IOC Report
A39tzaySzX.exe

loading gif

Files

File Path
Type
Category
Malicious
A39tzaySzX.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\RuntimeBroker
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x4d300deb, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tdgr3hb.0fn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5de3i03c.xsb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5pu0ct2r.ayt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_glbjohkb.xhi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_imzmhffo.ocj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iunublzp.mn4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmfv4cuf.f1l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ot5rexhx.zqm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qforbnhn.am5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sioqhl1m.u4b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_svxst01h.e12.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tmbju4kw.omc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vsdhun0f.gv2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vzydpe4z.rta.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xjws4u5w.k1e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zyw3ajrf.odi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 6 21:52:54 2024, mtime=Sun Oct 6 21:52:54 2024, atime=Sun Oct 6 21:52:54 2024, length=46592, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\A39tzaySzX.exe
"C:\Users\user\Desktop\A39tzaySzX.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\A39tzaySzX.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'A39tzaySzX.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\RuntimeBroker'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\user\AppData\Roaming\RuntimeBroker"
malicious
C:\Users\user\AppData\Roaming\RuntimeBroker
C:\Users\user\AppData\Roaming\RuntimeBroker
malicious
C:\Users\user\AppData\Roaming\RuntimeBroker
C:\Users\user\AppData\Roaming\RuntimeBroker
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
introduction-husband.gl.at.ply.gg
malicious
http://www.microsoft.coE
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://go.microsoft.co?
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://github.com/Pester/Pester
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
http://crl.m
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://.VisualC
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
introduction-husband.gl.at.ply.gg
147.185.221.23
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.23
introduction-husband.gl.at.ply.gg
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
25A1000
trusted library allocation
page read and write
malicious
312000
unkown
page readonly
malicious
7FF848E90000
trusted library allocation
page execute and read and write
21EA40D0000
trusted library allocation
page read and write
CE1000
heap
page read and write
224EB620000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF8490A5000
trusted library allocation
page read and write
1C992486000
trusted library allocation
page read and write
7FF848D42000
trusted library allocation
page read and write
1C9AAB70000
heap
page read and write
131A000
heap
page read and write
224E73F0000
trusted library allocation
page read and write
19DEFCD8000
heap
page read and write
1DF33C93000
heap
page read and write
81880C7000
stack
page read and write
1DF33DBD000
heap
page read and write
224E605C000
heap
page read and write
1DF33C93000
heap
page read and write
1C9AA8D4000
heap
page read and write
21EA1FD7000
heap
page read and write
1DF33C8E000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
8186E7E000
stack
page read and write
2DE64360000
trusted library section
page read and write
1C9AAC7A000
heap
page read and write
224E6815000
heap
page read and write
25823C4C000
trusted library allocation
page read and write
D38467B000
stack
page read and write
1DF33D87000
heap
page read and write
2DE7E5CC000
heap
page read and write
1DF337F5000
heap
page read and write
1DF33CA4000
heap
page read and write
1DF33D87000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
21EA1FCC000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
1DF33CB2000
heap
page read and write
1DF38280000
heap
page read and write
2DE7E4D0000
heap
page read and write
2583B5D7000
heap
page read and write
1DF337F0000
heap
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
1AFD0000
heap
page execute and read and write
224E6D40000
trusted library allocation
page read and write
1C993C92000
trusted library allocation
page read and write
21EA1ED3000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
2582429B000
trusted library allocation
page read and write
21EA1FB0000
heap
page read and write
77A5977000
stack
page read and write
1C993383000
trusted library allocation
page read and write
1DF33C8E000
heap
page read and write
1C9A26EF000
trusted library allocation
page read and write
81874FE000
stack
page read and write
1DF33D7B000
heap
page read and write
1DF33C83000
heap
page read and write
25823F06000
trusted library allocation
page read and write
1DF33DF5000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1DF31E0D000
heap
page read and write
2DE76141000
trusted library allocation
page read and write
2DE64570000
trusted library allocation
page read and write
C65000
heap
page read and write
1DF33C81000
heap
page read and write
1C9A2401000
trusted library allocation
page read and write
21EA1FB0000
heap
page read and write
27141C5C000
trusted library allocation
page read and write
2DE65FE2000
heap
page read and write
2DE7E603000
heap
page read and write
1C993714000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
1DF33C9C000
heap
page read and write
21EA1FE7000
heap
page read and write
21EA1FEA000
heap
page read and write
D383FDE000
stack
page read and write
21EA46ED000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
224EB6FC000
heap
page read and write
266F000
trusted library allocation
page read and write
2DE7E5C0000
heap
page read and write
1DF33C9E000
heap
page read and write
1DF31E3C000
heap
page read and write
21EA001C000
heap
page read and write
1DF33C7C000
heap
page read and write
1DF33C8F000
heap
page read and write
25824CFC000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
224EB690000
heap
page read and write
19DEFCDE000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
21EA0015000
heap
page read and write
7FF848D5B000
trusted library allocation
page read and write
12961000
trusted library allocation
page read and write
1DF33DF0000
heap
page read and write
21EA1EBC000
heap
page read and write
1C99098B000
heap
page read and write
CA6000
heap
page read and write
1DF33C7C000
heap
page read and write
21EA1FD7000
heap
page read and write
7FF848E26000
trusted library allocation
page read and write
27142EEA000
trusted library allocation
page read and write
224EB490000
trusted library allocation
page read and write
1DF33D9C000
heap
page read and write
2313000
trusted library allocation
page read and write
21EA1FCC000
heap
page read and write
C60000
heap
page read and write
1C9A2470000
trusted library allocation
page read and write
1C990A4D000
heap
page read and write
21EA1F94000
heap
page read and write
224EB6C5000
heap
page read and write
1DF31EB8000
heap
page read and write
1DF33CB2000
heap
page read and write
1DF33C8A000
heap
page read and write
1DF33C63000
heap
page read and write
1DF33C7E000
heap
page read and write
27140330000
heap
page read and write
21EA1ECB000
heap
page read and write
77A5CFE000
stack
page read and write
2DE7E5F2000
heap
page read and write
D3842FD000
stack
page read and write
1DF33D87000
heap
page read and write
21EA1EB6000
heap
page read and write
21EA1F40000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
21EA1FDD000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
2DE7E5B0000
heap
page read and write
2DE76446000
trusted library allocation
page read and write
21EA17FE000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
21EA1FD3000
heap
page read and write
27142C49000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
7DF4DA0B0000
trusted library allocation
page execute and read and write
7FF848D74000
trusted library allocation
page read and write
224E691A000
heap
page read and write
1AEEE000
stack
page read and write
1C9AABBB000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
2715A308000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
21EA1EC0000
heap
page read and write
1DF33C8E000
heap
page read and write
27151EC8000
trusted library allocation
page read and write
25822DE0000
trusted library allocation
page read and write
1DF33CA8000
heap
page read and write
224EB661000
heap
page read and write
1DF33C94000
heap
page read and write
F31D273000
stack
page read and write
1C9934C5000
trusted library allocation
page read and write
1DF33C8E000
heap
page read and write
CC0000
trusted library allocation
page read and write
B70FDFD000
stack
page read and write
1DF33C6D000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
1DF33C50000
heap
page read and write
2F00000
heap
page read and write
45AFF7E000
unkown
page readonly
1DF33CAC000
heap
page read and write
21E9FFFF000
heap
page read and write
7FF848F24000
trusted library allocation
page read and write
224EB4C0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
21EA1FE6000
heap
page read and write
125AE000
trusted library allocation
page read and write
21EA1FF2000
heap
page read and write
1DF33C81000
heap
page read and write
1C993791000
trusted library allocation
page read and write
21EA1FF7000
heap
page read and write
2DE66D39000
trusted library allocation
page read and write
1DF33C98000
heap
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
1DF33CA2000
heap
page read and write
2DE65FB7000
heap
page read and write
1C9A2431000
trusted library allocation
page read and write
B7100FD000
stack
page read and write
1DF33C69000
heap
page read and write
1DF31E90000
heap
page read and write
F31E5CC000
stack
page read and write
1DF33E2E000
heap
page read and write
1DF31E2E000
heap
page read and write
1DF33C98000
heap
page read and write
1DF33D9D000
heap
page read and write
1DF33C58000
heap
page read and write
21EA1F52000
heap
page read and write
25823F95000
trusted library allocation
page read and write
1DF33C9A000
heap
page read and write
21EA1F9B000
heap
page read and write
1DF33DC8000
heap
page read and write
1DF33C98000
heap
page read and write
1C9AA9D0000
heap
page execute and read and write
1DF33C7D000
heap
page read and write
1B544000
heap
page read and write
21EA1FCD000
heap
page read and write
818804E000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
21EA1FEB000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
21EA1EBA000
heap
page read and write
7FF848D34000
trusted library allocation
page read and write
1DF31EB9000
heap
page read and write
21EA1F22000
heap
page read and write
77A587A000
stack
page read and write
21EA0006000
heap
page read and write
1DF33C81000
heap
page read and write
818747F000
stack
page read and write
21EA46DF000
heap
page read and write
2715A41A000
heap
page read and write
25822D50000
heap
page readonly
271402E0000
heap
page execute and read and write
CA0000
heap
page read and write
21EA1F28000
heap
page read and write
21EA1FBC000
heap
page read and write
3B0000
heap
page read and write
21EA1FAB000
heap
page read and write
1DF33C86000
heap
page read and write
1C9AA407000
heap
page read and write
307F000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
224EB6CB000
heap
page read and write
2DE66EBC000
trusted library allocation
page read and write
1B8AE000
stack
page read and write
1C9AA9D6000
heap
page execute and read and write
1DF33C94000
heap
page read and write
7FF848D5B000
trusted library allocation
page read and write
8187277000
stack
page read and write
D3845FD000
stack
page read and write
1DF33C8A000
heap
page read and write
77A5C7E000
stack
page read and write
1DF33C9E000
heap
page read and write
25822CE0000
heap
page read and write
1DF33C93000
heap
page read and write
25823F00000
trusted library allocation
page read and write
1DF31EA7000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
21EA1FEE000
heap
page read and write
1DF33C81000
heap
page read and write
2DE7E5B4000
heap
page read and write
7FF848F58000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
27143471000
trusted library allocation
page read and write
8187379000
stack
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
21EA1FC8000
heap
page read and write
25823E31000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
21EA1EE9000
heap
page read and write
2583AED1000
heap
page read and write
25823E42000
trusted library allocation
page read and write
1DF33C98000
heap
page read and write
77A5AF6000
stack
page read and write
25832F01000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1DF33CA4000
heap
page read and write
1C9AAC6E000
heap
page read and write
F31D87F000
stack
page read and write
1DF33C69000
heap
page read and write
1C9AAB4A000
heap
page read and write
1DF33DFF000
heap
page read and write
21EA000F000
heap
page read and write
258213C0000
heap
page read and write
1DF33C98000
heap
page read and write
224E60A3000
heap
page read and write
7FF84918B000
trusted library allocation
page read and write
2DE64425000
heap
page read and write
21EA46B4000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1DF33D7B000
heap
page read and write
2DE7E480000
heap
page execute and read and write
21EA000A000
heap
page read and write
92BEF7F000
stack
page read and write
7FF8491CD000
trusted library allocation
page read and write
1DF33C94000
heap
page read and write
21EA1F59000
heap
page read and write
D10000
heap
page read and write
1C9AAC50000
heap
page read and write
21EA1ED3000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
21EA1FEE000
heap
page read and write
21EA1FC3000
heap
page read and write
1DF33C6E000
heap
page read and write
224E695A000
heap
page read and write
7FF848F22000
trusted library allocation
page read and write
12968000
trusted library allocation
page read and write
D0B000
heap
page read and write
1DF31E46000
heap
page read and write
21EA1F9C000
heap
page read and write
1DF33DDE000
heap
page read and write
27141BA0000
heap
page execute and read and write
224EB520000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
21EA1FC4000
heap
page read and write
77A69CC000
stack
page read and write
1C992200000
trusted library allocation
page read and write
1DF33C98000
heap
page read and write
92C014D000
stack
page read and write
21EA1FDE000
heap
page read and write
7FF849099000
trusted library allocation
page read and write
961000
heap
page read and write
1DF33D87000
heap
page read and write
2617000
trusted library allocation
page read and write
258212E0000
heap
page read and write
45AF87E000
unkown
page readonly
77A56FE000
stack
page read and write
2DE64655000
heap
page read and write
21E9FFFF000
heap
page read and write
21EA1FD7000
heap
page read and write
21EA1F95000
heap
page read and write
92BF07E000
stack
page read and write
21EA1FEB000
heap
page read and write
1DF33C81000
heap
page read and write
1B32E000
stack
page read and write
45B06FE000
stack
page read and write
45AFA77000
stack
page read and write
1C9922B0000
trusted library allocation
page read and write
1DF31E89000
heap
page read and write
1C99098E000
heap
page read and write
7FF8490DA000
trusted library allocation
page read and write
258331B9000
trusted library allocation
page read and write
2DE67144000
trusted library allocation
page read and write
7FF8490D5000
trusted library allocation
page read and write
1DF33CB2000
heap
page read and write
8187F4E000
stack
page read and write
1C990910000
trusted library section
page read and write
258240E7000
trusted library allocation
page read and write
7FF848F54000
trusted library allocation
page read and write
2715A44A000
heap
page read and write
224E6000000
heap
page read and write
818717D000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
1DF33CAE000
heap
page read and write
1C9A26F7000
trusted library allocation
page read and write
21EA1F5A000
heap
page read and write
1DF33C56000
heap
page read and write
27142EEE000
trusted library allocation
page read and write
21EA001C000
heap
page read and write
2DE76161000
trusted library allocation
page read and write
2DE66141000
trusted library allocation
page read and write
F31D5FD000
stack
page read and write
224EB580000
trusted library allocation
page read and write
27140088000
heap
page read and write
21EA1FD7000
heap
page read and write
21EA1ECB000
heap
page read and write
21EA1FC8000
heap
page read and write
1DF33D40000
heap
page read and write
21E9FFFF000
heap
page read and write
2605000
trusted library allocation
page read and write
7FF849132000
trusted library allocation
page read and write
1DF31E52000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
21EA1FCC000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
25823E3E000
trusted library allocation
page read and write
1DF31DC0000
heap
page read and write
27151C01000
trusted library allocation
page read and write
1C9AAC93000
heap
page read and write
21EA1FC4000
heap
page read and write
1DF33C8E000
heap
page read and write
1BB2F000
stack
page read and write
224EB62D000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
77A67CE000
stack
page read and write
1DF33C78000
heap
page read and write
7FF848E16000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
1240000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
7FF849160000
trusted library allocation
page read and write
27143533000
trusted library allocation
page read and write
1DF33DD0000
heap
page read and write
21EA1FF2000
heap
page read and write
F31E3CE000
stack
page read and write
7FF848F22000
trusted library allocation
page read and write
21EA0008000
heap
page read and write
92C01CE000
stack
page read and write
7FF848D40000
trusted library allocation
page read and write
21EA1FBA000
heap
page read and write
1DF33CB2000
heap
page read and write
27140080000
heap
page read and write
307C000
trusted library allocation
page read and write
2DE64617000
heap
page execute and read and write
1C993B86000
trusted library allocation
page read and write
1DF33DD0000
heap
page read and write
224E6079000
heap
page read and write
1DF33C93000
heap
page read and write
2DE67F6B000
trusted library allocation
page read and write
1DF33C9A000
heap
page read and write
1DF33CAA000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
271400C4000
heap
page read and write
AF0000
heap
page read and write
21EA46BD000
heap
page read and write
7DF427B20000
trusted library allocation
page execute and read and write
2715A448000
heap
page read and write
2583B5F4000
heap
page read and write
1C990895000
heap
page read and write
21E9FFFD000
heap
page read and write
1B5DF000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
2637000
trusted library allocation
page read and write
2DE6744C000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1DF33E1D000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1C9909B9000
heap
page read and write
2715A111000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
2582417A000
trusted library allocation
page read and write
1BA20000
heap
page read and write
2DE7642E000
trusted library allocation
page read and write
224E6129000
heap
page read and write
D38437E000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1C048000
stack
page read and write
1DF33C9E000
heap
page read and write
1DF33DC8000
heap
page read and write
1DF33E1D000
heap
page read and write
21EA1F6B000
heap
page read and write
1C9936AD000
trusted library allocation
page read and write
E9F000
stack
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
224E6E70000
trusted library allocation
page read and write
3D5000
heap
page read and write
1DF31E82000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
224EB6F1000
heap
page read and write
224E5E70000
heap
page read and write
1DF33C5E000
heap
page read and write
224EB6F8000
heap
page read and write
224E7050000
trusted library section
page readonly
1DF33D41000
heap
page read and write
1C9936E2000
trusted library allocation
page read and write
21EA46B6000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
224E5E90000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
82F000
stack
page read and write
2DE76382000
trusted library allocation
page read and write
21E9FFFD000
heap
page read and write
1DF33E22000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1B36E000
stack
page read and write
77A5BF8000
stack
page read and write
21EA1FDD000
heap
page read and write
224EB5A0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
21EA1FE7000
heap
page read and write
21EA1FEE000
heap
page read and write
1DF33DF0000
heap
page read and write
1DF33C7C000
heap
page read and write
45B137E000
unkown
page readonly
1DF33C64000
heap
page read and write
21EA1FA1000
heap
page read and write
21EA1FE7000
heap
page read and write
1C993529000
trusted library allocation
page read and write
81872F8000
stack
page read and write
21EA1FE1000
heap
page read and write
2583B391000
heap
page read and write
81870F9000
stack
page read and write
1DF3829B000
heap
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
AF1000
stack
page read and write
1DF33DD0000
heap
page read and write
27151ED7000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
27143A09000
trusted library allocation
page read and write
1DF33DD0000
heap
page read and write
21EA002A000
heap
page read and write
21EA1FA4000
heap
page read and write
224E6113000
heap
page read and write
1DF33E07000
heap
page read and write
C30000
heap
page read and write
1DF31E81000
heap
page read and write
21EA46EB000
heap
page read and write
45B077E000
unkown
page readonly
2DE7E5C4000
heap
page read and write
1DF33C94000
heap
page read and write
1DF33C8F000
heap
page read and write
2DE643A8000
heap
page read and write
2DE642E0000
heap
page read and write
7FF849185000
trusted library allocation
page read and write
21EA1FF2000
heap
page read and write
1BD0E000
stack
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7DF48A830000
trusted library allocation
page execute and read and write
1DF33CA6000
heap
page read and write
21EA1FCC000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1DF33C57000
heap
page read and write
81873FF000
stack
page read and write
224E6013000
heap
page read and write
7FF848F28000
trusted library allocation
page read and write
2583B71D000
heap
page read and write
127A000
heap
page read and write
1C993005000
trusted library allocation
page read and write
1C99096E000
heap
page read and write
1C990790000
heap
page read and write
25821457000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
B30000
heap
page read and write
2DE661C5000
trusted library allocation
page read and write
7FF8490A3000
trusted library allocation
page read and write
7FF848F2A000
trusted library allocation
page read and write
1DF33D69000
heap
page read and write
7FF849073000
trusted library allocation
page read and write
92BF2F9000
stack
page read and write
21EA1FD3000
heap
page read and write
92BF378000
stack
page read and write
21EA46BE000
heap
page read and write
2DE66369000
trusted library allocation
page read and write
77A68CE000
stack
page read and write
1C993D53000
trusted library allocation
page read and write
21EA1FE6000
heap
page read and write
1DF31E62000
heap
page read and write
21EA0036000
heap
page read and write
2DE65FD9000
heap
page read and write
2DE7E5C8000
heap
page read and write
21EA1FB0000
heap
page read and write
27142952000
trusted library allocation
page read and write
D383ED7000
stack
page read and write
258331D7000
trusted library allocation
page read and write
1DF33C65000
heap
page read and write
2DE64610000
heap
page execute and read and write
25822D40000
trusted library allocation
page read and write
F31D2FE000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
21EA1EC2000
heap
page read and write
21EA1FF7000
heap
page read and write
21EA1F6A000
heap
page read and write
8186F7E000
stack
page read and write
27151E20000
trusted library allocation
page read and write
7FF848D72000
trusted library allocation
page read and write
1C994204000
trusted library allocation
page read and write
B70FE7D000
stack
page read and write
2DE66B93000
trusted library allocation
page read and write
1DF33C40000
heap
page read and write
21EA1FCC000
heap
page read and write
224E7070000
trusted library section
page readonly
21EA0006000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
1DF33DDE000
heap
page read and write
1DF33CA0000
heap
page read and write
2DE66EB3000
trusted library allocation
page read and write
25823BE5000
trusted library allocation
page read and write
21EA0033000
heap
page read and write
25822D00000
trusted library section
page read and write
7FF849030000
trusted library allocation
page read and write
224E691A000
heap
page read and write
21EA1FDD000
heap
page read and write
2582146B000
heap
page read and write
224EB480000
trusted library allocation
page read and write
1DF33CA2000
heap
page read and write
7FF849094000
trusted library allocation
page read and write
1DF33C8E000
heap
page read and write
21EA1FE1000
heap
page read and write
224EB5F0000
remote allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1DF33C74000
heap
page read and write
224E6043000
heap
page read and write
21EA1FC9000
heap
page read and write
21EA1FEF000
heap
page read and write
224EB590000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
7FF848D50000
trusted library allocation
page read and write
935000
heap
page read and write
1DF33740000
heap
page read and write
19DEFCB0000
heap
page read and write
12963000
trusted library allocation
page read and write
21EA1FE1000
heap
page read and write
1C990940000
trusted library allocation
page read and write
21EA1FA6000
heap
page read and write
1DF3828D000
heap
page read and write
27151C4F000
trusted library allocation
page read and write
1C9AA938000
heap
page read and write
21EA1FEE000
heap
page read and write
1C9AA850000
heap
page read and write
224E6A91000
trusted library allocation
page read and write
21EA1FDD000
heap
page read and write
224E6075000
heap
page read and write
1DF31E6C000
heap
page read and write
1B16E000
stack
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
21EA000D000
heap
page read and write
224E5FA0000
trusted library allocation
page read and write
2DE67F21000
trusted library allocation
page read and write
2DE67F66000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1DF33D82000
heap
page read and write
45B08FE000
stack
page read and write
1C9AAA00000
heap
page read and write
1C9909BE000
heap
page read and write
1DF33C87000
heap
page read and write
1CA5C000
stack
page read and write
1DF33C54000
heap
page read and write
25823922000
trusted library allocation
page read and write
27142EE6000
trusted library allocation
page read and write
21EA1FB9000
heap
page read and write
224E6E60000
trusted library allocation
page read and write
1DF33C87000
heap
page read and write
21EA1FBA000
heap
page read and write
1DF33CAA000
heap
page read and write
2F60000
heap
page execute and read and write
1DF33DDE000
heap
page read and write
1DF33CA4000
heap
page read and write
7FF848F12000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
45B017E000
unkown
page readonly
21EA0020000
heap
page read and write
ED0000
trusted library allocation
page read and write
25822E50000
heap
page execute and read and write
1DF33DC8000
heap
page read and write
1B4DF000
stack
page read and write
27142F26000
trusted library allocation
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
21EA1FB5000
heap
page read and write
1DF33C94000
heap
page read and write
1DF31E3D000
heap
page read and write
1DF33C93000
heap
page read and write
2715A220000
heap
page read and write
1C9A2707000
trusted library allocation
page read and write
1C994224000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
1DF33C8E000
heap
page read and write
21EA1FC8000
heap
page read and write
2DE679AC000
trusted library allocation
page read and write
24BE000
stack
page read and write
2800000
heap
page execute and read and write
7FF848E60000
trusted library allocation
page execute and read and write
2DE67263000
trusted library allocation
page read and write
CAC000
heap
page read and write
1DF33C7C000
heap
page read and write
1DF33C77000
heap
page read and write
1DF33CA0000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
1DF38293000
heap
page read and write
21EA1FF7000
heap
page read and write
2583B6FE000
heap
page read and write
21EA1FD7000
heap
page read and write
21EA46C8000
heap
page read and write
1DF35E90000
trusted library allocation
page read and write
21EA1EC4000
heap
page read and write
1DF31EAA000
heap
page read and write
21EA1FD7000
heap
page read and write
92BEEFE000
stack
page read and write
1DF33CAA000
heap
page read and write
1DF33C8F000
heap
page read and write
B70FC7E000
stack
page read and write
21E9FE30000
heap
page read and write
21EA1FB5000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
27142B81000
trusted library allocation
page read and write
1DF33CA6000
heap
page read and write
25823C55000
trusted library allocation
page read and write
1B5FD000
stack
page read and write
7FF8490A8000
trusted library allocation
page read and write
21EA1FF2000
heap
page read and write
1DF33C9E000
heap
page read and write
1C9AA88A000
heap
page read and write
9B1000
heap
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
21EA1FC8000
heap
page read and write
15AE000
stack
page read and write
2715A15B000
heap
page read and write
8FC000
heap
page read and write
21EA1FD3000
heap
page read and write
2DE65F46000
heap
page read and write
3D0000
heap
page read and write
D38427E000
stack
page read and write
F31D577000
stack
page read and write
224EB610000
heap
page read and write
1DF33C63000
heap
page read and write
1DF33C8E000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1DF31E71000
heap
page read and write
1DF3829B000
heap
page read and write
21EA17FD000
heap
page read and write
2715A147000
heap
page read and write
1DF33D7B000
heap
page read and write
7FF8490A2000
trusted library allocation
page read and write
21EA1FD4000
heap
page read and write
1DF33D7B000
heap
page read and write
21EA1E88000
heap
page read and write
21EA1FC4000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
21E9FFBC000
heap
page read and write
1DF33CB8000
heap
page read and write
1DF3828B000
heap
page read and write
7FF8490C9000
trusted library allocation
page read and write
45B05FE000
stack
page read and write
2DE7E7D0000
trusted library allocation
page read and write
2DE65EE0000
heap
page read and write
1DF33C6D000
heap
page read and write
1DF33CA0000
heap
page read and write
7DF427B30000
trusted library allocation
page execute and read and write
1C99336E000
trusted library allocation
page read and write
1DF33C9A000
heap
page read and write
1DF33CA2000
heap
page read and write
1C9AACBD000
heap
page read and write
1DF33E1F000
heap
page read and write
77A6949000
stack
page read and write
21EA1FD7000
heap
page read and write
19DEFE20000
heap
page read and write
1DF33C8A000
heap
page read and write
21EA1FF7000
heap
page read and write
21EA1FB9000
heap
page read and write
1DF33C9C000
heap
page read and write
2DE671D4000
trusted library allocation
page read and write
21EA1FD3000
heap
page read and write
21EA1FB9000
heap
page read and write
1C993618000
trusted library allocation
page read and write
224E608B000
heap
page read and write
1DF33C93000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
1DF31BF0000
heap
page read and write
21EA1FDD000
heap
page read and write
25823FF8000
trusted library allocation
page read and write
45B0B7A000
stack
page read and write
1C9A2421000
trusted library allocation
page read and write
1DF38287000
heap
page read and write
1DF33C77000
heap
page read and write
21E9FFCD000
heap
page read and write
2715A443000
heap
page read and write
1C9923D0000
heap
page execute and read and write
25822F57000
trusted library allocation
page read and write
27141BE1000
trusted library allocation
page read and write
21EA1ECB000
heap
page read and write
7FF8490D8000
trusted library allocation
page read and write
7DF43E360000
trusted library allocation
page execute and read and write
1AB2C000
stack
page read and write
1DF31E6F000
heap
page read and write
1DF38287000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1DF33C9A000
heap
page read and write
7FF8490AC000
trusted library allocation
page read and write
25823ADF000
trusted library allocation
page read and write
224E6913000
heap
page read and write
1BE0F000
stack
page read and write
1DF33CAE000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
1DF33C9C000
heap
page read and write
7FF8490AC000
trusted library allocation
page read and write
21EA1FE7000
heap
page read and write
2583B3CB000
heap
page read and write
45B04FE000
stack
page read and write
92BEE7E000
stack
page read and write
7FF8491B0000
trusted library allocation
page read and write
B70FD7E000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
1DF33CA2000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
1DF33C8A000
heap
page read and write
1DF33DF0000
heap
page read and write
271400CA000
heap
page read and write
13073000
trusted library allocation
page read and write
1C9AAB42000
heap
page read and write
7FF849001000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1DF33D7B000
heap
page read and write
1DF33D91000
heap
page read and write
7FF848F52000
trusted library allocation
page read and write
2DE64590000
trusted library allocation
page read and write
21EA000A000
heap
page read and write
21EA1F90000
heap
page read and write
1B4BF000
heap
page read and write
2DE66130000
heap
page execute and read and write
1C9921F0000
heap
page readonly
21EA1FE6000
heap
page read and write
B70FCFF000
stack
page read and write
258240AE000
trusted library allocation
page read and write
25821494000
heap
page read and write
92BF47E000
stack
page read and write
295F000
stack
page read and write
21EA1FE6000
heap
page read and write
21EA1FCD000
heap
page read and write
21EA1FEB000
heap
page read and write
F31D7F8000
stack
page read and write
D3843FB000
stack
page read and write
1DF31E64000
heap
page read and write
25823E35000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
1DF33CAC000
heap
page read and write
1DF33DD5000
heap
page read and write
21EA1FCC000
heap
page read and write
1DF33C77000
heap
page read and write
1DF31E93000
heap
page read and write
7FF848F21000
trusted library allocation
page read and write
8187FCC000
stack
page read and write
1DF33C81000
heap
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
F31E549000
stack
page read and write
21EA1FFE000
heap
page read and write
21EA1FEA000
heap
page read and write
25EA000
trusted library allocation
page read and write
224EB6ED000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
1DF33DDE000
heap
page read and write
1C9922E0000
trusted library allocation
page read and write
8F6000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1DF33CA8000
heap
page read and write
81881CE000
stack
page read and write
258213E0000
heap
page read and write
2715A42E000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
13078000
trusted library allocation
page read and write
1DF33C7C000
heap
page read and write
21E9FF10000
heap
page read and write
2DE76434000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
21EA1FE1000
heap
page read and write
1DF33D5F000
heap
page read and write
224E602B000
heap
page read and write
1C9AAC84000
heap
page read and write
21EA004B000
heap
page read and write
25824659000
trusted library allocation
page read and write
1DF33C7D000
heap
page read and write
1DF33CA2000
heap
page read and write
1DF31CD0000
heap
page read and write
2DE643B2000
heap
page read and write
1DF31E71000
heap
page read and write
2582339D000
trusted library allocation
page read and write
271400BB000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
77A577E000
stack
page read and write
224EB640000
heap
page read and write
271400C2000
heap
page read and write
1C992240000
heap
page execute and read and write
2DE643E8000
heap
page read and write
45B177E000
unkown
page readonly
7FF8490E0000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
2DE67170000
trusted library allocation
page read and write
1DF33CB2000
heap
page read and write
7FF8490C9000
trusted library allocation
page read and write
25821497000
heap
page read and write
1B39FD9000
stack
page read and write
2DE76427000
trusted library allocation
page read and write
1DF33C93000
heap
page read and write
27140270000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
2715A0F0000
heap
page execute and read and write
7FF848D40000
trusted library allocation
page read and write
21EA1FF7000
heap
page read and write
21EA1FF2000
heap
page read and write
21EA0018000
heap
page read and write
7FF848D72000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
1DF33CA0000
heap
page read and write
21EA1FCC000
heap
page read and write
1DF33C94000
heap
page read and write
1DF33D62000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1DF33CA6000
heap
page read and write
21EA1FB9000
heap
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
1DF33D4F000
heap
page read and write
1DF33C9A000
heap
page read and write
1DF33DF0000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
21EA46E7000
heap
page read and write
2DE673EA000
trusted library allocation
page read and write
2583B320000
heap
page read and write
21EA1FF2000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
21EA46E7000
heap
page read and write
2583B7F0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1DF33C78000
heap
page read and write
D69000
heap
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
CE5000
heap
page read and write
21EA1FD8000
heap
page read and write
1DF33DC8000
heap
page read and write
1C9AAB46000
heap
page read and write
7FF848DF6000
trusted library allocation
page read and write
1DF33CB2000
heap
page read and write
1DF33C85000
heap
page read and write
27142DBF000
trusted library allocation
page read and write
21EA1FD3000
heap
page read and write
2DE65FD7000
heap
page read and write
21EA1FEA000
heap
page read and write
1DF33DC8000
heap
page read and write
1DF33C8E000
heap
page read and write
21EA1FF2000
heap
page read and write
1DF33CA6000
heap
page read and write
1B507000
heap
page read and write
21EA1FB0000
heap
page read and write
261C000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
21EA46DD000
heap
page read and write
21EA1FAA000
heap
page read and write
92BEBB3000
stack
page read and write
2DE67507000
trusted library allocation
page read and write
2DE761AE000
trusted library allocation
page read and write
27151ECD000
trusted library allocation
page read and write
224E6F70000
trusted library allocation
page read and write
1DF33C90000
heap
page read and write
21EA1EBC000
heap
page read and write
21EA1FF2000
heap
page read and write
224EB6C1000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
25821453000
heap
page read and write
77A57FF000
stack
page read and write
1DF31EB8000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
45B0A7E000
unkown
page readonly
2DE643A0000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
27151EE7000
trusted library allocation
page read and write
27140335000
heap
page read and write
31E000
unkown
page readonly
25822D10000
trusted library section
page read and write
1DF33CAE000
heap
page read and write
1B3A27E000
unkown
page read and write
7FF849090000
trusted library allocation
page read and write
F31D676000
stack
page read and write
12A7000
heap
page read and write
21EA1FD7000
heap
page read and write
1DF31EB8000
heap
page read and write
21EA1F92000
heap
page read and write
1DF33D82000
heap
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
1DF33C78000
heap
page read and write
1DF33C79000
heap
page read and write
21EA1FF2000
heap
page read and write
224E6077000
heap
page read and write
224EB6BF000
heap
page read and write
7DF43E370000
trusted library allocation
page execute and read and write
45B087E000
unkown
page readonly
21EA1F91000
heap
page read and write
1DF38282000
heap
page read and write
258241AA000
trusted library allocation
page read and write
27140070000
trusted library section
page read and write
310000
unkown
page readonly
1DF33CB2000
heap
page read and write
1DF33C8E000
heap
page read and write
1C993376000
trusted library allocation
page read and write
21EA17F0000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
2DE67F46000
trusted library allocation
page read and write
21E9FFF3000
heap
page read and write
7FF8490A8000
trusted library allocation
page read and write
818814D000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
224E60FE000
heap
page read and write
27140060000
trusted library section
page read and write
1DF33C78000
heap
page read and write
21EA1FC1000
heap
page read and write
92BF1F9000
stack
page read and write
7FF848D44000
trusted library allocation
page read and write
21EA1FC1000
heap
page read and write
21EA1EAA000
heap
page read and write
21EA1FEA000
heap
page read and write
45B097E000
unkown
page readonly
1C993365000
trusted library allocation
page read and write
CE4000
heap
page read and write
2583B3A0000
heap
page read and write
2DE645C0000
trusted library allocation
page read and write
2DE6600D000
heap
page read and write
21EA1EBE000
heap
page read and write
1DF33D92000
heap
page read and write
1DF33CB2000
heap
page read and write
21EA1F92000
heap
page read and write
21EA1FF2000
heap
page read and write
2DE66D75000
trusted library allocation
page read and write
1BAAD000
stack
page read and write
21EA1FF2000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
D0D000
heap
page read and write
21EA1FEA000
heap
page read and write
7FF8491CD000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
21EA1FC8000
heap
page read and write
21EA1FEE000
heap
page read and write
21EA1FEE000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
45B047E000
unkown
page readonly
2583B5D9000
heap
page read and write
1DF31E88000
heap
page read and write
1DF33DFF000
heap
page read and write
2582144B000
heap
page read and write
21EA1FEE000
heap
page read and write
21EA1FCC000
heap
page read and write
224EB5A0000
trusted library allocation
page read and write
1B060000
heap
page read and write
7FF848F58000
trusted library allocation
page read and write
7FF848F54000
trusted library allocation
page read and write
12E7000
heap
page read and write
21EA1FE1000
heap
page read and write
25822CD5000
heap
page read and write
1C150000
heap
page read and write
25824CF7000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
2300000
trusted library allocation
page read and write
1DF33D67000
heap
page read and write
1C9A26ED000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
1DF33C93000
heap
page read and write
1DF33CA0000
heap
page read and write
1DF33CA8000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
21EA1FEA000
heap
page read and write
1DF31E82000
heap
page read and write
21EA46DA000
heap
page read and write
1DF33C6D000
heap
page read and write
1B9AD000
stack
page read and write
F31E4CE000
stack
page read and write
1DF33C7D000
heap
page read and write
1DF33CAC000
heap
page read and write
1C99346B000
trusted library allocation
page read and write
2DE7E5B8000
heap
page read and write
258216B0000
heap
page read and write
1DF33CAC000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
1C994229000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
92BF3FE000
stack
page read and write
1DF33CAA000
heap
page read and write
21EA1FF7000
heap
page read and write
27141AE0000
trusted library allocation
page read and write
21EA1FC0000
heap
page read and write
1DF33C93000
heap
page read and write
21EA46DA000
heap
page read and write
1DF33CAE000
heap
page read and write
1DF31E8C000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
2625000
trusted library allocation
page read and write
21EA1FE1000
heap
page read and write
1C9AABF7000
heap
page read and write
1DF31E4E000
heap
page read and write
224E609D000
heap
page read and write
1DF33C78000
heap
page read and write
2642000
trusted library allocation
page read and write
2583B6E1000
heap
page read and write
21EA1EEA000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
258230F9000
trusted library allocation
page read and write
CDF000
heap
page read and write
1DF33C7C000
heap
page read and write
224EB5F0000
remote allocation
page read and write
27141BD0000
heap
page read and write
1DF33C81000
heap
page read and write
45B0F7E000
unkown
page readonly
1B063000
heap
page read and write
1DF33CB8000
heap
page read and write
1DF33C8A000
heap
page read and write
25832F40000
trusted library allocation
page read and write
1DF33C78000
heap
page read and write
2715A152000
heap
page read and write
21EA1EBE000
heap
page read and write
1DF33C9C000
heap
page read and write
1C9A26E9000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
1DF33C8A000
heap
page read and write
21EA1FA3000
heap
page read and write
27140030000
heap
page read and write
2DE64650000
heap
page read and write
224EB494000
trusted library allocation
page read and write
45B1079000
stack
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
1C9AAB3A000
heap
page read and write
21EA1FE1000
heap
page read and write
1BE45000
stack
page read and write
1C660000
heap
page read and write
1DF33DD0000
heap
page read and write
21EA1EA2000
heap
page read and write
1DF33CA0000
heap
page read and write
7FF8490C4000
trusted library allocation
page read and write
21EA1FF7000
heap
page read and write
271439BF000
trusted library allocation
page read and write
27141B10000
trusted library allocation
page read and write
224E608D000
heap
page read and write
2DE642D0000
heap
page read and write
3081000
trusted library allocation
page read and write
1DF33C86000
heap
page read and write
224E60BA000
heap
page read and write
224EB440000
trusted library allocation
page read and write
7FF84914E000
trusted library allocation
page read and write
1DF31E58000
heap
page read and write
2DE6731F000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF848E80000
trusted library allocation
page execute and read and write
2715A13E000
heap
page read and write
1DF33C7C000
heap
page read and write
21EA46BD000
heap
page read and write
21EA1F32000
heap
page read and write
25822D60000
heap
page execute and read and write
21EA48D0000
heap
page read and write
B70F9FE000
stack
page read and write
27142EF6000
trusted library allocation
page read and write
2629000
trusted library allocation
page read and write
7FF849099000
trusted library allocation
page read and write
1DF33C52000
heap
page read and write
92BF276000
stack
page read and write
1C55A000
stack
page read and write
92C00C9000
stack
page read and write
27159BEE000
heap
page read and write
21EA1FCC000
heap
page read and write
21EA1F14000
heap
page read and write
2DE65EF0000
heap
page read and write
27142AD3000
trusted library allocation
page read and write
224E6900000
heap
page read and write
932000
heap
page read and write
1DF33C8E000
heap
page read and write
1890000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
25821492000
heap
page read and write
21EA000B000
heap
page read and write
21EA1EC4000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1DF33C86000
heap
page read and write
45B067E000
unkown
page readonly
21EA1FDD000
heap
page read and write
21EA1FF4000
heap
page read and write
7FF848F2A000
trusted library allocation
page read and write
1DF33DD5000
heap
page read and write
1DF31E60000
heap
page read and write
FA1000
stack
page read and write
21EA0015000
heap
page read and write
77A684C000
stack
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
1C990990000
heap
page read and write
21EA1FCC000
heap
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
2DE7E5BC000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
2DE76436000
trusted library allocation
page read and write
77A5D7E000
stack
page read and write
25823E39000
trusted library allocation
page read and write
224EB6F3000
heap
page read and write
1DF33C94000
heap
page read and write
21EA1FDD000
heap
page read and write
21EA1FE7000
heap
page read and write
1C990890000
heap
page read and write
21EA1F99000
heap
page read and write
25832EF1000
trusted library allocation
page read and write
2715A42B000
heap
page read and write
1B46B000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
21EA1FD7000
heap
page read and write
1DF33CAA000
heap
page read and write
1DF33C81000
heap
page read and write
21EA1FF7000
heap
page read and write
2583B70D000
heap
page read and write
2583B66C000
heap
page read and write
77A58FF000
stack
page read and write
B70FEFB000
stack
page read and write
7FF8491A0000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
21EA0029000
heap
page read and write
1C9941DF000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1DF31E4A000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
21EA1F14000
heap
page read and write
21EA1F52000
heap
page read and write
125A1000
trusted library allocation
page read and write
224EB520000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
2DE6660D000
trusted library allocation
page read and write
1C990920000
trusted library allocation
page read and write
2DE643DD000
heap
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
21EA0006000
heap
page read and write
21EA1FE1000
heap
page read and write
1DF33C8E000
heap
page read and write
1C993115000
trusted library allocation
page read and write
1C9909BB000
heap
page read and write
19DEFCD0000
heap
page read and write
1DF33C8E000
heap
page read and write
1DF33CA6000
heap
page read and write
21EA1FD9000
heap
page read and write
1DF33C81000
heap
page read and write
1DF31E4A000
heap
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
27142D08000
trusted library allocation
page read and write
2DE64300000
heap
page read and write
21EA1F40000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1DF33DDE000
heap
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
21EA1FB9000
heap
page read and write
7FF849094000
trusted library allocation
page read and write
21EA1F9C000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
2645000
trusted library allocation
page read and write
1C9937CF000
trusted library allocation
page read and write
1DF33CA0000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1DF33C86000
heap
page read and write
21EA1FF7000
heap
page read and write
92BEFF9000
stack
page read and write
1C9922A5000
heap
page read and write
16AF000
stack
page read and write
1B7AE000
stack
page read and write
3071000
trusted library allocation
page read and write
1DF33DC8000
heap
page read and write
77A5A79000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
224EB430000
trusted library allocation
page read and write
224EB654000
heap
page read and write
1DF33CAC000
heap
page read and write
21EA1FD3000
heap
page read and write
1DF33C8E000
heap
page read and write
21E9FFB5000
heap
page read and write
25821459000
heap
page read and write
27151ECF000
trusted library allocation
page read and write
2DE643E4000
heap
page read and write
1B6DE000
stack
page read and write
21EA1F95000
heap
page read and write
27142C79000
trusted library allocation
page read and write
271400C6000
heap
page read and write
45B0C7E000
unkown
page readonly
77A5673000
stack
page read and write
1DF33DD5000
heap
page read and write
818757B000
stack
page read and write
1DF33C8E000
heap
page read and write
21EA1EB6000
heap
page read and write
1C992628000
trusted library allocation
page read and write
25824826000
trusted library allocation
page read and write
27151C11000
trusted library allocation
page read and write
19DEFBB0000
heap
page read and write
224EB480000
trusted library allocation
page read and write
21EA1FAC000
heap
page read and write
21EA1EA1000
heap
page read and write
3E0000
heap
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
21EA1FE7000
heap
page read and write
21EA1EAE000
heap
page read and write
1BC00000
heap
page execute and read and write
25823E46000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
25821449000
heap
page read and write
1C9922A0000
heap
page read and write
21EA1FF2000
heap
page read and write
2DE64600000
trusted library allocation
page read and write
224E5FB0000
trusted library section
page read and write
F31D8FF000
stack
page read and write
1C990958000
heap
page read and write
C70000
heap
page read and write
2DE643FE000
heap
page read and write
1DF33C9E000
heap
page read and write
45B03FE000
stack
page read and write
21EA1FC8000
heap
page read and write
45AFC7E000
stack
page read and write
1DF33DD5000
heap
page read and write
8186FF9000
stack
page read and write
1DF33D5B000
heap
page read and write
21EA46C7000
heap
page read and write
1DF33C83000
heap
page read and write
92BF5FB000
stack
page read and write
1249000
heap
page read and write
2715A100000
heap
page read and write
224EB64D000
heap
page read and write
21EA1ED8000
heap
page read and write
21EA1FC8000
heap
page read and write
1C9AA980000
trusted library allocation
page read and write
224EB470000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
21EA1FD3000
heap
page read and write
2715A3B1000
heap
page read and write
21EA1F80000
heap
page read and write
1C9AAAE0000
heap
page read and write
2DE65F3C000
heap
page read and write
21EA1FD3000
heap
page read and write
21EA46C7000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
27142CA5000
trusted library allocation
page read and write
21EA1ED3000
heap
page read and write
21EA1F92000
heap
page read and write
21EA1F3C000
heap
page read and write
1C99300F000
trusted library allocation
page read and write
271400DC000
heap
page read and write
21EA1FC0000
heap
page read and write
2961000
trusted library allocation
page read and write
1DF31E58000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
21EA1FF2000
heap
page read and write
2682000
trusted library allocation
page read and write
92BEBFE000
stack
page read and write
21EA1FF7000
heap
page read and write
1DF33C81000
heap
page read and write
1C990950000
heap
page read and write
1C9A2410000
trusted library allocation
page read and write
1C9908E0000
heap
page read and write
2DE64580000
heap
page readonly
45AFD7E000
unkown
page readonly
7FF848DCC000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
F31D4FE000
stack
page read and write
1DF31E7E000
heap
page read and write
1268000
heap
page read and write
1DF38287000
heap
page read and write
21EA1FE6000
heap
page read and write
7FF8491D0000
trusted library allocation
page read and write
21EA1900000
heap
page read and write
224EB6FE000
heap
page read and write
1DF33C6A000
heap
page read and write
1265000
heap
page read and write
F31D9FB000
stack
page read and write
21EA46E7000
heap
page read and write
1DF38293000
heap
page read and write
21EA1FB9000
heap
page read and write
2715A1B0000
heap
page read and write
27143365000
trusted library allocation
page read and write
21EA1FEB000
heap
page read and write
1DF33C51000
heap
page read and write
2DE66D47000
trusted library allocation
page read and write
7FF848D42000
trusted library allocation
page read and write
1DF33C86000
heap
page read and write
21EA1FE1000
heap
page read and write
21EA002A000
heap
page read and write
1DF33C63000
heap
page read and write
224EB600000
heap
page read and write
1DF33CAE000
heap
page read and write
45B127D000
stack
page read and write
224E6070000
heap
page read and write
21EA1FE3000
heap
page read and write
21EA1FC1000
heap
page read and write
2713FFC0000
heap
page read and write
21EA1F90000
heap
page read and write
21EA1FF7000
heap
page read and write
258331C6000
trusted library allocation
page read and write
1DF33C94000
heap
page read and write
1DF33C94000
heap
page read and write
7FF8491C7000
trusted library allocation
page read and write
2DE67DFD000
trusted library allocation
page read and write
8186BB3000
stack
page read and write
45AFE7C000
stack
page read and write
278F000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
1A5D0000
trusted library allocation
page read and write
1DF33E2F000
heap
page read and write
21EA1F26000
heap
page read and write
2850000
heap
page read and write
1DF33CA8000
heap
page read and write
1DF33C8E000
heap
page read and write
21EA1EE1000
heap
page read and write
21EA1FF7000
heap
page read and write
21EA1FD7000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
21EA46E7000
heap
page read and write
92BF57F000
stack
page read and write
224E6902000
heap
page read and write
258216B5000
heap
page read and write
21EA1FD3000
heap
page read and write
790000
unkown
page readonly
7FF848D8B000
trusted library allocation
page read and write
1DF33C93000
heap
page read and write
1DF33DD0000
heap
page read and write
1DF33C9E000
heap
page read and write
21EA1FCC000
heap
page read and write
8CF000
stack
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
45B057E000
unkown
page readonly
1DF31D10000
heap
page read and write
1BC4E000
stack
page read and write
2DE7E6FB000
heap
page read and write
F31E44D000
stack
page read and write
8D0000
heap
page read and write
271420AD000
trusted library allocation
page read and write
25821418000
heap
page read and write
840000
heap
page read and write
2DE67392000
trusted library allocation
page read and write
EE0000
heap
page read and write
27E0000
heap
page execute and read and write
1DF33C79000
heap
page read and write
27142F23000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
F31CFFE000
stack
page read and write
21EA0003000
heap
page read and write
77A5DFC000
stack
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
1DF31E5F000
heap
page read and write
92C01CB000
stack
page read and write
1DF33DF6000
heap
page read and write
2583B3D0000
heap
page read and write
1DF33C9C000
heap
page read and write
1DF33C9C000
heap
page read and write
21EA1F22000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
77A59FD000
stack
page read and write
1B3A2FF000
stack
page read and write
F31D6F9000
stack
page read and write
21EA46B0000
heap
page read and write
27151BE1000
trusted library allocation
page read and write
7FF84917C000
trusted library allocation
page read and write
224EB5B0000
trusted library allocation
page read and write
21EA002E000
heap
page read and write
21EA1EC0000
heap
page read and write
125B1000
trusted library allocation
page read and write
21E9FFFA000
heap
page read and write
1DF33C93000
heap
page read and write
21EA17F5000
heap
page read and write
1AF6A000
stack
page read and write
21EA1ED8000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
1DF33C8F000
heap
page read and write
7FF848F12000
trusted library allocation
page read and write
21EA1FE6000
heap
page read and write
1B50A000
heap
page read and write
25822D20000
trusted library allocation
page read and write
21EA1FB9000
heap
page read and write
1DF33CAA000
heap
page read and write
1DF33C90000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
21EA1FEB000
heap
page read and write
F31D77E000
stack
page read and write
1DF33DD5000
heap
page read and write
1DF33C79000
heap
page read and write
8186BFF000
stack
page read and write
92BF0F7000
stack
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
1DF33CA2000
heap
page read and write
1C990900000
trusted library section
page read and write
21EA1ED8000
heap
page read and write
1DF33DF0000
heap
page read and write
21EA46C8000
heap
page read and write
21E9FFFF000
heap
page read and write
2DE65F97000
heap
page read and write
2DE679D3000
trusted library allocation
page read and write
1C9AA990000
heap
page read and write
1DF33C9A000
heap
page read and write
21EA46E7000
heap
page read and write
1DF33C8A000
heap
page read and write
21EA1FC8000
heap
page read and write
21EA1ED8000
heap
page read and write
27141BC0000
trusted library allocation
page read and write
224E7090000
trusted library section
page readonly
1DF33CA4000
heap
page read and write
1DF33C94000
heap
page read and write
7FF848E26000
trusted library allocation
page read and write
27143A04000
trusted library allocation
page read and write
21EA1F26000
heap
page read and write
2DE76171000
trusted library allocation
page read and write
1DF33D88000
heap
page read and write
1DF33CA6000
heap
page read and write
1DF33C81000
heap
page read and write
224E7080000
trusted library section
page readonly
25822E56000
heap
page execute and read and write
7FF8491B0000
trusted library allocation
page read and write
2715A454000
heap
page read and write
7FF848F21000
trusted library allocation
page read and write
27140250000
trusted library allocation
page read and write
1DF33CA2000
heap
page read and write
CE0000
heap
page read and write
F31D3FE000
stack
page read and write
7FF849190000
trusted library allocation
page execute and read and write
21EA1FCC000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
224E6E41000
trusted library allocation
page read and write
21EA1FD3000
heap
page read and write
7FF8490D2000
trusted library allocation
page read and write
21EA1FD7000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
25824CD7000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
258331BE000
trusted library allocation
page read and write
1DF33C78000
heap
page read and write
21EA1FF7000
heap
page read and write
21EA1FF2000
heap
page read and write
21EA1E95000
heap
page read and write
25824765000
trusted library allocation
page read and write
224EB65A000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
21EA1FC1000
heap
page read and write
271434D4000
trusted library allocation
page read and write
2DE65EE5000
heap
page read and write
2DE64380000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7DF4DA0C0000
trusted library allocation
page execute and read and write
21EA1FE1000
heap
page read and write
77A5B7B000
stack
page read and write
7FF848EF1000
trusted library allocation
page read and write
1DF31EBB000
heap
page read and write
1270000
heap
page read and write
1DF33DC8000
heap
page read and write
45B027B000
stack
page read and write
45AF97E000
unkown
page readonly
21EA1FD7000
heap
page read and write
1B546000
heap
page read and write
23B0000
heap
page read and write
1DF33D82000
heap
page read and write
21EA1FE1000
heap
page read and write
21EA000A000
heap
page read and write
21EA1FEE000
heap
page read and write
1DF33E08000
heap
page read and write
91B000
heap
page read and write
1DF33DD0000
heap
page read and write
1DF33D4A000
heap
page read and write
224E5F70000
heap
page read and write
D6B000
heap
page read and write
1DF33D54000
heap
page read and write
21EA1FE1000
heap
page read and write
21EA0006000
heap
page read and write
92BF4FD000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
1895000
heap
page read and write
7FF8490AA000
trusted library allocation
page read and write
21EA1FE1000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
1DF33C81000
heap
page read and write
21EA1FEA000
heap
page read and write
1DF33C5C000
heap
page read and write
7DF48A820000
trusted library allocation
page execute and read and write
1DF33DDE000
heap
page read and write
1DF33C50000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
2714344B000
trusted library allocation
page read and write
1DF33C8A000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
2DE7E72A000
heap
page read and write
1DF33C7C000
heap
page read and write
224EB450000
trusted library allocation
page read and write
224E6800000
heap
page read and write
21EA1FF7000
heap
page read and write
1200000
heap
page read and write
2DE76540000
trusted library allocation
page read and write
1DF33CA4000
heap
page read and write
21EA1FC1000
heap
page read and write
1DF33CB2000
heap
page read and write
21EA67C2000
trusted library allocation
page read and write
1DF33C9A000
heap
page read and write
21EA1FB0000
heap
page read and write
7DF427B40000
trusted library allocation
page execute and read and write
27140290000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
1DF31EAA000
heap
page read and write
1DF33C8E000
heap
page read and write
25822EC0000
heap
page read and write
1DF33C8E000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
21EA1FDD000
heap
page read and write
21EA1FF7000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
1DF31E2E000
heap
page read and write
21EA1FE1000
heap
page read and write
1C65C000
stack
page read and write
21E9FFFF000
heap
page read and write
1DF33C6D000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848E26000
trusted library allocation
page execute and read and write
1DF31EA2000
heap
page read and write
21EA17FE000
heap
page read and write
25823F69000
trusted library allocation
page read and write
CD5000
heap
page read and write
224EB700000
heap
page read and write
27141E09000
trusted library allocation
page read and write
1BF4A000
stack
page read and write
1C9928CD000
trusted library allocation
page read and write
21EA1FDA000
heap
page read and write
19DEFC90000
heap
page read and write
21EA1FC8000
heap
page read and write
21EA1F90000
heap
page read and write
92BF17D000
stack
page read and write
1C9923F0000
heap
page read and write
1DF33C78000
heap
page read and write
EB0000
trusted library allocation
page read and write
1DF33CAC000
heap
page read and write
27142E8D000
trusted library allocation
page read and write
7FF848D8B000
trusted library allocation
page read and write
14A5000
heap
page read and write
2DE64429000
heap
page read and write
1DF33DD5000
heap
page read and write
21EA1F28000
heap
page read and write
9AF000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
1DF33C8E000
heap
page read and write
21EA1FEB000
heap
page read and write
21EA1FE6000
heap
page read and write
21E9FFFD000
heap
page read and write
77A6A4E000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
21EA46E3000
heap
page read and write
7FF848EE2000
trusted library allocation
page read and write
2DE671B5000
trusted library allocation
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
2DE7E73E000
heap
page read and write
1DF31E70000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
27142FA7000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
7FF8491C0000
trusted library allocation
page read and write
25822DA0000
trusted library allocation
page read and write
F31D97E000
stack
page read and write
224EB70A000
heap
page read and write
2582473E000
trusted library allocation
page read and write
21EA0009000
heap
page read and write
1DF33C7C000
heap
page read and write
21EA1FEA000
heap
page read and write
21EA1FE7000
heap
page read and write
1DF33C69000
heap
page read and write
1C993436000
trusted library allocation
page read and write
1DF33CA8000
heap
page read and write
224EB490000
trusted library allocation
page read and write
1DF33CB2000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
1BF0E000
stack
page read and write
7FF848EFA000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
21EA1FDA000
heap
page read and write
1DF33E1D000
heap
page read and write
1DF38298000
heap
page read and write
21E9FFFB000
heap
page read and write
21EA1FD7000
heap
page read and write
7FF49E800000
trusted library allocation
page execute and read and write
1DF33DFF000
heap
page read and write
21EA1FA8000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
1DF33CAE000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
21EA1FE3000
heap
page read and write
21EA1FF2000
heap
page read and write
1DF33C87000
heap
page read and write
1DF33C8E000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
21EA1F32000
heap
page read and write
1DF33CAE000
heap
page read and write
2583B7E0000
heap
page read and write
2715A3B6000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
27151BF0000
trusted library allocation
page read and write
21EA0006000
heap
page read and write
21EA46E2000
heap
page read and write
2583B71F000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1C9AA860000
heap
page read and write
21EA1E91000
heap
page read and write
1C990870000
heap
page read and write
1DF33D67000
heap
page read and write
27140055000
heap
page read and write
21EA1E95000
heap
page read and write
1DF33C6D000
heap
page read and write
1AFAF000
stack
page read and write
2DE643E0000
heap
page read and write
2583B725000
heap
page read and write
7FF8490C4000
trusted library allocation
page read and write
224EB451000
trusted library allocation
page read and write
1C9AAB3E000
heap
page read and write
1DF33C8E000
heap
page read and write
45B117E000
unkown
page readonly
21EA46EA000
heap
page read and write
1DF33D67000
heap
page read and write
21EA1800000
heap
page read and write
1DF33C86000
heap
page read and write
92C004A000
stack
page read and write
25823ACA000
trusted library allocation
page read and write
21EA1FC0000
heap
page read and write
1DF33D5F000
heap
page read and write
1DF31E58000
heap
page read and write
21E9FF50000
heap
page read and write
27142E38000
trusted library allocation
page read and write
21E9FFB1000
heap
page read and write
1DF31E0C000
heap
page read and write
2583B5C0000
heap
page read and write
1B3D0000
heap
page read and write
25822D70000
trusted library allocation
page read and write
1DF33C8E000
heap
page read and write
1C9AAAED000
heap
page read and write
271400BE000
heap
page read and write
27140102000
heap
page read and write
1DF33E27000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
25821410000
heap
page read and write
1C9AAB32000
heap
page read and write
D5E000
heap
page read and write
8186EFE000
stack
page read and write
2582144F000
heap
page read and write
21EA1FD7000
heap
page read and write
1DF33D83000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848DF0000
trusted library allocation
page execute and read and write
19DEFE25000
heap
page read and write
21EA46DA000
heap
page read and write
1DF33C87000
heap
page read and write
1B26E000
stack
page read and write
1DF33C8F000
heap
page read and write
1DF33C9E000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF84907F000
trusted library allocation
page read and write
125A8000
trusted library allocation
page read and write
21EA1FBD000
heap
page read and write
1DF33D5B000
heap
page read and write
25823AD1000
trusted library allocation
page read and write
1DF33C7C000
heap
page read and write
2DE678C7000
trusted library allocation
page read and write
21E9FFFD000
heap
page read and write
7FF849163000
trusted library allocation
page read and write
21EA1FC4000
heap
page read and write
D383F5E000
stack
page read and write
2713FFF0000
heap
page read and write
1220000
heap
page read and write
1DF33C8A000
heap
page read and write
2DE7642C000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
21EA1FD3000
heap
page read and write
2614000
trusted library allocation
page read and write
45AF8FE000
stack
page read and write
1DF33C7D000
heap
page read and write
1DF33D67000
heap
page read and write
45B037E000
unkown
page readonly
21EA1F9F000
heap
page read and write
21EA1E97000
heap
page read and write
21EA0026000
heap
page read and write
21E9FFF3000
heap
page read and write
1C9AAB36000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
21EA1EC2000
heap
page read and write
1C993430000
trusted library allocation
page read and write
7FF84913C000
trusted library allocation
page read and write
2DE67A94000
trusted library allocation
page read and write
21EA1FE6000
heap
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
1DF36530000
heap
page read and write
296C000
trusted library allocation
page read and write
1C9935DF000
trusted library allocation
page read and write
21EA1E87000
heap
page read and write
1DF31E82000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
27140109000
heap
page read and write
2583B409000
heap
page read and write
2583B4B0000
heap
page read and write
2DE65F87000
heap
page read and write
25832ED1000
trusted library allocation
page read and write
21EA1EB6000
heap
page read and write
2715A3F2000
heap
page read and write
21EA000A000
heap
page read and write
2DE65FF0000
heap
page read and write
F31D479000
stack
page read and write
7FF848F28000
trusted library allocation
page read and write
1DF31E4A000
heap
page read and write
27142BE5000
trusted library allocation
page read and write
92BFFCE000
stack
page read and write
1B470000
heap
page read and write
1C993372000
trusted library allocation
page read and write
45AFB7E000
unkown
page readonly
77A53FE000
stack
page read and write
1C99336A000
trusted library allocation
page read and write
224E70A0000
trusted library section
page readonly
7FF848D72000
trusted library allocation
page read and write
27140280000
heap
page readonly
7FF849090000
trusted library allocation
page read and write
2715A300000
heap
page read and write
1DF33C78000
heap
page read and write
1DF33C6D000
heap
page read and write
1DF33CA0000
heap
page read and write
224EB450000
trusted library allocation
page read and write
21EA1F3C000
heap
page read and write
2DE67200000
trusted library allocation
page read and write
1DF33C60000
heap
page read and write
B71017B000
stack
page read and write
224E6802000
heap
page read and write
1DF33C6E000
heap
page read and write
21EA1FB2000
heap
page read and write
127C000
heap
page read and write
306E000
stack
page read and write
1DF33C7C000
heap
page read and write
45B07FE000
stack
page read and write
818707E000
stack
page read and write
1DF33D87000
heap
page read and write
8F0000
heap
page read and write
1DF33C6A000
heap
page read and write
7FF849073000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF8490D8000
trusted library allocation
page read and write
2DE6796D000
trusted library allocation
page read and write
21EA1FE1000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
224E6091000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
21EA1FE3000
heap
page read and write
2DE6731B000
trusted library allocation
page read and write
21EA1FCC000
heap
page read and write
21EA46C3000
heap
page read and write
21EA1EE0000
heap
page read and write
1C993C6B000
trusted library allocation
page read and write
1DF33D67000
heap
page read and write
2713FFD0000
heap
page read and write
1DF31EB8000
heap
page read and write
21EA1FE1000
heap
page read and write
2DE7E721000
heap
page read and write
1DF33C9C000
heap
page read and write
21EA1FD3000
heap
page read and write
21EA0016000
heap
page read and write
45B0D7E000
unkown
page readonly
2715A0F6000
heap
page execute and read and write
2583B5E6000
heap
page read and write
45AF4BB000
stack
page read and write
7FF848F52000
trusted library allocation
page read and write
21EA1F98000
heap
page read and write
21EA1FEE000
heap
page read and write
224EC000000
heap
page read and write
1C992E53000
trusted library allocation
page read and write
21EA1FF7000
heap
page read and write
7FF8490DC000
trusted library allocation
page read and write
1DF33C8B000
heap
page read and write
1DF33DB9000
heap
page read and write
2DE67354000
trusted library allocation
page read and write
14A0000
heap
page read and write
F31D37E000
stack
page read and write
F31E64E000
stack
page read and write
1DF31EB8000
heap
page read and write
1DF33C9B000
heap
page read and write
81871F9000
stack
page read and write
224EB702000
heap
page read and write
7FF848D84000
trusted library allocation
page read and write
1DF33CAA000
heap
page read and write
1C9A2884000
trusted library allocation
page read and write
1DF31E7B000
heap
page read and write
1DF33DDE000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
1C95C000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
21EA1FBD000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
1DF33DD5000
heap
page read and write
1DF33DF0000
heap
page read and write
224E6102000
heap
page read and write
45B007C000
stack
page read and write
21EA1FC1000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
2DE64370000
trusted library section
page read and write
21EA46DA000
heap
page read and write
1DF33DF0000
heap
page read and write
21EA1FC9000
heap
page read and write
21EA1F6C000
heap
page read and write
2715A3E4000
heap
page read and write
1DF38293000
heap
page read and write
21EA1FCC000
heap
page read and write
27142632000
trusted library allocation
page read and write
224EB5F0000
remote allocation
page read and write
7FF8490A3000
trusted library allocation
page read and write
7FF8491C6000
trusted library allocation
page read and write
21EA0005000
heap
page read and write
25822CD0000
heap
page read and write
1DF33D48000
heap
page read and write
FF0000
heap
page read and write
21EA1FE1000
heap
page read and write
1DF33C94000
heap
page read and write
25822ED1000
trusted library allocation
page read and write
258241DD000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
45AF5BE000
stack
page read and write
45B0CFE000
stack
page read and write
224EB4C3000
trusted library allocation
page read and write
224EB530000
trusted library allocation
page read and write
21EA1FAC000
heap
page read and write
1DF31E58000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
C10000
heap
page read and write
2590000
heap
page execute and read and write
7FF849160000
trusted library allocation
page execute and read and write
2621000
trusted library allocation
page read and write
1410000
heap
page read and write
6F1000
stack
page read and write
1C9908A0000
heap
page read and write
21EA1FF2000
heap
page read and write
1C992401000
trusted library allocation
page read and write
21E9FFF3000
heap
page read and write
1DF33C6D000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
21EA1FE3000
heap
page read and write
1DF33CA6000
heap
page read and write
45B09FE000
stack
page read and write
7FF848D64000
trusted library allocation
page read and write
21EA1FB0000
heap
page read and write
21EA1F6A000
heap
page read and write
2583B590000
heap
page execute and read and write
21EA1FEF000
heap
page read and write
7FF848F24000
trusted library allocation
page read and write
45B16FE000
stack
page read and write
21EA1FEA000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
CCD000
heap
page read and write
21EA1FE1000
heap
page read and write
224EB70A000
heap
page read and write
27142C11000
trusted library allocation
page read and write
21EA1FDD000
heap
page read and write
1DF33D52000
heap
page read and write
7FF848E95000
trusted library allocation
page execute and read and write
21EA1F92000
heap
page read and write
27140050000
heap
page read and write
1DF33C66000
heap
page read and write
1B472000
heap
page read and write
1DF33C7D000
heap
page read and write
21EA1FEA000
heap
page read and write
7FF8490D2000
trusted library allocation
page read and write
7FF848EFA000
trusted library allocation
page read and write
21EA1FB5000
heap
page read and write
1DF33C64000
heap
page read and write
21EA1FD3000
heap
page read and write
EE5000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
2DE65F42000
heap
page read and write
21EA0024000
heap
page read and write
45B0E7B000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
25824CB2000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
2DE64340000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
21EA1E88000
heap
page read and write
21EA1E80000
heap
page read and write
21E9FFEA000
heap
page read and write
2DE7E920000
heap
page read and write
224E7060000
trusted library section
page readonly
21EA1FD3000
heap
page read and write
2715A0C0000
heap
page read and write
1C993499000
trusted library allocation
page read and write
21EA1FC8000
heap
page read and write
271439E4000
trusted library allocation
page read and write
21EA1FE7000
heap
page read and write
21EA1F9C000
heap
page read and write
12A9000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
2583B620000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1260000
heap
page read and write
1DF33C94000
heap
page read and write
1DF33C73000
heap
page read and write
1DF33C89000
heap
page read and write
B70F977000
stack
page read and write
7FF8490DC000
trusted library allocation
page read and write
2715A436000
heap
page read and write
1DF33C69000
heap
page read and write
1DF33C8E000
heap
page read and write
1C993361000
trusted library allocation
page read and write
2DE7E688000
heap
page read and write
1DF33CB2000
heap
page read and write
7FF848EF1000
trusted library allocation
page read and write
13071000
trusted library allocation
page read and write
1C990A3A000
heap
page read and write
1C993656000
trusted library allocation
page read and write
1B504000
heap
page read and write
1DF33C81000
heap
page read and write
There are 1953 hidden memdumps, click here to show them.