IOC Report
path.ps1

loading gif

Files

File Path
Type
Category
Malicious
path.ps1
ASCII text, with very long lines (645), with no line terminators
initial sample
malicious
C:\Users\Public\kkgno5j1.bat
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\iICi.ini
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1cifa30j.opm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jpjsqp3.bb1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kpnrnwzb.00w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nuhfogrn.zth.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5ghxxs2.ldc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xhblj3qw.kfp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WC02NXVD0FQTIY0KDMB1.temp
data
dropped
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
data
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
Generic INItialization configuration [interface]
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\path.ps1"
malicious
C:\Users\Public\kkgno5j1.bat
"C:\Users\Public\kkgno5j1.bat"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/iICi.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{C4844444-CC8C-4CC0-C000-00CCCC888844}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
malicious
C:\Users\user\Desktop\utox_x86_x64.exe
"C:\Users\user\Desktop\utox_x86_x64.exe"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/iICi.ini
malicious
C:\Windows\System32\regsvr32.exe
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/iICi.ini
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://go.microsoft.co
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
https://go.micro
unknown
malicious
https://github.com/Pester/Pester
unknown
malicious
https://rocketdocs.lol/g3y89237.exe
188.114.97.3
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://rocketdocs.lol
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://rocketdocs.lol/g3y89237.exeHt
unknown
https://rockeaotdocs.lol/utox_x86.eaoxeao
unknown
http://rocketdocs.lol
unknown
https://aka.ms/pscore68
unknown
https://rocketdocs.lol/utox_x86.exe
188.114.97.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://rockeaotdocs.lol/g3y89237.eaoxeaoHt
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rocketdocs.lol
188.114.97.3

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
104.223.122.15
unknown
United States
malicious
185.196.9.174
unknown
Switzerland
malicious
195.93.190.6
unknown
Ukraine
192.168.2.8
unknown
unknown
104.233.104.126
unknown
Saudi Arabia
148.251.23.146
unknown
Germany
192.168.2.7
unknown
unknown
163.172.136.118
unknown
United Kingdom
192.168.2.9
unknown
unknown
95.215.44.78
unknown
Latvia
193.124.186.205
unknown
Russian Federation
8.8.8.8
unknown
United States
37.97.185.116
unknown
Netherlands
130.133.110.14
unknown
Germany
194.249.212.109
unknown
Slovenia
136.243.141.187
unknown
Germany
37.187.122.30
unknown
France
185.14.30.213
unknown
Ukraine
185.58.206.164
unknown
Russian Federation
51.254.84.212
unknown
France
80.87.193.193
unknown
Russian Federation
46.229.52.198
unknown
Ukraine
188.114.97.3
rocketdocs.lol
European Union
205.185.116.116
unknown
United States
85.21.144.224
unknown
Russian Federation
192.168.2.255
unknown
unknown
198.98.51.198
unknown
United States
There are 18 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AE10000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
884000
unkown
page read and write
24B0000
trusted library allocation
page read and write
5044000
heap
page read and write
65EC000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
36D2000
stack
page read and write
2117000
heap
page read and write
1B230000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
1B1FB000
stack
page read and write
DE0000
heap
page read and write
26D0000
trusted library allocation
page read and write
501D000
heap
page read and write
5091000
heap
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
2806CBD6000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
480000
trusted library section
page read and write
7FF849070000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
1B2B0000
trusted library allocation
page read and write
17FBE1C0000
heap
page read and write
26B0000
trusted library allocation
page read and write
2030000
heap
page read and write
26E0000
trusted library allocation
page read and write
1B6A0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
17FBC870000
heap
page readonly
1B840000
trusted library allocation
page read and write
2805299E000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
24C7000
trusted library allocation
page read and write
232A000
heap
page read and write
2635000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
2806CBA0000
heap
page read and write
1686C75000
stack
page read and write
8537A37000
stack
page read and write
26C0000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
7FF848E0A000
trusted library allocation
page read and write
1BBF0000
trusted library allocation
page read and write
1BD70000
trusted library allocation
page read and write
1AE50000
trusted library allocation
page read and write
1B7C0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1B810000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1B240000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
5137000
heap
page read and write
1AE01000
heap
page read and write
1B6C0000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
4FFC000
heap
page read and write
21E3000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
1B900000
trusted library allocation
page read and write
1B1AB000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B850000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
1B8D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1BD00000
trusted library allocation
page read and write
2640000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
760000
heap
page read and write
280644D1000
trusted library allocation
page read and write
E1B000
heap
page read and write
1ADC0000
trusted library allocation
page read and write
1BBB0000
trusted library allocation
page read and write
1B400000
trusted library allocation
page read and write
17FD6A39000
heap
page read and write
16871F8000
stack
page read and write
1687F4E000
stack
page read and write
26A0000
trusted library allocation
page read and write
2806CB98000
heap
page read and write
1BD90000
trusted library allocation
page read and write
C2D000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1B390000
trusted library allocation
page read and write
1686FFE000
stack
page read and write
1B440000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
1B870000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
2806CDC0000
trusted library allocation
page read and write
1BC70000
trusted library allocation
page read and write
4B40000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
24B3000
trusted library allocation
page read and write
1B8C0000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1B7F0000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
1CDB33D0000
heap
page read and write
C20000
heap
page read and write
21E3000
trusted library allocation
page read and write
17FBE701000
trusted library allocation
page read and write
17FBFE13000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
D9B000
heap
page read and write
21D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B910000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1B210000
trusted library allocation
page read and write
1B1A0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FD69A7000
heap
page execute and read and write
59EC000
stack
page read and write
2200000
trusted library allocation
page read and write
7FF849213000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BD40000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
28052CD0000
trusted library allocation
page read and write
DCB000
heap
page read and write
7FF7FE0B0000
unkown
page readonly
8537DBB000
stack
page read and write
7FF8492C0000
trusted library allocation
page read and write
16873FE000
stack
page read and write
24B0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
26D8000
trusted library allocation
page read and write
26D3000
trusted library allocation
page read and write
17FBE070000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FD6740000
heap
page read and write
24B3000
trusted library allocation
page read and write
1CDB34D3000
heap
page read and write
24B0000
trusted library allocation
page read and write
28052CC0000
trusted library section
page read and write
24B0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
28054310000
trusted library allocation
page read and write
17FD6700000
heap
page read and write
21E0000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
2806CD0D000
heap
page read and write
1B200000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
280544B0000
heap
page execute and read and write
17FBC790000
heap
page read and write
26D0000
trusted library allocation
page read and write
ADFF3FE000
stack
page read and write
24F0000
trusted library allocation
page read and write
1BD60000
trusted library allocation
page read and write
2806CBD2000
heap
page read and write
24B0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
21B0000
heap
page read and write
1B1D0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1B2A0000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
1CDB1B53000
heap
page read and write
26E0000
trusted library allocation
page read and write
7FF7FE178000
unkown
page write copy
17FBC71B000
heap
page read and write
2806CBA8000
heap
page read and write
1AE31000
heap
page read and write
24B0000
trusted library allocation
page read and write
1B680000
trusted library allocation
page read and write
1B181000
trusted library allocation
page read and write
8537979000
stack
page read and write
1B7A3000
trusted library allocation
page read and write
30DF000
stack
page read and write
1B1D0000
trusted library allocation
page read and write
2701000
trusted library allocation
page read and write
1B800000
trusted library allocation
page read and write
1B260000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
1BC80000
trusted library allocation
page read and write
28056089000
trusted library allocation
page read and write
1B53E000
stack
page read and write
17FBFAB3000
trusted library allocation
page read and write
17FD6820000
heap
page read and write
26D0000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1B43E000
stack
page read and write
21F0000
trusted library allocation
page read and write
1B890000
trusted library allocation
page read and write
280647D7000
trusted library allocation
page read and write
1BBC0000
trusted library allocation
page read and write
ADFF1F9000
stack
page read and write
1B400000
trusted library allocation
page read and write
1B220000
trusted library allocation
page read and write
28055F86000
trusted library allocation
page read and write
202F000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
69F000
unkown
page read and write
8AD000
unkown
page readonly
21E3000
trusted library allocation
page read and write
8A9000
unkown
page readonly
1B690000
trusted library allocation
page read and write
20C0000
heap
page read and write
1B200000
trusted library allocation
page read and write
1B5E2000
heap
page read and write
280647C5000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
2806CD87000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1AF7A000
heap
page read and write
2805604E000
trusted library allocation
page read and write
280647BD000
trusted library allocation
page read and write
2766000
trusted library allocation
page read and write
1B920000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
2210000
heap
page execute and read and write
7FF848FF0000
trusted library allocation
page execute and read and write
567F000
stack
page read and write
26D3000
trusted library allocation
page read and write
2776000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
17FD6A6D000
heap
page read and write
17FD678D000
heap
page read and write
21E3000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
509C000
heap
page read and write
2200000
trusted library allocation
page read and write
5039000
heap
page read and write
28054330000
trusted library allocation
page read and write
5141000
heap
page read and write
2806CC01000
heap
page read and write
1BB80000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1ADC1000
heap
page read and write
17FD6A64000
heap
page read and write
21E0000
trusted library allocation
page read and write
190000
heap
page read and write
7FF849174000
trusted library allocation
page read and write
2806CD47000
heap
page read and write
7DF4E71B0000
trusted library allocation
page execute and read and write
21D0000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
16869EE000
stack
page read and write
280563E0000
trusted library allocation
page read and write
21C0000
trusted library allocation
page read and write
28056482000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
1687FCD000
stack
page read and write
23A1000
heap
page read and write
17FBE160000
heap
page execute and read and write
21E0000
trusted library allocation
page read and write
C24000
heap
page read and write
2806CD8A000
heap
page read and write
1B4F0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
280528F0000
heap
page read and write
1BAD0000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
1686E7E000
stack
page read and write
1BC80000
trusted library allocation
page read and write
1AE13000
heap
page read and write
21E0000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
2806CC6C000
heap
page read and write
2690000
trusted library allocation
page read and write
2806CB90000
heap
page read and write
26D0000
trusted library allocation
page read and write
168717E000
stack
page read and write
24B0000
trusted library allocation
page read and write
10C0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
1686F7E000
stack
page read and write
1B1B0000
trusted library allocation
page read and write
17FBFE09000
trusted library allocation
page read and write
17FD6A19000
heap
page read and write
586000
heap
page read and write
24D0000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
85377FE000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
1B630000
trusted library allocation
page read and write
1AE20000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
1B430000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B8E0000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
50B4000
heap
page read and write
24C0000
trusted library allocation
page read and write
1ADC1000
heap
page read and write
17FBFE0B000
trusted library allocation
page read and write
28054556000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B4D0000
trusted library allocation
page read and write
1B330000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
4B80000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
160000
heap
page read and write
26E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1B6B0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
280543E0000
heap
page read and write
895000
unkown
page readonly
21E3000
trusted library allocation
page read and write
17FBC642000
heap
page read and write
24D0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
28052CF4000
heap
page read and write
1BD10000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
1CDB1B30000
heap
page read and write
24B0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B4A0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
1AF7C000
heap
page read and write
765000
heap
page read and write
1BC70000
trusted library allocation
page read and write
17FBC890000
heap
page read and write
1B3FA000
stack
page read and write
21E3000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
2106000
heap
page read and write
17FBE51E000
heap
page read and write
26F0000
heap
page execute and read and write
1374000
heap
page read and write
D30000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
12751000
trusted library allocation
page read and write
1B5C0000
trusted library allocation
page read and write
7FF89FA5C000
unkown
page readonly
21E0000
trusted library allocation
page read and write
85373CD000
stack
page read and write
2783000
trusted library allocation
page read and write
1B3D0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
17FCE76F000
trusted library allocation
page read and write
2806CCA8000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
24B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1B650000
trusted library allocation
page read and write
280529AA000
heap
page read and write
1B1DC000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page read and write
55B000
heap
page read and write
26D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
5002000
heap
page read and write
2010000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BCA0000
trusted library allocation
page read and write
85378FD000
stack
page read and write
21D0000
trusted library allocation
page read and write
1BD80000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
28064501000
trusted library allocation
page read and write
1BD20000
trusted library allocation
page read and write
17FBC830000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
17FBFDF3000
trusted library allocation
page read and write
16874FB000
stack
page read and write
1B5C0000
heap
page read and write
280647C7000
trusted library allocation
page read and write
1AE30000
trusted library allocation
page read and write
17FBC630000
heap
page read and write
1B37A000
stack
page read and write
2806CC9E000
heap
page read and write
21E0000
trusted library allocation
page read and write
547F000
stack
page read and write
1B3F0000
trusted library allocation
page read and write
E1B000
heap
page read and write
21E0000
trusted library allocation
page read and write
17FD69CB000
heap
page read and write
21E0000
trusted library allocation
page read and write
1B2FD000
stack
page read and write
21E0000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
24D0000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848FB4000
trusted library allocation
page read and write
1686D7E000
stack
page read and write
DCE000
heap
page read and write
21D3000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
1B660000
trusted library allocation
page read and write
89D000
unkown
page write copy
36BF000
stack
page read and write
2200000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FBC6D2000
heap
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BC50000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
1B250000
trusted library allocation
page read and write
277E000
trusted library allocation
page read and write
17FBE933000
trusted library allocation
page read and write
1CDB33D1000
heap
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21D7000
trusted library allocation
page read and write
1B1B0000
trusted library allocation
page read and write
280546F8000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1B189000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2806CB9C000
heap
page read and write
2806D050000
heap
page read and write
21E0000
trusted library allocation
page read and write
7FF7FE178000
unkown
page read and write
24B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
2806CD66000
heap
page read and write
899000
unkown
page write copy
1B5E0000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
1B27E000
stack
page read and write
50CE000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
897000
unkown
page read and write
2806C9CA000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF848E40000
trusted library allocation
page read and write
1B410000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1ADF4000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
1B27F000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
17FBFE17000
trusted library allocation
page read and write
2500000
heap
page read and write
57D000
heap
page read and write
D57000
heap
page read and write
1B03E000
stack
page read and write
21E0000
trusted library allocation
page read and write
5036000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
DDD000
heap
page read and write
17FD6736000
heap
page read and write
1BCF0000
trusted library allocation
page read and write
7DF4E71C0000
trusted library allocation
page execute and read and write
2690000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
21E0000
trusted library allocation
page read and write
2160000
trusted library section
page read and write
17FC0320000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FD69A0000
heap
page execute and read and write
1BB90000
trusted library allocation
page read and write
17FBE120000
heap
page read and write
8537CBC000
stack
page read and write
21D3000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1CDB1B38000
heap
page read and write
21E0000
trusted library allocation
page read and write
28064540000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
5007000
heap
page read and write
12C0000
heap
page read and write
1E0000
heap
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
21D0000
trusted library allocation
page read and write
17FBC895000
heap
page read and write
21E3000
trusted library allocation
page read and write
1B860000
trusted library allocation
page read and write
1B500000
trusted library allocation
page read and write
1BC90000
trusted library allocation
page read and write
1686CFE000
stack
page read and write
400000
unkown
page readonly
1BC00000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
2203000
trusted library allocation
page read and write
897000
unkown
page write copy
24DF000
trusted library allocation
page read and write
2806C95A000
heap
page read and write
7FF7FE0B1000
unkown
page execute read
21E3000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
49B000
heap
page read and write
10FB000
heap
page read and write
730000
trusted library section
page read and write
21E0000
trusted library allocation
page read and write
1B7B0000
trusted library allocation
page read and write
8537343000
stack
page read and write
5BF0000
trusted library allocation
page read and write
50C1000
heap
page read and write
1B250000
trusted library allocation
page read and write
2806CBAC000
heap
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BD30000
trusted library allocation
page read and write
17FBC730000
heap
page read and write
853888A000
stack
page read and write
1B510000
trusted library allocation
page read and write
28054ECC000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
1B400000
trusted library allocation
page read and write
101000
stack
page read and write
1BBB0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B190000
trusted library allocation
page read and write
5025000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
1AFB6000
heap
page read and write
17FD69B0000
heap
page read and write
1B190000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
509E000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
21D3000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1B830000
trusted library allocation
page read and write
1C0000
heap
page read and write
21E3000
trusted library allocation
page read and write
7FF849002000
trusted library allocation
page read and write
1AF5E000
heap
page read and write
280529E7000
heap
page read and write
24D0000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
2806CA04000
heap
page read and write
21D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B538000
trusted library allocation
page read and write
2220000
heap
page execute and read and write
10B0000
heap
page read and write
21F3000
trusted library allocation
page read and write
7FF89FA11000
unkown
page execute read
1B6F0000
trusted library allocation
page read and write
17FD69D9000
heap
page read and write
21E3000
trusted library allocation
page read and write
E03000
heap
page read and write
1AE0C000
trusted library allocation
page read and write
1B210000
trusted library allocation
page read and write
1BB50000
trusted library allocation
page read and write
7FF89FA10000
unkown
page readonly
26D0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
1B5F0000
trusted library allocation
page read and write
1CDB1BB6000
heap
page read and write
740000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
21E7000
trusted library allocation
page read and write
24B1000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BC42000
trusted library allocation
page read and write
21D3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BBE0000
trusted library allocation
page read and write
E1B000
heap
page read and write
1B5D9000
heap
page read and write
1BBF0000
trusted library allocation
page read and write
17FD67F4000
heap
page read and write
4CC0000
heap
page read and write
21E3000
trusted library allocation
page read and write
24C3000
trusted library allocation
page read and write
1B820000
trusted library allocation
page read and write
1B700000
trusted library allocation
page read and write
17FD6A11000
heap
page read and write
2690000
trusted library allocation
page read and write
B78000
stack
page read and write
8537C3F000
stack
page read and write
1CDB1BC2000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
28055484000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
2A48000
trusted library allocation
page read and write
1D0000
heap
page readonly
17FBC6BB000
heap
page read and write
24B0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
1B290000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1A730000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BCE0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
1B270000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
1BBD0000
trusted library allocation
page read and write
508B000
heap
page read and write
21E0000
remote allocation
page read and write
1B3A0000
trusted library allocation
page read and write
979000
unkown
page readonly
1BB80000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
43F000
unkown
page read and write
24D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
2ED3000
heap
page read and write
17FD6A5E000
heap
page read and write
24B0000
trusted library allocation
page read and write
85379BE000
stack
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
24C0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
17FBC6F3000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
16872FE000
stack
page read and write
24D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
280528D0000
heap
page read and write
17FC039F000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
1CDB1A80000
heap
page read and write
28054457000
heap
page execute and read and write
17FBE6F0000
heap
page execute and read and write
26E0000
trusted library allocation
page read and write
1BB60000
trusted library allocation
page read and write
5134000
heap
page read and write
21E3000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
260E000
stack
page read and write
853880E000
stack
page read and write
7FF848DF4000
trusted library allocation
page read and write
401000
unkown
page execute read
1687ECF000
stack
page read and write
513A000
heap
page read and write
1687177000
stack
page read and write
28054360000
trusted library allocation
page read and write
1686EFB000
stack
page read and write
7FF849188000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
24B3000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1B27A000
trusted library allocation
page read and write
5130000
heap
page read and write
26D3000
trusted library allocation
page read and write
1BDA3000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
1BAC0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
12701000
trusted library allocation
page read and write
50A5000
heap
page read and write
24B0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
7FF89FA9D000
unkown
page read and write
1BB50000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
17FBC638000
heap
page read and write
21E0000
trusted library allocation
page read and write
17FBC750000
heap
page read and write
24C0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
490000
heap
page read and write
2779000
trusted library allocation
page read and write
2505000
heap
page read and write
4B80000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
1B5BC000
stack
page read and write
21E3000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
150000
heap
page read and write
28054F5B000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
1BC60000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
2A92000
trusted library allocation
page read and write
24B3000
trusted library allocation
page read and write
1B470000
trusted library allocation
page read and write
280544D1000
trusted library allocation
page read and write
2150000
heap
page execute and read and write
1B8F0000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
8537BBE000
stack
page read and write
17FBFE2F000
trusted library allocation
page read and write
26D7000
trusted library allocation
page read and write
2806CAB0000
heap
page read and write
1B2C0000
trusted library allocation
page read and write
1B1F0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1BCD0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1AF83000
heap
page read and write
168737E000
stack
page read and write
24C0000
trusted library allocation
page read and write
1BD5A000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
1BBE0000
trusted library allocation
page read and write
16870F9000
stack
page read and write
6A7000
unkown
page readonly
21E3000
trusted library allocation
page read and write
24B1000
trusted library allocation
page read and write
1F10000
heap
page read and write
24B0000
trusted library allocation
page read and write
50DE000
heap
page read and write
24D0000
trusted library allocation
page read and write
28055EE0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BCC3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
4F80000
heap
page read and write
24C0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
28052950000
trusted library section
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
17FBC880000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
DE2000
heap
page read and write
D50000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
21D0000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
24C0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1B5E0000
heap
page read and write
DEB000
heap
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
21D3000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
17FBE190000
heap
page read and write
17FC0260000
trusted library allocation
page read and write
258D000
stack
page read and write
21E0000
remote allocation
page read and write
DED000
heap
page read and write
21E3000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
2680000
trusted library allocation
page read and write
17FCE710000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BB60000
trusted library allocation
page read and write
17FD6A75000
heap
page read and write
DAA000
heap
page read and write
280647B9000
trusted library allocation
page read and write
503E000
heap
page read and write
1B1C0000
trusted library allocation
page read and write
17FC02A5000
trusted library allocation
page read and write
1B620000
trusted library allocation
page read and write
50BD000
heap
page read and write
24B0000
trusted library allocation
page read and write
503C000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1B530000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page execute and read and write
7FF7FE17C000
unkown
page readonly
1AE50000
heap
page read and write
24B3000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1B880000
trusted library allocation
page read and write
28056010000
trusted library allocation
page read and write
170000
heap
page read and write
21E3000
trusted library allocation
page read and write
21C3000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1B320000
trusted library allocation
page read and write
BD4000
heap
page read and write
24C3000
trusted library allocation
page read and write
1B1F0000
trusted library allocation
page read and write
DD3000
heap
page read and write
280543A0000
trusted library allocation
page read and write
1B5B0000
trusted library allocation
page read and write
7FF849007000
trusted library allocation
page read and write
1B1A0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1B1FF000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
5005000
heap
page read and write
2A00000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
2806CD26000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
28054450000
heap
page execute and read and write
17FC039A000
trusted library allocation
page read and write
17FC02A1000
trusted library allocation
page read and write
8537D3E000
stack
page read and write
25E0000
trusted library allocation
page read and write
1BC06000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
280556B1000
trusted library allocation
page read and write
2806CBA4000
heap
page read and write
24C0000
trusted library allocation
page read and write
1BBAF000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B4C0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BC47000
trusted library allocation
page read and write
1BB40000
trusted library allocation
page read and write
1ADE0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF7FE0B1000
unkown
page execute read
21E0000
trusted library allocation
page read and write
1BC30000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BC15000
trusted library allocation
page read and write
7FF89FA9C000
unkown
page readonly
1CDB1B51000
heap
page read and write
1BBA0000
trusted library allocation
page read and write
4B3D000
stack
page read and write
24B0000
trusted library allocation
page read and write
24B7000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1B1AD000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
280647BF000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1B420000
trusted library allocation
page read and write
1B1C0000
trusted library allocation
page read and write
1B640000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
280562AD000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
17FBC6DF000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
1B4B0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
853787A000
stack
page read and write
2ED0000
heap
page read and write
1ADC0000
heap
page read and write
1BBD0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page read and write
2105000
heap
page read and write
6E0000
direct allocation
page read and write
511E000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
52C000
heap
page read and write
21E3000
trusted library allocation
page read and write
529000
heap
page read and write
2B9E000
stack
page read and write
24C0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1BC6E000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
5152000
heap
page read and write
24B0000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1B5DC000
heap
page read and write
1BC03000
trusted library allocation
page read and write
24B5000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
168747F000
stack
page read and write
2207000
trusted library allocation
page read and write
1CDB1B04000
heap
page read and write
1B5A0000
trusted library allocation
page read and write
28056317000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1B3E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
6A7000
unkown
page readonly
26E0000
trusted library allocation
page read and write
269A000
trusted library allocation
page read and write
28054490000
heap
page execute and read and write
28052960000
heap
page read and write
1B5D4000
heap
page read and write
280529A6000
heap
page read and write
1B670000
trusted library allocation
page read and write
895000
unkown
page readonly
20FC000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7DF430E30000
trusted library allocation
page execute and read and write
1B590000
trusted library allocation
page read and write
17FD678B000
heap
page read and write
7DF4E71A0000
trusted library allocation
page execute and read and write
1BC50000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
17FBFE1B000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
2203000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FBC6B6000
heap
page read and write
2A05000
trusted library allocation
page read and write
24F3000
trusted library allocation
page read and write
DEB000
heap
page read and write
853777A000
stack
page read and write
1370000
heap
page read and write
2806CD07000
heap
page read and write
21E3000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1B490000
trusted library allocation
page read and write
5124000
heap
page read and write
17FBC550000
heap
page read and write
7FF89FA5B000
unkown
page read and write
1AF81000
heap
page read and write
1B230000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1ADF0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
7DF4AE780000
trusted library allocation
page execute and read and write
21D7000
trusted library allocation
page read and write
17FBC860000
trusted library allocation
page read and write
1B252000
trusted library allocation
page read and write
1B600000
trusted library allocation
page read and write
17FC02B7000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FBC6E1000
heap
page read and write
26A0000
trusted library allocation
page read and write
1BCB4000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
1B4E0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
280529BE000
heap
page read and write
12755000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
7FF8492B0000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
2A99000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
1B90D000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
85376FE000
stack
page read and write
28055FCB000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
17FD6800000
heap
page read and write
BE0000
heap
page read and write
1BC10000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
735000
unkown
page read and write
1BAE0000
trusted library allocation
page read and write
1B5D8000
heap
page read and write
26A0000
trusted library allocation
page read and write
50B6000
heap
page read and write
21E0000
remote allocation
page read and write
ADFF5FF000
stack
page read and write
2200000
trusted library allocation
page read and write
1B360000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
1B5E1000
heap
page read and write
21E0000
trusted library allocation
page read and write
5072000
heap
page read and write
107B000
stack
page read and write
34DF000
stack
page read and write
280528C0000
heap
page read and write
1B1E0000
trusted library allocation
page read and write
7FF7FE103000
unkown
page readonly
7FF848FD1000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
979000
unkown
page readonly
2806CD04000
heap
page read and write
1B5D0000
trusted library allocation
page read and write
1B240000
trusted library allocation
page read and write
4A7000
heap
page read and write
24B0000
trusted library allocation
page read and write
2806CBF1000
heap
page read and write
8537B3B000
stack
page read and write
24E0000
trusted library allocation
page read and write
280644F1000
trusted library allocation
page read and write
400000
unkown
page readonly
17FD69B8000
heap
page read and write
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
17FCE701000
trusted library allocation
page read and write
1B540000
trusted library allocation
page read and write
28055237000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
1687279000
stack
page read and write
1CDB1B00000
heap
page read and write
1AF78000
heap
page read and write
1B220000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1BB90000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
17FD6A0D000
heap
page read and write
21E3000
trusted library allocation
page read and write
1BC20000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
BD0000
heap
page read and write
24B0000
trusted library allocation
page read and write
1B5D0000
heap
page read and write
89D000
unkown
page write copy
21E3000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
1686DFD000
stack
page read and write
8A9000
unkown
page readonly
24F0000
trusted library allocation
page read and write
24B5000
trusted library allocation
page read and write
1BC30000
trusted library allocation
page read and write
1BB40000
trusted library allocation
page read and write
DFF000
heap
page read and write
17FBE78A000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
853878E000
stack
page read and write
24B0000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
7FF7FE179000
unkown
page write copy
7FF849180000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
1B380000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
2806CB94000
heap
page read and write
DFC000
heap
page read and write
21E7000
trusted library allocation
page read and write
1B180000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
24B3000
trusted library allocation
page read and write
8AD000
unkown
page readonly
2806C4D2000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
2806C920000
heap
page read and write
5096000
heap
page read and write
21E0000
trusted library allocation
page read and write
1BDA0000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B350000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
17FBFDF6000
trusted library allocation
page read and write
1CDB1980000
heap
page read and write
21E3000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
168707D000
stack
page read and write
1B6E0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
280543E4000
heap
page read and write
24B0000
trusted library allocation
page read and write
502E000
heap
page read and write
24B0000
trusted library allocation
page read and write
1BBC0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BB70000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2806D09C000
heap
page read and write
1B610000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
5BEB000
stack
page read and write
1ADE6000
heap
page read and write
17FBE073000
trusted library allocation
page read and write
556000
heap
page read and write
7FF7FE17C000
unkown
page readonly
2759000
trusted library allocation
page read and write
5010000
heap
page read and write
28054320000
heap
page readonly
21E7000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
17FBC71D000
heap
page read and write
5015000
heap
page read and write
28052CF0000
heap
page read and write
2806CE20000
heap
page read and write
190000
heap
page read and write
1B580000
trusted library allocation
page read and write
25B3000
trusted library allocation
page read and write
1AE40000
trusted library allocation
page read and write
1B7D0000
trusted library allocation
page read and write
2200000
trusted library allocation
page read and write
1BABD000
stack
page read and write
2A02000
trusted library allocation
page read and write
17FBC722000
heap
page read and write
17FBF333000
trusted library allocation
page read and write
1ADC1000
heap
page read and write
24F0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BD56000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
853767E000
stack
page read and write
17FBFAB7000
trusted library allocation
page read and write
17FBE1C5000
heap
page read and write
1CDB1A60000
heap
page read and write
26D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
1BD49000
trusted library allocation
page read and write
1ADD0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2040000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
1B7E0000
trusted library allocation
page read and write
1BC20000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1AEB1000
heap
page read and write
1330000
heap
page read and write
1B3C0000
trusted library allocation
page read and write
90000
heap
page read and write
280529EA000
heap
page read and write
5023000
heap
page read and write
239E000
stack
page read and write
21E3000
trusted library allocation
page read and write
1BB70000
trusted library allocation
page read and write
1B300000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1B1E0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
32DF000
stack
page read and write
26B0000
trusted library allocation
page read and write
2806C9D9000
heap
page read and write
24D5000
trusted library allocation
page read and write
7FF89FAA0000
unkown
page readonly
21E3000
trusted library allocation
page read and write
69F000
unkown
page write copy
17FBFAB5000
trusted library allocation
page read and write
1B520000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
1BCB0000
trusted library allocation
page read and write
1BC00000
trusted library allocation
page read and write
1B8A0000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
276C000
trusted library allocation
page read and write
1AF62000
heap
page read and write
499000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
1B5C0000
trusted library allocation
page read and write
DFC000
heap
page read and write
24B0000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1B370000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
1AE94000
heap
page read and write
10F0000
heap
page read and write
1CDB1BAF000
heap
page read and write
7FF7FE0B0000
unkown
page readonly
7FF7FE103000
unkown
page readonly
1AFAA000
heap
page read and write
28052930000
heap
page read and write
1B286000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
269F000
trusted library allocation
page read and write
280544C0000
heap
page read and write
28055F3F000
trusted library allocation
page read and write
268F000
stack
page read and write
17FCE8B1000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
21F0000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
2603000
trusted library allocation
page read and write
21E3000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
1BC40000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
1BBA0000
trusted library allocation
page read and write
5012000
heap
page read and write
1B5D0000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
8537ABA000
stack
page read and write
There are 1279 hidden memdumps, click here to show them.