IOC Report
s3OBQLA3xR.exe

loading gif

Files

File Path
Type
Category
Malicious
s3OBQLA3xR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Discord.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Discord.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zipkzog.wbp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zu4xfsi.o4n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5yqvmdb3.30w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ao4aa30l.ywr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bir5h0qu.unh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvk43siu.m0e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyg3uvcy.gtg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gdiytu4y.fs3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghqtr1ff.1gu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jph33gpi.ovp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ndljfo5w.3x4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pi20cdd4.cv5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pncfvtsf.ouw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_semkodpj.ii0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sj3t4gbf.4gx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x112r4y2.yyx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 15:52:52 2024, mtime=Sun Oct 13 15:52:52 2024, atime=Sun Oct 13 15:52:52 2024, length=358912, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\s3OBQLA3xR.exe
"C:\Users\user\Desktop\s3OBQLA3xR.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\s3OBQLA3xR.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 's3OBQLA3xR.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Discord.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\user\AppData\Roaming\Discord.exe"
malicious
C:\Users\user\AppData\Roaming\Discord.exe
C:\Users\user\AppData\Roaming\Discord.exe
malicious
C:\Users\user\AppData\Roaming\Discord.exe
C:\Users\user\AppData\Roaming\Discord.exe
malicious
C:\Users\user\AppData\Roaming\Discord.exe
"C:\Users\user\AppData\Roaming\Discord.exe"
malicious
C:\Users\user\AppData\Roaming\Discord.exe
"C:\Users\user\AppData\Roaming\Discord.exe"
malicious
C:\Users\user\AppData\Roaming\Discord.exe
C:\Users\user\AppData\Roaming\Discord.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
methods-availability.gl.at.ply.gg
malicious
http://crl.microso?
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.microsK_o
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.microsoo
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
methods-availability.gl.at.ply.gg
147.185.221.23
malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.23
methods-availability.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\s3OBQLA3xR_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Discord
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12BB2000
trusted library allocation
page read and write
malicious
2BA1000
trusted library allocation
page read and write
malicious
862000
unkown
page readonly
malicious
7FFD9B8F0000
trusted library allocation
page read and write
1AD97FE4000
heap
page read and write
720000
trusted library allocation
page read and write
21BD0C20000
heap
page read and write
7CC000
heap
page read and write
239B7DD2000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
90553BB000
stack
page read and write
239B75A9000
trusted library allocation
page read and write
239C767C000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
A39ECF9000
stack
page read and write
239B5A80000
trusted library section
page read and write
239B91A8000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1C6A0000
heap
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
2296F5A9000
heap
page read and write
1B40E000
stack
page read and write
A39EEF8000
stack
page read and write
239B7F79000
trusted library allocation
page read and write
3E0000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
5387A7E000
stack
page read and write
1ADA9CA5000
trusted library allocation
page read and write
1385000
heap
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
1B0C0000
heap
page read and write
229551FD000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
26BC000
trusted library allocation
page read and write
1C3A5000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
239B5A00000
heap
page read and write
7DF4B4150000
trusted library allocation
page execute and read and write
21BEAC67000
heap
page execute and read and write
1BACC000
stack
page read and write
1AD99C31000
trusted library allocation
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
7FFD9B750000
trusted library allocation
page read and write
239C73A1000
trusted library allocation
page read and write
21BEAFB2000
heap
page read and write
90550B9000
stack
page read and write
1190000
trusted library allocation
page read and write
229671AB000
trusted library allocation
page read and write
1AD9A0FD000
trusted library allocation
page read and write
7FFD9B898000
trusted library allocation
page read and write
C90000
heap
page read and write
7FFD9B6E2000
trusted library allocation
page read and write
99A000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
7FFD9BA38000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1ADB1F70000
heap
page read and write
239B5A90000
trusted library section
page read and write
22957C3B000
trusted library allocation
page read and write
1B5C3000
heap
page read and write
E00000
heap
page read and write
2D31000
trusted library allocation
page read and write
AA5000
heap
page read and write
260C000
trusted library allocation
page read and write
A39F23E000
stack
page read and write
21BE2B5D000
trusted library allocation
page read and write
21BD37E0000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
9054F78000
stack
page read and write
21BD3B50000
trusted library allocation
page read and write
B40000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
22956CF0000
heap
page read and write
790000
heap
page read and write
1AD9A9AC000
trusted library allocation
page read and write
D20000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B87A000
trusted library allocation
page read and write
239B7F6B000
trusted library allocation
page read and write
21BD1055000
heap
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
1AD99E5A000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
CC99EE000
unkown
page read and write
940000
trusted library allocation
page read and write
A85000
heap
page read and write
239CFC5D000
heap
page read and write
21BEACB8000
heap
page read and write
A39F13E000
stack
page read and write
21BD3B4E000
trusted library allocation
page read and write
22956D08000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1AD9AE0E000
trusted library allocation
page read and write
7FFD9BA22000
trusted library allocation
page read and write
5387D7F000
stack
page read and write
7FFD9B77C000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
116A6540000
heap
page read and write
22956B80000
heap
page read and write
22966EF1000
trusted library allocation
page read and write
239B588C000
heap
page read and write
2730000
heap
page read and write
7FFD9BB3D000
trusted library allocation
page read and write
A39FD0C000
stack
page read and write
1AD99910000
trusted library allocation
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
7FFD9B860000
trusted library allocation
page read and write
53875DF000
stack
page read and write
1AD9ACC6000
trusted library allocation
page read and write
125F8000
trusted library allocation
page read and write
99F000
heap
page read and write
21BD3B48000
trusted library allocation
page read and write
22958CE7000
trusted library allocation
page read and write
2296F600000
trusted library allocation
page read and write
C4F000
stack
page read and write
9054CFE000
stack
page read and write
1AD99950000
trusted library allocation
page read and write
1C4AA000
stack
page read and write
5A0000
heap
page read and write
22955237000
heap
page read and write
E20000
heap
page read and write
E91000
heap
page read and write
21BD2860000
heap
page execute and read and write
2296F23A000
heap
page read and write
239B5876000
heap
page read and write
2296F4AB000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
21BD28F6000
trusted library allocation
page read and write
22955130000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1B200000
heap
page execute and read and write
A39FE09000
stack
page read and write
21BD464F000
trusted library allocation
page read and write
5387B79000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
7DF3FECD0000
trusted library allocation
page execute and read and write
1AFC0000
heap
page read and write
25E0000
heap
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
239B5854000
heap
page read and write
12D38000
trusted library allocation
page read and write
A39F2BC000
stack
page read and write
1B9CE000
stack
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
1B0CF000
stack
page read and write
239B91A3000
trusted library allocation
page read and write
22956B70000
heap
page execute and read and write
7FFD9B6E0000
trusted library allocation
page read and write
21BE2B64000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
90551BE000
stack
page read and write
7FFD9B786000
trusted library allocation
page read and write
341000
stack
page read and write
E30000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
2296F2F7000
heap
page read and write
1AD9AC35000
trusted library allocation
page read and write
239B80F5000
trusted library allocation
page read and write
239B7375000
heap
page read and write
7FFD9B892000
trusted library allocation
page read and write
239CFC08000
heap
page read and write
1ADB2004000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
29A3000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
22956B50000
trusted library allocation
page read and write
80E000
heap
page read and write
1B2CE000
stack
page read and write
1AD980C0000
heap
page read and write
7FFD9B882000
trusted library allocation
page read and write
99C000
heap
page read and write
1AD9B4C3000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
239B8385000
trusted library allocation
page read and write
AF5000
heap
page read and write
7FFD9B8FF000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
53879F7000
stack
page read and write
53878FA000
stack
page read and write
21BEAE10000
heap
page read and write
21BD0D59000
heap
page read and write
1B1CE000
stack
page read and write
1B520000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
239CF84A000
heap
page read and write
A39EF3F000
stack
page read and write
C8F44FE000
stack
page read and write
1AD9B585000
trusted library allocation
page read and write
21BD3809000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
239B7F81000
trusted library allocation
page read and write
1ADB2180000
heap
page execute and read and write
829000
heap
page read and write
21BE28E4000
trusted library allocation
page read and write
22956CD0000
heap
page execute and read and write
21BEB032000
heap
page read and write
1AD98000000
heap
page read and write
CC9969000
stack
page read and write
FFC000
stack
page read and write
239B5AB5000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
2296F4D0000
heap
page read and write
22955140000
heap
page read and write
229551EE000
heap
page read and write
21BD3B17000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
5A0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
239B8596000
trusted library allocation
page read and write
239B7300000
heap
page read and write
26A0000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
1ADB1FC0000
heap
page read and write
2295809D000
trusted library allocation
page read and write
1380000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
21BEAE30000
heap
page read and write
EC6000
heap
page read and write
99F000
stack
page read and write
AD8000
heap
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
2296F320000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
2A00000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
900000
heap
page read and write
22967217000
trusted library allocation
page read and write
21BE2B6C000
trusted library allocation
page read and write
126B8000
trusted library allocation
page read and write
2296F277000
heap
page read and write
21BEAFB0000
heap
page read and write
1B1CE000
stack
page read and write
21BD4694000
trusted library allocation
page read and write
C8F52CE000
stack
page read and write
1AD9804A000
heap
page read and write
239B5A20000
heap
page read and write
7FFD9B881000
trusted library allocation
page read and write
EF0000
heap
page read and write
1ADB2286000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
1AD99AA0000
heap
page read and write
7FFD9B894000
trusted library allocation
page read and write
21BD3FF6000
trusted library allocation
page read and write
239B868C000
trusted library allocation
page read and write
7FFD9BA34000
trusted library allocation
page read and write
1ADA9F1E000
trusted library allocation
page read and write
1ADA9C31000
trusted library allocation
page read and write
E68000
heap
page read and write
1ADB1FFC000
heap
page read and write
1AD980A5000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9B6E4000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
21BD380F000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
EF5000
heap
page read and write
21BD3905000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
D26000
heap
page read and write
21BD3A4A000
trusted library allocation
page read and write
8F1000
stack
page read and write
C8F3BCE000
stack
page read and write
700000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
C8F3EFE000
stack
page read and write
9055139000
stack
page read and write
A39FF8E000
stack
page read and write
7FFD9BA03000
trusted library allocation
page read and write
E75000
heap
page read and write
2D3F000
trusted library allocation
page read and write
9054E77000
stack
page read and write
EC0000
trusted library allocation
page read and write
7FFD9BA3C000
trusted library allocation
page read and write
1ADA9C51000
trusted library allocation
page read and write
A39F0BA000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
21BD0C90000
heap
page read and write
21BD3931000
trusted library allocation
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
239CFB00000
heap
page read and write
7FFD9B6C1000
trusted library allocation
page read and write
239CF970000
heap
page execute and read and write
22957F84000
trusted library allocation
page read and write
A39EDF7000
stack
page read and write
1AD980AC000
heap
page read and write
12D31000
trusted library allocation
page read and write
12903000
trusted library allocation
page read and write
21BD40DB000
trusted library allocation
page read and write
22957D49000
trusted library allocation
page read and write
239C73F5000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
82C000
heap
page read and write
9054DFE000
stack
page read and write
21BEAC70000
heap
page read and write
2410000
heap
page read and write
12908000
trusted library allocation
page read and write
9055036000
stack
page read and write
2296F200000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
24F0000
heap
page execute and read and write
239C768C000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
29A0000
trusted library allocation
page read and write
7FFD9BA19000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
116A6560000
heap
page read and write
1B12C000
stack
page read and write
1AD9AFF9000
trusted library allocation
page read and write
1C8EF000
stack
page read and write
25FE000
stack
page read and write
251F000
stack
page read and write
90552BC000
stack
page read and write
116A6608000
heap
page read and write
2296F283000
heap
page read and write
21BEAF2C000
heap
page read and write
CE0000
heap
page read and write
21BD26C0000
heap
page read and write
22958816000
trusted library allocation
page read and write
2296F581000
heap
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
C8F437A000
stack
page read and write
1BB71000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
239B8441000
trusted library allocation
page read and write
865000
heap
page read and write
22966EC1000
trusted library allocation
page read and write
239B7381000
trusted library allocation
page read and write
1B6CA000
stack
page read and write
1AD99980000
trusted library allocation
page read and write
1AD999F6000
heap
page execute and read and write
5E0000
heap
page read and write
D8D000
heap
page read and write
1AD97FD2000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
21BD3BBA000
trusted library allocation
page read and write
760000
heap
page read and write
1AD97FDE000
heap
page read and write
E18000
heap
page read and write
26C1000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1ADB22B0000
heap
page read and write
AA0000
heap
page read and write
A80000
heap
page read and write
239B7408000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
21BEB083000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
239B915E000
trusted library allocation
page read and write
7FFD9B6EB000
trusted library allocation
page read and write
21BD0C50000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
1ADB1FC4000
heap
page read and write
7FFD9B871000
trusted library allocation
page read and write
538894E000
stack
page read and write
2296F242000
heap
page read and write
22955180000
heap
page read and write
2296F442000
heap
page read and write
C8F40FE000
stack
page read and write
1B0000
unkown
page readonly
21BD26D0000
trusted library allocation
page read and write
E70000
heap
page read and write
21BD0D0C000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
A75000
heap
page read and write
7FFD9B6A3000
trusted library allocation
page execute and read and write
239CF8BF000
heap
page read and write
7FFD9B891000
trusted library allocation
page read and write
21BEADE0000
heap
page execute and read and write
A39FC8E000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
239CFC4E000
heap
page read and write
21BD274D000
heap
page read and write
22956EC1000
trusted library allocation
page read and write
5387AF7000
stack
page read and write
126B3000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2296F43F000
heap
page read and write
2680000
heap
page execute and read and write
7FFD9B6CB000
trusted library allocation
page read and write
229671B0000
trusted library allocation
page read and write
C8F42F7000
stack
page read and write
1CBF8000
heap
page read and write
C8F4177000
stack
page read and write
A8F000
stack
page read and write
98F000
heap
page read and write
1AD97FFD000
heap
page read and write
E10000
heap
page read and write
E15000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B8E0000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7C0000
heap
page read and write
21BD0D14000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
C8F45FC000
stack
page read and write
2296F281000
heap
page read and write
7FFD9B8B2000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
239CF924000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B6FB000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
239B5820000
heap
page read and write
1ADB22CF000
heap
page read and write
7DF3FECB0000
trusted library allocation
page execute and read and write
22956C00000
trusted library allocation
page read and write
C8F3FFF000
stack
page read and write
7FFD9B796000
trusted library allocation
page read and write
2D20000
heap
page read and write
1AD999C0000
trusted library allocation
page read and write
1BAEE000
heap
page read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
12603000
trusted library allocation
page read and write
7FA000
heap
page read and write
7FFD9B6DB000
trusted library allocation
page read and write
21BD2690000
heap
page readonly
1BADD000
heap
page read and write
21BD3C3B000
trusted library allocation
page read and write
1ADB1FF8000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1B8CE000
stack
page read and write
1C5A8000
stack
page read and write
239B84E5000
trusted library allocation
page read and write
2296F300000
heap
page read and write
905496D000
stack
page read and write
7FFD9BABC000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
22957AC5000
trusted library allocation
page read and write
229551FB000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
22956B76000
heap
page execute and read and write
1AD9A682000
trusted library allocation
page read and write
E80000
heap
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
7FFD9B8E0000
trusted library allocation
page read and write
1CFEC000
stack
page read and write
239B586E000
heap
page read and write
D5E000
heap
page read and write
125F1000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
239CFB3A000
heap
page read and write
239CF88B000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
239B862B000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
21BD409C000
trusted library allocation
page read and write
A39ED7E000
stack
page read and write
21BD3B82000
trusted library allocation
page read and write
5387BFB000
stack
page read and write
229570E9000
trusted library allocation
page read and write
22958CC7000
trusted library allocation
page read and write
1AD99930000
trusted library allocation
page read and write
21BE2A7E000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
239CFC94000
heap
page read and write
B8E000
stack
page read and write
7FFD9B862000
trusted library allocation
page read and write
9055E0A000
stack
page read and write
21BD0D54000
heap
page read and write
239B5900000
heap
page read and write
11C0000
heap
page read and write
A39EFBA000
stack
page read and write
2B9E000
stack
page read and write
7DF489370000
trusted library allocation
page execute and read and write
1AC4D000
stack
page read and write
1BBBF000
heap
page read and write
26BE000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
E89000
heap
page read and write
EC8000
heap
page read and write
C95000
heap
page read and write
7FFD9B6B2000
trusted library allocation
page read and write
1B0CE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
239B72D0000
heap
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
9054EFD000
stack
page read and write
239B8415000
trusted library allocation
page read and write
21BD35E2000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
7DF4B4160000
trusted library allocation
page execute and read and write
21BEAE00000
trusted library allocation
page read and write
239B7370000
heap
page read and write
239CF8F3000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
B45000
heap
page read and write
9F1000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
26BF000
trusted library allocation
page read and write
7FFD9B8A2000
trusted library allocation
page read and write
21BEB027000
heap
page read and write
2C2E000
stack
page read and write
1AD99A90000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
3C0000
heap
page read and write
239B7FB7000
trusted library allocation
page read and write
22956BC0000
trusted library allocation
page read and write
1BB1B000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
CA0000
heap
page read and write
1ADB1FB0000
heap
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
22957F58000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
2295872E000
trusted library allocation
page read and write
22955110000
heap
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
C8F51C9000
stack
page read and write
9055E89000
stack
page read and write
7FFD9BA13000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2296F5A2000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
B10000
heap
page read and write
1C10D000
stack
page read and write
1ADB2376000
heap
page read and write
1ADB1FA1000
heap
page read and write
1ADB25B0000
heap
page read and write
1ADB1FEA000
heap
page read and write
21BE2871000
trusted library allocation
page read and write
1AD9B526000
trusted library allocation
page read and write
239B58B5000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page execute and read and write
12608000
trusted library allocation
page read and write
21BD3585000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
22966F32000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
9054C7E000
stack
page read and write
1ADB20C7000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
C8F41FD000
stack
page read and write
21BD0D0E000
heap
page read and write
7FFD9BA28000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
2296F42A000
heap
page read and write
1AD9AEDB000
trusted library allocation
page read and write
1AD9ACF2000
trusted library allocation
page read and write
1ADA9C40000
trusted library allocation
page read and write
5B0000
heap
page read and write
2296F246000
heap
page read and write
116A6600000
heap
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
7FFD9B6F0000
trusted library allocation
page read and write
21BD467D000
trusted library allocation
page read and write
1AD9AF3D000
trusted library allocation
page read and write
7DF4F13C0000
trusted library allocation
page execute and read and write
1ADA9F23000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
22956B90000
trusted library allocation
page read and write
229671B8000
trusted library allocation
page read and write
80C000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B852000
trusted library allocation
page read and write
A39E94E000
stack
page read and write
116A6900000
heap
page read and write
7FFD9BA14000
trusted library allocation
page read and write
C8F504C000
stack
page read and write
7FFD9B88A000
trusted library allocation
page read and write
2296F215000
heap
page read and write
1CBEC000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
22958754000
trusted library allocation
page read and write
2296F400000
heap
page read and write
22957C32000
trusted library allocation
page read and write
53889C9000
stack
page read and write
21BD3994000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7E2000
heap
page read and write
7FFD9B8B4000
trusted library allocation
page read and write
1AD9BA11000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
239B5830000
heap
page read and write
239B7290000
trusted library allocation
page read and write
7FF4A8C30000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
1ADB2344000
heap
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
7FFD9B79C000
trusted library allocation
page execute and read and write
21BE2B62000
trusted library allocation
page read and write
2A90000
heap
page execute and read and write
7FFD9B842000
trusted library allocation
page read and write
239CFC6C000
heap
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
1AD9801E000
heap
page read and write
11C5000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
D95000
heap
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
229581CC000
trusted library allocation
page read and write
239CFA10000
heap
page read and write
22957EF4000
trusted library allocation
page read and write
1AD98002000
heap
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
7FFD9BA24000
trusted library allocation
page read and write
239B83B1000
trusted library allocation
page read and write
7FFD9B8C8000
trusted library allocation
page read and write
2296F2BE000
heap
page read and write
E60000
heap
page read and write
21BD0CE2000
heap
page read and write
3A0000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
7FFD9B8A4000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
239B58B8000
heap
page read and write
B38000
heap
page read and write
1AD982C5000
heap
page read and write
239B7F89000
trusted library allocation
page read and write
7C8000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
22957ECA000
trusted library allocation
page read and write
12CE000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
2295523C000
heap
page read and write
2296F481000
heap
page read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
12BA8000
trusted library allocation
page read and write
21BD38F7000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
A33000
trusted library allocation
page read and write
7E5000
heap
page read and write
7FFD9B6FC000
trusted library allocation
page execute and read and write
2295816B000
trusted library allocation
page read and write
21BEAD25000
heap
page read and write
12601000
trusted library allocation
page read and write
5387CFE000
stack
page read and write
260F000
trusted library allocation
page read and write
1BF0E000
stack
page read and write
22955135000
heap
page read and write
A39EC7E000
stack
page read and write
239CF380000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page read and write
1BBA2000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
2296F24E000
heap
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
711000
stack
page read and write
1ADB236C000
heap
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
1AD998E0000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
22966EE1000
trusted library allocation
page read and write
1AD98047000
heap
page read and write
C8F4FCE000
stack
page read and write
1AFC0000
heap
page execute and read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
229671B2000
trusted library allocation
page read and write
239CFC55000
heap
page read and write
2901000
trusted library allocation
page read and write
21BEAF37000
heap
page read and write
21BD2A98000
trusted library allocation
page read and write
1ADB2028000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
1BACF000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9B700000
trusted library allocation
page read and write
239B586C000
heap
page read and write
1AD9AC61000
trusted library allocation
page read and write
239B80FE000
trusted library allocation
page read and write
1ADA9C61000
trusted library allocation
page read and write
1B30E000
stack
page read and write
1B5C0000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
1ADB23E0000
trusted library allocation
page read and write
1AD98006000
heap
page read and write
7FFD9BB1D000
trusted library allocation
page read and write
538759E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
2296F556000
heap
page read and write
1B6B0000
heap
page execute and read and write
1ADB20A0000
heap
page read and write
1CAEA000
stack
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
AD0000
heap
page read and write
2296F23E000
heap
page read and write
2296F50A000
heap
page read and write
7FFD9B8A8000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
AEB000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
960000
heap
page read and write
A39E8C3000
stack
page read and write
C8F3E73000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
21BD41C3000
trusted library allocation
page read and write
1ADB1F9D000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
22957FE7000
trusted library allocation
page read and write
21BD2D3D000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
239B8C11000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
21BD4062000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
7FFD9BACC000
trusted library allocation
page read and write
8F1000
stack
page read and write
7FFD9B890000
trusted library allocation
page read and write
1ABD0000
trusted library allocation
page read and write
7FFD9B862000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
7FFD9BB20000
trusted library allocation
page read and write
7DF489380000
trusted library allocation
page execute and read and write
239CF977000
heap
page execute and read and write
21BEAD56000
heap
page read and write
D2C000
heap
page read and write
7FFD9B776000
trusted library allocation
page read and write
9055F8E000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1AD9AF0A000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
22956B30000
trusted library allocation
page read and write
25FC000
trusted library allocation
page read and write
1AB7C000
stack
page read and write
BB1000
stack
page read and write
C2F000
stack
page read and write
7D4000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
E9B000
heap
page read and write
EED000
heap
page read and write
1AF70000
heap
page execute and read and write
1ADB2380000
heap
page read and write
7FFD9B882000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
22956B85000
heap
page read and write
7FFD9BA48000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
229551B0000
heap
page read and write
21BD0CC5000
heap
page read and write
239B5874000
heap
page read and write
21BEAF10000
heap
page read and write
5C0000
heap
page read and write
E40000
heap
page read and write
239CFE30000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BA04000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
1AD98004000
heap
page read and write
239CF950000
heap
page execute and read and write
D49000
heap
page read and write
21BD26A0000
trusted library allocation
page read and write
905533E000
stack
page read and write
28F0000
heap
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
22957AF3000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1BB2F000
heap
page read and write
2296F252000
heap
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
D3E000
heap
page read and write
22956F3D000
trusted library allocation
page read and write
1AFBE000
stack
page read and write
21BEAFAE000
heap
page read and write
21BE28A1000
trusted library allocation
page read and write
1AD99C20000
heap
page execute and read and write
D25000
heap
page read and write
968000
heap
page read and write
239CFB28000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
C8F524C000
stack
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
1B2CF000
stack
page read and write
7FFD9B6A4000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
2296F578000
heap
page read and write
DCE000
stack
page read and write
2C70000
heap
page execute and read and write
5387493000
stack
page read and write
7CA000
heap
page read and write
AD0000
trusted library allocation
page read and write
1BB75000
heap
page read and write
1ADB21E0000
heap
page read and write
C8F514E000
stack
page read and write
7DB000
heap
page read and write
21BD2871000
trusted library allocation
page read and write
25F1000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA29000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
1B1CF000
stack
page read and write
1CBF0000
heap
page read and write
1ADB1FF1000
heap
page read and write
21BD0D18000
heap
page read and write
7FFD9B9CF000
trusted library allocation
page read and write
126B1000
trusted library allocation
page read and write
1B240000
heap
page execute and read and write
1BB3F000
heap
page read and write
C8F4079000
stack
page read and write
7FFD9B852000
trusted library allocation
page read and write
21BEAC60000
heap
page execute and read and write
985000
heap
page read and write
1AD99A95000
heap
page read and write
1B9CE000
stack
page read and write
538751E000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
239CF843000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
C8F447E000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
12901000
trusted library allocation
page read and write
239CFBC5000
heap
page read and write
22956B60000
heap
page readonly
21BEAF1E000
heap
page read and write
229551C2000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
239B8BEA000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
22957EC8000
trusted library allocation
page read and write
2DFA000
trusted library allocation
page read and write
1ADB1FB8000
heap
page read and write
CCF000
stack
page read and write
E1D000
heap
page read and write
1ADB2325000
heap
page read and write
1AD999F0000
heap
page execute and read and write
7DF4F13D0000
trusted library allocation
page execute and read and write
7FFD9B86A000
trusted library allocation
page read and write
1AB8D000
stack
page read and write
90548E3000
stack
page read and write
1AD9BA56000
trusted library allocation
page read and write
21BD2700000
trusted library allocation
page read and write
770000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
2296F435000
heap
page read and write
1B2BD000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
7FFD9B8C4000
trusted library allocation
page read and write
21BD38A0000
trusted library allocation
page read and write
21BD3874000
trusted library allocation
page read and write
CC9C7F000
stack
page read and write
229671BA000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
22956EB0000
heap
page execute and read and write
22955239000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1AD9BA36000
trusted library allocation
page read and write
239CFBA4000
heap
page read and write
239C73B1000
trusted library allocation
page read and write
229551F5000
heap
page read and write
C8F3F7E000
stack
page read and write
A39F1BE000
stack
page read and write
E10000
heap
page read and write
239B9184000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9BA12000
trusted library allocation
page read and write
7FFD9BA42000
trusted library allocation
page read and write
A39FE8C000
stack
page read and write
9055D8E000
stack
page read and write
1AD9800C000
heap
page read and write
7FFD9B8B8000
trusted library allocation
page read and write
7FFD9B852000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
7FFD9B77C000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
1AD97EE0000
heap
page read and write
A39FD8E000
stack
page read and write
1AF25000
heap
page read and write
239B8CD2000
trusted library allocation
page read and write
229587B7000
trusted library allocation
page read and write
C8F50CE000
stack
page read and write
5388A4C000
stack
page read and write
7A0000
heap
page read and write
790000
heap
page read and write
239B7270000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA39000
trusted library allocation
page read and write
9055F8C000
stack
page read and write
1AD9B3B7000
trusted library allocation
page read and write
239B5842000
heap
page read and write
7FFD9BA1C000
trusted library allocation
page read and write
21BEB062000
heap
page read and write
1ADB1FB4000
heap
page read and write
7FFD9B6EB000
trusted library allocation
page execute and read and write
239B8B05000
trusted library allocation
page read and write
21BE2891000
trusted library allocation
page read and write
239C7672000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
B0A000
heap
page read and write
5387DFE000
stack
page read and write
21BD0D2C000
heap
page read and write
C40000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
5387E7C000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
C8F43FA000
stack
page read and write
B0C000
heap
page read and write
7FFD9B862000
trusted library allocation
page read and write
1AD9B49D000
trusted library allocation
page read and write
860000
heap
page read and write
2295520F000
heap
page read and write
7FFD9B9F3000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
1ADA9F3C000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
239B855D000
trusted library allocation
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
AFF000
heap
page read and write
A90000
heap
page read and write
21BEACD5000
heap
page read and write
21BD3B4A000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
9054D79000
stack
page read and write
1B59E000
stack
page read and write
1AD97FC0000
heap
page read and write
F24000
heap
page read and write
239B84A6000
trusted library allocation
page read and write
A39EE7D000
stack
page read and write
22957913000
trusted library allocation
page read and write
239B8747000
trusted library allocation
page read and write
7FFD9BA09000
trusted library allocation
page read and write
116A6530000
heap
page read and write
239CFD20000
trusted library allocation
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
7FD000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1B6C0000
heap
page read and write
229551B8000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
21BD0CC0000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
827000
heap
page read and write
26B1000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
21BD1050000
heap
page read and write
21BEACC9000
heap
page read and write
A05000
heap
page read and write
1B8CE000
stack
page read and write
1AD99A60000
heap
page read and write
1B160000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
21BD1040000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
112F000
stack
page read and write
2296F670000
heap
page read and write
7FFD9B786000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
21BEB022000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
1B540000
heap
page execute and read and write
7FFD9BB40000
trusted library allocation
page read and write
21BD4102000
trusted library allocation
page read and write
1AD9AD23000
trusted library allocation
page read and write
229671CA000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
21BE2B7C000
trusted library allocation
page read and write
239CF3F3000
heap
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
CE5000
heap
page read and write
538797F000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
21BD2680000
trusted library allocation
page read and write
22958289000
trusted library allocation
page read and write
7FFD9BB16000
trusted library allocation
page read and write
905523E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1AD97FC8000
heap
page read and write
22958CEC000
trusted library allocation
page read and write
239B5AA0000
trusted library allocation
page read and write
7DF3FECC0000
trusted library allocation
page execute and read and write
239B587A000
heap
page read and write
1C00E000
stack
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1CBFC000
heap
page read and write
A70000
heap
page read and write
2601000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
9055F0C000
stack
page read and write
860000
unkown
page readonly
1AD99940000
heap
page readonly
239CF840000
heap
page read and write
239B8321000
trusted library allocation
page read and write
22966ED0000
trusted library allocation
page read and write
21BD0CD0000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page execute and read and write
7FFD9BA2C000
trusted library allocation
page read and write
239C7381000
trusted library allocation
page read and write
53888CD000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
2D41000
trusted library allocation
page read and write
22955100000
heap
page read and write
E9D000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
239CF3B0000
trusted library allocation
page read and write
239B5A60000
heap
page read and write
239CFB2E000
heap
page read and write
1AD99CA2000
trusted library allocation
page read and write
7FFD9B700000
trusted library allocation
page read and write
239B7280000
heap
page readonly
1AD9A9A3000
trusted library allocation
page read and write
7FFD9B6AD000
trusted library allocation
page execute and read and write
7E8000
heap
page read and write
239B784D000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
90549EE000
stack
page read and write
21BD0C30000
heap
page read and write
7FFD9B89A000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1B3CE000
stack
page read and write
DE5000
heap
page read and write
239C7674000
trusted library allocation
page read and write
1AD980B0000
heap
page read and write
25CE000
stack
page read and write
1AD9AD57000
trusted library allocation
page read and write
12BAE000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA18000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
239B5870000
heap
page read and write
21BD3B4C000
trusted library allocation
page read and write
7FFD9BB36000
trusted library allocation
page read and write
2296F58D000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
390000
heap
page read and write
5D0000
heap
page read and write
1AD982C0000
heap
page read and write
239C75D7000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
239C766E000
trusted library allocation
page read and write
1ADB22E4000
heap
page read and write
538787E000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
538884F000
stack
page read and write
9C5000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
811000
heap
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
21BEB240000
heap
page read and write
1BAD0000
heap
page read and write
2296F2EA000
heap
page read and write
1AD980E0000
heap
page read and write
10FD000
stack
page read and write
21BEB056000
heap
page read and write
239CFC2B000
heap
page read and write
C8F4278000
stack
page read and write
22958648000
trusted library allocation
page read and write
1ADB202A000
heap
page read and write
1ADB1FAC000
heap
page read and write
5387C78000
stack
page read and write
A39FF0C000
stack
page read and write
C8F457E000
stack
page read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
7A6000
heap
page read and write
239B5902000
heap
page read and write
7FFD9B766000
trusted library allocation
page read and write
21BEAD03000
heap
page read and write
7FFD9B8C2000
trusted library allocation
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
21BD4699000
trusted library allocation
page read and write
9054FBF000
stack
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1AD9BA5B000
trusted library allocation
page read and write
7FFD9B861000
trusted library allocation
page read and write
1B50E000
stack
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
1B08F000
stack
page read and write
229580D6000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
21BD32C2000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
21BD4675000
trusted library allocation
page read and write
116A6905000
heap
page read and write
1ADA9F2C000
trusted library allocation
page read and write
12D33000
trusted library allocation
page read and write
7AC000
heap
page read and write
239B5AB0000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
A39E9CE000
stack
page read and write
2295738D000
trusted library allocation
page read and write
2296F59D000
heap
page read and write
239CFC98000
heap
page read and write
2296F42D000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
5388ACE000
stack
page read and write
22958CA2000
trusted library allocation
page read and write
125F3000
trusted library allocation
page read and write
21BD3A83000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
82F000
heap
page read and write
590000
heap
page read and write
A39F037000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B776000
trusted library allocation
page read and write
D62000
heap
page read and write
1B34E000
stack
page read and write
1AD7D000
stack
page read and write
There are 1144 hidden memdumps, click here to show them.