IOC Report
FATALITY_CLIENT.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
FATALITY_CLIENT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\svhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_254j3c14.u34.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2oyf243e.gnm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3knz4fib.cdn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bubawrm.wqx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_afrwojb4.hjf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ch0gk3ic.cfq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_crr1uwi0.gwu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2o5em0p.ba4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fj1gbjkz.4ha.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gzcod2jt.rxo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hff2zknl.knn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhbe0ruh.xmo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jz314yw1.fmi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mltquqzo.2tr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qljuaqrr.phs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3vhm1hb.r02.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Mar 26 16:51:15 2025, mtime=Wed Mar 26 16:51:15 2025, atime=Wed Mar 26 16:51:15 2025, length=72704, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FATALITY_CLIENT.exe
"C:\Users\user\Desktop\FATALITY_CLIENT.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\FATALITY_CLIENT.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FATALITY_CLIENT.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\svhost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svhost.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svhost" /tr "C:\Users\user\svhost.exe"
malicious
C:\Users\user\svhost.exe
C:\Users\user\svhost.exe
malicious
C:\Users\user\svhost.exe
"C:\Users\user\svhost.exe"
malicious
C:\Users\user\svhost.exe
"C:\Users\user\svhost.exe"
malicious
C:\Users\user\svhost.exe
C:\Users\user\svhost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
points-detect.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.coj
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.coy-k
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.microsoft.c
unknown
http://www.microsoft.coW
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.mi
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
points-detect.gl.at.ply.gg
147.185.221.18
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
147.185.221.18
points-detect.gl.at.ply.gg
United States
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FATALITY_CLIENT_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svhost
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
5A2000
unkown
page readonly
malicious
285A000
trusted library allocation
page read and write
malicious
2811000
trusted library allocation
page read and write
malicious
6930ABE000
stack
page read and write
B561179000
stack
page read and write
18A95E37000
trusted library allocation
page read and write
C5E000
stack
page read and write
1C230000
heap
page read and write
1BB90000
heap
page read and write
18A92E36000
heap
page read and write
23E2FEC5000
heap
page read and write
7FF88B168000
trusted library allocation
page read and write
7FF88B220000
trusted library allocation
page read and write
16415BC0000
trusted library allocation
page read and write
ACE000
heap
page read and write
7FF88AEC0000
trusted library allocation
page read and write
13AB000
heap
page read and write
7FF88B240000
trusted library allocation
page read and write
18AACE31000
heap
page read and write
1400000
trusted library allocation
page read and write
18AAD072000
heap
page read and write
DBCAD7D000
stack
page read and write
16427731000
trusted library allocation
page read and write
23E32F91000
trusted library allocation
page read and write
7FF88B17C000
trusted library allocation
page read and write
1B30F000
stack
page read and write
7FF88AE14000
trusted library allocation
page read and write
1642FE0A000
heap
page read and write
1642779D000
trusted library allocation
page read and write
BD6000
heap
page read and write
1CC0B38B000
trusted library allocation
page read and write
16427740000
trusted library allocation
page read and write
18AA4D74000
trusted library allocation
page read and write
1CC22CBB000
heap
page read and write
7FF88AFBA000
trusted library allocation
page read and write
7FF88AF20000
trusted library allocation
page execute and read and write
1CC22C25000
heap
page read and write
7FF88AFBA000
trusted library allocation
page read and write
DBCA7E3000
stack
page read and write
18A95788000
trusted library allocation
page read and write
7FF88B1D0000
trusted library allocation
page read and write
7FF88B134000
trusted library allocation
page read and write
1CC0C5C1000
trusted library allocation
page read and write
18AA4ADC000
trusted library allocation
page read and write
7FF88B210000
trusted library allocation
page read and write
DBCBC0C000
stack
page read and write
1B5AE000
stack
page read and write
23E2FD21000
heap
page read and write
23E41EBD000
trusted library allocation
page read and write
23E41BD1000
trusted library allocation
page read and write
23E49F20000
heap
page read and write
ACC000
heap
page read and write
DBCBB8E000
stack
page read and write
18A95D1C000
trusted library allocation
page read and write
16415BF0000
trusted library allocation
page read and write
23E32807000
trusted library allocation
page read and write
1CC1A811000
trusted library allocation
page read and write
13873C70000
heap
page read and write
7FF88AE0D000
trusted library allocation
page execute and read and write
7FF88AE6C000
trusted library allocation
page execute and read and write
1CC0BAA9000
trusted library allocation
page read and write
7FF88B010000
trusted library allocation
page read and write
7FF88AEF6000
trusted library allocation
page execute and read and write
13E0000
trusted library allocation
page read and write
1CC1A7C1000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FF88B0B0000
trusted library allocation
page read and write
1265000
heap
page read and write
1642FE39000
heap
page read and write
7FF88B230000
trusted library allocation
page execute and read and write
7FF88B162000
trusted library allocation
page read and write
18AA4AA1000
trusted library allocation
page read and write
36FF000
trusted library allocation
page read and write
1CC22ED1000
heap
page read and write
294C000
trusted library allocation
page read and write
7FF88B0F0000
trusted library allocation
page read and write
7FF88AFE4000
trusted library allocation
page read and write
1B79D000
heap
page read and write
7FF88B178000
trusted library allocation
page read and write
AF1000
stack
page read and write
FE8000
heap
page read and write
7FF88B160000
trusted library allocation
page read and write
7FF88B220000
trusted library allocation
page read and write
23E2FC60000
trusted library allocation
page read and write
23E49F73000
heap
page read and write
1026000
heap
page read and write
18AACF90000
heap
page read and write
8F1000
stack
page read and write
A40000
heap
page read and write
146F000
stack
page read and write
DBCAB7E000
stack
page read and write
7FF88B1E0000
trusted library allocation
page read and write
14C9000
heap
page read and write
23E31DF9000
trusted library allocation
page read and write
290F000
stack
page read and write
1CC08F70000
heap
page read and write
1CC08C9E000
heap
page read and write
18A9570C000
trusted library allocation
page read and write
7FF88AE10000
trusted library allocation
page read and write
18A959DE000
trusted library allocation
page read and write
7FF88AE02000
trusted library allocation
page read and write
B60000
heap
page read and write
7FF88AFD0000
trusted library allocation
page execute and read and write
18AACDB0000
heap
page read and write
1CC1AA98000
trusted library allocation
page read and write
23E319D0000
heap
page read and write
7FF88AF80000
trusted library allocation
page read and write
1B4EF000
stack
page read and write
23E2FD01000
heap
page read and write
23E3343A000
trusted library allocation
page read and write
7FF88AED0000
trusted library allocation
page execute and read and write
16418A2C000
trusted library allocation
page read and write
16418854000
trusted library allocation
page read and write
DBCAC7E000
stack
page read and write
1CC22EE1000
heap
page read and write
7FF88B180000
trusted library allocation
page read and write
1B1A0000
heap
page read and write
7FF88AFB2000
trusted library allocation
page read and write
7FF88AFE4000
trusted library allocation
page read and write
C60000
heap
page read and write
7FF88AEE6000
trusted library allocation
page execute and read and write
7DF4BEE70000
trusted library allocation
page execute and read and write
4999038000
stack
page read and write
286F000
trusted library allocation
page read and write
4999E8C000
stack
page read and write
16415A5A000
heap
page read and write
6930473000
stack
page read and write
7FF88B260000
trusted library allocation
page read and write
1641907B000
trusted library allocation
page read and write
DBCB13E000
stack
page read and write
18A95D7D000
trusted library allocation
page read and write
7FF88AE10000
trusted library allocation
page read and write
1B6A5000
stack
page read and write
4998CFE000
stack
page read and write
16418337000
trusted library allocation
page read and write
18AA4A91000
trusted library allocation
page read and write
18A954C4000
trusted library allocation
page read and write
4998A72000
stack
page read and write
7FF88AE1D000
trusted library allocation
page execute and read and write
7FF88B010000
trusted library allocation
page read and write
7FF88AE0D000
trusted library allocation
page execute and read and write
18A94A71000
trusted library allocation
page read and write
18A92DD0000
heap
page read and write
1CC08BC0000
heap
page read and write
18A92DE0000
trusted library section
page read and write
4999E0E000
stack
page read and write
1CC08E10000
trusted library section
page read and write
AD6000
heap
page read and write
7FF88B170000
trusted library allocation
page read and write
1154F8F000
stack
page read and write
1CC22D80000
heap
page execute and read and write
7FF88B100000
trusted library allocation
page read and write
1641832D000
trusted library allocation
page read and write
7FF88B250000
trusted library allocation
page read and write
7FF88AFB2000
trusted library allocation
page read and write
18AAD1CC000
heap
page read and write
1B74E000
heap
page read and write
7FF88AEC6000
trusted library allocation
page read and write
7FF88B130000
trusted library allocation
page read and write
7FF88AFF0000
trusted library allocation
page execute and read and write
7FF88AFC4000
trusted library allocation
page read and write
7FF88B139000
trusted library allocation
page read and write
B5614BE000
stack
page read and write
1CC22CE5000
heap
page read and write
164189D7000
trusted library allocation
page read and write
1642FA70000
heap
page read and write
DBCB03F000
stack
page read and write
23E41C3F000
trusted library allocation
page read and write
7FF88AFF0000
trusted library allocation
page read and write
6931789000
stack
page read and write
18AACE1F000
heap
page read and write
1CC0B8C3000
trusted library allocation
page read and write
B56230C000
stack
page read and write
23E33519000
trusted library allocation
page read and write
1CC22F0D000
heap
page read and write
7FF88B164000
trusted library allocation
page read and write
B5610FE000
stack
page read and write
B90000
heap
page read and write
1CC2306C000
heap
page read and write
BCB000
heap
page read and write
FC0000
heap
page read and write
18AAD080000
heap
page read and write
1B2AA000
stack
page read and write
140F000
heap
page read and write
1C840000
heap
page read and write
7FF88B0B0000
trusted library allocation
page read and write
693067A000
stack
page read and write
7FF88B0D0000
trusted library allocation
page read and write
1642FD03000
heap
page read and write
7FF88B120000
trusted library allocation
page read and write
7FF88B233000
trusted library allocation
page read and write
7FF88AE0D000
trusted library allocation
page execute and read and write
18AA4A71000
trusted library allocation
page read and write
7FF88AE96000
trusted library allocation
page read and write
7FF88B160000
trusted library allocation
page read and write
7DF413250000
trusted library allocation
page execute and read and write
13873E85000
heap
page read and write
7FF88AE1D000
trusted library allocation
page execute and read and write
23E31840000
heap
page read and write
164177AA000
trusted library allocation
page read and write
23E2FEC0000
heap
page read and write
7FF88B0D0000
trusted library allocation
page read and write
7FF88B290000
trusted library allocation
page read and write
23E32BD4000
trusted library allocation
page read and write
7FF88B230000
trusted library allocation
page read and write
1CC08EA0000
heap
page read and write
16415A57000
heap
page read and write
1CC22D87000
heap
page execute and read and write
499923B000
stack
page read and write
7FF88AE20000
trusted library allocation
page read and write
1650000
heap
page read and write
1CC22F80000
heap
page read and write
7FF88B203000
trusted library allocation
page read and write
7FF88AF20000
trusted library allocation
page execute and read and write
7FF88B020000
trusted library allocation
page read and write
1642FCFF000
heap
page read and write
7FF88B0E0000
trusted library allocation
page read and write
1CC08F00000
heap
page read and write
12941000
trusted library allocation
page read and write
1CC22CAF000
heap
page read and write
1642FB4B000
heap
page read and write
1B8E0000
heap
page read and write
1AECE000
stack
page read and write
23E2FAE0000
heap
page read and write
7FF88B000000
trusted library allocation
page execute and read and write
DBCAF3A000
stack
page read and write
7FF88AFCA000
trusted library allocation
page read and write
1CC0B3A1000
trusted library allocation
page read and write
1642FC70000
heap
page read and write
2E20000
heap
page read and write
7FF88AE00000
trusted library allocation
page read and write
7FF88B0D0000
trusted library allocation
page read and write
18AAD075000
heap
page read and write
4999D89000
stack
page read and write
1CC1A7D1000
trusted library allocation
page read and write
2FAF000
stack
page read and write
23E31860000
heap
page read and write
7FF88B100000
trusted library allocation
page read and write
693180C000
stack
page read and write
7FF88B010000
trusted library allocation
page read and write
18A96872000
trusted library allocation
page read and write
FF0000
heap
page read and write
2930000
heap
page read and write
30CF000
stack
page read and write
F20000
trusted library allocation
page read and write
1BFEA000
stack
page read and write
1642FAB2000
heap
page read and write
1CC1A7A1000
trusted library allocation
page read and write
1A840000
trusted library allocation
page read and write
7FF88ADE4000
trusted library allocation
page read and write
16417680000
heap
page execute and read and write
23E318CB000
heap
page read and write
14DA000
heap
page read and write
7FF88B226000
trusted library allocation
page read and write
FFA000
heap
page read and write
7FF88AEA0000
trusted library allocation
page read and write
16415C70000
heap
page read and write
16415930000
heap
page read and write
1CC0A750000
trusted library allocation
page read and write
23E2FD4E000
heap
page read and write
164159DF000
heap
page read and write
136F8000
trusted library allocation
page read and write
BB0000
heap
page read and write
1C73A000
stack
page read and write
18A92FE0000
trusted library section
page read and write
7FF88B110000
trusted library allocation
page read and write
312C000
trusted library allocation
page read and write
1642FB1F000
heap
page read and write
B56210D000
stack
page read and write
7FF88B0F0000
trusted library allocation
page read and write
BD8000
heap
page read and write
28C1000
trusted library allocation
page read and write
7FF88AE30000
trusted library allocation
page read and write
DBCB1BB000
stack
page read and write
7FF88AFD0000
trusted library allocation
page execute and read and write
280F000
stack
page read and write
1CC0C007000
trusted library allocation
page read and write
23E319C7000
heap
page execute and read and write
1BE3F000
stack
page read and write
23E2FC80000
trusted library allocation
page read and write
1BD9F000
stack
page read and write
7FF88B190000
trusted library allocation
page read and write
1CC22CB3000
heap
page read and write
164F000
stack
page read and write
7FF88AF00000
trusted library allocation
page execute and read and write
1B3E0000
heap
page read and write
7FF88B133000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
1CC22FFB000
heap
page read and write
7FF88B280000
trusted library allocation
page read and write
DBCBE0D000
stack
page read and write
18AA4D5A000
trusted library allocation
page read and write
DBCADF9000
stack
page read and write
7FF88AE04000
trusted library allocation
page read and write
B56228D000
stack
page read and write
4998AFF000
stack
page read and write
1BCED000
stack
page read and write
FB0000
unkown
page readonly
134C000
heap
page read and write
23E4A030000
heap
page read and write
1CC22CA7000
heap
page read and write
FC5000
heap
page read and write
23E32624000
trusted library allocation
page read and write
7FF88B050000
trusted library allocation
page read and write
23E33461000
trusted library allocation
page read and write
13E9000
heap
page read and write
7FF88B0A0000
trusted library allocation
page read and write
69306FE000
stack
page read and write
23E33522000
trusted library allocation
page read and write
6930BBE000
stack
page read and write
1CC0C02E000
trusted library allocation
page read and write
1B5EF000
stack
page read and write
13121000
trusted library allocation
page read and write
1CC23068000
heap
page read and write
23E41BF1000
trusted library allocation
page read and write
1C83E000
stack
page read and write
AA3000
heap
page read and write
23E32C8C000
trusted library allocation
page read and write
7FF88AE12000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
16415BA0000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
7FF88B200000
trusted library allocation
page read and write
18AAD3E0000
heap
page read and write
7FF88B100000
trusted library allocation
page read and write
7FF88AE13000
trusted library allocation
page execute and read and write
23E327D9000
trusted library allocation
page read and write
7FF88AED0000
trusted library allocation
page execute and read and write
7FF88AE21000
trusted library allocation
page read and write
18AACEF7000
heap
page execute and read and write
18A94A20000
heap
page execute and read and write
F05000
heap
page read and write
18A95C4D000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
18A93135000
heap
page read and write
6930C3C000
stack
page read and write
18A95C86000
trusted library allocation
page read and write
1B130000
heap
page execute and read and write
4998F38000
stack
page read and write
1CC08C8A000
heap
page read and write
136F000
stack
page read and write
1CC08E70000
trusted library allocation
page read and write
DBCBD89000
stack
page read and write
1CB3C000
stack
page read and write
B560FFE000
stack
page read and write
7FF88B070000
trusted library allocation
page read and write
23E32ED6000
trusted library allocation
page read and write
18A959D9000
trusted library allocation
page read and write
7FF88B260000
trusted library allocation
page read and write
16418183000
trusted library allocation
page read and write
7FF88B050000
trusted library allocation
page read and write
B560E73000
stack
page read and write
1BBAE000
stack
page read and write
23E41C01000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FF88B110000
trusted library allocation
page read and write
1860000
trusted library allocation
page read and write
23E2FCD2000
heap
page read and write
13018000
trusted library allocation
page read and write
18A957FA000
trusted library allocation
page read and write
23E2FD05000
heap
page read and write
1642FE00000
heap
page read and write
1CC0C57C000
trusted library allocation
page read and write
1AD9C000
stack
page read and write
1B6AE000
stack
page read and write
18A92DF0000
heap
page read and write
DBCB0BF000
stack
page read and write
7FF88AF82000
trusted library allocation
page read and write
16418FBA000
trusted library allocation
page read and write
7FF88B160000
trusted library allocation
page read and write
16418739000
trusted library allocation
page read and write
7FF88AE30000
trusted library allocation
page read and write
7FF88AE3C000
trusted library allocation
page execute and read and write
23E2FCE2000
heap
page read and write
7FF88B240000
trusted library allocation
page read and write
1CC1AA8E000
trusted library allocation
page read and write
13123000
trusted library allocation
page read and write
7FF88B060000
trusted library allocation
page read and write
18A959EA000
trusted library allocation
page read and write
16415900000
heap
page read and write
164176B0000
trusted library allocation
page read and write
693168C000
stack
page read and write
7FF88B080000
trusted library allocation
page read and write
4998FBA000
stack
page read and write
1CC0BF22000
trusted library allocation
page read and write
7FF88AED6000
trusted library allocation
page execute and read and write
18A95CC4000
trusted library allocation
page read and write
1CC0A790000
heap
page execute and read and write
7FF88B070000
trusted library allocation
page read and write
1AC0000
heap
page read and write
D70000
heap
page read and write
18A959F7000
trusted library allocation
page read and write
7FF88AFE2000
trusted library allocation
page read and write
DBCABF9000
stack
page read and write
B80000
trusted library allocation
page read and write
499913E000
stack
page read and write
1CC3C000
stack
page read and write
7FF88B101000
trusted library allocation
page read and write
18AA4D5C000
trusted library allocation
page read and write
1CC0A7A1000
trusted library allocation
page read and write
7FF88B0C7000
trusted library allocation
page read and write
23E318A8000
heap
page read and write
7FF88AE04000
trusted library allocation
page read and write
BED000
heap
page read and write
7FF88AFA2000
trusted library allocation
page read and write
13011000
trusted library allocation
page read and write
7FF88B142000
trusted library allocation
page read and write
1CC08E60000
heap
page readonly
69308BE000
stack
page read and write
7FF88AE20000
trusted library allocation
page read and write
16417432000
heap
page read and write
1CC22CE9000
heap
page read and write
23E318AC000
heap
page read and write
18AACEF0000
heap
page execute and read and write
14C6000
heap
page read and write
7FF88AF30000
trusted library allocation
page execute and read and write
23E339AE000
trusted library allocation
page read and write
4998EBE000
stack
page read and write
1BD3E000
stack
page read and write
F60000
heap
page read and write
1154E89000
stack
page read and write
16415C85000
heap
page read and write
FF0000
heap
page execute and read and write
1642FABB000
heap
page read and write
1CC0A9C9000
trusted library allocation
page read and write
B560EFE000
stack
page read and write
A60000
heap
page read and write
1311000
stack
page read and write
7FF88AFB0000
trusted library allocation
page read and write
2700000
heap
page read and write
18AAD178000
heap
page read and write
16417720000
heap
page execute and read and write
7FF88AE6C000
trusted library allocation
page execute and read and write
1B3A0000
heap
page execute and read and write
7FF88B250000
trusted library allocation
page read and write
1642FCF7000
heap
page read and write
1670000
heap
page read and write
23E31970000
trusted library allocation
page read and write
B56208E000
stack
page read and write
18A92D70000
heap
page read and write
4998D77000
stack
page read and write
1642FCDB000
heap
page read and write
7FF88B159000
trusted library allocation
page read and write
23E32CEF000
trusted library allocation
page read and write
1CC08C48000
heap
page read and write
23E3167B000
heap
page read and write
7FF88B000000
trusted library allocation
page read and write
F7F000
stack
page read and write
7FF88AEB6000
trusted library allocation
page read and write
7FF88AE3B000
trusted library allocation
page execute and read and write
18A9668E000
trusted library allocation
page read and write
B5612BE000
stack
page read and write
18AACDC2000
heap
page read and write
23E4A000000
heap
page read and write
7FF88B0D0000
trusted library allocation
page read and write
1C53A000
stack
page read and write
7FF88B165000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
7FF88AE1B000
trusted library allocation
page read and write
18A930A0000
trusted library allocation
page read and write
23E33355000
trusted library allocation
page read and write
7FF88AE23000
trusted library allocation
page read and write
14D1000
heap
page read and write
7FF88AE5C000
trusted library allocation
page execute and read and write
1CC23063000
heap
page read and write
16418AC9000
trusted library allocation
page read and write
1B3AE000
stack
page read and write
14C0000
heap
page read and write
1642FAAF000
heap
page read and write
DBCAFB8000
stack
page read and write
141D000
heap
page read and write
7FF88AE03000
trusted library allocation
page execute and read and write
B560F7E000
stack
page read and write
7FF88B060000
trusted library allocation
page read and write
1642FCD2000
heap
page read and write
7FF88AEB0000
trusted library allocation
page execute and read and write
16427A1B000
trusted library allocation
page read and write
1CC0BA49000
trusted library allocation
page read and write
152C000
heap
page read and write
4998BFE000
stack
page read and write
7FF88AFE8000
trusted library allocation
page read and write
3701000
trusted library allocation
page read and write
7FF88B050000
trusted library allocation
page read and write
18A959E2000
trusted library allocation
page read and write
1381000
heap
page read and write
23E2FCC0000
heap
page read and write
7FF88ADED000
trusted library allocation
page execute and read and write
1346000
heap
page read and write
1C0E8000
stack
page read and write
136A000
heap
page read and write
16427AAB000
trusted library allocation
page read and write
23E4A060000
heap
page read and write
1CC08CC7000
heap
page read and write
7FF88B090000
trusted library allocation
page read and write
18A92E38000
heap
page read and write
A6C000
heap
page read and write
7FF88B150000
trusted library allocation
page read and write
7FF88B0C0000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
7FF88AE6C000
trusted library allocation
page execute and read and write
69309B8000
stack
page read and write
7FF88AFC8000
trusted library allocation
page read and write
1642FAFB000
heap
page read and write
7FF88B090000
trusted library allocation
page read and write
4999D0A000
stack
page read and write
7FF88AE1B000
trusted library allocation
page read and write
23E41EB8000
trusted library allocation
page read and write
7FF88B0F0000
trusted library allocation
page read and write
16415A11000
heap
page read and write
13AD000
heap
page read and write
6930777000
stack
page read and write
BB0000
heap
page read and write
7FF88AF20000
trusted library allocation
page execute and read and write
23E32E74000
trusted library allocation
page read and write
B56163E000
stack
page read and write
7FF88B080000
trusted library allocation
page read and write
23E2FD0D000
heap
page read and write
18A95B33000
trusted library allocation
page read and write
1C540000
heap
page read and write
1BAA0000
heap
page read and write
7FF88B070000
trusted library allocation
page read and write
1CC23054000
heap
page read and write
7C0000
heap
page read and write
16415A13000
heap
page read and write
294F000
trusted library allocation
page read and write
164159D0000
heap
page read and write
23E31865000
heap
page read and write
16427751000
trusted library allocation
page read and write
7FF88AE04000
trusted library allocation
page read and write
1BCE000
stack
page read and write
7FF88AFF2000
trusted library allocation
page read and write
22DE000
stack
page read and write
6930939000
stack
page read and write
164183C1000
trusted library allocation
page read and write
23E319E0000
heap
page read and write
B5615BE000
stack
page read and write
7FF88B16C000
trusted library allocation
page read and write
7FF88ADFD000
trusted library allocation
page execute and read and write
7FF88AE10000
trusted library allocation
page read and write
7FF88B110000
trusted library allocation
page read and write
23E32F0E000
trusted library allocation
page read and write
1642FDD9000
heap
page read and write
7FF88B040000
trusted library allocation
page read and write
7FF88AEB0000
trusted library allocation
page read and write
23E2FD07000
heap
page read and write
7FF88AE20000
trusted library allocation
page read and write
1642FCB6000
heap
page read and write
18A94AF5000
trusted library allocation
page read and write
693057E000
stack
page read and write
136F1000
trusted library allocation
page read and write
18A96897000
trusted library allocation
page read and write
DBCBC8E000
stack
page read and write
23E2FBE0000
heap
page read and write
7FF88B270000
trusted library allocation
page read and write
B562187000
stack
page read and write
7FF88AE2D000
trusted library allocation
page execute and read and write
7FF88B256000
trusted library allocation
page read and write
7FF88B220000
trusted library allocation
page read and write
1CC08BE0000
heap
page read and write
1CC0B399000
trusted library allocation
page read and write
7FF88B20C000
trusted library allocation
page read and write
164184A5000
trusted library allocation
page read and write
1CC08CCA000
heap
page read and write
7FF88AEF6000
trusted library allocation
page execute and read and write
7FF88AE1D000
trusted library allocation
page execute and read and write
7FF88B280000
trusted library allocation
page read and write
18A93020000
heap
page readonly
E7F000
stack
page read and write
23E32C00000
trusted library allocation
page read and write
7FF88AFC2000
trusted library allocation
page read and write
7FF88AEBC000
trusted library allocation
page execute and read and write
7FF88AFC0000
trusted library allocation
page execute and read and write
693188E000
stack
page read and write
1B782000
heap
page read and write
18A94A50000
heap
page execute and read and write
7FF88B1FC000
trusted library allocation
page read and write
18AACE4B000
heap
page read and write
7FF88AECC000
trusted library allocation
page execute and read and write
12943000
trusted library allocation
page read and write
7FF88ADFB000
trusted library allocation
page read and write
7FF88ADF3000
trusted library allocation
page execute and read and write
7FF88AE14000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
16415BB0000
heap
page readonly
16417580000
heap
page read and write
4999F0E000
stack
page read and write
1CC0C5A1000
trusted library allocation
page read and write
16415A2D000
heap
page read and write
23E2FD03000
heap
page read and write
693160E000
stack
page read and write
1CC08C84000
heap
page read and write
7FF88AF92000
trusted library allocation
page read and write
7FF88B200000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
1460000
heap
page execute and read and write
7FF88B160000
trusted library allocation
page read and write
18A92E30000
heap
page read and write
B561439000
stack
page read and write
1CC0C0EF000
trusted library allocation
page read and write
16418F93000
trusted library allocation
page read and write
7FF88AFC0000
trusted library allocation
page execute and read and write
23E319C0000
heap
page execute and read and write
1CC0B1F2000
trusted library allocation
page read and write
1CC08C53000
heap
page read and write
18A95676000
trusted library allocation
page read and write
18A963C1000
trusted library allocation
page read and write
7FF88B110000
trusted library allocation
page read and write
4998E79000
stack
page read and write
1530000
heap
page read and write
3110000
heap
page execute and read and write
7FF88B040000
trusted library allocation
page read and write
2FC0000
heap
page read and write
7FF88B060000
trusted library allocation
page read and write
18A961F4000
trusted library allocation
page read and write
1B776000
heap
page read and write
1CC22DE0000
heap
page read and write
7FF88B280000
trusted library allocation
page read and write
1642FCFB000
heap
page read and write
1CC08C40000
heap
page read and write
13B0000
heap
page read and write
7FF88AE1D000
trusted library allocation
page execute and read and write
7FF88B020000
trusted library allocation
page read and write
F50000
heap
page read and write
23E2FD4B000
heap
page read and write
7FF88AFA0000
trusted library allocation
page read and write
7FF88B130000
trusted library allocation
page read and write
23E49F6D000
heap
page read and write
1060000
heap
page read and write
16417686000
heap
page execute and read and write
23E32DA7000
trusted library allocation
page read and write
18A92E7A000
heap
page read and write
14A8000
heap
page read and write
1CC22C29000
heap
page read and write
1642FD07000
heap
page read and write
215D000
stack
page read and write
7FF88B170000
trusted library allocation
page read and write
107D000
heap
page read and write
7FF88B250000
trusted library allocation
page read and write
16419551000
trusted library allocation
page read and write
7FF88B0A0000
trusted library allocation
page read and write
1CC23000000
heap
page read and write
B56153E000
stack
page read and write
7FF88AECC000
trusted library allocation
page execute and read and write
18A93010000
trusted library allocation
page read and write
1CC0B9B4000
trusted library allocation
page read and write
7FF88B0E5000
trusted library allocation
page read and write
1BC30000
heap
page execute and read and write
18A94A60000
heap
page read and write
7FF88AF30000
trusted library allocation
page execute and read and write
23E2FC20000
heap
page read and write
69304FE000
stack
page read and write
16417650000
heap
page execute and read and write
7DF481810000
trusted library allocation
page execute and read and write
1CC08EA5000
heap
page read and write
18A96300000
trusted library allocation
page read and write
1B6B2000
heap
page read and write
7FF88B060000
trusted library allocation
page read and write
7FF88B1A0000
trusted library allocation
page read and write
23E4A068000
heap
page read and write
7FF88B190000
trusted library allocation
page read and write
23E2FCE8000
heap
page read and write
1CC08F75000
heap
page read and write
16415A1B000
heap
page read and write
7FF88B1F0000
trusted library allocation
page read and write
7FF88AFF0000
trusted library allocation
page execute and read and write
B5613BC000
stack
page read and write
7FF88B0B0000
trusted library allocation
page read and write
18A92E03000
heap
page read and write
23E339F3000
trusted library allocation
page read and write
23E49F83000
heap
page read and write
1885000
heap
page read and write
12811000
trusted library allocation
page read and write
23E31820000
heap
page read and write
23E31916000
heap
page read and write
7FF88AFA2000
trusted library allocation
page read and write
7FF88B030000
trusted library allocation
page read and write
7FF88ADE0000
trusted library allocation
page read and write
18AAD070000
heap
page read and write
18A956AA000
trusted library allocation
page read and write
7FF88AEF6000
trusted library allocation
page execute and read and write
7FF88AEE6000
trusted library allocation
page execute and read and write
23E31815000
heap
page read and write
7FF88AFE0000
trusted library allocation
page execute and read and write
7DF4BEE60000
trusted library allocation
page execute and read and write
7FF88AEC6000
trusted library allocation
page execute and read and write
18A94C98000
trusted library allocation
page read and write
1CC2303E000
heap
page read and write
7FF88AEB6000
trusted library allocation
page read and write
AA0000
heap
page read and write
16418EAE000
trusted library allocation
page read and write
7FF88B14C000
trusted library allocation
page read and write
18AACE02000
heap
page read and write
1B48D000
stack
page read and write
7FF88B1FA000
trusted library allocation
page read and write
1CC22BF0000
heap
page read and write
137F000
heap
page read and write
1CC0B51D000
trusted library allocation
page read and write
693170E000
stack
page read and write
23E2FDF0000
trusted library allocation
page read and write
1BA50000
heap
page execute and read and write
7FF88B148000
trusted library allocation
page read and write
16418765000
trusted library allocation
page read and write
18A92DF8000
heap
page read and write
7FF88AFB0000
trusted library allocation
page execute and read and write
EF1000
stack
page read and write
7FF88B180000
trusted library allocation
page read and write
16418AF3000
trusted library allocation
page read and write
13873D90000
heap
page read and write
7FF88AE20000
trusted library allocation
page read and write
16419507000
trusted library allocation
page read and write
1CC0A828000
trusted library allocation
page read and write
FC0000
heap
page read and write
4998DFD000
stack
page read and write
18AAD1BF000
heap
page read and write
7DF413240000
trusted library allocation
page execute and read and write
7FF88B070000
trusted library allocation
page read and write
18A95B96000
trusted library allocation
page read and write
7FF88AFC0000
trusted library allocation
page execute and read and write
7FF88B270000
trusted library allocation
page read and write
18A92E2E000
heap
page read and write
4998C79000
stack
page read and write
1B8CE000
stack
page read and write
1CC0AC6E000
trusted library allocation
page read and write
7FF88B20E000
trusted library allocation
page read and write
18A95680000
trusted library allocation
page read and write
18A9684D000
trusted library allocation
page read and write
7FF88AFD0000
trusted library allocation
page execute and read and write
7FF88AEC6000
trusted library allocation
page read and write
1CC08C8C000
heap
page read and write
1690000
heap
page read and write
EE0000
trusted library allocation
page read and write
164193E4000
trusted library allocation
page read and write
18A92E4E000
heap
page read and write
1450000
heap
page read and write
1CC08CA1000
heap
page read and write
18AAD125000
heap
page read and write
1695000
heap
page read and write
7FF88AE4C000
trusted library allocation
page execute and read and write
7FF88B250000
trusted library allocation
page read and write
7FF88B16C000
trusted library allocation
page read and write
16417731000
trusted library allocation
page read and write
6930A39000
stack
page read and write
18AAD1A0000
heap
page read and write
18A95671000
trusted library allocation
page read and write
1CC22C70000
heap
page read and write
7FF88AE5C000
trusted library allocation
page execute and read and write
1028000
heap
page read and write
13873E80000
heap
page read and write
164187F0000
trusted library allocation
page read and write
1CC0B3A9000
trusted library allocation
page read and write
940000
heap
page read and write
7FF88AEF6000
trusted library allocation
page execute and read and write
36FC000
trusted library allocation
page read and write
A8B000
heap
page read and write
23E2FD09000
heap
page read and write
1CC0B7A6000
trusted library allocation
page read and write
18AACE4D000
heap
page read and write
23E49F3C000
heap
page read and write
18A94F3D000
trusted library allocation
page read and write
7FF88AF90000
trusted library allocation
page read and write
7FF88B0E0000
trusted library allocation
page read and write
1CC22C97000
heap
page read and write
23E2FCD5000
heap
page read and write
1CC22DB0000
heap
page read and write
7FF88AFB0000
trusted library allocation
page read and write
7FF88B170000
trusted library allocation
page read and write
C65000
heap
page read and write
DBCBD0E000
stack
page read and write
7FF88B0A0000
trusted library allocation
page read and write
7FF88B270000
trusted library allocation
page read and write
23E4A049000
heap
page read and write
12822000
trusted library allocation
page read and write
7FF88B000000
trusted library allocation
page read and write
26C0000
heap
page execute and read and write
7FF88B140000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
49991BE000
stack
page read and write
7FF88AE10000
trusted library allocation
page read and write
B561079000
stack
page read and write
7FF88AEB0000
trusted library allocation
page read and write
13873B90000
heap
page read and write
7FF88B120000
trusted library allocation
page read and write
7FF88AE0D000
trusted library allocation
page execute and read and write
23E31BC0000
heap
page execute and read and write
7FF88AE13000
trusted library allocation
page execute and read and write
23E49F30000
heap
page read and write
1154F0F000
unkown
page read and write
13873D70000
heap
page read and write
18AACE4F000
heap
page read and write
7FF88B133000
trusted library allocation
page read and write
7FF88B0C0000
trusted library allocation
page read and write
23E2FC90000
heap
page readonly
7FF88AEBC000
trusted library allocation
page execute and read and write
1AA0000
heap
page execute and read and write
FC8000
heap
page read and write
7FF88AFB2000
trusted library allocation
page read and write
B65000
heap
page read and write
1CC230C0000
trusted library allocation
page read and write
7FF88B240000
trusted library allocation
page read and write
18AA4D62000
trusted library allocation
page read and write
1085000
heap
page read and write
16417BFD000
trusted library allocation
page read and write
7FF88B169000
trusted library allocation
page read and write
136F3000
trusted library allocation
page read and write
7FF88B090000
trusted library allocation
page read and write
1CC23066000
heap
page read and write
7FF88B16A000
trusted library allocation
page read and write
18A93060000
trusted library allocation
page read and write
7FF88AE9C000
trusted library allocation
page execute and read and write
7FF88AFE2000
trusted library allocation
page read and write
49990BF000
stack
page read and write
FDA000
heap
page read and write
7B0000
heap
page read and write
18A96892000
trusted library allocation
page read and write
7FF88ADE2000
trusted library allocation
page read and write
16415A0C000
heap
page read and write
1BC9E000
stack
page read and write
23E31810000
heap
page read and write
23E4A290000
heap
page read and write
1CC22D60000
heap
page execute and read and write
7FF88ADF4000
trusted library allocation
page read and write
7FF88AFD0000
trusted library allocation
page execute and read and write
1CC0B97B000
trusted library allocation
page read and write
7FF88AE04000
trusted library allocation
page read and write
7FF88B230000
trusted library allocation
page read and write
1CC227A3000
heap
page read and write
7FF88B130000
trusted library allocation
page read and write
DBCBE8E000
stack
page read and write
1CC22CAB000
heap
page read and write
1CC0C5C6000
trusted library allocation
page read and write
7FF88B154000
trusted library allocation
page read and write
7FF88B150000
trusted library allocation
page read and write
1CC23047000
heap
page read and write
7FF88AFD0000
trusted library allocation
page execute and read and write
7FF88AE13000
trusted library allocation
page execute and read and write
23E31C57000
trusted library allocation
page read and write
B00000
heap
page read and write
7FF88AE30000
trusted library allocation
page read and write
7FF88B143000
trusted library allocation
page read and write
1642FE30000
heap
page read and write
1641952C000
trusted library allocation
page read and write
18AAD12F000
heap
page read and write
7FF88B168000
trusted library allocation
page read and write
7FF88B200000
trusted library allocation
page read and write
2D6E000
stack
page read and write
18AA4D64000
trusted library allocation
page read and write
23E41EC6000
trusted library allocation
page read and write
1B1A3000
heap
page read and write
18A92D60000
heap
page read and write
7FF88AE2B000
trusted library allocation
page read and write
164176C0000
heap
page read and write
1B9EF000
stack
page read and write
7FF88AE6C000
trusted library allocation
page execute and read and write
F00000
heap
page read and write
6930B3F000
stack
page read and write
7FF88AFA0000
trusted library allocation
page read and write
C1F000
stack
page read and write
7FF88B030000
trusted library allocation
page read and write
1340000
heap
page read and write
12F1000
stack
page read and write
16427A24000
trusted library allocation
page read and write
7FF88AF30000
trusted library allocation
page execute and read and write
1641954C000
trusted library allocation
page read and write
1B9EF000
stack
page read and write
7FF88AF30000
trusted library allocation
page execute and read and write
18A9566F000
trusted library allocation
page read and write
16427A16000
trusted library allocation
page read and write
7FF88B030000
trusted library allocation
page read and write
7FF88B162000
trusted library allocation
page read and write
7FF88AE00000
trusted library allocation
page read and write
7FF88B0F0000
trusted library allocation
page read and write
23E32DE0000
trusted library allocation
page read and write
1CC22C3A000
heap
page read and write
16415970000
heap
page read and write
1CC0BB65000
trusted library allocation
page read and write
7FF88B050000
trusted library allocation
page read and write
18A959E6000
trusted library allocation
page read and write
7FF88B030000
trusted library allocation
page read and write
23E49F10000
heap
page read and write
301F000
trusted library allocation
page read and write
1BEDE000
stack
page read and write
EF3000
trusted library allocation
page read and write
7FF88B1EC000
trusted library allocation
page read and write
FD0000
heap
page read and write
7FF88B010000
trusted library allocation
page read and write
1CC08BB0000
heap
page read and write
1CC08C20000
heap
page read and write
23E2FBC0000
heap
page read and write
B56230E000
stack
page read and write
1BB2E000
stack
page read and write
7FF88B040000
trusted library allocation
page read and write
1642FE2D000
heap
page read and write
DBCAE3E000
stack
page read and write
7FF88AFE8000
trusted library allocation
page read and write
23E49FB7000
heap
page read and write
7FF88B040000
trusted library allocation
page read and write
F80000
heap
page read and write
1CC22EC0000
heap
page read and write
1C43C000
stack
page read and write
1CC08C88000
heap
page read and write
1CC08E20000
trusted library section
page read and write
7FF88AE2D000
trusted library allocation
page execute and read and write
1642FDA9000
heap
page read and write
23E328E1000
trusted library allocation
page read and write
16427761000
trusted library allocation
page read and write
7FF88AEC0000
trusted library allocation
page read and write
B56220E000
stack
page read and write
7FF88B159000
trusted library allocation
page read and write
C17000
heap
page read and write
7FF88B210000
trusted library allocation
page read and write
23E339D3000
trusted library allocation
page read and write
7FF88B154000
trusted library allocation
page read and write
7FF88B090000
trusted library allocation
page read and write
7FF88AFE0000
trusted library allocation
page read and write
23E31BD1000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
16415C80000
heap
page read and write
7FF88AFF8000
trusted library allocation
page read and write
7FF88B230000
trusted library allocation
page execute and read and write
18AACEA9000
heap
page read and write
7FF88AFA2000
trusted library allocation
page read and write
7FF88AE1D000
trusted library allocation
page execute and read and write
13873C78000
heap
page read and write
1065000
heap
page read and write
B561336000
stack
page read and write
B561279000
stack
page read and write
DBCAA7E000
stack
page read and write
1642FB90000
heap
page read and write
23E2FCA0000
trusted library allocation
page read and write
4999C0F000
stack
page read and write
69307FD000
stack
page read and write
7FF88AE3D000
trusted library allocation
page execute and read and write
1B6B0000
heap
page read and write
7FF88B113000
trusted library allocation
page read and write
23E31920000
heap
page execute and read and write
164159B0000
trusted library allocation
page read and write
18A92FF0000
trusted library allocation
page read and write
23E41ED6000
trusted library allocation
page read and write
7DF4817F0000
trusted library allocation
page execute and read and write
7FF88AE24000
trusted library allocation
page read and write
7FF88AE10000
trusted library allocation
page read and write
DBCAAFE000
stack
page read and write
7FF88B0A0000
trusted library allocation
page read and write
7FF88B260000
trusted library allocation
page read and write
7FF88B170000
trusted library allocation
page read and write
16415A55000
heap
page read and write
6930877000
stack
page read and write
1880000
heap
page read and write
7FF88AFA0000
trusted library allocation
page execute and read and write
4998B7E000
stack
page read and write
7FF88AFB1000
trusted library allocation
page read and write
7FF88AE20000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
1BBEE000
stack
page read and write
7FF88B130000
trusted library allocation
page read and write
1CC1AA8A000
trusted library allocation
page read and write
13128000
trusted library allocation
page read and write
7FF88AF10000
trusted library allocation
page execute and read and write
1CC0B860000
trusted library allocation
page read and write
1CC0B7D2000
trusted library allocation
page read and write
1CC1AAA8000
trusted library allocation
page read and write
1374000
heap
page read and write
7FF88AF9A000
trusted library allocation
page read and write
7FF88B240000
trusted library allocation
page execute and read and write
7FF88AE2D000
trusted library allocation
page execute and read and write
5A0000
unkown
page readonly
7FF88AE14000
trusted library allocation
page read and write
136C000
heap
page read and write
4999C8D000
stack
page read and write
7FF88AE5C000
trusted library allocation
page execute and read and write
18A92D90000
heap
page read and write
7FF88B0E0000
trusted library allocation
page read and write
FA5000
heap
page read and write
23E328DF000
trusted library allocation
page read and write
7FF88ADF0000
trusted library allocation
page read and write
18A962D9000
trusted library allocation
page read and write
7FF88AEC0000
trusted library allocation
page read and write
18A93030000
trusted library allocation
page read and write
23E4A00E000
heap
page read and write
16427A34000
trusted library allocation
page read and write
23E3209E000
trusted library allocation
page read and write
7FF88B080000
trusted library allocation
page read and write
1281E000
trusted library allocation
page read and write
1642FCF3000
heap
page read and write
1CC22FFD000
heap
page read and write
7FF88B1FA000
trusted library allocation
page read and write
1BAEE000
stack
page read and write
7DF474290000
trusted library allocation
page execute and read and write
3011000
trusted library allocation
page read and write
1B714000
heap
page read and write
BB8000
heap
page read and write
7FF88AEB0000
trusted library allocation
page read and write
1BB5E000
stack
page read and write
1CC08E50000
trusted library allocation
page read and write
7FF88B210000
trusted library allocation
page read and write
7FF88B120000
trusted library allocation
page read and write
18A92E76000
heap
page read and write
18A92FC0000
heap
page read and write
23E4A04D000
heap
page read and write
69305FF000
stack
page read and write
7FF408430000
trusted library allocation
page execute and read and write
7FF88B0E6000
trusted library allocation
page read and write
A20000
heap
page read and write
1BF3E000
stack
page read and write
7FF88AE03000
trusted library allocation
page execute and read and write
2873000
trusted library allocation
page read and write
16418F52000
trusted library allocation
page read and write
7FF88B190000
trusted library allocation
page read and write
1642FD2D000
heap
page read and write
7FF88B000000
trusted library allocation
page read and write
7FF88AFF4000
trusted library allocation
page read and write
14A0000
heap
page read and write
7FF88B180000
trusted library allocation
page read and write
1642FDA6000
heap
page read and write
1641890A000
trusted library allocation
page read and write
7FF88ADE3000
trusted library allocation
page execute and read and write
16415C30000
trusted library allocation
page read and write
16415910000
heap
page read and write
16418A3A000
trusted library allocation
page read and write
7FF88AEC0000
trusted library allocation
page execute and read and write
7FF88B0C0000
trusted library allocation
page read and write
B5616BB000
stack
page read and write
18AAD1B6000
heap
page read and write
23E4A04B000
heap
page read and write
16417958000
trusted library allocation
page read and write
7FF88B080000
trusted library allocation
page read and write
7DF4742A0000
trusted library allocation
page execute and read and write
7FF88AE14000
trusted library allocation
page read and write
FA0000
heap
page read and write
1CC08E30000
trusted library allocation
page read and write
12818000
trusted library allocation
page read and write
16415A19000
heap
page read and write
1384000
heap
page read and write
18A93130000
heap
page read and write
13013000
trusted library allocation
page read and write
7FF88B020000
trusted library allocation
page read and write
7FF88AE90000
trusted library allocation
page read and write
7FF88AFC1000
trusted library allocation
page read and write
18A948E3000
heap
page read and write
18A94F2C000
trusted library allocation
page read and write
1506000
heap
page read and write
23E31900000
heap
page read and write
7FF88AE00000
trusted library allocation
page read and write
7FF88AE03000
trusted library allocation
page execute and read and write
7FF88B020000
trusted library allocation
page read and write
23E2FDA8000
heap
page read and write
14C5000
heap
page read and write
DBCACF7000
stack
page read and write
169E000
stack
page read and write
141A000
heap
page read and write
7FF88AF91000
trusted library allocation
page read and write
16417585000
heap
page read and write
7FF88AFB1000
trusted library allocation
page read and write
18AA4D55000
trusted library allocation
page read and write
7FF88AE34000
trusted library allocation
page read and write
14DC000
heap
page read and write
1CC08C7D000
heap
page read and write
7FF88B210000
trusted library allocation
page read and write
BF0000
heap
page read and write
23E339F8000
trusted library allocation
page read and write
1CC2304A000
heap
page read and write
7FF88AE24000
trusted library allocation
page read and write
23E31868000
heap
page read and write
7FF88AE10000
trusted library allocation
page read and write
1642FCE2000
heap
page read and write
B5611FD000
stack
page read and write
301C000
trusted library allocation
page read and write
7FF88B0C0000
trusted library allocation
page read and write
C73000
heap
page read and write
FFC000
heap
page read and write
DBCAEB6000
stack
page read and write
BD0000
heap
page read and write
7DF481800000
trusted library allocation
page execute and read and write
1508000
heap
page read and write
7FF88AE13000
trusted library allocation
page execute and read and write
B80000
heap
page read and write
7FF88B140000
trusted library allocation
page read and write
7FF88B1F0000
trusted library allocation
page read and write
1CC23003000
heap
page read and write
7FF88AFE0000
trusted library allocation
page read and write
23E31A00000
heap
page read and write
1B4AE000
stack
page read and write
BB0000
heap
page read and write
18AACEE0000
trusted library allocation
page read and write
7FF88AE00000
trusted library allocation
page read and write
12948000
trusted library allocation
page read and write
23E4A052000
heap
page read and write
18A92DD5000
heap
page read and write
7FF88B0B0000
trusted library allocation
page read and write
3000000
heap
page execute and read and write
23E4A03D000
heap
page read and write
1CC23020000
heap
page read and write
18AACE33000
heap
page read and write
7FF88AEE6000
trusted library allocation
page execute and read and write
There are 1084 hidden memdumps, click here to show them.