IOC Report
PixpFUv4G7.exe

loading gif

Files

File Path
Type
Category
Malicious
PixpFUv4G7.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Copilot.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Gma.System.MouseKeyHook.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Guna.UI2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mech Server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.TestPlatform.AdapterUtilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.CodeCoverage.Shim.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.MSTest.TestAdapter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.TestFramework.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.TestFramework.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.Mdb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.Pdb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.Rocks.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Profiles\Default.xml
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Quasar.Common.Tests.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Quasar.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Vestris.ResourceLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\aa-DJ\Quasar.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\client.bin
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\protobuf-net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Microsoft Copilot.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Mech RAT.zip
Zip archive data, at least v2.0 to extract, compression method=store
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bcaxv5z.b0k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zt03qhq.po0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajczprla.cij.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bzu5hxfh.xeq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e243zlq3.bck.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egfsle4z.epq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_klshm5t3.2ql.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lgche4mn.wfz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ltbjgqci.0cf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oyhil3c3.lr2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p012odqo.22x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s2fqu20u.f1v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvm2f5nq.c24.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x2f0rpli.rmq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zcawnhwe.1e4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zy5hglte.q2d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Client.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\CM Stolen ICO.ico
MS Windows icon resource - 1 icon, 256x256, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Discord Stolen ICO.ico
MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Mech ICO.ico
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Mech2.png
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Roblox Modern Stolen.ico
MS Windows icon resource - 1 icon, 256x256, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\XWorm Stolen ICO.ico
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (1).ico
MS Windows icon resource - 5 icons, 48x48, 32 bits/pixel, 64x64, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (10).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (11).ico
MS Windows icon resource - 1 icon, 48x48
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (12).ico
MS Windows icon resource - 1 icon, 48x48
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (13).ico
MS Windows icon resource - 6 icons, 256x256, 32 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (14).ico
MS Windows icon resource - 6 icons, 256x256, 32 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (15).ico
MS Windows icon resource - 6 icons, 256x256, 32 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (16).ico
MS Windows icon resource - 5 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (17).ico
MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (2).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (3).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (4).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (5).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (6).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (7).ico
Targa image data - Map 32 x 3467 x 1 +1
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (8).ico
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (9).ico
MS Windows icon resource - 1 icon, 256x256
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fixer.bat
DOS batch file, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Open.Nat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Quasar.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\settings.xml
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Copilot.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 6 23:35:09 2024, mtime=Sun Oct 6 23:35:09 2024, atime=Sun Oct 6 23:35:09 2024, length=71680, window=hide
dropped
There are 65 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PixpFUv4G7.exe
"C:\Users\user\Desktop\PixpFUv4G7.exe"
malicious
C:\Users\user\AppData\Local\Temp\Copilot.exe
"C:\Users\user~1\AppData\Local\Temp\Copilot.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Copilot.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Copilot.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Copilot.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft Copilot" /tr "C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
malicious
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
malicious
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
malicious
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
malicious
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user~1\AppData\Local\Temp\Mech RAT.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd" "C:\Users\user~1\AppData\Local\Temp\Mech RAT.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
content-portion.gl.at.ply.gg
malicious
https://api.ipify.org/
unknown
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/lontivero/Open.Nat/issuesOAlso
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://contoso.com/Icon
unknown
https://github.com/Pester/Pester
unknown
http://crl.mi
unknown
http://crl.m
unknown
https://ion=v4.5
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore68
unknown
https://stackoverflow.com/q/2152978/23354sCannot
unknown
https://ipwho.is/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/novotnyllc/bc-csharp
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
content-portion.gl.at.ply.gg
147.185.221.21
malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.21
content-portion.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Copilot
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\SysWOW64\unarchiver.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\SysWOW64\unarchiver.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2820000
heap
page read and write
malicious
2BB1000
trusted library allocation
page read and write
malicious
962000
unkown
page readonly
malicious
7FFAACD8C000
trusted library allocation
page read and write
2189B811000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
3639CB6000
stack
page read and write
205B9220000
heap
page readonly
205BB306000
trusted library allocation
page read and write
7FFAACAC6000
trusted library allocation
page read and write
5A0460E000
stack
page read and write
204AC675000
trusted library allocation
page read and write
7FFB0B7F0000
unkown
page read and write
7FFAACAB6000
trusted library allocation
page read and write
17A9C760000
heap
page read and write
7FFAACA24000
trusted library allocation
page read and write
7FFAACD54000
trusted library allocation
page read and write
5BA54BE000
stack
page read and write
7FFAACAB0000
trusted library allocation
page read and write
21889ED5000
heap
page read and write
7FFAACBE0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
1C4A8000
stack
page read and write
205D1B7D000
heap
page read and write
205D1896000
heap
page read and write
205BB0B3000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page execute and read and write
2A30000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
7FFAACAE6000
trusted library allocation
page execute and read and write
7FFAACD88000
trusted library allocation
page read and write
7FFAACBDA000
trusted library allocation
page read and write
26AE000
stack
page read and write
204C3160000
heap
page read and write
205BA458000
trusted library allocation
page read and write
D85000
heap
page read and write
7FFAACA20000
trusted library allocation
page read and write
205BAD6A000
trusted library allocation
page read and write
2189BADD000
trusted library allocation
page read and write
226813F3000
trusted library allocation
page read and write
7FFAACA33000
trusted library allocation
page execute and read and write
205B9709000
trusted library allocation
page read and write
2269870B000
heap
page read and write
5A037B9000
stack
page read and write
93B000
heap
page read and write
7FFAACD7C000
trusted library allocation
page read and write
7FFAACBBA000
trusted library allocation
page read and write
7FFAACD6C000
trusted library allocation
page read and write
226904D3000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
7FFAACA3D000
trusted library allocation
page execute and read and write
7FFAACCF0000
trusted library allocation
page read and write
204C33C0000
heap
page read and write
22680E1F000
trusted library allocation
page read and write
218A3FA4000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
204AAC1C000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
127F1000
trusted library allocation
page read and write
EF0000
heap
page read and write
205B7C00000
heap
page read and write
7FFAACC10000
trusted library allocation
page execute and read and write
7FFAACE20000
trusted library allocation
page read and write
1080000
heap
page read and write
7FFAACBC1000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
7FFAACA03000
trusted library allocation
page execute and read and write
2188C904000
trusted library allocation
page read and write
9E7000
heap
page read and write
36398FE000
stack
page read and write
2188D600000
trusted library allocation
page read and write
A70000
heap
page read and write
1409000
heap
page read and write
22681157000
trusted library allocation
page read and write
7FFAACA0D000
trusted library allocation
page execute and read and write
1BB36000
heap
page read and write
205C9551000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
2188D605000
trusted library allocation
page read and write
5BA618E000
stack
page read and write
205BB2EC000
trusted library allocation
page read and write
5BA5236000
stack
page read and write
205BAE36000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
1600000
heap
page read and write
4D5D000
stack
page read and write
FC0000
heap
page read and write
205D1AE6000
heap
page read and write
5BA543E000
stack
page read and write
226904CE000
trusted library allocation
page read and write
7FFAACE5D000
trusted library allocation
page read and write
218A3D20000
heap
page read and write
2A4A000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
7FF4EF500000
trusted library allocation
page execute and read and write
21889CE0000
heap
page read and write
E5E000
heap
page read and write
769000
stack
page read and write
7FFAACCA0000
trusted library allocation
page read and write
22681216000
trusted library allocation
page read and write
BFE000
stack
page read and write
7FFAACD54000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
205BB22B000
trusted library allocation
page read and write
204BB07A000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page execute and read and write
204ABEA1000
trusted library allocation
page read and write
F30000
heap
page read and write
7FFAACD62000
trusted library allocation
page read and write
5BA5179000
stack
page read and write
12BC1000
trusted library allocation
page read and write
22680C32000
trusted library allocation
page read and write
12BB1000
trusted library allocation
page read and write
CFA000
trusted library allocation
page execute and read and write
7FFAACC50000
trusted library allocation
page read and write
218A3C44000
heap
page read and write
DA1000
heap
page read and write
D09000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
205B7A27000
heap
page read and write
205BAE3D000
trusted library allocation
page read and write
2188C3DA000
trusted library allocation
page read and write
1CEAC000
stack
page read and write
205BB2F6000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
7FFAACA14000
trusted library allocation
page read and write
205BAD48000
trusted library allocation
page read and write
204C323C000
heap
page read and write
2188C754000
trusted library allocation
page read and write
22690201000
trusted library allocation
page read and write
204C32E3000
heap
page read and write
7FFAACA0D000
trusted library allocation
page execute and read and write
2F7E000
stack
page read and write
7FFAACDF3000
trusted library allocation
page read and write
226987C2000
heap
page read and write
205BA465000
trusted library allocation
page read and write
1BDFE000
stack
page read and write
218A3BF0000
heap
page execute and read and write
205BA867000
trusted library allocation
page read and write
205BAD53000
trusted library allocation
page read and write
1BB0C000
heap
page read and write
E30000
heap
page read and write
7FFAACC00000
trusted library allocation
page read and write
CE0000
heap
page read and write
204C3190000
trusted library allocation
page read and write
7FFAACD68000
trusted library allocation
page read and write
7FFAACBD1000
trusted library allocation
page read and write
205C97D7000
trusted library allocation
page read and write
205BB147000
trusted library allocation
page read and write
7FFAACE80000
trusted library allocation
page read and write
C9F000
stack
page read and write
D0C000
trusted library allocation
page execute and read and write
920000
heap
page read and write
7B1000
stack
page read and write
204C32D0000
heap
page read and write
7FFAACE50000
trusted library allocation
page read and write
2B075CC000
stack
page read and write
7FFAACB40000
trusted library allocation
page execute and read and write
7FFAACC02000
trusted library allocation
page read and write
205B99AD000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page execute and read and write
DCE000
stack
page read and write
205BA787000
trusted library allocation
page read and write
363AA0E000
stack
page read and write
218A3BF6000
heap
page execute and read and write
BAE000
heap
page read and write
226987B0000
heap
page read and write
7FFAACE30000
trusted library allocation
page execute and read and write
7FFAACA30000
trusted library allocation
page read and write
22698777000
heap
page execute and read and write
CFA000
heap
page read and write
2DFE000
stack
page read and write
226989BC000
heap
page read and write
2188C9BC000
trusted library allocation
page read and write
5BA5F8C000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
EBE000
heap
page read and write
5A03738000
stack
page read and write
AD0000
heap
page read and write
2268115F000
trusted library allocation
page read and write
2188C812000
trusted library allocation
page read and write
1CBB0000
heap
page read and write
DF0000
heap
page read and write
7FFAACA10000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
12BB8000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
205D1C35000
heap
page read and write
5A02FC3000
stack
page read and write
205B7920000
trusted library section
page read and write
7FFAACAC0000
trusted library allocation
page read and write
E33000
heap
page read and write
AE5000
heap
page read and write
226FE562000
heap
page read and write
2C3F000
trusted library allocation
page read and write
22690255000
trusted library allocation
page read and write
7FFAACAB0000
trusted library allocation
page read and write
12918000
trusted library allocation
page read and write
205BAD39000
trusted library allocation
page read and write
1C8B0000
heap
page read and write
7FFAACD59000
trusted library allocation
page read and write
218A3F95000
heap
page read and write
D0A000
trusted library allocation
page execute and read and write
2188B7D5000
heap
page read and write
C70000
heap
page read and write
204C33C4000
heap
page read and write
7FFAACCE0000
trusted library allocation
page read and write
7FFAACD65000
trusted library allocation
page read and write
E1B000
heap
page read and write
D07000
heap
page read and write
146A000
heap
page read and write
1820000
heap
page read and write
B9A000
heap
page read and write
22681304000
trusted library allocation
page read and write
CDF000
stack
page read and write
204AAD70000
heap
page read and write
226814E9000
trusted library allocation
page read and write
1B563000
heap
page read and write
7FFAACBA2000
trusted library allocation
page read and write
DD7000
heap
page read and write
2188C5A2000
trusted library allocation
page read and write
22681FBC000
trusted library allocation
page read and write
204AC145000
trusted library allocation
page read and write
205BA6F4000
trusted library allocation
page read and write
2188CF61000
trusted library allocation
page read and write
226FE59D000
heap
page read and write
7FFAACA14000
trusted library allocation
page read and write
640000
heap
page read and write
205B78A0000
heap
page read and write
7FFAACBD2000
trusted library allocation
page read and write
7FFAACD33000
trusted library allocation
page read and write
5BA533A000
stack
page read and write
7FFAACBE2000
trusted library allocation
page read and write
1B73E000
stack
page read and write
7FFAACBB1000
trusted library allocation
page read and write
205BB0FD000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
1B89E000
stack
page read and write
7FFAACAC0000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
204A91E0000
heap
page read and write
5A038BE000
stack
page read and write
205BAE76000
trusted library allocation
page read and write
218A3F15000
heap
page read and write
17AF000
stack
page read and write
226FE593000
heap
page read and write
401000
unkown
page execute read
7FFAACBC0000
trusted library allocation
page execute and read and write
7FFB0B7F2000
unkown
page readonly
205D1980000
heap
page read and write
7FFAACA4D000
trusted library allocation
page execute and read and write
17A9C7A0000
heap
page read and write
205B92B0000
trusted library allocation
page read and write
7FFAACBF0000
trusted library allocation
page execute and read and write
1B4DE000
stack
page read and write
21889CC0000
trusted library allocation
page read and write
204A92D0000
heap
page read and write
7FFAACE20000
trusted library allocation
page execute and read and write
12BF000
stack
page read and write
4B9E000
stack
page read and write
204A92A0000
heap
page read and write
7FFAACA23000
trusted library allocation
page execute and read and write
205BAE23000
trusted library allocation
page read and write
2188B684000
heap
page read and write
205D1AB0000
heap
page read and write
226989F3000
heap
page read and write
2C27000
trusted library allocation
page read and write
F40000
heap
page read and write
226FE680000
heap
page read and write
F10000
heap
page execute and read and write
2188C748000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
AEB000
heap
page read and write
5BA51BE000
stack
page read and write
2188B7E1000
trusted library allocation
page read and write
226FE5AD000
heap
page read and write
1075000
heap
page read and write
B45000
heap
page read and write
7FFAACA23000
trusted library allocation
page execute and read and write
22681218000
trusted library allocation
page read and write
204AAD81000
trusted library allocation
page read and write
204C31A0000
heap
page execute and read and write
7FFAACD00000
trusted library allocation
page read and write
204ABD86000
trusted library allocation
page read and write
21889CF2000
heap
page read and write
226FE650000
heap
page read and write
22680050000
heap
page readonly
2188B7D0000
heap
page read and write
363AC0E000
stack
page read and write
127F3000
trusted library allocation
page read and write
3639EBE000
stack
page read and write
22698965000
heap
page read and write
2188C3E3000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
7FFAACD82000
trusted library allocation
page read and write
204A9330000
trusted library allocation
page read and write
AE0000
heap
page read and write
205B7943000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
8FD000
stack
page read and write
205BAE48000
trusted library allocation
page read and write
7FFAACA5C000
trusted library allocation
page execute and read and write
218A3E00000
heap
page read and write
1B1CF000
stack
page read and write
205D1E10000
heap
page read and write
F20000
unkown
page readonly
5BA4F7A000
stack
page read and write
D3B000
trusted library allocation
page execute and read and write
95C000
heap
page read and write
2188C750000
trusted library allocation
page read and write
22698C20000
heap
page read and write
7FFAACA44000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
363987E000
stack
page read and write
205BB2E1000
trusted library allocation
page read and write
218A3C00000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
7DF4C37F0000
trusted library allocation
page execute and read and write
205BAE00000
trusted library allocation
page read and write
7FFAACA30000
trusted library allocation
page read and write
5BA50FD000
stack
page read and write
204ABE3F000
trusted library allocation
page read and write
17A9C7D0000
heap
page read and write
226904D5000
trusted library allocation
page read and write
22698A4C000
heap
page read and write
30BE000
stack
page read and write
205BAB30000
trusted library allocation
page read and write
2189B7E1000
trusted library allocation
page read and write
218A3EE3000
heap
page read and write
D00000
heap
page read and write
7FFAACC20000
trusted library allocation
page read and write
218A3EF8000
heap
page read and write
218A3F90000
heap
page read and write
5A039BB000
stack
page read and write
205BAE30000
trusted library allocation
page read and write
5BA4EFF000
stack
page read and write
7FFAACA14000
trusted library allocation
page read and write
204AB7D2000
trusted library allocation
page read and write
B79000
heap
page read and write
5A0363E000
stack
page read and write
205BA7B6000
trusted library allocation
page read and write
205B7C05000
heap
page read and write
7FFAACA10000
trusted library allocation
page read and write
204AABD0000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page execute and read and write
1B99E000
stack
page read and write
EB5000
heap
page read and write
226FE597000
heap
page read and write
7FFAACA2B000
trusted library allocation
page read and write
7FFAACA02000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
1B790000
heap
page execute and read and write
21889D3F000
heap
page read and write
11B0000
heap
page read and write
7FFAACA10000
trusted library allocation
page read and write
7FFAACAE6000
trusted library allocation
page execute and read and write
C39000
heap
page read and write
7FFAACD68000
trusted library allocation
page read and write
7FFAACBC2000
trusted library allocation
page read and write
66C000
stack
page read and write
226801E1000
trusted library allocation
page read and write
E5C000
heap
page read and write
2189BA6E000
trusted library allocation
page read and write
205C9723000
trusted library allocation
page read and write
5A0347F000
stack
page read and write
965000
heap
page read and write
2B0764D000
stack
page read and write
7FFAACA40000
trusted library allocation
page read and write
22680020000
trusted library allocation
page read and write
205D1AEE000
heap
page read and write
5A0438F000
stack
page read and write
2188C744000
trusted library allocation
page read and write
3D20000
heap
page read and write
CE0000
trusted library allocation
page read and write
930000
heap
page read and write
204A9226000
heap
page read and write
205BACAF000
trusted library allocation
page read and write
7FFAACAE0000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
21889D68000
heap
page read and write
2268114E000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
205B77C0000
heap
page read and write
2C2E000
trusted library allocation
page read and write
BA2000
heap
page read and write
4FDE000
stack
page read and write
7FFAACB40000
trusted library allocation
page execute and read and write
7FFAACD00000
trusted library allocation
page read and write
21889D23000
heap
page read and write
7DF407A20000
trusted library allocation
page execute and read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFAACABC000
trusted library allocation
page execute and read and write
31A0000
heap
page execute and read and write
2189BAD3000
trusted library allocation
page read and write
CD5000
heap
page read and write
2189B801000
trusted library allocation
page read and write
218A3C91000
heap
page read and write
1BA78000
heap
page read and write
1B3BF000
stack
page read and write
218A4140000
heap
page read and write
5BA4FFF000
stack
page read and write
7FFAACE30000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
204BADA1000
trusted library allocation
page read and write
95F000
stack
page read and write
7FFAACCC0000
trusted library allocation
page read and write
F45000
heap
page read and write
2269869E000
heap
page read and write
B00000
heap
page read and write
205B7979000
heap
page read and write
D78000
heap
page read and write
7FFAACCB0000
trusted library allocation
page read and write
218A3C15000
heap
page read and write
2900000
heap
page execute and read and write
5BA610D000
stack
page read and write
F60000
heap
page read and write
2A5F000
trusted library allocation
page read and write
3639F3C000
stack
page read and write
204AB97F000
trusted library allocation
page read and write
205BA9B3000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
1B86E000
stack
page read and write
7FFAACA1D000
trusted library allocation
page execute and read and write
21889D6B000
heap
page read and write
205BA265000
trusted library allocation
page read and write
7FFAACA6C000
trusted library allocation
page execute and read and write
226FE557000
heap
page read and write
7FFAACA04000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
205D1C44000
heap
page read and write
205BA454000
trusted library allocation
page read and write
7FFAACA5C000
trusted library allocation
page execute and read and write
EC0000
heap
page read and write
226814B6000
trusted library allocation
page read and write
204AB97D000
trusted library allocation
page read and write
204A9170000
heap
page read and write
204A9380000
heap
page execute and read and write
7FFAACB06000
trusted library allocation
page execute and read and write
2188C758000
trusted library allocation
page read and write
D80000
heap
page read and write
5BA4E7E000
stack
page read and write
698000
heap
page read and write
95A000
heap
page read and write
2268129F000
trusted library allocation
page read and write
3639AF7000
stack
page read and write
CF1000
stack
page read and write
204A91DC000
heap
page read and write
205BAA4B000
trusted library allocation
page read and write
32FF000
stack
page read and write
7FFAACA23000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page execute and read and write
204A91FC000
heap
page read and write
205BB2FD000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
7FFAACE90000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
21889D2D000
heap
page read and write
333C000
stack
page read and write
204C3546000
heap
page read and write
1BFAD000
stack
page read and write
A54000
unkown
page readonly
3639C3E000
stack
page read and write
D22000
trusted library allocation
page execute and read and write
7FFAACE50000
trusted library allocation
page read and write
7FFAACA22000
trusted library allocation
page read and write
1BBF0000
heap
page execute and read and write
7FFAACA13000
trusted library allocation
page execute and read and write
1BEAE000
stack
page read and write
1175000
heap
page read and write
22680010000
trusted library section
page read and write
2E3E000
stack
page read and write
363AA8E000
stack
page read and write
205BA9FD000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
7FFAACAE6000
trusted library allocation
page execute and read and write
218A3C71000
heap
page read and write
2189BACF000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
204BAD90000
trusted library allocation
page read and write
1C6A0000
heap
page read and write
7FFAACD53000
trusted library allocation
page read and write
226FE5D6000
heap
page read and write
14D4000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
C30000
heap
page read and write
1B5D0000
heap
page read and write
21889B20000
heap
page read and write
7FFAACA03000
trusted library allocation
page execute and read and write
7FFAACC30000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page execute and read and write
7FFAACD20000
trusted library allocation
page read and write
650000
heap
page read and write
205D1AE2000
heap
page read and write
22698630000
heap
page read and write
2C46000
trusted library allocation
page read and write
2A7A000
trusted library allocation
page read and write
226800D0000
trusted library allocation
page read and write
2B0657E000
stack
page read and write
7FFAACA04000
trusted library allocation
page read and write
204C320A000
heap
page read and write
10E0000
heap
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
205B7971000
heap
page read and write
5A0337E000
stack
page read and write
205B798D000
heap
page read and write
1850000
heap
page read and write
5A035FA000
stack
page read and write
7FFAACC20000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
204A91E4000
heap
page read and write
2B064FA000
stack
page read and write
112E000
stack
page read and write
7FFAACD80000
trusted library allocation
page read and write
21889CE8000
heap
page read and write
7FFAACE56000
trusted library allocation
page read and write
1406000
heap
page read and write
5A0448E000
stack
page read and write
7FFAACD80000
trusted library allocation
page read and write
D99000
heap
page read and write
7FFAACCA0000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
960000
unkown
page readonly
1855000
heap
page read and write
205B7938000
heap
page read and write
7FFAACA1D000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
AE0000
heap
page read and write
DDE000
stack
page read and write
205D1CC0000
trusted library allocation
page read and write
205B7BD0000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
3639E3F000
stack
page read and write
929000
heap
page read and write
205BAF38000
trusted library allocation
page read and write
7FFAACBBA000
trusted library allocation
page read and write
31BF000
stack
page read and write
205BB198000
trusted library allocation
page read and write
1B1CD000
stack
page read and write
7FFAACC08000
trusted library allocation
page read and write
363AB8C000
stack
page read and write
21889C00000
heap
page read and write
B1D000
heap
page read and write
7FFB0B7F0000
unkown
page read and write
7FFAACA8C000
trusted library allocation
page execute and read and write
1BA65000
stack
page read and write
D60000
heap
page read and write
205BAE43000
trusted library allocation
page read and write
15FF000
stack
page read and write
1B4BE000
stack
page read and write
357F000
stack
page read and write
205B9270000
trusted library allocation
page read and write
204ACBA5000
trusted library allocation
page read and write
226904DD000
trusted library allocation
page read and write
B20000
heap
page read and write
204C33B8000
heap
page read and write
204C32DD000
heap
page read and write
7FFAACC80000
trusted library allocation
page read and write
22681146000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
2C2E000
stack
page read and write
205B7BF0000
trusted library allocation
page read and write
21889CA0000
trusted library allocation
page read and write
2188C75D000
trusted library allocation
page read and write
402000
unkown
page readonly
2188C55C000
trusted library allocation
page read and write
21889D29000
heap
page read and write
307F000
stack
page read and write
2188C565000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
2188C8A0000
trusted library allocation
page read and write
1C29E000
stack
page read and write
22681FE1000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
205BAF80000
trusted library allocation
page read and write
F65000
heap
page read and write
2240000
trusted library allocation
page read and write
1BA70000
heap
page read and write
2188B7B0000
heap
page execute and read and write
7FFAACA5C000
trusted library allocation
page execute and read and write
12F1000
stack
page read and write
BB5000
heap
page read and write
2189BADB000
trusted library allocation
page read and write
22682006000
trusted library allocation
page read and write
204BB06C000
trusted library allocation
page read and write
205C97CF000
trusted library allocation
page read and write
3C0C000
stack
page read and write
7FFAACA3D000
trusted library allocation
page execute and read and write
7FFAACE1C000
trusted library allocation
page read and write
7DF4C37E0000
trusted library allocation
page execute and read and write
1B3DF000
stack
page read and write
1B290000
heap
page execute and read and write
1B96E000
stack
page read and write
146C000
heap
page read and write
7FFAACE40000
trusted library allocation
page read and write
21889C60000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
218A3E66000
heap
page read and write
1B66A000
stack
page read and write
ABE000
stack
page read and write
690000
heap
page read and write
218A3F47000
heap
page read and write
205D1AF6000
heap
page read and write
2188D5BB000
trusted library allocation
page read and write
2269890A000
heap
page read and write
B9E000
stack
page read and write
3583000
heap
page read and write
3639BF9000
stack
page read and write
218A3E16000
heap
page read and write
7FFAACBE0000
trusted library allocation
page execute and read and write
204C344F000
heap
page read and write
204A93F5000
heap
page read and write
22681142000
trusted library allocation
page read and write
22680DEF000
trusted library allocation
page read and write
1BA9E000
stack
page read and write
CBE000
heap
page read and write
AF0000
heap
page read and write
10D0000
trusted library allocation
page read and write
218A3F68000
heap
page read and write
501E000
stack
page read and write
204A91E8000
heap
page read and write
7FFAACC10000
trusted library allocation
page read and write
2188D5E0000
trusted library allocation
page read and write
22698A46000
heap
page read and write
2F3F000
stack
page read and write
B97000
heap
page read and write
22698973000
heap
page read and write
988000
heap
page read and write
7FFAACC60000
trusted library allocation
page read and write
2188CAEB000
trusted library allocation
page read and write
AEE000
heap
page read and write
7FFAACAF6000
trusted library allocation
page execute and read and write
22698A3D000
heap
page read and write
7FFAACA40000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
7FFAACD43000
trusted library allocation
page read and write
2269061E000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
7DF49B390000
trusted library allocation
page execute and read and write
204A9310000
trusted library allocation
page read and write
C10000
heap
page read and write
3639DB8000
stack
page read and write
363997E000
stack
page read and write
E15000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
205BA81E000
trusted library allocation
page read and write
7FFAACCBF000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
7FFAACC30000
trusted library allocation
page read and write
5A0440D000
stack
page read and write
7FFAACD69000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
131B1000
trusted library allocation
page read and write
7FFAACBCA000
trusted library allocation
page read and write
21889DE0000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
204C31FD000
heap
page read and write
205C97E8000
trusted library allocation
page read and write
7FFB0B7F0000
unkown
page read and write
3639D3B000
stack
page read and write
204AC612000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
205B79B9000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
22690211000
trusted library allocation
page read and write
14C2000
heap
page read and write
204AB24E000
trusted library allocation
page read and write
204C33B0000
heap
page read and write
22681B30000
trusted library allocation
page read and write
205D186F000
heap
page read and write
226988C0000
heap
page read and write
218A3BC0000
heap
page execute and read and write
226989B5000
heap
page read and write
9E5000
heap
page read and write
7FFAACC40000
trusted library allocation
page read and write
1434000
heap
page read and write
63E000
stack
page read and write
11B5000
heap
page read and write
1B5BF000
stack
page read and write
5F0000
heap
page read and write
E00000
trusted library allocation
page execute and read and write
204BB070000
trusted library allocation
page read and write
1BAD8000
heap
page read and write
204C340C000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACACC000
trusted library allocation
page execute and read and write
1AD8D000
stack
page read and write
218A3C4F000
heap
page read and write
5A036B7000
stack
page read and write
105F000
stack
page read and write
7FFAACE60000
trusted library allocation
page read and write
EB2000
heap
page read and write
2594DEF000
stack
page read and write
205BA605000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
226FE64B000
heap
page read and write
7FFAACBF4000
trusted library allocation
page read and write
5A0383F000
stack
page read and write
7FFAACB25000
trusted library allocation
page execute and read and write
7FFAACA20000
trusted library allocation
page read and write
7FFAACA13000
trusted library allocation
page execute and read and write
7FFAACAD0000
trusted library allocation
page read and write
21889D27000
heap
page read and write
F90000
heap
page read and write
36395D3000
stack
page read and write
2268115B000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
2B069FE000
stack
page read and write
205BADD1000
trusted library allocation
page read and write
2B074CC000
stack
page read and write
2188C232000
trusted library allocation
page read and write
7FFAACAD0000
trusted library allocation
page read and write
205BB296000
trusted library allocation
page read and write
1442000
heap
page read and write
2594D6F000
unkown
page read and write
986000
heap
page read and write
2188C989000
trusted library allocation
page read and write
2265000
heap
page read and write
226986A8000
heap
page read and write
12913000
trusted library allocation
page read and write
205B94D0000
heap
page execute and read and write
511E000
stack
page read and write
21889C80000
trusted library section
page read and write
7FFAACE40000
trusted library allocation
page execute and read and write
7DF490350000
trusted library allocation
page execute and read and write
7FFAACBB2000
trusted library allocation
page read and write
960000
heap
page read and write
205BAD73000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page execute and read and write
204A91A0000
heap
page read and write
205B796D000
heap
page read and write
7FFAACE20000
trusted library allocation
page read and write
205BAC62000
trusted library allocation
page read and write
205B9F32000
trusted library allocation
page read and write
226904ED000
trusted library allocation
page read and write
22698675000
heap
page read and write
204C3263000
heap
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
2B065F7000
stack
page read and write
1BEFE000
stack
page read and write
FD0000
heap
page read and write
7FFAACA00000
trusted library allocation
page read and write
5BA4B43000
stack
page read and write
58D000
stack
page read and write
2188C818000
trusted library allocation
page read and write
7FFAACAF6000
trusted library allocation
page execute and read and write
7FFAACE70000
trusted library allocation
page read and write
205BA547000
trusted library allocation
page read and write
7FFAACBC2000
trusted library allocation
page read and write
226904DB000
trusted library allocation
page read and write
5A032FE000
stack
page read and write
226FE750000
heap
page read and write
7FFAACCC0000
trusted library allocation
page read and write
21889D21000
heap
page read and write
2B0618E000
stack
page read and write
7FFAACA10000
trusted library allocation
page read and write
7FFAACA00000
trusted library allocation
page read and write
FAF000
stack
page read and write
204ABF5A000
trusted library allocation
page read and write
2370000
trusted library allocation
page read and write
204ABAF0000
trusted library allocation
page read and write
D37000
trusted library allocation
page execute and read and write
7FFAACE80000
trusted library allocation
page read and write
7FFAACA2D000
trusted library allocation
page execute and read and write
205D1920000
heap
page execute and read and write
226FE550000
heap
page read and write
205BAD6E000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
204C31B0000
heap
page read and write
7FFAACE30000
trusted library allocation
page execute and read and write
2A50000
trusted library allocation
page read and write
DAA000
heap
page read and write
7FFAACCF0000
trusted library allocation
page read and write
205D1B1C000
heap
page read and write
22680040000
trusted library allocation
page read and write
5BA553C000
stack
page read and write
204AC506000
trusted library allocation
page read and write
104E000
stack
page read and write
204A91B2000
heap
page read and write
2B06777000
stack
page read and write
22698A11000
heap
page read and write
DD5000
heap
page read and write
7DF407A10000
trusted library allocation
page execute and read and write
7FFAACE00000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
205C97CA000
trusted library allocation
page read and write
7FFB0B7D1000
unkown
page execute read
204ABDB2000
trusted library allocation
page read and write
7FFAACA14000
trusted library allocation
page read and write
7FFAACAD0000
trusted library allocation
page execute and read and write
7FFAACE10000
trusted library allocation
page read and write
DDA000
heap
page read and write
7FFAACBE4000
trusted library allocation
page read and write
5A0458C000
stack
page read and write
2A67000
trusted library allocation
page read and write
205BA372000
trusted library allocation
page read and write
2188CB1E000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
E66000
heap
page read and write
30FE000
stack
page read and write
218A3C9D000
heap
page read and write
205BA0ED000
trusted library allocation
page read and write
9B5000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
205BB30F000
trusted library allocation
page read and write
7FFAACC00000
trusted library allocation
page read and write
7DF49B3A0000
trusted library allocation
page execute and read and write
7FFAACD70000
trusted library allocation
page read and write
12911000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
7FFAACA34000
trusted library allocation
page read and write
7FFAACA5C000
trusted library allocation
page execute and read and write
2188BA0A000
trusted library allocation
page read and write
205D1C01000
heap
page read and write
1B4F0000
heap
page execute and read and write
205BA8CD000
trusted library allocation
page read and write
205BAE25000
trusted library allocation
page read and write
C0F000
stack
page read and write
7FFAACC90000
trusted library allocation
page read and write
21889CD0000
heap
page readonly
7FFAACAD6000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
204C34B1000
heap
page read and write
C00000
heap
page read and write
402000
unkown
page readonly
7FFAACA04000
trusted library allocation
page read and write
205D1ADE000
heap
page read and write
7FFAACC90000
trusted library allocation
page read and write
22698AE0000
trusted library allocation
page read and write
2B068FE000
stack
page read and write
205BA443000
trusted library allocation
page read and write
A6E000
stack
page read and write
7FFAACA3B000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
218A3E5A000
heap
page read and write
1B13D000
stack
page read and write
7FFB0B7E6000
unkown
page readonly
7FFAACA30000
trusted library allocation
page read and write
205B79B4000
heap
page read and write
CBA000
heap
page read and write
7FFAACA3D000
trusted library allocation
page execute and read and write
204C3504000
heap
page read and write
974000
unkown
page readonly
5BA53BE000
stack
page read and write
7FFAACCF0000
trusted library allocation
page read and write
10C0000
heap
page read and write
7FFAACA7C000
trusted library allocation
page execute and read and write
205BA966000
trusted library allocation
page read and write
D70000
heap
page read and write
5BA5077000
stack
page read and write
7FFAACD30000
trusted library allocation
page read and write
205D1BF5000
heap
page read and write
5BA6089000
stack
page read and write
205D1AA0000
heap
page read and write
22681963000
trusted library allocation
page read and write
7FFAACD74000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
1060000
heap
page read and write
1B1D0000
heap
page execute and read and write
7FFAACA0D000
trusted library allocation
page execute and read and write
204C34AB000
heap
page read and write
7FFAACBF2000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
900000
heap
page read and write
3639FBE000
stack
page read and write
D7E000
stack
page read and write
7FFAACC20000
trusted library allocation
page read and write
2BA0000
heap
page read and write
7FFAACCE0000
trusted library allocation
page read and write
343C000
stack
page read and write
205D1A60000
heap
page execute and read and write
205D1926000
heap
page execute and read and write
218A3E90000
heap
page read and write
205B9307000
heap
page read and write
7FFAACBB1000
trusted library allocation
page read and write
7FFB0B7F5000
unkown
page readonly
22698680000
heap
page read and write
1B2B0000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
22680267000
trusted library allocation
page read and write
2B06083000
stack
page read and write
7FFAACCF0000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
22681A48000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
204A91A8000
heap
page read and write
7FFAACBF0000
trusted library allocation
page execute and read and write
204ABEDC000
trusted library allocation
page read and write
22680090000
trusted library allocation
page read and write
2188CBA5000
trusted library allocation
page read and write
2189B856000
trusted library allocation
page read and write
7FFB0B7F0000
unkown
page read and write
7FFAACBE4000
trusted library allocation
page read and write
766000
stack
page read and write
2A80000
heap
page execute and read and write
218A3F10000
heap
page read and write
7FFAACE66000
trusted library allocation
page read and write
226981E5000
heap
page read and write
36399FA000
stack
page read and write
2B076CE000
stack
page read and write
7FFAACA40000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
226813BA000
trusted library allocation
page read and write
1AD7D000
stack
page read and write
7FFAACC04000
trusted library allocation
page read and write
205BA59F000
trusted library allocation
page read and write
AAE000
stack
page read and write
218A3E62000
heap
page read and write
204BADF3000
trusted library allocation
page read and write
12BBE000
trusted library allocation
page read and write
2B06A7C000
stack
page read and write
205C9855000
trusted library allocation
page read and write
1C3AA000
stack
page read and write
7FFAACBF0000
trusted library allocation
page execute and read and write
3A01000
trusted library allocation
page read and write
226FE58F000
heap
page read and write
CB0000
heap
page read and write
205B92F5000
heap
page read and write
143F000
heap
page read and write
205D1BF8000
heap
page read and write
22698890000
heap
page execute and read and write
2B0610E000
stack
page read and write
5BA52B9000
stack
page read and write
204AAE07000
trusted library allocation
page read and write
205B7BC0000
trusted library section
page read and write
2A5B000
trusted library allocation
page read and write
7FFAACA34000
trusted library allocation
page read and write
218A3F9F000
heap
page read and write
7DF490360000
trusted library allocation
page execute and read and write
7FFAACCC0000
trusted library allocation
page read and write
1070000
heap
page read and write
48C000
stack
page read and write
D6E000
stack
page read and write
14BF000
heap
page read and write
A54000
unkown
page readonly
218A3F4D000
heap
page read and write
7D0000
heap
page read and write
7FFAACC2F000
trusted library allocation
page read and write
22680409000
trusted library allocation
page read and write
920000
heap
page read and write
7FFAACA2D000
trusted library allocation
page execute and read and write
205BB301000
trusted library allocation
page read and write
1C0AD000
stack
page read and write
7FFAACBA2000
trusted library allocation
page read and write
205B7A2C000
heap
page read and write
226987B6000
heap
page read and write
204A93F0000
heap
page read and write
205B7975000
heap
page read and write
205BAC15000
trusted library allocation
page read and write
7FFAACABC000
trusted library allocation
page execute and read and write
4EDE000
stack
page read and write
12C31000
trusted library allocation
page read and write
17A9C770000
heap
page read and write
204ACB85000
trusted library allocation
page read and write
291F000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
1B76E000
stack
page read and write
347E000
stack
page read and write
226FE410000
heap
page read and write
204BB072000
trusted library allocation
page read and write
204BB0BF000
trusted library allocation
page read and write
204C34EF000
heap
page read and write
204C33BC000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
7FFAACA11000
trusted library allocation
page read and write
204A9090000
heap
page read and write
7FFAACBA2000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
16A0000
heap
page read and write
7FFAACE70000
trusted library allocation
page read and write
226FE595000
heap
page read and write
205BAE2C000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
27EE000
stack
page read and write
226801B0000
heap
page execute and read and write
1B110000
heap
page read and write
226FE58C000
heap
page read and write
204C33F2000
heap
page read and write
7FFAACC20000
trusted library allocation
page read and write
1150000
heap
page read and write
204AC5EC000
trusted library allocation
page read and write
218A3C03000
heap
page read and write
1170000
heap
page read and write
205BA450000
trusted library allocation
page read and write
DFC000
heap
page read and write
7FFB0B7F0000
unkown
page read and write
204BADB1000
trusted library allocation
page read and write
205B94E1000
trusted library allocation
page read and write
7FFAACE2C000
trusted library allocation
page read and write
205C9511000
trusted library allocation
page read and write
CF2000
trusted library allocation
page execute and read and write
B8C000
heap
page read and write
218A3E52000
heap
page read and write
7DF4C3800000
trusted library allocation
page execute and read and write
BDC000
heap
page read and write
2188C761000
trusted library allocation
page read and write
19B000
stack
page read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
205C98BE000
trusted library allocation
page read and write
5BA4BCE000
stack
page read and write
226FE685000
heap
page read and write
950000
heap
page read and write
218A3CC8000
heap
page read and write
12C38000
trusted library allocation
page read and write
5A034F7000
stack
page read and write
1ABE0000
trusted library allocation
page read and write
226FE755000
heap
page read and write
205B78C0000
heap
page read and write
7FFAACD72000
trusted library allocation
page read and write
7FFAACDF0000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page execute and read and write
21889C90000
trusted library section
page read and write
218A3FC3000
heap
page read and write
2C31000
trusted library allocation
page read and write
7EF30000
trusted library allocation
page execute and read and write
21889ED0000
heap
page read and write
204AAD20000
heap
page read and write
7FFAACD6A000
trusted library allocation
page read and write
226988DD000
heap
page read and write
2B8E000
stack
page read and write
205BA7EB000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
7FFAACA03000
trusted library allocation
page execute and read and write
363A03B000
stack
page read and write
204A9350000
trusted library allocation
page read and write
4C5E000
stack
page read and write
2188D06D000
trusted library allocation
page read and write
127F8000
trusted library allocation
page read and write
226986D1000
heap
page read and write
5A033F9000
stack
page read and write
363AB09000
stack
page read and write
D02000
trusted library allocation
page execute and read and write
2B061CF000
stack
page read and write
3639B7D000
stack
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAACA1D000
trusted library allocation
page execute and read and write
7FFAACA6C000
trusted library allocation
page execute and read and write
1B2DF000
stack
page read and write
4D9E000
stack
page read and write
7FFAACA3B000
trusted library allocation
page execute and read and write
7FFAACBB0000
trusted library allocation
page read and write
951000
heap
page read and write
7FFAACBE8000
trusted library allocation
page read and write
B06000
heap
page read and write
205BB2DD000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
205D189C000
heap
page read and write
204C32B0000
heap
page read and write
8B0000
heap
page read and write
7FFAACBE8000
trusted library allocation
page read and write
1B6DE000
stack
page read and write
204C33C8000
heap
page read and write
7FFAACAB0000
trusted library allocation
page read and write
2188C74C000
trusted library allocation
page read and write
7FFAACA24000
trusted library allocation
page read and write
205D1BF1000
heap
page read and write
205BAB7E000
trusted library allocation
page read and write
3639A7E000
stack
page read and write
1B560000
heap
page read and write
205B79B6000
heap
page read and write
204ACB60000
trusted library allocation
page read and write
7FFAACC00000
trusted library allocation
page execute and read and write
2C25000
trusted library allocation
page read and write
F95000
heap
page read and write
5A0393E000
stack
page read and write
2C4B000
trusted library allocation
page read and write
B70000
heap
page read and write
204AAD75000
heap
page read and write
7FFAACD00000
trusted library allocation
page read and write
204C31C3000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
22680000000
trusted library section
page read and write
226806AD000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
204C33CC000
heap
page read and write
7FFAACD79000
trusted library allocation
page read and write
17A9C7A5000
heap
page read and write
226FE5D9000
heap
page read and write
27FF000
trusted library allocation
page read and write
7FFAACA34000
trusted library allocation
page read and write
2188B867000
trusted library allocation
page read and write
205BADA2000
trusted library allocation
page read and write
2A3A000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
2B0744E000
stack
page read and write
204A9340000
heap
page readonly
7FFAACDA0000
trusted library allocation
page read and write
205C94E1000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
205B92F0000
heap
page read and write
7FFAACD00000
trusted library allocation
page read and write
E8E000
stack
page read and write
22681487000
trusted library allocation
page read and write
205BACCE000
trusted library allocation
page read and write
7FFAACD59000
trusted library allocation
page read and write
205BB2D3000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
7FFAACA03000
trusted library allocation
page execute and read and write
949000
heap
page read and write
C70000
trusted library allocation
page read and write
7FFAACA7C000
trusted library allocation
page execute and read and write
7FFAACAE0000
trusted library allocation
page execute and read and write
2188CA89000
trusted library allocation
page read and write
22698702000
heap
page read and write
DAD000
heap
page read and write
4E9D000
stack
page read and write
218A3E5E000
heap
page read and write
2270000
heap
page read and write
205BAD5F000
trusted library allocation
page read and write
12C33000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
7FFAACBF8000
trusted library allocation
page read and write
7FFAACA30000
trusted library allocation
page read and write
205BAFD0000
trusted library allocation
page read and write
2B066F9000
stack
page read and write
226986F3000
heap
page read and write
7FFAACBB2000
trusted library allocation
page read and write
7FFAACA50000
trusted library allocation
page read and write
22698A32000
heap
page read and write
7FFAACC60000
trusted library allocation
page read and write
7FFAACE80000
trusted library allocation
page read and write
205BAD44000
trusted library allocation
page read and write
7FFAACAF0000
trusted library allocation
page execute and read and write
7FFAACD20000
trusted library allocation
page read and write
2188D046000
trusted library allocation
page read and write
204C33B4000
heap
page read and write
205BB01A000
trusted library allocation
page read and write
22681A6F000
trusted library allocation
page read and write
1BCFE000
stack
page read and write
31FE000
stack
page read and write
400000
unkown
page readonly
7FFAACC60000
trusted library allocation
page read and write
2594CE9000
stack
page read and write
7FFAACBE2000
trusted library allocation
page read and write
7FFAACD33000
trusted library allocation
page read and write
670000
heap
page read and write
1CAAB000
stack
page read and write
7FFAACDB0000
trusted library allocation
page read and write
7FFAACC10000
trusted library allocation
page read and write
9B000
stack
page read and write
7FFAACC30000
trusted library allocation
page read and write
22698770000
heap
page execute and read and write
2260000
heap
page read and write
7FFAACAE6000
trusted library allocation
page execute and read and write
1CBAA000
stack
page read and write
2A60000
trusted library allocation
page read and write
D11000
stack
page read and write
26BE000
stack
page read and write
7FFAACBC0000
trusted library allocation
page execute and read and write
7FFAACAC6000
trusted library allocation
page read and write
204C3538000
heap
page read and write
2A62000
trusted library allocation
page read and write
7FFAACA0D000
trusted library allocation
page execute and read and write
7FFAACD40000
trusted library allocation
page read and write
22682001000
trusted library allocation
page read and write
7FFAACACC000
trusted library allocation
page execute and read and write
2700000
heap
page read and write
204AC027000
trusted library allocation
page read and write
205BA447000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page execute and read and write
204C31A6000
heap
page execute and read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
21889C20000
heap
page read and write
2C34000
trusted library allocation
page read and write
226801D0000
heap
page read and write
2A3C000
trusted library allocation
page read and write
7FFAACA1B000
trusted library allocation
page read and write
F10000
heap
page read and write
205D1C20000
heap
page read and write
204AC088000
trusted library allocation
page read and write
226FE59B000
heap
page read and write
BB0000
heap
page read and write
204ACBAA000
trusted library allocation
page read and write
7FFAACA1B000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
7FFAACD64000
trusted library allocation
page read and write
205BA512000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
205BA8A5000
trusted library allocation
page read and write
7FFAACD6C000
trusted library allocation
page read and write
2188D12E000
trusted library allocation
page read and write
205B7930000
heap
page read and write
226901E1000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
21889D1E000
heap
page read and write
5BA600E000
stack
page read and write
131B8000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
205BABCD000
trusted library allocation
page read and write
400000
unkown
page readonly
7FFAACA12000
trusted library allocation
page read and write
205B9566000
trusted library allocation
page read and write
17A9C7B0000
heap
page read and write
31B1000
trusted library allocation
page read and write
205D1820000
heap
page read and write
401000
unkown
page execute read
5A0357D000
stack
page read and write
218A4020000
trusted library allocation
page read and write
5A0327E000
stack
page read and write
E10000
heap
page execute and read and write
7FFAACC10000
trusted library allocation
page read and write
1400000
heap
page read and write
7FFAACD10000
trusted library allocation
page read and write
5BA5F0E000
stack
page read and write
205D1879000
heap
page read and write
205D1AEA000
heap
page read and write
205B7990000
heap
page read and write
17A9C7D8000
heap
page read and write
7FFAACD78000
trusted library allocation
page read and write
7FFAACB06000
trusted library allocation
page execute and read and write
A60000
heap
page read and write
2188C3ED000
trusted library allocation
page read and write
204C3130000
heap
page execute and read and write
7FFAACBC0000
trusted library allocation
page read and write
205BA44B000
trusted library allocation
page read and write
204BB08A000
trusted library allocation
page read and write
226FE4F0000
heap
page read and write
205D1AF2000
heap
page read and write
2268114A000
trusted library allocation
page read and write
21889E40000
trusted library allocation
page read and write
2B20000
heap
page execute and read and write
2B0697E000
stack
page read and write
7FFAACE40000
trusted library allocation
page read and write
21889E00000
heap
page read and write
204C347B000
heap
page read and write
2B06878000
stack
page read and write
7FFAACA2D000
trusted library allocation
page execute and read and write
7FFAACBE0000
trusted library allocation
page execute and read and write
16A5000
heap
page read and write
131B3000
trusted library allocation
page read and write
226FE510000
heap
page read and write
205BAAE4000
trusted library allocation
page read and write
1BA76000
heap
page read and write
3D0D000
stack
page read and write
204AAFAA000
trusted library allocation
page read and write
1670000
heap
page read and write
204BAD81000
trusted library allocation
page read and write
7FFAACB16000
trusted library allocation
page execute and read and write
22680F5D000
trusted library allocation
page read and write
205B7900000
heap
page read and write
2188BCAD000
trusted library allocation
page read and write
2189BAED000
trusted library allocation
page read and write
205BB2BC000
trusted library allocation
page read and write
CD0000
heap
page read and write
7FFB0B7D0000
unkown
page readonly
205BA0E3000
trusted library allocation
page read and write
7FFAACA1D000
trusted library allocation
page execute and read and write
8F1000
stack
page read and write
EAE000
stack
page read and write
205B9230000
heap
page read and write
226815A5000
trusted library allocation
page read and write
10E5000
heap
page read and write
13D0000
heap
page read and write
2B0667D000
stack
page read and write
1BB15000
heap
page read and write
1BDAE000
stack
page read and write
7FFAACD40000
trusted library allocation
page read and write
AE0000
heap
page read and write
116E000
stack
page read and write
7FFAACAB6000
trusted library allocation
page read and write
7FFAACADC000
trusted library allocation
page execute and read and write
22681153000
trusted library allocation
page read and write
2B0754D000
stack
page read and write
205C9501000
trusted library allocation
page read and write
2B0647E000
stack
page read and write
21889D66000
heap
page read and write
7FFAACD30000
trusted library allocation
page read and write
1BB7E000
stack
page read and write
205BA6BB000
trusted library allocation
page read and write
402000
unkown
page readonly
204AC6D4000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
F40000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
142C000
heap
page read and write
218A3EE0000
heap
page read and write
2B067FA000
stack
page read and write
5A04509000
stack
page read and write
There are 1282 hidden memdumps, click here to show them.