
29B92371000
trusted library allocation
page read and write
784000
heap
page read and write
813000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
29BA990F000
heap
page read and write
2E3FB1BC000
heap
page read and write
1E6D7B00000
heap
page read and write
29BA1230000
trusted library allocation
page read and write
1E6DA46E000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
22AF0257000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1E6DA720000
trusted library allocation
page read and write
BC0000
heap
page read and write
2E3FB520000
trusted library allocation
page read and write
E4D533F000
stack
page read and write
1B6A0000
heap
page read and write
7FFD9BBD2000
trusted library allocation
page read and write
2E381869000
trusted library allocation
page read and write
E4D628D000
stack
page read and write
2E3FB174000
heap
page read and write
C76F3BB000
stack
page read and write
1E6D7A30000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
C76F037000
stack
page read and write
7DF4BF540000
trusted library allocation
page execute and read and write
1E6E9B25000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
29B8F5A1000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
1B5FF000
stack
page read and write
1E6F1D36000
heap
page execute and read and write
1E6DB08E000
trusted library allocation
page read and write
88BA54E000
stack
page read and write
2E38121B000
trusted library allocation
page read and write
145D000
heap
page read and write
18FF000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
2E3FACA0000
heap
page execute and read and write
7A2000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
BD0000
heap
page read and write
E4D6209000
stack
page read and write
7FFD9BC0B000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1E6DA9FF000
trusted library allocation
page read and write
2E380BFF000
trusted library allocation
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1452000
heap
page read and write
C76F1BF000
stack
page read and write
1E6D9810000
heap
page read and write
29BA11C1000
trusted library allocation
page read and write
C76EFBE000
stack
page read and write
1B35E000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1D0FE000
stack
page read and write
847000
heap
page read and write
7FFD9B94A000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
2E3FB214000
heap
page read and write
9C0000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
29B92159000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
2E3FB489000
heap
page read and write
1B6D0000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1E6DB0B5000
trusted library allocation
page read and write
132A8000
trusted library allocation
page read and write
29B92258000
trusted library allocation
page read and write
22AF05F1000
heap
page read and write
1E6E9B07000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
A27CE77000
stack
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
22AE81B7000
trusted library allocation
page read and write
2E3F92F0000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2E3810F7000
trusted library allocation
page read and write
E4D527D000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1E6E9B0B000
trusted library allocation
page read and write
1022000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2B59EBF5000
heap
page read and write
1BCFE000
stack
page read and write
29B924A0000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
22AD7E20000
heap
page read and write
122E000
heap
page read and write
1B990000
heap
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
29BA9A28000
heap
page read and write
1E6DA790000
trusted library allocation
page read and write
FE1000
stack
page read and write
2721000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
2E3902F7000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1E6F1B7C000
heap
page read and write
1BAFE000
stack
page read and write
29BA9917000
heap
page read and write
A27CCFE000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1E6DB04F000
trusted library allocation
page read and write
1240000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2E3FB46E000
heap
page read and write
29B90FB0000
trusted library allocation
page read and write
878000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
BFE000
stack
page read and write
1E6F1B60000
heap
page read and write
1E6D7B44000
heap
page read and write
88B99FE000
stack
page read and write
7FFD9BBEA000
trusted library allocation
page read and write
88B9876000
stack
page read and write
1E6DB628000
trusted library allocation
page read and write
11A0000
heap
page read and write
1E6F1D87000
heap
page read and write
22AD80E8000
trusted library allocation
page read and write
29BA11E1000
trusted library allocation
page read and write
7FFD9BAFA000
trusted library allocation
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9BAF2000
trusted library allocation
page read and write
2E3F92D5000
heap
page read and write
C76FF8E000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
6C6000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
2E3FB220000
heap
page read and write
32B1000
trusted library allocation
page read and write
29B911B0000
heap
page read and write
29BA98A0000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
88B9978000
stack
page read and write
88B91EF000
stack
page read and write
29B90F70000
heap
page readonly
6CC000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
9F0000
heap
page execute and read and write
22AF0640000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
1E6D7CD0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
29BA965A000
heap
page read and write
1439000
heap
page read and write
88B9A7E000
stack
page read and write
29BA98E5000
heap
page read and write
29BA9684000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
A27CFF8000
stack
page read and write
852000
heap
page read and write
22AD6430000
heap
page readonly
2E3FB43D000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1E6D7B87000
heap
page read and write
A27DFCE000
stack
page read and write
A25000
heap
page read and write
22AE7EF1000
trusted library allocation
page read and write
1000000
heap
page read and write
29B8F560000
heap
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
29B8F520000
heap
page read and write
2B59EB70000
heap
page read and write
2E3FB320000
heap
page read and write
E4D4CE2000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2E3902E8000
trusted library allocation
page read and write
2DD0000
heap
page execute and read and write
88B97F9000
stack
page read and write
2E3FB165000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B771000
trusted library allocation
page read and write
88BA7CE000
stack
page read and write
1B7DE000
stack
page read and write
29B8F59F000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
E4D618E000
stack
page read and write
29B9123A000
trusted library allocation
page read and write
29B90F30000
trusted library section
page read and write
2EEF000
trusted library allocation
page read and write
1457000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2E3813CB000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FF462360000
trusted library allocation
page execute and read and write
29BA98DE000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
22AD8EC6000
trusted library allocation
page read and write
2E381031000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1E6F1BEF000
heap
page read and write
2E3F90F0000
heap
page read and write
E4D56BB000
stack
page read and write
C76F138000
stack
page read and write
7DF4B1820000
trusted library allocation
page execute and read and write
1302000
heap
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
A27DD4C000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
2E380001000
trusted library allocation
page read and write
1BC6E000
stack
page read and write
1220000
heap
page read and write
1E6D7DC5000
heap
page read and write
29BA98F0000
heap
page read and write
1B0CE000
stack
page read and write
7FFD9B952000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
839000
heap
page read and write
E4D55BE000
stack
page read and write
2E3902F5000
trusted library allocation
page read and write
29BA991F000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
22AF03D0000
heap
page read and write
13A0000
heap
page read and write
2E381784000
trusted library allocation
page read and write
2E380DF1000
trusted library allocation
page read and write
2E3FACC0000
heap
page execute and read and write
2651000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
2E381E22000
trusted library allocation
page read and write
2E39006F000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1B4FE000
stack
page read and write
1E6DA430000
trusted library allocation
page read and write
2E381312000
trusted library allocation
page read and write
1E6DA79C000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
13FF000
stack
page read and write
2E3F9050000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
2E3FB3CC000
heap
page read and write
1B6FE000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
319F000
stack
page read and write
2B59EC37000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
10D3000
heap
page read and write
29BA14A9000
trusted library allocation
page read and write
1213000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2E3F90B0000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
143D000
heap
page read and write
29B90F40000
trusted library allocation
page read and write
29B8F780000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
29BA97D7000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
1247000
heap
page read and write
88BA5CC000
stack
page read and write
88B9B7B000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
BE0000
heap
page read and write
7DF4344B0000
trusted library allocation
page execute and read and write
2E3FB1E7000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
266000
unkown
page readonly
2E3F90F6000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
29B92FEA000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2E3FB120000
heap
page read and write
AE0000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
A27CC7E000
stack
page read and write
1E6D7D60000
trusted library allocation
page read and write
29B91120000
heap
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
1E6F1E40000
heap
page read and write
1E6D7AC0000
trusted library section
page read and write
1B2DE000
heap
page read and write
7DF4B1810000
trusted library allocation
page execute and read and write
A27CEFD000
stack
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
29B92946000
trusted library allocation
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
32AF000
trusted library allocation
page read and write
1488000
heap
page read and write
29BA91CB000
heap
page read and write
1E6DA945000
trusted library allocation
page read and write
29BA9913000
heap
page read and write
1E6D9821000
trusted library allocation
page read and write
2E390021000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page execute and read and write
132A1000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
2E38007B000
trusted library allocation
page read and write
22AD7EC1000
trusted library allocation
page read and write
1A9D2000
heap
page read and write
1BDFE000
stack
page read and write
E4D563E000
stack
page read and write
1E6F1FBB000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7DF4CDB80000
trusted library allocation
page execute and read and write
29B9168D000
trusted library allocation
page read and write
22AD6520000
heap
page read and write
83D000
heap
page read and write
12713000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1160000
heap
page read and write
264E000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1E6D7B48000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
13C0000
heap
page read and write
1E6D9650000
heap
page execute and read and write
C76FE89000
stack
page read and write
25C0000
trusted library allocation
page read and write
7FFD9BA78000
trusted library allocation
page read and write
1E6D98A7000
trusted library allocation
page read and write
22AF04B0000
heap
page read and write
2EE1000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1E6D9A49000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
124C000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
1E6D7A60000
heap
page read and write
1BC02000
heap
page read and write
1E6D7B5E000
heap
page read and write
690000
trusted library allocation
page read and write
12651000
trusted library allocation
page read and write
2E381E02000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
A27DF4D000
stack
page read and write
7DF4BF530000
trusted library allocation
page execute and read and write
1E6DA273000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
22AD6420000
trusted library allocation
page read and write
22AD9CC5000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
25E0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
88B98FA000
stack
page read and write
29BA9796000
heap
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
2E39029E000
trusted library allocation
page read and write
DD0000
unkown
page readonly
7FFD9B990000
trusted library allocation
page read and write
1E6D7B3D000
heap
page read and write
1E6F2210000
heap
page read and write
29B8F510000
heap
page read and write
2E3902EF000
trusted library allocation
page read and write
7FFD9B94A000
trusted library allocation
page read and write
1E6D9690000
heap
page read and write
1051000
heap
page read and write
29BA991B000
heap
page read and write
142D000
heap
page read and write
2B59EBF0000
heap
page read and write
29B8F750000
heap
page read and write
A27CD79000
stack
page read and write
C76EE77000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2E380229000
trusted library allocation
page read and write
29B92470000
trusted library allocation
page read and write
640000
heap
page read and write
1B1FE000
stack
page read and write
22AD7F47000
trusted library allocation
page read and write
88B96F7000
stack
page read and write
1E6DB648000
trusted library allocation
page read and write
2E380C57000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
10BD000
heap
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
1E6D7A40000
heap
page read and write
993000
trusted library allocation
page read and write
1B259000
heap
page read and write
A27DECD000
stack
page read and write
1402000
heap
page read and write
29B91010000
heap
page read and write
29BA9C20000
heap
page read and write
C76EEFD000
stack
page read and write
29B8F653000
heap
page read and write
2E3810C3000
trusted library allocation
page read and write
7FFD9BB63000
trusted library allocation
page read and write
29BA9660000
heap
page read and write
15F0000
heap
page execute and read and write
7FFD9BBB0000
trusted library allocation
page read and write
89A000
heap
page read and write
C76F33E000
stack
page read and write
2E3812DE000
trusted library allocation
page read and write
1B060000
heap
page read and write
7FFD9BADA000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
1E6D7AE0000
trusted library allocation
page read and write
A27CDFE000
stack
page read and write
1BCA0000
heap
page read and write
8AB000
heap
page read and write
1E6F1D71000
heap
page read and write
7FFD9B972000
trusted library allocation
page read and write
A27C9CE000
stack
page read and write
1400000
heap
page read and write
2E3FAB30000
trusted library allocation
page read and write
1E6DA78C000
trusted library allocation
page read and write
29B8F5E3000
heap
page read and write
1BFFE000
stack
page read and write
22AD972C000
trusted library allocation
page read and write
C76E963000
stack
page read and write
1BEFE000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1BB5F000
stack
page read and write
270F000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
73C000
heap
page read and write
1220000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
29BA9A05000
heap
page read and write
2E38112A000
trusted library allocation
page read and write
22AD838D000
trusted library allocation
page read and write
29BA9610000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7DF4CDB70000
trusted library allocation
page execute and read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
6E5000
heap
page read and write
29BA97C0000
heap
page read and write
2E3F9020000
heap
page read and write
1E6DA7A1000
trusted library allocation
page read and write
C76F0BB000
stack
page read and write
14AF000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2600000
heap
page execute and read and write
1B01D000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2E3804CD000
trusted library allocation
page read and write
1E6DA8B6000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
22AF05AB000
heap
page read and write
29B8F540000
heap
page read and write
2EEC000
trusted library allocation
page read and write
250000
unkown
page readonly
1E6D7B12000
heap
page read and write
29B90F60000
trusted library allocation
page read and write
1E6DAACB000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
2E3FB48F000
heap
page read and write
2E3818F2000
trusted library allocation
page read and write
1E6DB64D000
trusted library allocation
page read and write
6F5000
heap
page read and write
22AD7DF0000
heap
page execute and read and write
22AD6280000
heap
page read and write
10AF000
heap
page read and write
22AD8FE6000
trusted library allocation
page read and write
2E3F9350000
heap
page read and write
22AD9813000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
2E3F9139000
heap
page read and write
BA0000
heap
page read and write
12711000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
A20000
heap
page read and write
22AF04F7000
heap
page read and write
1E6F1F7D000
heap
page read and write
1043000
heap
page read and write
22AF04B8000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
12CA000
heap
page read and write
C76EC7E000
stack
page read and write
1E6D7B8A000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
EF4ADBE000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
A27DDCE000
stack
page read and write
1E6DA980000
trusted library allocation
page read and write
22AF02BB000
heap
page read and write
1200000
heap
page read and write
2E3FB425000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
88B947E000
stack
page read and write
22AD8DB5000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
29B8F5BB000
heap
page read and write
2E3F90EC000
heap
page read and write
2E3FB1FA000
heap
page read and write
2E3FB47E000
heap
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
13B0000
heap
page execute and read and write
1E6D7AA0000
heap
page read and write
22AF0200000
heap
page read and write
2DC0000
heap
page read and write
128A000
heap
page read and write
1E6DAB2C000
trusted library allocation
page read and write
1B3FE000
stack
page read and write
29B8F567000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
EF1000
stack
page read and write
A27D27E000
stack
page read and write
E4D630E000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
12AF000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B876000
trusted library allocation
page execute and read and write
12718000
trusted library allocation
page read and write
123F000
heap
page read and write
2E3FB34F000
heap
page read and write
29B91140000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1C002000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
E4D553F000
stack
page read and write
1E6D7CE0000
heap
page readonly
1013000
heap
page read and write
2E3FB15D000
heap
page read and write
29B922E8000
trusted library allocation
page read and write
7E0000
heap
page read and write
29BA11F1000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
29BA14C7000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
88B967E000
stack
page read and write
1038000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1422000
heap
page read and write
2E3FB6F0000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
2E3FB461000
heap
page read and write
25F0000
heap
page read and write
1E6D7B08000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1B200000
heap
page read and write
1502000
heap
page read and write
22AD8C34000
trusted library allocation
page read and write
1A680000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
29B91F32000
trusted library allocation
page read and write
22AD8F58000
trusted library allocation
page read and write
1E6F1BC3000
heap
page read and write
2B59EB80000
heap
page read and write
88B91A3000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9BAF2000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1413000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
2E3F9134000
heap
page read and write
88B95F9000
stack
page read and write
EF4AD3E000
unkown
page read and write
C76ECFE000
stack
page read and write
29BA9634000
heap
page read and write
22AF0548000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
E4D54B9000
stack
page read and write
6F1000
stack
page read and write
E4D608F000
stack
page read and write
29BA9949000
heap
page read and write
1227000
heap
page read and write
1E6D7B40000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
7FFD9BB9E000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2E3FAB77000
heap
page read and write
29B92284000
trusted library allocation
page read and write
1E6D96AC000
heap
page read and write
29B8F5E8000
heap
page read and write
2E381DDD000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
88B977D000
stack
page read and write
22AD8AAA000
trusted library allocation
page read and write
22AD6380000
heap
page read and write
22AD62BF000
heap
page read and write
29B92A2B000
trusted library allocation
page read and write
2B59EC30000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1AB8D000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1E6DB643000
trusted library allocation
page read and write
2E3FB240000
heap
page read and write
29B8F646000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
701000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
131A1000
trusted library allocation
page read and write
7FFD9BAF5000
trusted library allocation
page read and write
1E6D9695000
heap
page read and write
1E6D7CF0000
trusted library allocation
page read and write
22AF0870000
heap
page read and write
11E0000
trusted library allocation
page read and write
22AD64B0000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1E6E9B15000
trusted library allocation
page read and write
131A8000
trusted library allocation
page read and write
1BFAE000
stack
page read and write
22AF0300000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
9C3000
heap
page read and write
103C000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
29BA9A3F000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
22AD9CA0000
trusted library allocation
page read and write
1180000
heap
page read and write
29B92FC5000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1BFFE000
stack
page read and write
22AD6305000
heap
page read and write
1E6E9851000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1ABDC000
stack
page read and write
1E6F1F18000
heap
page read and write
E4D4DED000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
22AD7EB5000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
7FFD9BB14000
trusted library allocation
page read and write
2E3FB478000
heap
page read and write
1E6DB176000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
29BA98D6000
heap
page read and write
22AF0606000
heap
page read and write
1E6DAFA9000
trusted library allocation
page read and write
14AD000
heap
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
704000
heap
page read and write
29BA9790000
heap
page execute and read and write
2E3F90B8000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
1E6F1F9B000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
There are 1086 hidden memdumps, click here to show them.