IOC Report
X.exe

loading gif

Files

File Path
Type
Category
Malicious
X.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\X.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Google Chrome.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Nursultan by fruktoozik.bat
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_153adawq.rww.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2tabp3yi.0z2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2z3kwouv.uxf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_310wevqq.mq5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3m0f3ufn.yjj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3p23iqby.njd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ah0ntmup.nog.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bakzojbf.n2v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bvd1lp44.zwp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_crse2sov.lui.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dbktxfw3.yln.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_didt0foy.mij.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fi1s4f5o.50c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hd4b54el.4pz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hkx1hao5.okz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqecefwc.qg0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l121kadt.pet.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4gbtcen.ycp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lhwewkpo.zac.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obr4o2cp.zqh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ox1ghied.1hk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdw5b5zr.noa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rfuq4pg4.wfz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnyca14o.jx5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruwsh3it.4xv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tqw2nxgt.12p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vu1fhkgy.hxm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycnt2h5n.4v3.ps1
ASCII text, with no line terminators
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\X.exe
"C:\Users\user\Desktop\X.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Windows Defender.exe'
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
"C:\Users\user~1\AppData\Local\Temp\Windows Defender.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Google Chrome.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Windows Defender.exe'
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender.exe"
malicious
C:\Users\user\AppData\Local\Temp\Windows Defender.exe
"C:\Users\user\AppData\Local\Temp\Windows Defender.exe"
malicious
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
"C:\Users\user~1\AppData\Local\Temp\Google Chrome.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Google Chrome.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
malicious
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
"C:\Users\user\AppData\Local\Temp\Google Chrome.exe"
malicious
C:\Users\user\AppData\Local\Temp\Google Chrome.exe
"C:\Users\user\AppData\Local\Temp\Google Chrome.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Google Chrome.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Windows Defender.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\Nursultan by fruktoozik.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
22.ip.gl.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.microsoqx8
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Defender
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Google Chrome
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Google Chrome_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3161000
trusted library allocation
page read and write
malicious
172000
unkown
page readonly
malicious
140F8000
trusted library allocation
page read and write
malicious
612000
unkown
page readonly
malicious
EB5000
heap
page read and write
1D0F8305000
heap
page read and write
21E47767000
trusted library allocation
page read and write
7FFAABA90000
trusted library allocation
page read and write
1543EF7000
stack
page read and write
B73677B000
stack
page read and write
7FFAAB9B8000
trusted library allocation
page read and write
7FFAAB81A000
trusted library allocation
page read and write
12AD3000
trusted library allocation
page read and write
7FFAABA6C000
trusted library allocation
page read and write
7FFAAB831000
trusted library allocation
page read and write
EC5C479000
stack
page read and write
253B5FB5000
heap
page read and write
7FFAABAA0000
trusted library allocation
page read and write
26F576C5000
heap
page read and write
1D0F60DC000
heap
page read and write
1710000
heap
page read and write
13A0000
heap
page read and write
7FFAAB6A0000
trusted library allocation
page read and write
1D0F7A50000
heap
page read and write
7FFAAB852000
trusted library allocation
page read and write
7FFAABA60000
trusted library allocation
page read and write
1D510070000
trusted library allocation
page read and write
1543D7E000
stack
page read and write
190C2E6C000
heap
page read and write
7FFAABAB0000
trusted library allocation
page read and write
7FFAAB9D4000
trusted library allocation
page read and write
2539BF86000
heap
page read and write
B17B1FE000
stack
page read and write
7FFAAB9F0000
trusted library allocation
page read and write
190D4801000
trusted library allocation
page read and write
190D4C77000
trusted library allocation
page read and write
190C6605000
trusted library allocation
page read and write
7FFB1E3C2000
unkown
page readonly
190DD085000
heap
page read and write
7FFAAB7A0000
trusted library allocation
page execute and read and write
1D575A85000
heap
page read and write
20CBE5A0000
heap
page read and write
20CBE5B0000
heap
page read and write
1D081901000
trusted library allocation
page read and write
2539D990000
trusted library allocation
page read and write
7FFAAB6AD000
trusted library allocation
page execute and read and write
7FFAAB6CC000
trusted library allocation
page execute and read and write
26F593A0000
heap
page read and write
7FFAABA63000
trusted library allocation
page read and write
140D000
heap
page read and write
C50000
heap
page read and write
1D575A7A000
heap
page read and write
DAB95BE000
stack
page read and write
190DD210000
trusted library allocation
page read and write
2D221031000
trusted library allocation
page read and write
190DD12F000
heap
page read and write
190C2E93000
heap
page read and write
2539F4CE000
trusted library allocation
page read and write
7FFAAB67D000
trusted library allocation
page execute and read and write
B73657E000
stack
page read and write
13BD7535000
heap
page read and write
7FFAAB9F0000
trusted library allocation
page read and write
7FFAAB6B0000
trusted library allocation
page read and write
7FFAAB9D9000
trusted library allocation
page read and write
E2A000
heap
page read and write
7FFAAB660000
trusted library allocation
page read and write
7FFAAB662000
trusted library allocation
page read and write
537507E000
stack
page read and write
13E1000
heap
page read and write
21E4F8D0000
heap
page read and write
21E38DE5000
trusted library allocation
page read and write
CED000
heap
page read and write
2D20F560000
heap
page read and write
2539BF12000
heap
page read and write
7FFAAB720000
trusted library allocation
page read and write
21E374FB000
trusted library allocation
page read and write
190C4A0A000
trusted library allocation
page read and write
7FFAAB822000
trusted library allocation
page read and write
190C2F80000
heap
page read and write
D16000
heap
page read and write
7FFAAB960000
trusted library allocation
page read and write
1D5751C0000
heap
page read and write
253B6238000
heap
page read and write
190C59B5000
trusted library allocation
page read and write
7FFAABAC0000
trusted library allocation
page read and write
2D21220E000
trusted library allocation
page read and write
DAB907E000
stack
page read and write
28F9F09000
stack
page read and write
1D0901A1000
trusted library allocation
page read and write
7FFAABA6A000
trusted library allocation
page read and write
5374EFE000
stack
page read and write
7FFAAB770000
trusted library allocation
page execute and read and write
1D0F8220000
heap
page read and write
20CBE5A0000
heap
page read and write
21E37ED4000
trusted library allocation
page read and write
190DD063000
heap
page read and write
1D575B40000
trusted library allocation
page read and write
190D4AC8000
trusted library allocation
page read and write
1D0F7990000
trusted library allocation
page read and write
EB0000
heap
page read and write
7FFAAB694000
trusted library allocation
page read and write
15439D2000
stack
page read and write
28F8F7D000
stack
page read and write
7FFAAB9D8000
trusted library allocation
page read and write
21E359DC000
heap
page read and write
21E38DD3000
trusted library allocation
page read and write
7FFAAB72C000
trusted library allocation
page execute and read and write
7FFAAB993000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
1E3AB000
stack
page read and write
7DF491510000
trusted library allocation
page execute and read and write
21E4FC83000
heap
page read and write
7FFAAB72C000
trusted library allocation
page execute and read and write
1D57572B000
heap
page read and write
13D1000
heap
page read and write
B17A98F000
stack
page read and write
253B61D0000
heap
page read and write
7FFAAB8B0000
trusted library allocation
page read and write
190DCD60000
heap
page execute and read and write
20CBE5B0000
heap
page read and write
28F8D7E000
stack
page read and write
13B6000
heap
page read and write
1D09025C000
trusted library allocation
page read and write
7FFAAB664000
trusted library allocation
page read and write
7FFAAB9DA000
trusted library allocation
page read and write
7FFAABA80000
trusted library allocation
page read and write
2D221010000
trusted library allocation
page read and write
7FFAAB66B000
trusted library allocation
page read and write
2539D8F0000
heap
page read and write
29B0000
heap
page read and write
7FFAAB822000
trusted library allocation
page read and write
7FFAAB68D000
trusted library allocation
page execute and read and write
26F599B5000
trusted library allocation
page read and write
7FFAAB67D000
trusted library allocation
page execute and read and write
2D20F705000
heap
page read and write
1B6DD000
stack
page read and write
2D221021000
trusted library allocation
page read and write
7FFAABA96000
trusted library allocation
page read and write
190C589C000
trusted library allocation
page read and write
21E477EE000
trusted library allocation
page read and write
13BD7540000
heap
page read and write
7FFAAB670000
trusted library allocation
page read and write
7FFAABAB0000
trusted library allocation
page read and write
7FFAAB842000
trusted library allocation
page read and write
122000
unkown
page readonly
1544138000
stack
page read and write
8B8000
heap
page read and write
2D229893000
heap
page read and write
13C0000
heap
page read and write
190DCE48000
heap
page read and write
2D212030000
trusted library allocation
page read and write
1D5013C5000
trusted library allocation
page read and write
7FFAAB726000
trusted library allocation
page read and write
7FFAAB82A000
trusted library allocation
page read and write
2D20F5AB000
heap
page read and write
7FFAAB920000
trusted library allocation
page read and write
7FFAAB900000
trusted library allocation
page read and write
190DD0C3000
heap
page read and write
7FFAAB9B0000
trusted library allocation
page read and write
2539D940000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
7FFAAB822000
trusted library allocation
page read and write
1D500D77000
trusted library allocation
page read and write
2530000
heap
page execute and read and write
7FFAAB920000
trusted library allocation
page read and write
B17ADFE000
stack
page read and write
21E35940000
heap
page read and write
21E4F48B000
heap
page read and write
7FFAAB730000
trusted library allocation
page read and write
1D57595D000
heap
page read and write
7FFAAB8F0000
trusted library allocation
page read and write
7FFAAB910000
trusted library allocation
page read and write
7FFAAB966000
trusted library allocation
page read and write
B735FB3000
stack
page read and write
253B63F0000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
1D0F831D000
heap
page read and write
1D090067000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
154433E000
stack
page read and write
2D211079000
trusted library allocation
page read and write
21E385A1000
trusted library allocation
page read and write
21E359CA000
heap
page read and write
163F000
stack
page read and write
21E35A03000
heap
page read and write
1B3E0000
heap
page execute and read and write
3CE0000
heap
page execute and read and write
EAF000
stack
page read and write
7FFAAB860000
trusted library allocation
page execute and read and write
1D080001000
trusted library allocation
page read and write
7FFAAB83A000
trusted library allocation
page read and write
190DD03B000
heap
page read and write
1D500001000
trusted library allocation
page read and write
2539F95A000
trusted library allocation
page read and write
1D573890000
heap
page read and write
1D5018F1000
trusted library allocation
page read and write
7FFAAB9DC000
trusted library allocation
page read and write
7FFAAB9C0000
trusted library allocation
page read and write
253B61D8000
heap
page read and write
BD0000
heap
page read and write
21E37420000
heap
page execute and read and write
EC5D24E000
stack
page read and write
CB0000
heap
page read and write
855000
heap
page read and write
28F8EF7000
stack
page read and write
40EE000
stack
page read and write
21E376A9000
trusted library allocation
page read and write
1D0F7970000
trusted library allocation
page read and write
B17ACFE000
stack
page read and write
1DFAF000
stack
page read and write
26F5A4EB000
trusted library allocation
page read and write
1D0F79B0000
trusted library allocation
page read and write
7FFAAB9B3000
trusted library allocation
page read and write
7FFAAB9B9000
trusted library allocation
page read and write
7FFAAB9B8000
trusted library allocation
page read and write
7FFAAB950000
trusted library allocation
page read and write
190DCD66000
heap
page execute and read and write
1D0F8300000
heap
page read and write
EC5C2FF000
stack
page read and write
21E380B3000
trusted library allocation
page read and write
21E35A07000
heap
page read and write
7FFAAB838000
trusted library allocation
page read and write
2600000
heap
page read and write
7FFAAB990000
trusted library allocation
page read and write
7FFAAB9D5000
trusted library allocation
page read and write
7FFAAB9A0000
trusted library allocation
page read and write
2539D9F5000
heap
page read and write
3B10000
heap
page read and write
26F57640000
heap
page read and write
2D2120BB000
trusted library allocation
page read and write
190DCE15000
heap
page read and write
860000
heap
page read and write
880000
heap
page read and write
2539C0D0000
heap
page read and write
1B1D0000
heap
page read and write
1D57378B000
heap
page read and write
2539E5D2000
trusted library allocation
page read and write
253B637B000
heap
page read and write
B73637F000
stack
page read and write
1B2DE000
stack
page read and write
7FFAAB694000
trusted library allocation
page read and write
190C5785000
trusted library allocation
page read and write
1D081262000
trusted library allocation
page read and write
21E35840000
heap
page read and write
7FFAAB890000
trusted library allocation
page read and write
1D573777000
heap
page read and write
1D081443000
trusted library allocation
page read and write
1D0F79A0000
heap
page readonly
7FFAAB9B2000
trusted library allocation
page read and write
E16000
heap
page read and write
7FFAAB766000
trusted library allocation
page execute and read and write
B736677000
stack
page read and write
26F592CE000
heap
page read and write
7FFAAB690000
trusted library allocation
page read and write
7FFAABA50000
trusted library allocation
page read and write
7FFAAB9F0000
trusted library allocation
page read and write
190DD00A000
heap
page read and write
26F59500000
heap
page read and write
253B61C0000
heap
page read and write
7FFAABAAD000
trusted library allocation
page read and write
190C53DD000
trusted library allocation
page read and write
20CBE597000
heap
page read and write
304E000
stack
page read and write
7FFAAB8A0000
trusted library allocation
page read and write
190DCD40000
heap
page execute and read and write
DABA28C000
stack
page read and write
7FFAAB6DC000
trusted library allocation
page execute and read and write
2539EAF2000
trusted library allocation
page read and write
28F9E0C000
stack
page read and write
7FFAAB9D8000
trusted library allocation
page read and write
1D0F6090000
heap
page read and write
7FFAAB68B000
trusted library allocation
page read and write
1D575A6B000
heap
page read and write
12813000
trusted library allocation
page read and write
7FFAAB800000
trusted library allocation
page read and write
EC5C67F000
stack
page read and write
7FFAAB950000
trusted library allocation
page read and write
26F57680000
heap
page read and write
7FFAABAB0000
trusted library allocation
page read and write
190C5F61000
trusted library allocation
page read and write
21E359C0000
heap
page read and write
7FFAAB8C0000
trusted library allocation
page read and write
7FFAAB880000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
26F5933C000
heap
page read and write
2539BF08000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
1D57376F000
heap
page read and write
2D2298C0000
heap
page read and write
1D500A53000
trusted library allocation
page read and write
7FFAAB8F0000
trusted library allocation
page read and write
7FFAAB970000
trusted library allocation
page read and write
7FFAABA80000
trusted library allocation
page execute and read and write
7DF491520000
trusted library allocation
page execute and read and write
2D20F568000
heap
page read and write
7FFAAB790000
trusted library allocation
page execute and read and write
26F5765E000
heap
page read and write
7FFAAB680000
trusted library allocation
page read and write
2539F99F000
trusted library allocation
page read and write
1320000
heap
page read and write
7FFAAB795000
trusted library allocation
page execute and read and write
1D5012AA000
trusted library allocation
page read and write
190D47F0000
trusted library allocation
page read and write
1D7AE000
stack
page read and write
28F933E000
stack
page read and write
7FFAAB8F0000
trusted library allocation
page read and write
1D573895000
heap
page read and write
20CBE5C1000
heap
page read and write
7FFAAB670000
trusted library allocation
page read and write
C90000
heap
page read and write
5374CFF000
stack
page read and write
20CBE5A0000
heap
page read and write
EC5C1FE000
stack
page read and write
13CC000
heap
page read and write
7FFAAB6BC000
trusted library allocation
page execute and read and write
B7363FA000
stack
page read and write
2539E902000
trusted library allocation
page read and write
280F000
stack
page read and write
1D0F7AD6000
heap
page read and write
26F593B3000
heap
page read and write
21E4F909000
heap
page read and write
B17AFF7000
stack
page read and write
B73754C000
stack
page read and write
1D575A42000
heap
page read and write
B73734E000
stack
page read and write
7FFAAB880000
trusted library allocation
page read and write
CF1000
stack
page read and write
20CBE5C1000
heap
page read and write
5375ECC000
stack
page read and write
7FFAAB70C000
trusted library allocation
page execute and read and write
190C57E5000
trusted library allocation
page read and write
190C5810000
trusted library allocation
page read and write
26F577C0000
trusted library allocation
page read and write
13BD7548000
heap
page read and write
1D57376D000
heap
page read and write
21E4F939000
heap
page read and write
7FFAAB776000
trusted library allocation
page execute and read and write
20CBE5C1000
heap
page read and write
5374C7F000
stack
page read and write
1D5102EF000
trusted library allocation
page read and write
1D0F6126000
heap
page read and write
7FFAAB9EC000
trusted library allocation
page read and write
29CF000
stack
page read and write
1D500DF3000
trusted library allocation
page read and write
7FFAABAD0000
trusted library allocation
page read and write
2D20F6F0000
heap
page read and write
12AD1000
trusted library allocation
page read and write
2D2123C3000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
1D5750B0000
heap
page readonly
2539EADE000
trusted library allocation
page read and write
5375D4C000
stack
page read and write
20CBE5B0000
heap
page read and write
1D5102E9000
trusted library allocation
page read and write
190C65E0000
trusted library allocation
page read and write
7FFAABAA0000
trusted library allocation
page execute and read and write
7FFAAB9C0000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
1D510001000
trusted library allocation
page read and write
7FFAAB890000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
20CBE5C0000
heap
page read and write
EC5C279000
stack
page read and write
20CBE5C1000
heap
page read and write
B17B07D000
stack
page read and write
DABA10C000
stack
page read and write
7FFAABAC7000
trusted library allocation
page read and write
1360000
heap
page read and write
1D510307000
trusted library allocation
page read and write
21E47785000
trusted library allocation
page read and write
7FFAABA40000
trusted library allocation
page read and write
7FFAAB970000
trusted library allocation
page read and write
13BD73E0000
heap
page read and write
CB8000
heap
page read and write
7FFAAB720000
trusted library allocation
page read and write
21E37400000
heap
page execute and read and write
1D0F6121000
heap
page read and write
1D08007B000
trusted library allocation
page read and write
1D5759D1000
heap
page read and write
21E4F8D8000
heap
page read and write
7FFAAB920000
trusted library allocation
page read and write
1543DFA000
stack
page read and write
3B52000
heap
page read and write
20CBE5A0000
heap
page read and write
7FFAAB910000
trusted library allocation
page read and write
21E4FBF6000
heap
page read and write
20CBE5A0000
heap
page read and write
20CBE5A0000
heap
page read and write
1D501E01000
trusted library allocation
page read and write
B7365F9000
stack
page read and write
1D0F8241000
heap
page read and write
7FFAAB71C000
trusted library allocation
page execute and read and write
7FFAAB7B0000
trusted library allocation
page execute and read and write
2D211A52000
trusted library allocation
page read and write
190C4750000
trusted library allocation
page read and write
20CBE5C1000
heap
page read and write
537527F000
stack
page read and write
53750FD000
stack
page read and write
1BDCF000
stack
page read and write
21E392AA000
trusted library allocation
page read and write
190C53DF000
trusted library allocation
page read and write
1535000
heap
page read and write
DAB953E000
stack
page read and write
21E38D75000
trusted library allocation
page read and write
26F5AE70000
trusted library allocation
page read and write
1D575731000
heap
page read and write
7FFAAB840000
trusted library allocation
page read and write
26F5928D000
heap
page read and write
20CBE5A0000
heap
page read and write
7FFAAB980000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
7FFAAB69B000
trusted library allocation
page read and write
253ADE6E000
trusted library allocation
page read and write
2D229865000
heap
page read and write
190C555C000
trusted library allocation
page read and write
7FFAABAE0000
trusted library allocation
page read and write
21E359C6000
heap
page read and write
7FFAAB8B0000
trusted library allocation
page read and write
13CC000
heap
page read and write
154403F000
stack
page read and write
B7366F8000
stack
page read and write
190C2E10000
heap
page read and write
21E372C5000
heap
page read and write
26F59480000
trusted library allocation
page read and write
26F5A9A5000
trusted library allocation
page read and write
7FFAAB8B0000
trusted library allocation
page read and write
2D2123BF000
trusted library allocation
page read and write
7FFAAB83D000
trusted library allocation
page read and write
7DF464510000
trusted library allocation
page execute and read and write
26F59195000
heap
page read and write
129D8000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
1D090484000
trusted library allocation
page read and write
7FFAAB950000
trusted library allocation
page read and write
190C4760000
heap
page readonly
20CBE5C1000
heap
page read and write
1544D8E000
stack
page read and write
5375F4C000
stack
page read and write
190D47E1000
trusted library allocation
page read and write
7FFAABAC0000
trusted library allocation
page read and write
21E38657000
trusted library allocation
page read and write
7FFAAB6BC000
trusted library allocation
page execute and read and write
26F593AE000
heap
page read and write
1D0F802B000
heap
page read and write
21E35AB0000
trusted library section
page read and write
1070000
heap
page read and write
B17BDCA000
stack
page read and write
1DBAE000
stack
page read and write
1D5011DD000
trusted library allocation
page read and write
2539ECE6000
trusted library allocation
page read and write
7FFAAB690000
trusted library allocation
page read and write
C95000
heap
page read and write
7FFAAB6CC000
trusted library allocation
page execute and read and write
21E4FC13000
heap
page read and write
7DF4F47D0000
trusted library allocation
page execute and read and write
7FFAAB8A0000
trusted library allocation
page read and write
E58000
heap
page read and write
2D2298BE000
heap
page read and write
2539E04D000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
190DD0EB000
heap
page read and write
2D2294AF000
heap
page read and write
F10000
trusted library allocation
page read and write
7FFAAB821000
trusted library allocation
page read and write
21E37406000
heap
page execute and read and write
28F91B9000
stack
page read and write
26F575B0000
heap
page read and write
21E37340000
trusted library allocation
page read and write
2D21211E000
trusted library allocation
page read and write
EC5D44E000
stack
page read and write
1D50188E000
trusted library allocation
page read and write
2D212307000
trusted library allocation
page read and write
154500C000
stack
page read and write
1D575746000
heap
page read and write
21E474A1000
trusted library allocation
page read and write
190C4730000
trusted library allocation
page read and write
2D210EB0000
trusted library allocation
page read and write
253B60A0000
heap
page read and write
1E88E000
stack
page read and write
7FFAAB880000
trusted library allocation
page read and write
253B5FE7000
heap
page read and write
7FFAAB660000
trusted library allocation
page read and write
7FFAAB9A0000
trusted library allocation
page read and write
1D0F8120000
heap
page read and write
7FFAAB67D000
trusted library allocation
page execute and read and write
13A6000
heap
page read and write
2D2122D2000
trusted library allocation
page read and write
1D0F7A20000
trusted library allocation
page read and write
7FFAABA80000
trusted library allocation
page read and write
190D4B1D000
trusted library allocation
page read and write
7FFAAB8C0000
trusted library allocation
page read and write
7FFAAB821000
trusted library allocation
page read and write
21E38085000
trusted library allocation
page read and write
7FFAAB720000
trusted library allocation
page execute and read and write
B17A903000
stack
page read and write
7FFAAB673000
trusted library allocation
page read and write
7FFAABA00000
trusted library allocation
page read and write
26F59270000
heap
page read and write
7FFAAB670000
trusted library allocation
page read and write
1D0F60E6000
heap
page read and write
190DCF00000
heap
page read and write
1D090010000
trusted library allocation
page read and write
1D0F60A0000
heap
page read and write
190C4853000
trusted library allocation
page read and write
DABA30E000
stack
page read and write
7FFAAB890000
trusted library allocation
page read and write
53749AF000
stack
page read and write
1D57576E000
heap
page read and write
7FFAAB980000
trusted library allocation
page read and write
2D211DE9000
trusted library allocation
page read and write
1D0F80B2000
heap
page read and write
1D5751DB000
heap
page read and write
253ADE6A000
trusted library allocation
page read and write
26F57825000
heap
page read and write
154508E000
stack
page read and write
1D573754000
heap
page read and write
7FFAAB960000
trusted library allocation
page read and write
15D0000
heap
page read and write
1D0F6095000
heap
page read and write
1D575952000
heap
page read and write
13F8000
heap
page read and write
7FFAAB6DC000
trusted library allocation
page execute and read and write
190DD146000
heap
page read and write
20CBE5A0000
heap
page read and write
170000
unkown
page readonly
7FFAAB670000
trusted library allocation
page read and write
2D2121D5000
trusted library allocation
page read and write
7FFAAB9D0000
trusted library allocation
page read and write
28F8DFA000
stack
page read and write
EF0000
heap
page read and write
DAB93B7000
stack
page read and write
7FFAAB910000
trusted library allocation
page read and write
7FFAAB880000
trusted library allocation
page read and write
190C612E000
trusted library allocation
page read and write
21E38D12000
trusted library allocation
page read and write
12F0000
heap
page read and write
20CBE5A0000
heap
page read and write
26F595F7000
trusted library allocation
page read and write
7FFAAB977000
trusted library allocation
page read and write
7FFAAB672000
trusted library allocation
page read and write
2D229470000
heap
page read and write
7FFAAB9C2000
trusted library allocation
page read and write
2D2128F1000
trusted library allocation
page read and write
21E37481000
trusted library allocation
page read and write
1D0902C7000
trusted library allocation
page read and write
1D0902E7000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
21E47490000
trusted library allocation
page read and write
190C6497000
trusted library allocation
page read and write
2D212DDC000
trusted library allocation
page read and write
EC5C87B000
stack
page read and write
2539E76B000
trusted library allocation
page read and write
253B6354000
heap
page read and write
7FFB1E3A0000
unkown
page readonly
24E0000
heap
page execute and read and write
13D4000
heap
page read and write
26F57790000
trusted library allocation
page read and write
7FFAAB970000
trusted library allocation
page read and write
21E35A80000
heap
page read and write
7FFAAB860000
trusted library allocation
page read and write
7FFAAB9DC000
trusted library allocation
page read and write
B7F000
stack
page read and write
253ADBB1000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
2539DC07000
trusted library allocation
page read and write
E95000
heap
page read and write
20CBE5B0000
heap
page read and write
1D57573B000
heap
page read and write
F90000
heap
page read and write
20CBE5B0000
heap
page read and write
CEB000
heap
page read and write
7FFAAB810000
trusted library allocation
page read and write
7FFAABA90000
trusted library allocation
page read and write
190DD150000
heap
page read and write
1D081918000
trusted library allocation
page read and write
2539F3E6000
trusted library allocation
page read and write
1B55F000
stack
page read and write
26F5A7D1000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
7FFAAB756000
trusted library allocation
page execute and read and write
2539E77B000
trusted library allocation
page read and write
1D080D47000
trusted library allocation
page read and write
7FFAAB683000
trusted library allocation
page execute and read and write
7FFAABA80000
trusted library allocation
page read and write
26F576C3000
heap
page read and write
7FFAAB960000
trusted library allocation
page read and write
253B6374000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
7FFAAB840000
trusted library allocation
page execute and read and write
190C47D5000
heap
page read and write
1D5750F0000
trusted library allocation
page read and write
26F593C7000
heap
page read and write
B17A9CF000
stack
page read and write
1D0F60E0000
heap
page read and write
2539EEC8000
trusted library allocation
page read and write
1D575789000
heap
page read and write
7FFAAB9C9000
trusted library allocation
page read and write
1544F8E000
stack
page read and write
21E38485000
trusted library allocation
page read and write
1D080D7F000
trusted library allocation
page read and write
7FFAAB736000
trusted library allocation
page execute and read and write
DF0000
heap
page read and write
2D221001000
trusted library allocation
page read and write
21E35AA0000
trusted library section
page read and write
21E4FED0000
heap
page read and write
21E4776C000
trusted library allocation
page read and write
190DD133000
heap
page read and write
2D20F5A3000
heap
page read and write
EC5BDEE000
stack
page read and write
7FFAAB7A0000
trusted library allocation
page execute and read and write
190C4CAD000
trusted library allocation
page read and write
1D5759FA000
heap
page read and write
21E385DB000
trusted library allocation
page read and write
2D20F5E4000
heap
page read and write
B7375CE000
stack
page read and write
1D0F80CA000
heap
page read and write
7FFAAB8C0000
trusted library allocation
page read and write
2D210FF0000
heap
page read and write
1D575700000
heap
page read and write
20CBE5A0000
heap
page read and write
7FFAAB830000
trusted library allocation
page execute and read and write
190DD3B0000
heap
page read and write
1D575748000
heap
page read and write
B7362FE000
stack
page read and write
7FFAAB983000
trusted library allocation
page read and write
21E4FA60000
heap
page read and write
12D0000
heap
page read and write
190D4A24000
trusted library allocation
page read and write
7FFAABAE0000
trusted library allocation
page read and write
7FFAAB9C4000
trusted library allocation
page read and write
2D2122A3000
trusted library allocation
page read and write
7FFAAB69D000
trusted library allocation
page execute and read and write
253B61A0000
heap
page execute and read and write
7FFAAB990000
trusted library allocation
page read and write
28F92BE000
stack
page read and write
7FFAAB840000
trusted library allocation
page execute and read and write
1D0F5F40000
heap
page read and write
DABA207000
stack
page read and write
2539F9A4000
trusted library allocation
page read and write
190C54BF000
trusted library allocation
page read and write
190DD15A000
heap
page read and write
1D081430000
trusted library allocation
page read and write
2D20F470000
heap
page read and write
20CBE5B0000
heap
page read and write
7FFAAB9F0000
trusted library allocation
page read and write
B17B0FA000
stack
page read and write
190C5B9D000
trusted library allocation
page read and write
28F8C7E000
stack
page read and write
DAB927D000
stack
page read and write
1D575821000
heap
page read and write
1D575837000
heap
page read and write
1D080D51000
trusted library allocation
page read and write
118F000
stack
page read and write
2D210F90000
heap
page execute and read and write
26F5931A000
heap
page read and write
21E474B1000
trusted library allocation
page read and write
13BD754B000
heap
page read and write
1D3AE000
stack
page read and write
7FFAAB802000
trusted library allocation
page read and write
7FFAAB8D0000
trusted library allocation
page read and write
1D0F82D8000
heap
page read and write
7FFAAB960000
trusted library allocation
page read and write
2D210EE0000
heap
page readonly
830000
heap
page read and write
190DC85F000
heap
page read and write
7FFAABAA0000
trusted library allocation
page read and write
1065000
heap
page read and write
7FFAAB683000
trusted library allocation
page execute and read and write
190C2E50000
heap
page read and write
1D090300000
trusted library allocation
page read and write
1D080A2C000
trusted library allocation
page read and write
1D080EC9000
trusted library allocation
page read and write
1D500F9F000
trusted library allocation
page read and write
1B65E000
stack
page read and write
7FFAAB970000
trusted library allocation
page read and write
8ED000
heap
page read and write
7FFAAB6AC000
trusted library allocation
page execute and read and write
21E38DDA000
trusted library allocation
page read and write
1D5738E5000
heap
page read and write
26F59210000
heap
page execute and read and write
1D0902E0000
trusted library allocation
page read and write
7FFAAB930000
trusted library allocation
page read and write
21E38CEC000
trusted library allocation
page read and write
1AD78F000
stack
page read and write
20CBE5B0000
heap
page read and write
7FFAAB664000
trusted library allocation
page read and write
7FFAABA80000
trusted library allocation
page read and write
DAB917F000
stack
page read and write
7FFAABAD0000
trusted library allocation
page read and write
7FFB1E3C0000
unkown
page read and write
B7374C7000
stack
page read and write
2AD1000
trusted library allocation
page read and write
7FFAAB780000
trusted library allocation
page execute and read and write
7FFAAB663000
trusted library allocation
page execute and read and write
7DF46D850000
trusted library allocation
page execute and read and write
F95000
heap
page read and write
1D5738E0000
heap
page read and write
1D08136E000
trusted library allocation
page read and write
26F59267000
heap
page execute and read and write
2D212004000
trusted library allocation
page read and write
7FFAABAC0000
trusted library allocation
page read and write
7FFAAB812000
trusted library allocation
page read and write
8B0000
heap
page read and write
2D212E21000
trusted library allocation
page read and write
2D2294EC000
heap
page read and write
7FFAAB9C8000
trusted library allocation
page read and write
2D20F680000
heap
page read and write
7FFAAB690000
trusted library allocation
page read and write
28F93BC000
stack
page read and write
B73647E000
stack
page read and write
7FFAAB870000
trusted library allocation
page execute and read and write
190C60D0000
trusted library allocation
page read and write
190C53E7000
trusted library allocation
page read and write
1D575939000
heap
page read and write
7FFAAB9C4000
trusted library allocation
page read and write
7FFAAB673000
trusted library allocation
page execute and read and write
253B628E000
heap
page read and write
7FFAAB69D000
trusted library allocation
page execute and read and write
7FFAAB9A9000
trusted library allocation
page read and write
2D20F6E0000
trusted library section
page read and write
7FFAAB746000
trusted library allocation
page execute and read and write
20CBE5C1000
heap
page read and write
B7373CC000
stack
page read and write
1D5000C6000
trusted library allocation
page read and write
253B5F51000
heap
page read and write
1D0F8349000
heap
page read and write
1D5759A7000
heap
page read and write
253B5F19000
heap
page read and write
1D0F6040000
heap
page read and write
7DF48C740000
trusted library allocation
page execute and read and write
1D08104B000
trusted library allocation
page read and write
1F40000
heap
page execute and read and write
2D2212EC000
trusted library allocation
page read and write
236E000
stack
page read and write
12811000
trusted library allocation
page read and write
1D50194F000
trusted library allocation
page read and write
7FFAAB900000
trusted library allocation
page read and write
253ADB81000
trusted library allocation
page read and write
7FFAABAD9000
trusted library allocation
page read and write
140F3000
trusted library allocation
page read and write
7FFAAB9B0000
trusted library allocation
page read and write
1D0F6020000
heap
page read and write
26F59260000
heap
page execute and read and write
7FFAAB82A000
trusted library allocation
page read and write
2539BF4A000
heap
page read and write
B17AC7F000
stack
page read and write
1AD70F000
stack
page read and write
28BE000
stack
page read and write
EC5D2CE000
stack
page read and write
2539EAEA000
trusted library allocation
page read and write
26F57780000
heap
page readonly
7FFAABA70000
trusted library allocation
page read and write
1D080BD0000
trusted library allocation
page read and write
28F9F8E000
stack
page read and write
5374923000
stack
page read and write
21E38843000
trusted library allocation
page read and write
26F592CC000
heap
page read and write
7FFAAB990000
trusted library allocation
page read and write
7FFAAB68D000
trusted library allocation
page execute and read and write
B31000
stack
page read and write
1B05D000
stack
page read and write
7FFAAB66D000
trusted library allocation
page execute and read and write
1D5010C2000
trusted library allocation
page read and write
7FFAAB820000
trusted library allocation
page read and write
7FFAAB810000
trusted library allocation
page execute and read and write
7FFAAB71C000
trusted library allocation
page execute and read and write
EC5C5F8000
stack
page read and write
21E35980000
heap
page read and write
190C2E4C000
heap
page read and write
5374E79000
stack
page read and write
20CBE5C1000
heap
page read and write
7FFAAB820000
trusted library allocation
page execute and read and write
956000
heap
page read and write
7FFAAB87E000
trusted library allocation
page read and write
7FFAABA5C000
trusted library allocation
page read and write
410D000
trusted library allocation
page read and write
B7368FE000
stack
page read and write
1D501782000
trusted library allocation
page read and write
21E4FC02000
heap
page read and write
28FA00C000
stack
page read and write
7FFAAB652000
trusted library allocation
page read and write
7FFAABAB0000
trusted library allocation
page read and write
B17B17E000
stack
page read and write
2539DB70000
heap
page read and write
1D0F80B6000
heap
page read and write
7FFAAB766000
trusted library allocation
page execute and read and write
7FFB1E3A1000
unkown
page execute read
1D0F8200000
heap
page execute and read and write
EF0000
trusted library allocation
page read and write
1D0F80C6000
heap
page read and write
1D501252000
trusted library allocation
page read and write
2F40000
heap
page execute and read and write
1D5758F0000
heap
page execute and read and write
20CBE5A0000
heap
page read and write
7FFAABAD0000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
5375E47000
stack
page read and write
2D22986B000
heap
page read and write
7DF48C730000
trusted library allocation
page execute and read and write
7FFAAB9E2000
trusted library allocation
page read and write
253B620A000
heap
page read and write
7FFAAB710000
trusted library allocation
page read and write
1F65000
heap
page read and write
21E37290000
trusted library allocation
page read and write
253B634E000
heap
page read and write
7FFAABA8C000
trusted library allocation
page read and write
1F60000
heap
page read and write
2D20F5EB000
heap
page read and write
1020000
heap
page read and write
1D500D6D000
trusted library allocation
page read and write
2539EC42000
trusted library allocation
page read and write
7FFAABA60000
trusted library allocation
page read and write
21E35920000
heap
page read and write
2539C2D5000
heap
page read and write
1413000
heap
page read and write
20CBE5B0000
heap
page read and write
2D20F59D000
heap
page read and write
1DDE000
stack
page read and write
1B65F000
stack
page read and write
190DCDE0000
heap
page read and write
7FFAAB9A0000
trusted library allocation
page read and write
1D0902E5000
trusted library allocation
page read and write
1D575A14000
heap
page read and write
7FFB1E3C5000
unkown
page readonly
7FFAAB9D0000
trusted library allocation
page read and write
190DCE6D000
heap
page read and write
190C4770000
heap
page execute and read and write
8EB000
heap
page read and write
1D0902EF000
trusted library allocation
page read and write
7FFAABACD000
trusted library allocation
page read and write
26F574D0000
heap
page read and write
20CBE5B0000
heap
page read and write
2D22977C000
heap
page read and write
7FFAAB850000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
1390000
heap
page read and write
20CBE5B0000
heap
page read and write
7FFAAB694000
trusted library allocation
page read and write
20CBE5C1000
heap
page read and write
E21000
heap
page read and write
7FFAAB6DC000
trusted library allocation
page execute and read and write
26F57800000
trusted library allocation
page read and write
1D501033000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
470000
unkown
page readonly
7FFAABA10000
trusted library allocation
page read and write
2D20F59F000
heap
page read and write
190DCE78000
heap
page read and write
2D212E26000
trusted library allocation
page read and write
B17AF79000
stack
page read and write
2539EE5E000
trusted library allocation
page read and write
1D0903A8000
trusted library allocation
page read and write
2D2294C0000
heap
page read and write
190C2E2E000
heap
page read and write
7FFAABAF0000
trusted library allocation
page read and write
1D575A3C000
heap
page read and write
2D212E01000
trusted library allocation
page read and write
EC5D3CD000
stack
page read and write
7FFAAB9B4000
trusted library allocation
page read and write
1D5756E7000
heap
page execute and read and write
7FFAAB854000
trusted library allocation
page read and write
DAB933E000
stack
page read and write
15443BC000
stack
page read and write
253B621D000
heap
page read and write
20CBE5A0000
heap
page read and write
7FFAAB710000
trusted library allocation
page read and write
7FFAAB750000
trusted library allocation
page execute and read and write
253ADE88000
trusted library allocation
page read and write
1D0818BC000
trusted library allocation
page read and write
190C5553000
trusted library allocation
page read and write
DABA08F000
stack
page read and write
26F58FDD000
heap
page read and write
26F57686000
heap
page read and write
1B550000
heap
page read and write
1D50007F000
trusted library allocation
page read and write
1D575950000
heap
page read and write
190C2E52000
heap
page read and write
1B450000
heap
page read and write
7FFAAB970000
trusted library allocation
page read and write
26F5A8DD000
trusted library allocation
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
129D1000
trusted library allocation
page read and write
2D229630000
heap
page read and write
190C58FF000
trusted library allocation
page read and write
2539D9E0000
heap
page execute and read and write
7FFAAB860000
trusted library allocation
page read and write
DAB963F000
stack
page read and write
1D575825000
heap
page read and write
7FFAAB68B000
trusted library allocation
page read and write
7FFAAB683000
trusted library allocation
page execute and read and write
2539DB40000
heap
page execute and read and write
2D210F40000
trusted library allocation
page read and write
21E4FC5C000
heap
page read and write
21E4FC90000
heap
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
26F59370000
heap
page read and write
2D2294F6000
heap
page read and write
7FFAAB9BC000
trusted library allocation
page read and write
7FFAAB9C9000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
190D4AE6000
trusted library allocation
page read and write
B73697B000
stack
page read and write
B17BFCE000
stack
page read and write
13F6000
heap
page read and write
20CBE5B0000
heap
page read and write
26F5768A000
heap
page read and write
26F5A99E000
trusted library allocation
page read and write
7FFAABAF0000
trusted library allocation
page read and write
190C2D00000
heap
page read and write
DAB96BC000
stack
page read and write
EC5C7FE000
stack
page read and write
253B6267000
heap
page read and write
B17AE7B000
stack
page read and write
1BBAE000
stack
page read and write
21E39260000
trusted library allocation
page read and write
7FFAAB68D000
trusted library allocation
page execute and read and write
28F9D8F000
stack
page read and write
1543F7D000
stack
page read and write
7FFAAB980000
trusted library allocation
page read and write
253ADE76000
trusted library allocation
page read and write
190C5A81000
trusted library allocation
page read and write
1D573738000
heap
page read and write
EC5C0FE000
stack
page read and write
7FFAAB990000
trusted library allocation
page read and write
B17AD79000
stack
page read and write
20CBE5A0000
heap
page read and write
26F5772E000
heap
page read and write
2D22988B000
heap
page read and write
7FFAAB8A0000
trusted library allocation
page read and write
26F5769C000
heap
page read and write
7DF4F47F0000
trusted library allocation
page execute and read and write
7FFAAB8C0000
trusted library allocation
page read and write
2539D9F0000
heap
page read and write
7FFAABA50000
trusted library allocation
page read and write
7FFAAB673000
trusted library allocation
page execute and read and write
7FFB1E3C0000
unkown
page read and write
26F5934C000
heap
page read and write
7FFAAB691000
trusted library allocation
page read and write
DAB92F9000
stack
page read and write
1B39E000
stack
page read and write
1544E8E000
stack
page read and write
7FFAABAA6000
trusted library allocation
page read and write
7FFAAB980000
trusted library allocation
page read and write
7FFAAB69D000
trusted library allocation
page execute and read and write
20CBE5B0000
heap
page read and write
190D4ACC000
trusted library allocation
page read and write
20CBE5C1000
heap
page read and write
7FFAAB8D0000
trusted library allocation
page read and write
1D09030F000
trusted library allocation
page read and write
253ADBF1000
trusted library allocation
page read and write
7FFAAB852000
trusted library allocation
page read and write
7FFAAB880000
trusted library allocation
page read and write
7FFAAB822000
trusted library allocation
page read and write
190C5233000
trusted library allocation
page read and write
1D0F808F000
heap
page read and write
13151000
trusted library allocation
page read and write
1543FF9000
stack
page read and write
2D212950000
trusted library allocation
page read and write
7FFAAB6A4000
trusted library allocation
page read and write
7FFAAB91B000
trusted library allocation
page read and write
7FFAABAB0000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
1D57377B000
heap
page read and write
7FFAAB663000
trusted library allocation
page execute and read and write
2D211001000
trusted library allocation
page read and write
21E372B0000
trusted library allocation
page read and write
1BCCE000
stack
page read and write
13BD74E0000
heap
page read and write
1D501125000
trusted library allocation
page read and write
7FFAAB980000
trusted library allocation
page read and write
2539C2D0000
heap
page read and write
2D2297AB000
heap
page read and write
B80000
heap
page read and write
7FFAAB7A0000
trusted library allocation
page execute and read and write
B17B2FC000
stack
page read and write
2539BF00000
heap
page read and write
15440BC000
stack
page read and write
7FFAAB870000
trusted library allocation
page read and write
1025000
heap
page read and write
B17AEFE000
stack
page read and write
28F89F2000
stack
page read and write
1D0F830D000
heap
page read and write
190C2DE0000
heap
page read and write
1340000
heap
page read and write
DAB90FA000
stack
page read and write
253B61C4000
heap
page read and write
7FFAAB848000
trusted library allocation
page read and write
2539EE90000
trusted library allocation
page read and write
1D5004CD000
trusted library allocation
page read and write
26F5AE75000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
21E372A0000
heap
page readonly
140F1000
trusted library allocation
page read and write
13BD74C0000
heap
page read and write
2D2114CD000
trusted library allocation
page read and write
7FFAAB9E0000
trusted library allocation
page read and write
7FFAABA70000
trusted library allocation
page read and write
BC0000
heap
page read and write
91C000
heap
page read and write
7FFAAB680000
trusted library allocation
page read and write
21E384B1000
trusted library allocation
page read and write
F50000
heap
page execute and read and write
7FFAAB9E8000
trusted library allocation
page read and write
7FFAAB8A0000
trusted library allocation
page read and write
11F4000
stack
page read and write
7FFAABAE0000
trusted library allocation
page read and write
DAB943E000
stack
page read and write
D18000
heap
page read and write
537517E000
stack
page read and write
B73627F000
stack
page read and write
253B60CB000
heap
page read and write
190C2E95000
heap
page read and write
B17BCCE000
stack
page read and write
1D080F79000
trusted library allocation
page read and write
EC5C3FE000
stack
page read and write
40F1000
trusted library allocation
page read and write
B17B27E000
stack
page read and write
7FFAAB9A3000
trusted library allocation
page read and write
7FFAAB8A0000
trusted library allocation
page read and write
190C6600000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
2D20F5E6000
heap
page read and write
253B62B0000
heap
page read and write
1D5757B9000
heap
page read and write
1D501E26000
trusted library allocation
page read and write
2539EBB2000
trusted library allocation
page read and write
1BBC0000
heap
page execute and read and write
7FFAAB674000
trusted library allocation
page read and write
21E4FB40000
heap
page read and write
7D0000
unkown
page readonly
C90000
heap
page read and write
7FFAAB832000
trusted library allocation
page read and write
7FFAAB899000
trusted library allocation
page read and write
2D21288E000
trusted library allocation
page read and write
2539DDA9000
trusted library allocation
page read and write
2D210EF0000
trusted library allocation
page read and write
26F575D0000
heap
page read and write
190C2E98000
heap
page read and write
26F5A32B000
trusted library allocation
page read and write
2D229780000
heap
page read and write
7FFAAB9A0000
trusted library allocation
page read and write
253B61C8000
heap
page read and write
14B0000
trusted library allocation
page read and write
26F59190000
heap
page read and write
190D4811000
trusted library allocation
page read and write
7FFAAB970000
trusted library allocation
page read and write
26F57648000
heap
page read and write
1D0F7AC0000
heap
page read and write
21E3794E000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
21E4FD40000
trusted library allocation
page read and write
253B632C000
heap
page read and write
2539EBB7000
trusted library allocation
page read and write
190C65BB000
trusted library allocation
page read and write
100F000
stack
page read and write
7FFAAB65D000
trusted library allocation
page execute and read and write
7FFAAB920000
trusted library allocation
page read and write
190C2F10000
heap
page read and write
2D221306000
trusted library allocation
page read and write
53752FB000
stack
page read and write
190C2F85000
heap
page read and write
1D0F7AC5000
heap
page read and write
21E38705000
trusted library allocation
page read and write
28F9E8B000
stack
page read and write
7FFAAB850000
trusted library allocation
page execute and read and write
190D484F000
trusted library allocation
page read and write
1D0F7CB0000
heap
page execute and read and write
13BD7530000
heap
page read and write
7FFAAB682000
trusted library allocation
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
21E37270000
trusted library allocation
page read and write
28F923E000
stack
page read and write
2539D950000
heap
page readonly
DAB94B8000
stack
page read and write
7FFAAB726000
trusted library allocation
page read and write
7FFAAB890000
trusted library allocation
page read and write
B7364FB000
stack
page read and write
2539EAE6000
trusted library allocation
page read and write
1D0F60A8000
heap
page read and write
B735FFE000
stack
page read and write
2539D960000
trusted library allocation
page read and write
2539D920000
trusted library allocation
page read and write
20CBE5C1000
heap
page read and write
26F57820000
heap
page read and write
20CBE5A0000
heap
page read and write
1B4EE000
stack
page read and write
1D081906000
trusted library allocation
page read and write
1D0F7C70000
heap
page execute and read and write
7FFAAB83A000
trusted library allocation
page read and write
2D2212F6000
trusted library allocation
page read and write
7FFAAB920000
trusted library allocation
page read and write
13AC000
heap
page read and write
7FFAAB9D2000
trusted library allocation
page read and write
7FFAAB811000
trusted library allocation
page read and write
26F5767C000
heap
page read and write
190C577F000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
16B0000
heap
page read and write
190DCEDE000
heap
page read and write
26F59798000
trusted library allocation
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
21E4F949000
heap
page read and write
7FFAABA60000
trusted library allocation
page read and write
21E47774000
trusted library allocation
page read and write
190C5779000
trusted library allocation
page read and write
7FFAAB890000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
1B5DE000
stack
page read and write
1D575989000
heap
page read and write
7FFAABA6C000
trusted library allocation
page read and write
2539F46F000
trusted library allocation
page read and write
7FFAABAB3000
trusted library allocation
page read and write
7FFAAB930000
trusted library allocation
page read and write
7FFAAB980000
trusted library allocation
page read and write
2D20F6B0000
heap
page read and write
2D229788000
heap
page read and write
2539EAE2000
trusted library allocation
page read and write
7FFAAB858000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
2D22980E000
heap
page read and write
2539EAF7000
trusted library allocation
page read and write
2D22900B000
heap
page read and write
1D5750C0000
trusted library allocation
page read and write
1D501E21000
trusted library allocation
page read and write
7FFAAB8A0000
trusted library allocation
page read and write
7FFAAB870000
trusted library allocation
page read and write
21E47481000
trusted library allocation
page read and write
7FFAAB73C000
trusted library allocation
page execute and read and write
190C5AE2000
trusted library allocation
page read and write
B70000
heap
page read and write
270E000
stack
page read and write
2D212783000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
D56000
heap
page read and write
1AD68C000
stack
page read and write
1D57376B000
heap
page read and write
8D6000
heap
page read and write
1D080C0A000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
7FFAAB868000
trusted library allocation
page read and write
1D575170000
heap
page execute and read and write
7FFAAB8B0000
trusted library allocation
page read and write
1D0F79E0000
trusted library allocation
page read and write
2D210F96000
heap
page execute and read and write
21E474EE000
trusted library allocation
page read and write
28FA08E000
stack
page read and write
21E35AC0000
heap
page read and write
7FFAAB950000
trusted library allocation
page read and write
20CBE5C1000
heap
page read and write
190C60A1000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
2D20F660000
heap
page read and write
2D22106F000
trusted library allocation
page read and write
7FFAAB864000
trusted library allocation
page read and write
1D575A60000
heap
page read and write
7FF497A00000
trusted library allocation
page execute and read and write
190C4790000
trusted library allocation
page read and write
918000
heap
page read and write
7FFAABA00000
trusted library allocation
page read and write
7FFAAB940000
trusted library allocation
page read and write
7FFAAB9E0000
trusted library allocation
page read and write
1D0F80C2000
heap
page read and write
1030000
heap
page read and write
7FFAAB9CC000
trusted library allocation
page read and write
7FFAAB8D0000
trusted library allocation
page read and write
1D08191E000
trusted library allocation
page read and write
7FFAAB790000
trusted library allocation
page execute and read and write
1C86D000
stack
page read and write
20CBE5C1000
heap
page read and write
7FFAAB780000
trusted library allocation
page execute and read and write
2539BEF0000
heap
page read and write
21E4FBC9000
heap
page read and write
7FFAAB756000
trusted library allocation
page execute and read and write
7FFAAB766000
trusted library allocation
page execute and read and write
3B8C000
heap
page read and write
26F57610000
heap
page read and write
7FFAAB832000
trusted library allocation
page read and write
8E0000
heap
page read and write
7FFAAB920000
trusted library allocation
page read and write
2D211C05000
trusted library allocation
page read and write
2D229750000
heap
page read and write
7FFAABA00000
trusted library allocation
page read and write
190DC810000
trusted library allocation
page read and write
5374DFE000
stack
page read and write
1D0818E1000
trusted library allocation
page read and write
1D5756F0000
heap
page read and write
7FFAAB910000
trusted library allocation
page read and write
622000
unkown
page readonly
26F597C2000
trusted library allocation
page read and write
2D2298A9000
heap
page read and write
1D50130B000
trusted library allocation
page read and write
7FFAAB940000
trusted library allocation
page read and write
1D500228000
trusted library allocation
page read and write
7FFAAB7F2000
trusted library allocation
page read and write
7FFAAB950000
trusted library allocation
page read and write
2539BF5E000
heap
page read and write
13CA000
heap
page read and write
253B6228000
heap
page read and write
7DF4F47E0000
trusted library allocation
page execute and read and write
190DCE29000
heap
page read and write
1AD9D000
stack
page read and write
1D5756F6000
heap
page read and write
1544E0C000
stack
page read and write
13158000
trusted library allocation
page read and write
5374D79000
stack
page read and write
1D510031000
trusted library allocation
page read and write
7FFAABAF0000
trusted library allocation
page read and write
7FFAAB653000
trusted library allocation
page execute and read and write
1418000
heap
page read and write
EC5C6FE000
stack
page read and write
20CBE5B0000
heap
page read and write
253B61D4000
heap
page read and write
1D573640000
heap
page read and write
EC5C4F7000
stack
page read and write
2811000
trusted library allocation
page read and write
2D229950000
heap
page read and write
7FFAAB830000
trusted library allocation
page execute and read and write
7FFAAB8D0000
trusted library allocation
page read and write
B17BD4D000
stack
page read and write
2539EAFB000
trusted library allocation
page read and write
140F000
heap
page read and write
7FFAAB9A0000
trusted library allocation
page read and write
21E372C0000
heap
page read and write
145E000
heap
page read and write
7FFAAB910000
trusted library allocation
page read and write
2D20F6D0000
trusted library section
page read and write
2539DB81000
trusted library allocation
page read and write
1D0F60DA000
heap
page read and write
1D080227000
trusted library allocation
page read and write
7FFAAB66D000
trusted library allocation
page execute and read and write
20CBE5A0000
heap
page read and write
7FFAAB680000
trusted library allocation
page read and write
2539BFFA000
heap
page read and write
1D5756E0000
heap
page execute and read and write
1BAA0000
heap
page read and write
2D210F00000
heap
page execute and read and write
5375DCE000
stack
page read and write
7FFAAB650000
trusted library allocation
page read and write
1543C7F000
stack
page read and write
13E3000
heap
page read and write
2539BF3D000
heap
page read and write
129D3000
trusted library allocation
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
7FFAAB990000
trusted library allocation
page read and write
27B0000
heap
page read and write
7FFAAB880000
trusted library allocation
page read and write
253B631C000
heap
page read and write
B7367FE000
stack
page read and write
1D501C1B000
trusted library allocation
page read and write
15441BA000
stack
page read and write
7FFAAB820000
trusted library allocation
page execute and read and write
28F90B9000
stack
page read and write
1D5103A6000
trusted library allocation
page read and write
C70000
heap
page read and write
B17BECC000
stack
page read and write
CD6000
heap
page read and write
2D211D70000
trusted library allocation
page read and write
1D0F80BA000
heap
page read and write
1D575A69000
heap
page read and write
1D0F80F0000
heap
page read and write
7FFAAB674000
trusted library allocation
page read and write
1D0F8038000
heap
page read and write
7FFAAB766000
trusted library allocation
page execute and read and write
7FFAAB654000
trusted library allocation
page read and write
26F5A8B6000
trusted library allocation
page read and write
253B5F10000
heap
page read and write
2D2212E8000
trusted library allocation
page read and write
2539F97F000
trusted library allocation
page read and write
7FFAAB870000
trusted library allocation
page read and write
21E37300000
heap
page execute and read and write
EC5C17E000
stack
page read and write
2539EE2C000
trusted library allocation
page read and write
2539ED99000
trusted library allocation
page read and write
7FFAAB8F0000
trusted library allocation
page read and write
CE0000
heap
page read and write
1435000
heap
page read and write
2539C0F0000
heap
page read and write
21E381FD000
trusted library allocation
page read and write
190DD111000
heap
page read and write
7FFAAB8D0000
trusted library allocation
page read and write
7FFAAB930000
trusted library allocation
page read and write
190C4780000
heap
page read and write
144E000
heap
page read and write
FF1000
stack
page read and write
7FFAAB694000
trusted library allocation
page read and write
2D229980000
trusted library allocation
page read and write
1D5737B4000
heap
page read and write
DABA18E000
stack
page read and write
1D510021000
trusted library allocation
page read and write
7FFAAB9E0000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
7FFAABA70000
trusted library allocation
page execute and read and write
1B75E000
stack
page read and write
26F59380000
heap
page read and write
2AC0000
heap
page execute and read and write
7FFAAB870000
trusted library allocation
page read and write
7FFAAB9B0000
trusted library allocation
page read and write
7FFAAB900000
trusted library allocation
page read and write
D00000
heap
page read and write
26F59F9C000
trusted library allocation
page read and write
B17BF4C000
stack
page read and write
190C2E18000
heap
page read and write
1D5738A0000
heap
page read and write
7FFAAB950000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
21E4F90B000
heap
page read and write
7FFAAB960000
trusted library allocation
page read and write
EC5C578000
stack
page read and write
7FFAAB8C0000
trusted library allocation
page read and write
2539BF42000
heap
page read and write
2950000
trusted library allocation
page read and write
7FFAAB684000
trusted library allocation
page read and write
7FFAAB854000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
7FFAAB9D0000
trusted library allocation
page read and write
7FFAAB6A0000
trusted library allocation
page read and write
314F000
stack
page read and write
186000
unkown
page readonly
2D229730000
heap
page execute and read and write
53751FE000
stack
page read and write
1D0F60DE000
heap
page read and write
20CBE5A0000
heap
page read and write
1D573730000
heap
page read and write
2D211228000
trusted library allocation
page read and write
21E392A5000
trusted library allocation
page read and write
26F59571000
trusted library allocation
page read and write
7FFAAB940000
trusted library allocation
page read and write
B73744E000
stack
page read and write
7FFAAB6A0000
trusted library allocation
page read and write
7FFAAB860000
trusted library allocation
page execute and read and write
7FFAAB680000
trusted library allocation
page read and write
1D0F8000000
heap
page read and write
610000
unkown
page readonly
2D22983D000
heap
page read and write
190C5939000
trusted library allocation
page read and write
2D2122D4000
trusted library allocation
page read and write
7FFAAB8E0000
trusted library allocation
page read and write
190C606D000
trusted library allocation
page read and write
B73687E000
stack
page read and write
7FFAAB67B000
trusted library allocation
page read and write
1543CFE000
stack
page read and write
2D212868000
trusted library allocation
page read and write
7FFAAB740000
trusted library allocation
page read and write
7FFAAB930000
trusted library allocation
page read and write
DAB8D4E000
stack
page read and write
3151000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
2539BF8A000
heap
page read and write
1D575130000
trusted library allocation
page read and write
26F5A877000
trusted library allocation
page read and write
12818000
trusted library allocation
page read and write
DAB8DCE000
stack
page read and write
7FFAAB700000
trusted library allocation
page read and write
1D501868000
trusted library allocation
page read and write
21E4FBF8000
heap
page read and write
7FFAAB9E0000
trusted library allocation
page read and write
2539BF4C000
heap
page read and write
1D0813D1000
trusted library allocation
page read and write
7FFAAB940000
trusted library allocation
page read and write
190C47E1000
trusted library allocation
page read and write
190DCFF0000
heap
page read and write
1D5737B7000
heap
page read and write
7FFAABA70000
trusted library allocation
page read and write
1B4DE000
stack
page read and write
28F8CFF000
stack
page read and write
2539DA0D000
heap
page read and write
7FFAAB746000
trusted library allocation
page execute and read and write
190C2F40000
heap
page read and write
2539DB47000
heap
page execute and read and write
1B75E000
stack
page read and write
1D090001000
trusted library allocation
page read and write
7FFAAB9C0000
trusted library allocation
page read and write
21E37470000
heap
page read and write
2D20F5BD000
heap
page read and write
26F5A2FD000
trusted library allocation
page read and write
120000
unkown
page readonly
2539D9D0000
trusted library allocation
page read and write
21E359BB000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
2539F40C000
trusted library allocation
page read and write
2D20F5A7000
heap
page read and write
1D5102ED000
trusted library allocation
page read and write
DAB91F9000
stack
page read and write
2AE1000
trusted library allocation
page read and write
7FFAABAD0000
trusted library allocation
page read and write
13B3000
heap
page read and write
253ADE70000
trusted library allocation
page read and write
7FFAABAA0000
trusted library allocation
page execute and read and write
26F576C8000
heap
page read and write
DF8000
heap
page read and write
5374F78000
stack
page read and write
26F5AE8C000
trusted library allocation
page read and write
20CBE5C1000
heap
page read and write
7FFAAB930000
trusted library allocation
page read and write
E2C000
heap
page read and write
7FFAAB6EC000
trusted library allocation
page execute and read and write
7FFAAB8F0000
trusted library allocation
page read and write
7FFAAB683000
trusted library allocation
page execute and read and write
2D210ED0000
trusted library allocation
page read and write
1D0F60FA000
heap
page read and write
7FFAAB68D000
trusted library allocation
page execute and read and write
7FFAAB9A4000
trusted library allocation
page read and write
15D5000
heap
page read and write
1D081348000
trusted library allocation
page read and write
21E3909F000
trusted library allocation
page read and write
7FFAAB840000
trusted library allocation
page execute and read and write
28F8FF8000
stack
page read and write
190D4AD6000
trusted library allocation
page read and write
1D5738D0000
trusted library allocation
page read and write
21E38786000
trusted library allocation
page read and write
1D0F834E000
heap
page read and write
1B3DE000
stack
page read and write
5E1000
stack
page read and write
7FFAAB693000
trusted library allocation
page execute and read and write
28F913B000
stack
page read and write
2539ED60000
trusted library allocation
page read and write
13153000
trusted library allocation
page read and write
7FFAAB900000
trusted library allocation
page read and write
7FFAAB6DC000
trusted library allocation
page execute and read and write
21E359C4000
heap
page read and write
E19000
heap
page read and write
1D080F73000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
2D2294CA000
heap
page read and write
1D0F8057000
heap
page read and write
7FFAAB930000
trusted library allocation
page read and write
7FFAAB801000
trusted library allocation
page read and write
1D501DDC000
trusted library allocation
page read and write
2539ECA9000
trusted library allocation
page read and write
154423E000
stack
page read and write
B22000
unkown
page readonly
7FFAAB68D000
trusted library allocation
page execute and read and write
7FFAAB834000
trusted library allocation
page read and write
21E4F966000
heap
page read and write
2539EAEE000
trusted library allocation
page read and write
7FFAAB910000
trusted library allocation
page read and write
1543E7F000
stack
page read and write
26F5AE50000
trusted library allocation
page read and write
2539EF4B000
trusted library allocation
page read and write
410B000
trusted library allocation
page read and write
EC5C77C000
stack
page read and write
7FFAAB940000
trusted library allocation
page read and write
7DF46D840000
trusted library allocation
page execute and read and write
20CBE5B0000
heap
page read and write
1D081130000
trusted library allocation
page read and write
7FFAAB716000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
1398000
heap
page read and write
2539F300000
trusted library allocation
page read and write
21E38C06000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
1D573830000
heap
page read and write
DAB8CC3000
stack
page read and write
E56000
heap
page read and write
26F5AE2B000
trusted library allocation
page read and write
253ADBA1000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
7FFAAB858000
trusted library allocation
page read and write
7DF464500000
trusted library allocation
page execute and read and write
7FFAAB840000
trusted library allocation
page execute and read and write
2D20F6F5000
heap
page read and write
1060000
heap
page read and write
21E39285000
trusted library allocation
page read and write
21E38723000
trusted library allocation
page read and write
7FFAAB680000
trusted library allocation
page read and write
1D0F7C76000
heap
page execute and read and write
1715000
heap
page read and write
20CBE5A0000
heap
page read and write
EC5C377000
stack
page read and write
7FFAABAC0000
trusted library allocation
page read and write
7FFAAB7F0000
trusted library allocation
page read and write
7FFAAB7A0000
trusted library allocation
page execute and read and write
7FFAAB844000
trusted library allocation
page read and write
7FFAAB706000
trusted library allocation
page read and write
1D5102F7000
trusted library allocation
page read and write
26F57770000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
5375CCE000
stack
page read and write
1D575920000
heap
page read and write
190C47D0000
heap
page read and write
1D573850000
heap
page read and write
7FFAAB8B0000
trusted library allocation
page read and write
B17BE47000
stack
page read and write
1D575810000
heap
page read and write
7FFAAB900000
trusted library allocation
page read and write
7FFAAB740000
trusted library allocation
page execute and read and write
1D0F7940000
heap
page read and write
1D575A87000
heap
page read and write
850000
heap
page read and write
1530000
heap
page read and write
5375FCE000
stack
page read and write
26F5AAEF000
trusted library allocation
page read and write
190DD138000
heap
page read and write
20CBE5C1000
heap
page read and write
28F903F000
stack
page read and write
7FFAAB9E0000
trusted library allocation
page read and write
253B6202000
heap
page read and write
2ABE000
stack
page read and write
7FFAAB80A000
trusted library allocation
page read and write
5374FF6000
stack
page read and write
20CBE5B0000
heap
page read and write
7FFAAB736000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
7FFAAB960000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
28F8E7E000
stack
page read and write
7FFAAB940000
trusted library allocation
page read and write
26F57750000
trusted library allocation
page read and write
1AF5D000
stack
page read and write
21E35988000
heap
page read and write
190C6047000
trusted library allocation
page read and write
253B61CC000
heap
page read and write
20CBE5A0000
heap
page read and write
28C0000
heap
page execute and read and write
7FFAAB684000
trusted library allocation
page read and write
1CFAD000
stack
page read and write
1544F09000
stack
page read and write
1D5757E5000
heap
page read and write
12AD8000
trusted library allocation
page read and write
7FFAABA90000
trusted library allocation
page read and write
7FFAAB730000
trusted library allocation
page read and write
21E4FC7A000
heap
page read and write
1540000
heap
page read and write
7FFAAB8D0000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
1D0F80BE000
heap
page read and write
253B60E6000
heap
page read and write
7FFAABA90000
trusted library allocation
page read and write
1D501008000
trusted library allocation
page read and write
7FFAAB850000
trusted library allocation
page read and write
7FFAAB862000
trusted library allocation
page read and write
7FFAAB8B0000
trusted library allocation
page read and write
1240000
heap
page read and write
29D1000
trusted library allocation
page read and write
253ADE78000
trusted library allocation
page read and write
7FFAAB9D0000
trusted library allocation
page read and write
7FFAAB8C0000
trusted library allocation
page read and write
19DE000
stack
page read and write
7FFAAB690000
trusted library allocation
page read and write
7FFAAB69D000
trusted library allocation
page execute and read and write
2930000
trusted library allocation
page read and write
20CBE5A0000
heap
page read and write
21E35AC5000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
1D5750A0000
trusted library allocation
page read and write
20CBE5B0000
heap
page read and write
253B60C0000
heap
page read and write
EC5D34C000
stack
page read and write
20CBE5A0000
heap
page read and write
253B6450000
heap
page read and write
7FFAAB9A3000
trusted library allocation
page read and write
EC5C073000
stack
page read and write
53749EE000
stack
page read and write
26F59560000
heap
page execute and read and write
1D575CC0000
heap
page read and write
20CBE5B0000
heap
page read and write
15442BE000
stack
page read and write
2D20F700000
heap
page read and write
315F000
trusted library allocation
page read and write
21E3853C000
trusted library allocation
page read and write
1D57598F000
heap
page read and write
There are 1551 hidden memdumps, click here to show them.