IOC Report
obvious.exe

loading gif

Files

File Path
Type
Category
Malicious
obvious.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\uGCIY.scr
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\uGCIY.scr:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\obvious.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\KtE6mRAFZ5iEcgF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\VUku0KRjiZfWItk
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\XztjmX3oOWYRvow
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1bn5izav.svr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3zs0arm0.yv4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54lwo32v.j0g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55rxnatn.e34.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbe1ofz.iyz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aug5f4cu.a1j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gyooz3qh.iwe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ld2h1shx.1kr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkft2utz.wte.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovmlvudg.mq1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4rkrywx.hjg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5v1osxi.j4o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hGQwf2dJC9byEfm.ligma
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\hGQwf2dJC9byEfm\Browsers\Cookies\Chrome Cookies.txt
ASCII text, with very long lines (522), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hGQwf2dJC9byEfm\Display\Display.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\obvious.exe
"C:\Users\user\Desktop\obvious.exe"
malicious
C:\Windows\System32\attrib.exe
"attrib.exe" +h +s "C:\Users\user\Desktop\obvious.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\obvious.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c ping localhost && del /F /A h "C:\Users\user\Desktop\obvious.exe" && pause
malicious
C:\Windows\System32\PING.EXE
ping localhost
malicious
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" os get Caption
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" computersystem get totalphysicalmemory
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
"wmic" path win32_VideoController get name
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://discord.com/api/webhooks/1240617539009249350/TqBzgc6PPLDK8U9sL3OIQ7VPVwnDIoONcaMLCG9G1Uo5vMQ9KEFuAEkuqQ_6XKEkyetX
162.159.136.232
malicious
https://discord.com
unknown
malicious
https://discord.com/api/webhooks/1240617539009249350/TqBzgc6PPLDK8U9sL3OIQ7VPVwnDIoONcaMLCG9G1Uo5vMQ
unknown
malicious
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://mail.google.com/mail/installwebapp?usp=chrome_default
unknown
https://docs.google.com/presentation/J
unknown
https://docs.google.com/document/J
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://contoso.com/License
unknown
https://discordapp.com/api/v9/users/
unknown
https://www.youtube.com/:
unknown
https://media.discordapp.net/attachments/1176050474064019486/12780529320964Pj
unknown
http://discord.com
unknown
https://mail.google.com/mail/:
unknown
https://docs.google.com/document/installwebapp?usp=chrome_default
unknown
https://docs.google.com/presentation/:
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_default
unknown
https://docs.google.com/document/:
unknown
https://docs.google.com/spreadsheets/J
unknown
https://docs.google.com/spreadsheets/?usp=installed_webapp
unknown
https://mail.google.com/mail/J
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://docs.google.com/spreadsheets/:
unknown
https://drive.google.com/?lfhs=2
unknown
http://ip-api.com
unknown
https://oneget.orgX
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.youtube.com/?feature=ytca
unknown
http://ip-api.com/line/?fields=hostingI7AB5C494-39F5-4941-9163-47F54D6D5016I032E02B4-0499-05C3-0806-
unknown
https://www.youtube.com/J
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://discord.com/api/v10/users/
unknown
https://drive.google.com/:
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://media.discordapp.net/attachments/1176050474064019486/1278052932096491550/Umbral-927537.zip?e
unknown
https://cdn.discordapp.com/attachments/1176050474064019486/1278052932096491550/Umbral-927537.zip?ex=
unknown
https://drive.google.com/J
unknown
https://github.com/Pester/Pester
unknown
https://github.com/Blank-c/Umbral-Stealer
unknown
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_default
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://media.discordapp.net/attachments/1176050474064019486/12780529320964
unknown
https://docs.google.com/presentation/?usp=installed_webapp
unknown
https://aka.ms/pscore68
unknown
http://ip-api.com/json/?fields=225545P
unknown
https://docs.google.com/document/?usp=installed_webapp
unknown
https://oneget.org
unknown
http://ip-api.com/json/?fields=225545
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.136.232
malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
162.159.136.232
discord.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obvious_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12F5F5A2000
unkown
page readonly
malicious
12F6169F000
trusted library allocation
page read and write
malicious
12F61605000
trusted library allocation
page read and write
malicious
1B902EB4000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
22D6B8DC000
heap
page read and write
22D6B8FC000
heap
page read and write
12F61800000
trusted library allocation
page read and write
7DF4A9B90000
trusted library allocation
page execute and read and write
1E0AAA07000
trusted library allocation
page read and write
12F61273000
trusted library allocation
page read and write
B7B5C7E000
stack
page read and write
12F613BB000
trusted library allocation
page read and write
22D6B8D0000
heap
page read and write
1B5EEE8E000
heap
page read and write
7FFD9BBBA000
trusted library allocation
page read and write
B7B5D79000
stack
page read and write
1B5EF388000
heap
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
10D224E000
stack
page read and write
2349AB67000
heap
page read and write
1B5EF388000
heap
page read and write
2349B12A000
heap
page read and write
12BB9380000
heap
page execute and read and write
12F5FA75000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
223BEAE1000
trusted library allocation
page read and write
236195C2000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1B5EED70000
trusted library allocation
page read and write
22D6B8E8000
heap
page read and write
12F61805000
trusted library allocation
page read and write
1E204126000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
12BB7975000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
1B900E61000
heap
page read and write
10D1479000
stack
page read and write
1B5EF37F000
heap
page read and write
1B5EECAE000
heap
page read and write
236195BF000
heap
page read and write
1E0B9AED000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
236195B2000
heap
page read and write
1B5EEC63000
heap
page read and write
B2913DE000
stack
page read and write
23619760000
heap
page read and write
2349B27C000
heap
page read and write
22D6B8E3000
heap
page read and write
2349CB26000
heap
page read and write
1E205BA0000
heap
page read and write
2249DFE000
stack
page read and write
1B901641000
heap
page read and write
1B5EEC40000
trusted library allocation
page read and write
1E21E27F000
heap
page read and write
B291B7E000
stack
page read and write
1E0AA9CE000
trusted library allocation
page read and write
12BB7720000
heap
page read and write
12BB9140000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
22D6B3A2000
heap
page read and write
1B901627000
heap
page read and write
12BB93B1000
trusted library allocation
page read and write
5B7FE78000
stack
page read and write
1E0AAA9B000
trusted library allocation
page read and write
1B5EF388000
heap
page read and write
1E0B97F1000
trusted library allocation
page read and write
2349B100000
heap
page read and write
588957E000
stack
page read and write
2349CB1E000
heap
page read and write
10D14F8000
stack
page read and write
223CE9F1000
trusted library allocation
page read and write
23619600000
heap
page read and write
24922074000
trusted library allocation
page read and write
22D6BA47000
heap
page read and write
1E204165000
heap
page read and write
1E0B9AEB000
trusted library allocation
page read and write
2361B572000
heap
page read and write
1E0A7D00000
heap
page read and write
2349CB1E000
heap
page read and write
10D1578000
stack
page read and write
B7B578E000
stack
page read and write
1B902EC4000
heap
page read and write
7FFD9BC90000
trusted library allocation
page execute and read and write
B291BFE000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
22D6B330000
heap
page read and write
23619767000
heap
page read and write
1B900E5B000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
2349B27E000
heap
page read and write
22D6B2A0000
trusted library allocation
page read and write
23619577000
heap
page read and write
1E205C65000
heap
page read and write
22D6B8F9000
heap
page read and write
5A08EFF000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2349ABA0000
heap
page read and write
58895FE000
stack
page read and write
2349AB38000
heap
page read and write
2249CF3000
stack
page read and write
236198B5000
heap
page read and write
1B90163D000
heap
page read and write
2349AB43000
heap
page read and write
1B5EF389000
heap
page read and write
1B5EECB9000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
B7B5B7E000
stack
page read and write
58894FE000
stack
page read and write
1B5EF394000
heap
page read and write
1E0A7EF0000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
5B7FCFE000
stack
page read and write
1664F5C000
stack
page read and write
2491EA20000
heap
page readonly
1B901649000
heap
page read and write
23619C4C000
heap
page read and write
5B7FBFD000
stack
page read and write
12F5F820000
heap
page read and write
22D6BA40000
heap
page read and write
22D6B398000
heap
page read and write
1B5EEC84000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
2349B125000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
12BD1A0A000
heap
page read and write
B7B5A7E000
stack
page read and write
1B5EF370000
heap
page read and write
1B902EBE000
heap
page read and write
22D6B3A4000
heap
page read and write
1B5EECC3000
heap
page read and write
23619C62000
heap
page read and write
1B5EEE84000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
10D167E000
stack
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
1B5EECF1000
heap
page read and write
12F61286000
trusted library allocation
page read and write
1E205C85000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BD70000
trusted library allocation
page read and write
1B902EB6000
heap
page read and write
23619C10000
heap
page read and write
2349AB00000
heap
page read and write
1E0B9866000
trusted library allocation
page read and write
1E21E261000
heap
page read and write
12F5F841000
heap
page read and write
22D6BA4A000
heap
page read and write
7042E4E000
stack
page read and write
2349B124000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
12F617D6000
trusted library allocation
page read and write
2349CB13000
heap
page read and write
1B5EECB2000
heap
page read and write
7FFD9BB82000
trusted library allocation
page read and write
12F617CE000
trusted library allocation
page read and write
1E207060000
trusted library allocation
page read and write
23619629000
heap
page read and write
1B5EECE8000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1E205A41000
heap
page read and write
22D6B8FF000
heap
page read and write
223BCDB5000
heap
page read and write
2361976A000
heap
page read and write
1B5EEB40000
heap
page read and write
1E0C1EE1000
heap
page read and write
4F8B17F000
stack
page read and write
1B5EECE4000
heap
page read and write
23619639000
heap
page read and write
24938A30000
heap
page read and write
1E0AAB81000
trusted library allocation
page read and write
24938825000
heap
page read and write
2361B57E000
heap
page read and write
2349B2A9000
heap
page read and write
1B900E31000
heap
page read and write
1E0C2021000
heap
page read and write
1B900E46000
heap
page read and write
22D6B393000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
236195DA000
heap
page read and write
1E215F70000
trusted library allocation
page read and write
23619C44000
heap
page read and write
23619C59000
heap
page read and write
1E205EF1000
trusted library allocation
page read and write
7FFD9BE00000
trusted library allocation
page read and write
B2916FE000
stack
page read and write
2349B123000
heap
page read and write
236198BD000
heap
page read and write
12F61281000
trusted library allocation
page read and write
223BCD75000
heap
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
12BD184B000
heap
page read and write
2361B576000
heap
page read and write
12F61766000
trusted library allocation
page read and write
1B5EED90000
heap
page read and write
22D6B3A5000
heap
page read and write
2349B270000
heap
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
2349B29C000
heap
page read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
22D6D1F0000
heap
page read and write
1B900E34000
heap
page read and write
22D6B580000
heap
page read and write
1B5EECA1000
heap
page read and write
7FFD9BB41000
trusted library allocation
page read and write
1B901110000
heap
page read and write
1B5EF391000
heap
page read and write
23619600000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
2349CB14000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
23619C3F000
heap
page read and write
22D6B384000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2361B584000
heap
page read and write
223BCCE0000
heap
page read and write
1E0AAB04000
trusted library allocation
page read and write
1B900E57000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
24920370000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1E20416A000
heap
page read and write
22D6B8D7000
heap
page read and write
7FFD9BB72000
trusted library allocation
page read and write
236195FF000
heap
page read and write
1B901117000
heap
page read and write
236195EB000
heap
page read and write
1E205C00000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
22D6D1F6000
heap
page read and write
B2918FD000
stack
page read and write
70422FE000
stack
page read and write
22D6B358000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
12F61374000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
12F617E9000
trusted library allocation
page read and write
22D6B358000
heap
page read and write
22D6B384000
heap
page read and write
2361963A000
heap
page read and write
1B901000000
trusted library allocation
page read and write
12BB9539000
trusted library allocation
page read and write
1E207761000
trusted library allocation
page read and write
1B900E4E000
heap
page read and write
23619642000
heap
page read and write
1B5EEE8A000
heap
page read and write
1E20411D000
heap
page read and write
2491E8EB000
heap
page read and write
2349AB9D000
heap
page read and write
2361B584000
heap
page read and write
2349B12A000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
2349B277000
heap
page read and write
22D6B358000
heap
page read and write
2491E8F1000
heap
page read and write
12BD1CB0000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
23619750000
trusted library allocation
page read and write
1E205C0E000
heap
page read and write
24938867000
heap
page read and write
223D6D20000
heap
page read and write
1E0AA755000
trusted library allocation
page read and write
2349CB1E000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1E0A9A19000
trusted library allocation
page read and write
1E2040F2000
heap
page read and write
1B90111B000
heap
page read and write
2349AB91000
heap
page read and write
223D6DFF000
heap
page read and write
12F61748000
trusted library allocation
page read and write
2349CB12000
heap
page read and write
5B7FEF9000
stack
page read and write
2349AB64000
heap
page read and write
1E0C1C40000
heap
page read and write
7042177000
stack
page read and write
1B5EECA5000
heap
page read and write
12BB772A000
heap
page read and write
1B5EECB0000
heap
page read and write
2349AAFA000
heap
page read and write
B291A79000
stack
page read and write
2349CB1D000
heap
page read and write
24938882000
heap
page read and write
12F613B4000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
12F79B0C000
heap
page read and write
7FFD9BB41000
trusted library allocation
page read and write
10D137F000
stack
page read and write
22D6B280000
heap
page read and write
B2927CA000
stack
page read and write
12BC9426000
trusted library allocation
page read and write
22D6B909000
heap
page read and write
1E204030000
heap
page read and write
1B900E59000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
224A9F9000
stack
page read and write
1BAECEF0000
heap
page read and write
236195DA000
heap
page read and write
1B5EEE80000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2349ABB0000
heap
page read and write
22D6B8E1000
heap
page read and write
12BD17F0000
heap
page read and write
22D6D390000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
2249FFE000
stack
page read and write
4F8AD1E000
stack
page read and write
249387FE000
heap
page read and write
4F8AC97000
stack
page read and write
23619C59000
heap
page read and write
B7B570D000
unkown
page read and write
12F617BC000
trusted library allocation
page read and write
5B7FDF9000
stack
page read and write
2349B12E000
heap
page read and write
12BB76E8000
heap
page read and write
2349AB88000
heap
page read and write
12F79FB1000
heap
page read and write
2349CB16000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1B903000000
heap
page read and write
23619763000
heap
page read and write
22D6B377000
heap
page read and write
223BEAF6000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
2349AB85000
heap
page read and write
23619644000
heap
page read and write
236195C9000
heap
page read and write
236195A3000
heap
page read and write
1B902EB0000
heap
page read and write
1E0A7D3E000
heap
page read and write
1E0C1EC0000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
224B0F9000
stack
page read and write
22D6BA43000
heap
page read and write
1E207386000
trusted library allocation
page read and write
12F5F897000
heap
page read and write
23619C59000
heap
page read and write
1B900E26000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
236195FA000
heap
page read and write
1B5EED70000
trusted library allocation
page read and write
249204E9000
trusted library allocation
page read and write
12BC9568000
trusted library allocation
page read and write
23619C5C000
heap
page read and write
1E0A7D08000
heap
page read and write
2361B560000
heap
page read and write
5B7FF78000
stack
page read and write
2349B299000
heap
page read and write
125AEFD0000
heap
page read and write
1E0A7CE0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
B291AFA000
stack
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
1E0AA951000
trusted library allocation
page read and write
2361B574000
heap
page read and write
2349B127000
heap
page read and write
1B902EC6000
heap
page read and write
1B5EECF2000
heap
page read and write
22D6D203000
heap
page read and write
223BEEF4000
trusted library allocation
page read and write
1E205C10000
heap
page read and write
22D6D1F1000
heap
page read and write
1E215EF1000
trusted library allocation
page read and write
222792C000
stack
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1B5EF38D000
heap
page read and write
223BCDB9000
heap
page read and write
236195C2000
heap
page read and write
12BB9220000
heap
page read and write
22D6B3A8000
heap
page read and write
1B5EEE8A000
heap
page read and write
1E0C1C9B000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
2349B120000
heap
page read and write
22D6BA4A000
heap
page read and write
236195C9000
heap
page read and write
22D6B900000
heap
page read and write
1B900E57000
heap
page read and write
12F71296000
trusted library allocation
page read and write
1B901113000
heap
page read and write
24922078000
trusted library allocation
page read and write
1BAECF78000
heap
page read and write
1B5EED50000
heap
page read and write
1B900E35000
heap
page read and write
223BCD42000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BCD4000
trusted library allocation
page read and write
23619C3C000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1B902EB3000
heap
page read and write
7FFD9B992000
trusted library allocation
page read and write
10D127D000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
23619620000
heap
page read and write
1B901638000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
22D6B39C000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
23619C63000
heap
page read and write
23619593000
heap
page read and write
1B901115000
heap
page read and write
5B7FC7E000
stack
page read and write
7041E7E000
stack
page read and write
1B5EECE4000
heap
page read and write
2349AB85000
heap
page read and write
7FFD9BC77000
trusted library allocation
page read and write
2349B12E000
heap
page read and write
1B902EC4000
heap
page read and write
23619C62000
heap
page read and write
7FFD9B99B000
trusted library allocation
page read and write
1B5EEE8A000
heap
page read and write
12BB7763000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
22D6B180000
heap
page read and write
1B901643000
heap
page read and write
1B5EF36C000
heap
page read and write
B291313000
stack
page read and write
5A08CFE000
stack
page read and write
B7B5E78000
stack
page read and write
12F616D5000
trusted library allocation
page read and write
2349B2A5000
heap
page read and write
7FFD9BB42000
trusted library allocation
page read and write
1B5EECB2000
heap
page read and write
1B5F0C00000
heap
page read and write
23619C60000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2361976A000
heap
page read and write
2349AB96000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1B900E26000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9BC40000
trusted library allocation
page read and write
1B5EEEDA000
heap
page read and write
1B901112000
heap
page read and write
7FFD9BB68000
trusted library allocation
page read and write
1BAECF7B000
heap
page read and write
12F6174E000
trusted library allocation
page read and write
12BB78D0000
heap
page read and write
2361B57E000
heap
page read and write
1B5EECB2000
heap
page read and write
23619C48000
heap
page read and write
22D6B8DC000
heap
page read and write
2349AB88000
heap
page read and write
236195EB000
heap
page read and write
22499BE000
stack
page read and write
12F61398000
trusted library allocation
page read and write
12BD1813000
heap
page read and write
223BEB36000
trusted library allocation
page read and write
23619593000
heap
page read and write
1B900E03000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1B5EEC86000
heap
page read and write
223BCE80000
trusted library allocation
page read and write
223D6D49000
heap
page read and write
12BB9215000
heap
page read and write
1E0A7E00000
heap
page readonly
23619767000
heap
page read and write
2349B2A2000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
1E0AA439000
trusted library allocation
page read and write
12BB95E2000
trusted library allocation
page read and write
125AEC4A000
heap
page read and write
2349AD00000
trusted library allocation
page read and write
22D6D1FD000
heap
page read and write
223CEA56000
trusted library allocation
page read and write
24920450000
heap
page read and write
223BE9E1000
trusted library allocation
page read and write
1B900E5A000
heap
page read and write
1B5EEC86000
heap
page read and write
1E21E490000
heap
page read and write
125AEC64000
heap
page read and write
223BEA65000
trusted library allocation
page read and write
2349AB88000
heap
page read and write
1B5EF37F000
heap
page read and write
2349B299000
heap
page read and write
1B901638000
heap
page read and write
B291C7C000
stack
page read and write
12F79AE0000
heap
page read and write
23619C69000
heap
page read and write
1B5EECB6000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1E0C1C96000
heap
page read and write
22D6B260000
heap
page read and write
2349B127000
heap
page read and write
1E204290000
heap
page read and write
23619632000
heap
page read and write
12BB9193000
trusted library allocation
page read and write
1B5EF374000
heap
page read and write
2491E850000
heap
page read and write
22D6B3A2000
heap
page read and write
7FFD9BBF2000
trusted library allocation
page read and write
1B900DF9000
heap
page read and write
629C37E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B901641000
heap
page read and write
12F5F9F0000
heap
page read and write
236198BE000
heap
page read and write
1E0AAAD5000
trusted library allocation
page read and write
23619591000
heap
page read and write
2349B285000
heap
page read and write
2361B573000
heap
page read and write
2361964A000
heap
page read and write
7FFD9BC7F000
trusted library allocation
page read and write
1B902EB2000
heap
page read and write
12F5F8AF000
heap
page read and write
1B901620000
heap
page read and write
23619C59000
heap
page read and write
12F61794000
trusted library allocation
page read and write
12F61493000
trusted library allocation
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
12F5FA70000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
224A7FE000
stack
page read and write
1B5EEC68000
heap
page read and write
12F5F5A0000
unkown
page readonly
7FFD9BB54000
trusted library allocation
page read and write
2349AB85000
heap
page read and write
2491EAB0000
heap
page read and write
1E0C2004000
heap
page read and write
1B90162B000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
125AEC30000
heap
page read and write
629C3FE000
stack
page read and write
1B5EEC86000
heap
page read and write
24920266000
heap
page read and write
1E0B9AE3000
trusted library allocation
page read and write
2491EA73000
trusted library allocation
page read and write
1B5EECB3000
heap
page read and write
223BEE95000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B90111A000
heap
page read and write
12BD18D2000
heap
page read and write
1B900E6A000
heap
page read and write
2349AB67000
heap
page read and write
12F61693000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
23619645000
heap
page read and write
1B900DFF000
heap
page read and write
223BCD6F000
heap
page read and write
1B90118A000
heap
page read and write
2349AB85000
heap
page read and write
7FFD9BB6B000
trusted library allocation
page read and write
23619597000
heap
page read and write
12BBA968000
trusted library allocation
page read and write
223BEA23000
trusted library allocation
page read and write
1B900DF0000
heap
page read and write
22D6B585000
heap
page read and write
22D6B902000
heap
page read and write
4F8B0FF000
stack
page read and write
12F5F760000
heap
page read and write
1B900E60000
heap
page read and write
1E21E230000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
223BCBE0000
heap
page read and write
12F615F1000
trusted library allocation
page read and write
5B0007F000
stack
page read and write
7FFD9BB64000
trusted library allocation
page read and write
23619636000
heap
page read and write
1B900E28000
heap
page read and write
7DF4A9BA0000
trusted library allocation
page execute and read and write
1B901000000
trusted library allocation
page read and write
12BBAA48000
trusted library allocation
page read and write
B291877000
stack
page read and write
2349AB65000
heap
page read and write
1E0A7D4F000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
7FFD9BC30000
trusted library allocation
page read and write
24921CD2000
trusted library allocation
page read and write
1E0AA766000
trusted library allocation
page read and write
1E0C1D40000
trusted library allocation
page read and write
12BBAFC7000
trusted library allocation
page read and write
1E0C1F81000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
1E204010000
heap
page read and write
1B90111E000
heap
page read and write
223D7190000
heap
page read and write
1B900E5A000
heap
page read and write
223D6D7C000
heap
page read and write
1B5EF360000
heap
page read and write
7FFD9BB62000
trusted library allocation
page read and write
1B5EF391000
heap
page read and write
2349B050000
heap
page read and write
22D6B2A0000
trusted library allocation
page read and write
1B5EECE8000
heap
page read and write
24921CA7000
trusted library allocation
page read and write
1E0AA75E000
trusted library allocation
page read and write
1B902EBE000
heap
page read and write
2349B2A3000
heap
page read and write
22D6B342000
heap
page read and write
223BCD4F000
heap
page read and write
1B5EEC86000
heap
page read and write
7FFD9BCEC000
trusted library allocation
page read and write
24920692000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
236195F2000
heap
page read and write
1E205CF0000
heap
page execute and read and write
7FFD9BDF0000
trusted library allocation
page read and write
373407D000
stack
page read and write
2349AAB0000
heap
page read and write
1E205BF0000
heap
page read and write
23619530000
heap
page read and write
12F6171A000
trusted library allocation
page read and write
236195BA000
heap
page read and write
7041F7E000
stack
page read and write
1B900E70000
heap
page read and write
22D6B347000
heap
page read and write
1B5EECC7000
heap
page read and write
12F5F960000
heap
page execute and read and write
2349AB92000
heap
page read and write
1B5EEE82000
heap
page read and write
22D6B396000
heap
page read and write
236195A4000
heap
page read and write
1B5EEC50000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
12F5F740000
heap
page read and write
236195BA000
heap
page read and write
2491E8EF000
heap
page read and write
7041FFF000
stack
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
1B5EECC3000
heap
page read and write
23619560000
heap
page read and write
1B5EF388000
heap
page read and write
2349ABAA000
heap
page read and write
2349B27F000
heap
page read and write
12F61221000
trusted library allocation
page read and write
1B5EF36E000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
22D6B386000
heap
page read and write
12F5F8B5000
heap
page read and write
1B90162B000
heap
page read and write
22D6BA47000
heap
page read and write
2491E937000
heap
page read and write
223BE7E0000
heap
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
12BB9FE2000
trusted library allocation
page read and write
12BB7970000
heap
page read and write
12F71221000
trusted library allocation
page read and write
224A2FF000
stack
page read and write
1E0A7F40000
heap
page read and write
22D6B347000
heap
page read and write
12BBAEFE000
trusted library allocation
page read and write
B292849000
stack
page read and write
23619C62000
heap
page read and write
23619608000
heap
page read and write
1E0A7C80000
heap
page read and write
236195BE000
heap
page read and write
12F79DD0000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1B900E5A000
heap
page read and write
12F79DA0000
heap
page read and write
22D6B369000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
2491EA30000
heap
page execute and read and write
7FFD9BC40000
trusted library allocation
page read and write
23619634000
heap
page read and write
12F79250000
trusted library allocation
page read and write
2361976B000
heap
page read and write
1B5EECB9000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
1E0AB14B000
trusted library allocation
page read and write
1E21E238000
heap
page read and write
1B900FC0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1B5F0C14000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
1B5EEE8B000
heap
page read and write
24938896000
heap
page read and write
12BBAD6A000
trusted library allocation
page read and write
1E0AA3EC000
trusted library allocation
page read and write
1E0AA886000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
12F61635000
trusted library allocation
page read and write
12F5F5A0000
unkown
page readonly
7FFD9BBE0000
trusted library allocation
page read and write
22D6B397000
heap
page read and write
1E204223000
trusted library allocation
page read and write
125AEE30000
heap
page read and write
10D117F000
stack
page read and write
1B900E08000
heap
page read and write
12F61713000
trusted library allocation
page read and write
12BD1A1C000
heap
page read and write
223BE970000
heap
page execute and read and write
24920455000
heap
page read and write
1E0AB61C000
trusted library allocation
page read and write
22D6B8F9000
heap
page read and write
1B901000000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1E0A7C20000
heap
page read and write
4F8AD9E000
stack
page read and write
1B901638000
heap
page read and write
23619550000
trusted library allocation
page read and write
2349B281000
heap
page read and write
22D6B8E4000
heap
page read and write
12F7122D000
trusted library allocation
page read and write
1E207735000
trusted library allocation
page read and write
1E0A97F1000
trusted library allocation
page read and write
24938910000
heap
page read and write
1B901641000
heap
page read and write
1B5EECC3000
heap
page read and write
B291977000
stack
page read and write
1E0C1CAB000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1E204295000
heap
page read and write
12BB76E0000
heap
page read and write
1B5EECF5000
heap
page read and write
223D6F38000
heap
page read and write
23619C44000
heap
page read and write
223CE9E1000
trusted library allocation
page read and write
B7B5FFE000
stack
page read and write
5B7FFFE000
stack
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
7FFD9B9A2000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
223D6E13000
heap
page read and write
10D13FE000
stack
page read and write
12BB9425000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1E0C17F1000
heap
page read and write
22D6B386000
heap
page read and write
12BBAC1C000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
22D6D1FD000
heap
page read and write
1E205C95000
heap
page read and write
10D1072000
stack
page read and write
22D6B909000
heap
page read and write
23619C59000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
7041EFD000
stack
page read and write
12F79FA0000
heap
page read and write
12F615E0000
trusted library allocation
page read and write
1B5EECA5000
heap
page read and write
10D0DDF000
stack
page read and write
2361976A000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1B90118D000
heap
page read and write
1E0B9AFD000
trusted library allocation
page read and write
1E0AAACF000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1B5EECEB000
heap
page read and write
1E207B03000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
12F79B99000
heap
page read and write
12F613AE000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2491E932000
heap
page read and write
23619C38000
heap
page read and write
22D6B393000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
2349CB10000
heap
page read and write
23619C4C000
heap
page read and write
1B901649000
heap
page read and write
B7B5EFE000
stack
page read and write
1E0C1DB6000
heap
page execute and read and write
588967E000
stack
page read and write
1B5EECA8000
heap
page read and write
12BBABF1000
trusted library allocation
page read and write
12F5F7F0000
trusted library allocation
page read and write
22D6B38E000
heap
page read and write
588947D000
stack
page read and write
1E0B9811000
trusted library allocation
page read and write
1B901617000
heap
page read and write
12F79FBD000
heap
page read and write
223BE9FD000
trusted library allocation
page read and write
12F613A3000
trusted library allocation
page read and write
1B5EECC3000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
B291CFE000
stack
page read and write
2349AAF0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2349AB6A000
heap
page read and write
24938ABA000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2349ABB0000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
12BD17E0000
heap
page execute and read and write
23619632000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
125AEE10000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
22D6B3A2000
heap
page read and write
22D6B8FA000
heap
page read and write
23619C67000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
1B5EF391000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1E20413E000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1B901649000
heap
page read and write
12BD1A2E000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1E0C1EF3000
heap
page read and write
5B000FE000
stack
page read and write
1B900E6B000
heap
page read and write
1E207A3D000
trusted library allocation
page read and write
23619762000
heap
page read and write
3733DC7000
stack
page read and write
1B5F0C04000
heap
page read and write
22D6B376000
heap
page read and write
236195C1000
heap
page read and write
1B90111A000
heap
page read and write
24921D2D000
trusted library allocation
page read and write
10D21CE000
stack
page read and write
B7B5BFE000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
12F5FA00000
heap
page read and write
1E0AA3EA000
trusted library allocation
page read and write
37342FF000
stack
page read and write
2349AAE0000
trusted library allocation
page read and write
2349AAE0000
trusted library allocation
page read and write
22D6BA4A000
heap
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
1E0AA401000
trusted library allocation
page read and write
1E0AABBF000
trusted library allocation
page read and write
12BBA96A000
trusted library allocation
page read and write
1B90118E000
heap
page read and write
7FFD9BB32000
trusted library allocation
page read and write
23619644000
heap
page read and write
2349CB11000
heap
page read and write
16652FF000
stack
page read and write
12F617FB000
trusted library allocation
page read and write
1B90161C000
heap
page read and write
7FFD9BD73000
trusted library allocation
page read and write
2349ABA3000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1E0AAF7E000
trusted library allocation
page read and write
12F5FA0E000
heap
page read and write
22D6B8D8000
heap
page read and write
22D6B8DF000
heap
page read and write
24920380000
trusted library allocation
page read and write
1E2040D0000
trusted library allocation
page read and write
1B900E26000
heap
page read and write
1B5F0C14000
heap
page read and write
1E2078AA000
trusted library allocation
page read and write
12F613C1000
trusted library allocation
page read and write
1B900E43000
heap
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
223BCF05000
heap
page read and write
2349AB9C000
heap
page read and write
2349B12B000
heap
page read and write
1B901624000
heap
page read and write
1E207361000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
12F795A4000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
B7B5AFD000
stack
page read and write
1E0C1DE0000
heap
page read and write
12BC93C0000
trusted library allocation
page read and write
1B5EECD7000
heap
page read and write
1B900E52000
heap
page read and write
1E0A7CF0000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
23619765000
heap
page read and write
23619C4C000
heap
page read and write
224A0FE000
stack
page read and write
2349B2A3000
heap
page read and write
2349AB75000
heap
page read and write
1B900E46000
heap
page read and write
223BE9D0000
heap
page read and write
1E215F64000
trusted library allocation
page read and write
1B5EEED5000
heap
page read and write
1B901638000
heap
page read and write
5B0017C000
stack
page read and write
23619C3C000
heap
page read and write
1B900E46000
heap
page read and write
22D6B39F000
heap
page read and write
2349B299000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
2349ABB0000
heap
page read and write
2349B278000
heap
page read and write
2349AB48000
heap
page read and write
12BB771C000
heap
page read and write
B291D7B000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
2249EFE000
stack
page read and write
1E0A7D8B000
heap
page read and write
22D6B364000
heap
page read and write
1B5EECC8000
heap
page read and write
1E206B91000
trusted library allocation
page read and write
236195FA000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
223D6E40000
heap
page read and write
125AEC40000
heap
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
23619C5F000
heap
page read and write
1B900E4F000
heap
page read and write
12F617D9000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
22D6BA4E000
heap
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
12BB9120000
trusted library allocation
page read and write
1B5EF37F000
heap
page read and write
22D6B8F9000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
12F5F660000
heap
page read and write
12F5F863000
heap
page read and write
12BB9190000
trusted library allocation
page read and write
B7B607B000
stack
page read and write
12BBAC3C000
trusted library allocation
page read and write
10D11FE000
stack
page read and write
1E215F00000
trusted library allocation
page read and write
2349AB88000
heap
page read and write
1E0AB0EC000
trusted library allocation
page read and write
2349B29A000
heap
page read and write
12F61560000
trusted library allocation
page read and write
236198B0000
heap
page read and write
1B5EECE4000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
1B5EF368000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
B29177A000
stack
page read and write
23619640000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1E0A7CC0000
trusted library allocation
page read and write
B2917FE000
stack
page read and write
223BEF9F000
trusted library allocation
page read and write
236195B2000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
1B901644000
heap
page read and write
224B2FD000
stack
page read and write
1B5EECBE000
heap
page read and write
7FFD9BD13000
trusted library allocation
page read and write
22D6B384000
heap
page read and write
22D6D1F2000
heap
page read and write
1B5EECE5000
heap
page read and write
1B5EECC3000
heap
page read and write
1E0C1FE2000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B5EEC87000
heap
page read and write
12F6127D000
trusted library allocation
page read and write
23619593000
heap
page read and write
1B5EECF3000
heap
page read and write
1E0AB5D7000
trusted library allocation
page read and write
1E0A97E0000
heap
page execute and read and write
1BAECE10000
heap
page read and write
629C77F000
stack
page read and write
1E0C1DB0000
heap
page execute and read and write
B29139E000
unkown
page read and write
1E0A7E80000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1B901117000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2349AB76000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
24938A50000
heap
page execute and read and write
373427E000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1E0A7B40000
heap
page read and write
12F61624000
trusted library allocation
page read and write
2349AAF5000
heap
page read and write
1E0AB621000
trusted library allocation
page read and write
223D6DBE000
heap
page read and write
12F61523000
trusted library allocation
page read and write
B2928CC000
stack
page read and write
23619C5F000
heap
page read and write
23619550000
trusted library allocation
page read and write
1E0A7D5F000
heap
page read and write
24930461000
trusted library allocation
page read and write
1B5EECA5000
heap
page read and write
2491E9F0000
trusted library allocation
page read and write
1B901610000
heap
page read and write
22499FF000
stack
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
2491E8B8000
heap
page read and write
1B900E61000
heap
page read and write
1BAECF10000
heap
page read and write
1B901621000
heap
page read and write
1B90162B000
heap
page read and write
223BCD6D000
heap
page read and write
2493887B000
heap
page read and write
1B5EEE00000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
236195B0000
heap
page read and write
12BB7930000
heap
page read and write
1E2040E0000
heap
page read and write
58891B7000
stack
page read and write
1B902EBE000
heap
page read and write
223BCF00000
heap
page read and write
629C6FE000
stack
page read and write
1E0C1CFE000
heap
page read and write
2349AB9F000
heap
page read and write
1E0A7F45000
heap
page read and write
2349ABA9000
heap
page read and write
22D6B3A7000
heap
page read and write
12F6168D000
trusted library allocation
page read and write
2349AB9F000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
23619C37000
heap
page read and write
12F6156B000
trusted library allocation
page read and write
224A8F5000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1B5F0C0D000
heap
page read and write
12BB93A0000
heap
page read and write
B7B6A4E000
stack
page read and write
12BC93B1000
trusted library allocation
page read and write
2349AB69000
heap
page read and write
7041BBE000
stack
page read and write
1B5EECA5000
heap
page read and write
23619632000
heap
page read and write
22D6D1FD000
heap
page read and write
1E0AA76F000
trusted library allocation
page read and write
1B5EF388000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
1B5EEE83000
heap
page read and write
223BCE1D000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
22D6B373000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
7FFD9BB32000
trusted library allocation
page read and write
24921092000
trusted library allocation
page read and write
12F79BC8000
heap
page read and write
12F79B5F000
heap
page read and write
223BCD30000
heap
page read and write
23619750000
trusted library allocation
page read and write
2349AB30000
heap
page read and write
1E206191000
trusted library allocation
page read and write
223BEADE000
trusted library allocation
page read and write
1B5EEC89000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1B5EF399000
heap
page read and write
5A08C78000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
236195B2000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
12BB7765000
heap
page read and write
7FFD9BC43000
trusted library allocation
page read and write
2361957D000
heap
page read and write
22D6B904000
heap
page read and write
1E206122000
trusted library allocation
page read and write
10D10FF000
unkown
page read and write
23619593000
heap
page read and write
2349AB8C000
heap
page read and write
12F6157C000
trusted library allocation
page read and write
1B5EF377000
heap
page read and write
22D6B58B000
heap
page read and write
1B900E46000
heap
page read and write
12F617EF000
trusted library allocation
page read and write
1B901000000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
2491EA10000
trusted library allocation
page read and write
12BB77F0000
heap
page read and write
2491E934000
heap
page read and write
1E21E236000
heap
page read and write
1E204167000
heap
page read and write
12F61312000
trusted library allocation
page read and write
12F61697000
trusted library allocation
page read and write
12F61629000
trusted library allocation
page read and write
22D6B366000
heap
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
22D6B8E4000
heap
page read and write
223D6F62000
heap
page read and write
223BEA3E000
trusted library allocation
page read and write
24921A62000
trusted library allocation
page read and write
166527F000
stack
page read and write
1B5EF38B000
heap
page read and write
12F615D1000
trusted library allocation
page read and write
1E0C1D16000
heap
page read and write
12BD17E7000
heap
page execute and read and write
23619C30000
heap
page read and write
5A08E7F000
stack
page read and write
10D15F9000
stack
page read and write
23619620000
heap
page read and write
1E205DB0000
heap
page read and write
23619764000
heap
page read and write
5B7F7DE000
stack
page read and write
23619636000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
223BCD8D000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
249387DB000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
12F61576000
trusted library allocation
page read and write
1E204220000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1E2160A6000
trusted library allocation
page read and write
12BB7768000
heap
page read and write
12BB78F0000
heap
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
1E204260000
trusted library allocation
page read and write
1B5EEED0000
heap
page read and write
24921BF6000
trusted library allocation
page read and write
10D17FB000
stack
page read and write
1E203F30000
heap
page read and write
24920461000
trusted library allocation
page read and write
23619636000
heap
page read and write
1E21E277000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
224B1F8000
stack
page read and write
24921FAE000
trusted library allocation
page read and write
22D6B3AD000
heap
page read and write
22D6B365000
heap
page read and write
5B7FD7E000
stack
page read and write
7FFD9BC70000
trusted library allocation
page read and write
1BAED205000
heap
page read and write
12BB91D0000
trusted library allocation
page read and write
12F613A6000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1E0AA762000
trusted library allocation
page read and write
12F79BD4000
heap
page read and write
2349B299000
heap
page read and write
1E0A7D88000
heap
page read and write
12F6155C000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
23619730000
heap
page read and write
1B5EF37F000
heap
page read and write
1B902EBD000
heap
page read and write
23619632000
heap
page read and write
1B5EECA8000
heap
page read and write
7FFD9BB31000
trusted library allocation
page read and write
223D6E20000
heap
page read and write
2491E8F9000
heap
page read and write
7FFD9BB51000
trusted library allocation
page read and write
22D6B384000
heap
page read and write
223BCE60000
trusted library allocation
page read and write
249304E2000
trusted library allocation
page read and write
236195E1000
heap
page read and write
1B5EEC59000
heap
page read and write
1B90162B000
heap
page read and write
223D6DFD000
heap
page read and write
5A08DFE000
stack
page read and write
1E0A7D4D000
heap
page read and write
5B7FA7E000
stack
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
223BCEA0000
trusted library allocation
page read and write
1B901185000
heap
page read and write
70421FC000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
223BCE20000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2491EAB5000
heap
page read and write
2349AB67000
heap
page read and write
2491E9B0000
heap
page read and write
12BB9210000
heap
page read and write
2349AAFE000
heap
page read and write
23619C5F000
heap
page read and write
22D6BA44000
heap
page read and write
12F5F940000
trusted library allocation
page read and write
23619C5A000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1B901180000
heap
page read and write
23619632000
heap
page read and write
1B900E61000
heap
page read and write
7FFD9BB42000
trusted library allocation
page read and write
22D6B372000
heap
page read and write
2349B2A2000
heap
page read and write
12F61565000
trusted library allocation
page read and write
1E0A97D0000
heap
page read and write
1E0A9780000
heap
page execute and read and write
12BD1910000
heap
page read and write
1B90111A000
heap
page read and write
7041B3F000
unkown
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
1B5EF36C000
heap
page read and write
2349AB93000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
2349AB48000
heap
page read and write
223BEAF4000
trusted library allocation
page read and write
1B900E53000
heap
page read and write
223D6F20000
heap
page read and write
22D6B384000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
23619629000
heap
page read and write
249304D5000
trusted library allocation
page read and write
1B5EEC68000
heap
page read and write
1B5EECA5000
heap
page read and write
23619640000
heap
page read and write
7041BFE000
stack
page read and write
22D6B338000
heap
page read and write
1E205CF7000
heap
page execute and read and write
1B900E2A000
heap
page read and write
12F6162F000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1B5EEE8E000
heap
page read and write
22D6B2A0000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
2491E8B0000
heap
page read and write
B2919F6000
stack
page read and write
2349CB24000
heap
page read and write
10D177E000
stack
page read and write
7DF4564E0000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B5EF371000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
5A08D7D000
stack
page read and write
1E0A9CBD000
trusted library allocation
page read and write
22D6B905000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1B5F0C01000
heap
page read and write
224AEFE000
stack
page read and write
2361957D000
heap
page read and write
1E0A7CA0000
trusted library section
page read and write
2493886D000
heap
page read and write
1B5EF373000
heap
page read and write
1E205C5A000
heap
page read and write
236195E1000
heap
page read and write
5B7FB7E000
stack
page read and write
12F5F866000
heap
page read and write
223BE7E5000
heap
page read and write
12F617B9000
trusted library allocation
page read and write
1B5EEC86000
heap
page read and write
12BB9370000
heap
page execute and read and write
236195BA000
heap
page read and write
12BB7722000
heap
page read and write
12F612A0000
trusted library allocation
page read and write
7042279000
stack
page read and write
2349AB9A000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
12F6169B000
trusted library allocation
page read and write
2349AB85000
heap
page read and write
2349ABA3000
heap
page read and write
22D6D1FD000
heap
page read and write
1B900E5C000
heap
page read and write
B7B5DFC000
stack
page read and write
12BD18A7000
heap
page read and write
224A3FE000
stack
page read and write
704247B000
stack
page read and write
7DF4A9B80000
trusted library allocation
page execute and read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1E0AA3F7000
trusted library allocation
page read and write
22D6B2A0000
trusted library allocation
page read and write
1B5EEE85000
heap
page read and write
1E205E90000
heap
page execute and read and write
B7B5F7F000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
249387A0000
heap
page read and write
22D6D1F4000
heap
page read and write
12BB9150000
heap
page readonly
1B5EECF6000
heap
page read and write
2349B282000
heap
page read and write
22D6BA4E000
heap
page read and write
22D6B8F9000
heap
page read and write
236195B2000
heap
page read and write
70420F9000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
23619C4C000
heap
page read and write
1B902EC4000
heap
page read and write
629C2F8000
stack
page read and write
2349B122000
heap
page read and write
24921A1B000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
224A5FE000
stack
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
1B901624000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1B900E70000
heap
page read and write
10D12FE000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
22D6BA42000
heap
page read and write
23619572000
heap
page read and write
2491E770000
heap
page read and write
12F61789000
trusted library allocation
page read and write
1B900E26000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
12BB773C000
heap
page read and write
7FFD9BA56000
trusted library allocation
page read and write
12F7A370000
heap
page read and write
1E207A4A000
trusted library allocation
page read and write
12F79AEE000
heap
page read and write
125AEFD5000
heap
page read and write
1BAECF70000
heap
page read and write
B29274E000
stack
page read and write
236195C4000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
10D16FF000
stack
page read and write
7FFD9BD30000
trusted library allocation
page read and write
22D6BA45000
heap
page read and write
12F5F5DC000
unkown
page readonly
224ACFB000
stack
page read and write
236195F2000
heap
page read and write
1B90161E000
heap
page read and write
1B5F0C02000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
12F5FA05000
heap
page read and write
1E0A7CB0000
trusted library section
page read and write
7FFD9BA66000
trusted library allocation
page read and write
1B5EECE8000
heap
page read and write
224A4FE000
stack
page read and write
24920447000
heap
page execute and read and write
2349AD00000
trusted library allocation
page read and write
24938930000
heap
page read and write
2491E870000
heap
page read and write
23619598000
heap
page read and write
224B3F6000
stack
page read and write
37340FE000
stack
page read and write
1B90163B000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
22D6B3AD000
heap
page read and write
22D6B3A5000
heap
page read and write
23619520000
heap
page read and write
12F5F826000
heap
page read and write
22D6B8FF000
heap
page read and write
12F5F82C000
heap
page read and write
7FFD9BDB0000
trusted library allocation
page execute and read and write
1E207394000
trusted library allocation
page read and write
1B900DE0000
heap
page read and write
236195B2000
heap
page read and write
1E205F78000
trusted library allocation
page read and write
1E0A7D45000
heap
page read and write
B7B57CF000
stack
page read and write
2361B584000
heap
page read and write
12F61754000
trusted library allocation
page read and write
224A1FC000
stack
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
12F79DE6000
heap
page read and write
1B5EECAE000
heap
page read and write
22D6B8F9000
heap
page read and write
236195C2000
heap
page read and write
1E0AB063000
trusted library allocation
page read and write
2349AB66000
heap
page read and write
223BE7C6000
heap
page execute and read and write
1B900E53000
heap
page read and write
24938823000
heap
page read and write
2349AAC0000
heap
page read and write
23619C65000
heap
page read and write
1B5EF388000
heap
page read and write
2349ABAB000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
70423FE000
stack
page read and write
23619632000
heap
page read and write
23619C59000
heap
page read and write
1E0C1CA0000
heap
page read and write
2349B284000
heap
page read and write
1E205EE0000
heap
page execute and read and write
1E0AA916000
trusted library allocation
page read and write
1B901618000
heap
page read and write
1B5EF374000
heap
page read and write
1B5EEC20000
heap
page read and write
1B900E28000
heap
page read and write
236198BB000
heap
page read and write
2349AB98000
heap
page read and write
1B901639000
heap
page read and write
223BCD7B000
heap
page read and write
1B900E51000
heap
page read and write
12F61353000
trusted library allocation
page read and write
12F617BF000
trusted library allocation
page read and write
2361976E000
heap
page read and write
23619C42000
heap
page read and write
373417E000
stack
page read and write
1B5EECA3000
heap
page read and write
12F615E6000
trusted library allocation
page read and write
12F5F7D0000
trusted library allocation
page read and write
1B900E4B000
heap
page read and write
1E2040B0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
1E2041E0000
heap
page readonly
7FFD9BBF0000
trusted library allocation
page read and write
23619C45000
heap
page read and write
223BE7C0000
heap
page execute and read and write
1E0B9ADF000
trusted library allocation
page read and write
22D6B367000
heap
page read and write
1E21E259000
heap
page read and write
1E204070000
heap
page read and write
2349CB24000
heap
page read and write
1B5F0C0D000
heap
page read and write
1E2077BC000
trusted library allocation
page read and write
1E2041DA000
heap
page read and write
23619569000
heap
page read and write
1E207B07000
trusted library allocation
page read and write
1B900E31000
heap
page read and write
12F5F780000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1B5EECAE000
heap
page read and write
2349B299000
heap
page read and write
1B5EEE87000
heap
page read and write
1B5EEE87000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
224AFF7000
stack
page read and write
223BCE30000
heap
page read and write
12BC9432000
trusted library allocation
page read and write
704207F000
stack
page read and write
37341FF000
stack
page read and write
7FFD9BC50000
trusted library allocation
page read and write
223D6D59000
heap
page read and write
22D6B38F000
heap
page read and write
12F6181A000
trusted library allocation
page read and write
1B5F0C0D000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
22D6B2D0000
heap
page read and write
2361976E000
heap
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
22D6B397000
heap
page read and write
22D6B363000
heap
page read and write
12F79B5D000
heap
page read and write
1E0AB5FC000
trusted library allocation
page read and write
5B7F793000
stack
page read and write
24920440000
heap
page execute and read and write
2349AB96000
heap
page read and write
1B5EF391000
heap
page read and write
1E0B9821000
trusted library allocation
page read and write
1B5EEC40000
trusted library allocation
page read and write
1E2040E8000
heap
page read and write
1E0C1CDA000
heap
page read and write
22D6B386000
heap
page read and write
1E0C1F8B000
heap
page read and write
2349AB88000
heap
page read and write
1B5EECB9000
heap
page read and write
24930470000
trusted library allocation
page read and write
2361B57E000
heap
page read and write
236195C3000
heap
page read and write
2361B570000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1E205BA5000
heap
page read and write
1E0C201A000
heap
page read and write
1E0A9877000
trusted library allocation
page read and write
22D6BA4B000
heap
page read and write
23619577000
heap
page read and write
1E0A7C40000
heap
page read and write
7FFD9BB51000
trusted library allocation
page read and write
1B900E61000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2349AAFD000
heap
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
12BD186D000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
704237E000
stack
page read and write
2349B284000
heap
page read and write
7041AB3000
stack
page read and write
12F61265000
trusted library allocation
page read and write
B29167E000
stack
page read and write
1B900E57000
heap
page read and write
1E0AAB3C000
trusted library allocation
page read and write
12F61717000
trusted library allocation
page read and write
2349B288000
heap
page read and write
1B900E26000
heap
page read and write
12F616BA000
trusted library allocation
page read and write
1B5EECAE000
heap
page read and write
23619639000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
22D6B386000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
4F8B07F000
stack
page read and write
1B5F0C14000
heap
page read and write
1E204105000
heap
page read and write
22D6B8F9000
heap
page read and write
1B900E08000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
B7B5CF6000
stack
page read and write
1B5EF367000
heap
page read and write
1E205BDC000
heap
page read and write
12F7A170000
heap
page read and write
224AAFD000
stack
page read and write
1B5EEEDE000
heap
page read and write
7FFD9BCB3000
trusted library allocation
page read and write
1B901030000
heap
page read and write
223BCE90000
heap
page readonly
12BD19F0000
heap
page read and write
1B900E42000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
2349CB24000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
236195BF000
heap
page read and write
1B5EEEDD000
heap
page read and write
1B90111E000
heap
page read and write
12BBAC79000
trusted library allocation
page read and write
B7B5683000
stack
page read and write
2349AB95000
heap
page read and write
2361B571000
heap
page read and write
629C67E000
stack
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
2493887F000
heap
page read and write
7FFD9BCD9000
trusted library allocation
page read and write
1E0AA242000
trusted library allocation
page read and write
23619C4C000
heap
page read and write
2349ABAA000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
22D6B373000
heap
page read and write
12F79AD0000
heap
page execute and read and write
1B5EECA0000
heap
page read and write
2491EA70000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1E0A7CF5000
heap
page read and write
24930618000
trusted library allocation
page read and write
1E0A7E40000
trusted library allocation
page read and write
23619593000
heap
page read and write
12BD18A9000
heap
page read and write
1E0AA75A000
trusted library allocation
page read and write
1E21E232000
heap
page read and write
B29294E000
stack
page read and write
22D6B386000
heap
page read and write
2349B12A000
heap
page read and write
1BAED200000
heap
page read and write
7FFD9BCE8000
trusted library allocation
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
1B902EB1000
heap
page read and write
5B7FAFE000
stack
page read and write
1B900FE0000
heap
page read and write
1E205D10000
heap
page read and write
24938A70000
heap
page read and write
223BEADB000
trusted library allocation
page read and write
1E205BC0000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
224A6FD000
stack
page read and write
1E0AA8B2000
trusted library allocation
page read and write
223BCCC0000
heap
page read and write
12BBAFC3000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
1664FDE000
unkown
page read and write
1B900E69000
heap
page read and write
223BE9A0000
heap
page execute and read and write
1B90161C000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
125AEE50000
heap
page read and write
23619C41000
heap
page read and write
2491E90B000
heap
page read and write
1B900E31000
heap
page read and write
7FFD9BB82000
trusted library allocation
page read and write
1B5EF37F000
heap
page read and write
223BEB30000
trusted library allocation
page read and write
2349AB99000
heap
page read and write
1B5EF37F000
heap
page read and write
23619C4C000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
1E0AB089000
trusted library allocation
page read and write
2361B57D000
heap
page read and write
22D6B907000
heap
page read and write
12F613B8000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
2361957D000
heap
page read and write
1B901114000
heap
page read and write
1E204122000
heap
page read and write
12BB7724000
heap
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
1B5EECEA000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
There are 1546 hidden memdumps, click here to show them.