IOC Report
I8YtUAUWeS.exe

loading gif

Files

File Path
Type
Category
Malicious
I8YtUAUWeS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\System User
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x48b142e9, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System User.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24faipop.y05.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24n3jbl3.ngk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dj2c2e2r.uvd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ekqdfyc2.5xv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3mbwosb.lgb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fcxhqtgk.ji4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gl3hoeq1.0o0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mbaiwadm.fsy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p55zf3nn.che.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxg4ciea.txp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgkm03yo.vza.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0ojefhf.v2r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_swoq54dy.glm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vexyftkz.y54.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0t3uxtp.5uz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxoysyw0.2qs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System User.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 15:54:55 2024, mtime=Sun Oct 13 15:54:55 2024, atime=Sun Oct 13 15:54:55 2024, length=70144, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\I8YtUAUWeS.exe
"C:\Users\user\Desktop\I8YtUAUWeS.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\I8YtUAUWeS.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'I8YtUAUWeS.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\System User'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System User'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System User" /tr "C:\Users\user\AppData\Roaming\System User"
malicious
C:\Users\user\AppData\Roaming\System User
"C:\Users\user\AppData\Roaming\System User"
malicious
C:\Users\user\AppData\Roaming\System User
"C:\Users\user\AppData\Roaming\System User"
malicious
C:\Users\user\AppData\Roaming\System User
"C:\Users\user\AppData\Roaming\System User"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
147.185.221.23
malicious
https://g.live.com/odclientsettings/Prod/C:
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microso
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.microsK
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.microsoft.
unknown
https://aka.ms/pscore68
unknown
http://crl.micr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.mioft.sito
unknown
https://github.com/Pester/Pester
unknown
There are 11 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.185.221.23
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
System User
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
FE2000
unkown
page readonly
malicious
7FF848EB6000
trusted library allocation
page read and write
6338FB6000
stack
page read and write
282E081E000
heap
page read and write
282E0FC8000
heap
page read and write
282E0E95000
heap
page read and write
1C259EC1000
trusted library allocation
page read and write
282E1018000
heap
page read and write
282E0E59000
heap
page read and write
1C0ED000
heap
page read and write
1940000
heap
page read and write
251C6FE000
stack
page read and write
210E0CCE000
heap
page read and write
22E42790000
heap
page execute and read and write
282DEEBC000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
F38B47E000
stack
page read and write
1EC07370000
trusted library allocation
page read and write
23756F1F000
heap
page read and write
202E1C80000
trusted library allocation
page read and write
251CCFE000
stack
page read and write
282E0E5E000
heap
page read and write
202F22DF000
trusted library allocation
page read and write
26AB8FE000
stack
page read and write
7FF848E02000
trusted library allocation
page read and write
23756FF9000
heap
page read and write
1833000
trusted library allocation
page read and write
23756E44000
heap
page read and write
251D67E000
unkown
page readonly
282E101C000
heap
page read and write
210FAE30000
heap
page read and write
23756E4C000
heap
page read and write
12893000
trusted library allocation
page read and write
202E04A0000
heap
page read and write
26AB9F9000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
22E2B768000
trusted library allocation
page read and write
23754FE1000
heap
page read and write
22E2B3AF000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
282E0E7B000
heap
page read and write
282E0E99000
heap
page read and write
1EC074A0000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
282E07C3000
heap
page read and write
210E0C55000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
23756FEF000
heap
page read and write
23754ED0000
heap
page read and write
14B0000
trusted library allocation
page read and write
282E0E89000
heap
page read and write
251CFFE000
stack
page read and write
1EC01EA2000
heap
page read and write
30D1000
trusted library allocation
page read and write
7DF4D5590000
trusted library allocation
page execute and read and write
F38B5F9000
stack
page read and write
23756E6A000
heap
page read and write
282E0E93000
heap
page read and write
23756E12000
heap
page read and write
22E284E0000
heap
page read and write
210E3F78000
trusted library allocation
page read and write
6338F3E000
stack
page read and write
23756E3C000
heap
page read and write
1C24B005000
trusted library allocation
page read and write
282E0F3A000
heap
page read and write
26ABDFE000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
282E0FD8000
heap
page read and write
237595C7000
heap
page read and write
282E0F68000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
23756E59000
heap
page read and write
1EC07384000
trusted library allocation
page read and write
23756E35000
heap
page read and write
282E0E72000
heap
page read and write
202E0360000
heap
page read and write
210E4083000
trusted library allocation
page read and write
23756E67000
heap
page read and write
282E0E46000
heap
page read and write
156C000
heap
page read and write
282E0E72000
heap
page read and write
237595CC000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
6338C7E000
stack
page read and write
251BA7E000
unkown
page readonly
1EC02602000
heap
page read and write
23756E48000
heap
page read and write
1EC074FA000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
23756E4C000
heap
page read and write
282DEE89000
heap
page read and write
251C8FE000
stack
page read and write
1EC074A2000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
202FA366000
heap
page read and write
23756F05000
heap
page read and write
7FF84916C000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
22E2B874000
trusted library allocation
page read and write
282E0E87000
heap
page read and write
237595DA000
heap
page read and write
633903A000
stack
page read and write
282DEE5E000
heap
page read and write
282E0FC8000
heap
page read and write
1C05F000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
23756E40000
heap
page read and write
230C2CE000
stack
page read and write
282E0E41000
heap
page read and write
23756E61000
heap
page read and write
1C24B23B000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
282E0E6D000
heap
page read and write
282E0F60000
heap
page read and write
1EC074EE000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
23756E53000
heap
page read and write
1C24ABAA000
trusted library allocation
page read and write
23756FE8000
heap
page read and write
282E0E59000
heap
page read and write
23754E90000
heap
page read and write
23756E49000
heap
page read and write
282E0F5E000
heap
page read and write
7FF848FE2000
trusted library allocation
page read and write
210E2590000
trusted library allocation
page read and write
7DF4D55A0000
trusted library allocation
page execute and read and write
282E0EA1000
heap
page read and write
7FF849094000
trusted library allocation
page read and write
23754FE1000
heap
page read and write
23756E12000
heap
page read and write
210E27A0000
heap
page execute and read and write
282E0E7B000
heap
page read and write
282E0E8F000
heap
page read and write
282E0E82000
heap
page read and write
2375B742000
trusted library allocation
page read and write
210E45D1000
trusted library allocation
page read and write
2375500C000
heap
page read and write
23754FE9000
heap
page read and write
282E0E87000
heap
page read and write
237595A4000
heap
page read and write
282E0E8B000
heap
page read and write
282E0EA1000
heap
page read and write
282DEEAD000
heap
page read and write
282E0E64000
heap
page read and write
282E0E72000
heap
page read and write
202E04A5000
heap
page read and write
1C262350000
heap
page execute and read and write
237595B4000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
282E0E7B000
heap
page read and write
1C248362000
heap
page read and write
7FF84918C000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1C0B6000
heap
page read and write
23756FA5000
heap
page read and write
202FA5DB000
heap
page read and write
251D47E000
unkown
page readonly
210F2811000
trusted library allocation
page read and write
289F000
trusted library allocation
page read and write
210E3A9A000
trusted library allocation
page read and write
210E0EB5000
heap
page read and write
210F2AE0000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
1BCFE000
stack
page read and write
1230000
heap
page read and write
1C2622B7000
heap
page read and write
B50000
trusted library allocation
page read and write
282E0E7B000
heap
page read and write
134A000
heap
page read and write
23756E4C000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
26AB5DE000
stack
page read and write
1EC073B0000
trusted library allocation
page read and write
23756E15000
heap
page read and write
202F1F61000
trusted library allocation
page read and write
1C24AF91000
trusted library allocation
page read and write
282E5475000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
1EC02713000
heap
page read and write
210E0B90000
heap
page read and write
1C24B149000
trusted library allocation
page read and write
23756E5D000
heap
page read and write
7FF848FE4000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
22E28505000
heap
page read and write
210FAEFA000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
251CF7E000
unkown
page readonly
23756E5D000
heap
page read and write
1EC02615000
heap
page read and write
22E29FE1000
trusted library allocation
page read and write
23756E6A000
heap
page read and write
1EC02F40000
trusted library section
page readonly
FF4000
unkown
page readonly
7FF849220000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
7FF848FE8000
trusted library allocation
page read and write
23756E77000
heap
page read and write
202E1CB0000
heap
page readonly
282DEE74000
heap
page read and write
A9F2CC7000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
282E0E7D000
heap
page read and write
210E3790000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
23756E6F000
heap
page read and write
1C2484E0000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
23754FF8000
heap
page read and write
1D18C000
stack
page read and write
26ABCF8000
stack
page read and write
210FAD19000
heap
page read and write
282E0E82000
heap
page read and write
282E0E68000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
282DEDE0000
heap
page read and write
1C24844B000
heap
page read and write
1BEFE000
stack
page read and write
22E28550000
trusted library section
page read and write
251C97E000
unkown
page readonly
202F2249000
trusted library allocation
page read and write
98B1D7E000
stack
page read and write
A9F35FF000
stack
page read and write
26ABF7B000
stack
page read and write
282E5473000
heap
page read and write
23756E58000
heap
page read and write
1EC074DF000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
210E33F7000
trusted library allocation
page read and write
131A8000
trusted library allocation
page read and write
1550000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
22E2BDC1000
trusted library allocation
page read and write
1C25A18E000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
23756F2E000
heap
page read and write
22E42900000
heap
page read and write
23754FF5000
heap
page read and write
F38C54C000
stack
page read and write
23756E72000
heap
page read and write
23754FEE000
heap
page read and write
23756E66000
heap
page read and write
22E29EE0000
trusted library allocation
page read and write
1C24B70D000
trusted library allocation
page read and write
23756E57000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
251C37B000
stack
page read and write
31AC000
trusted library allocation
page read and write
1496000
heap
page read and write
22E2B92C000
trusted library allocation
page read and write
22E42B10000
heap
page read and write
1C24B796000
trusted library allocation
page read and write
23756F84000
heap
page read and write
7FF849008000
trusted library allocation
page read and write
98B1E7E000
stack
page read and write
E6F000
stack
page read and write
202F2230000
trusted library allocation
page read and write
23756E77000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
202E37D4000
trusted library allocation
page read and write
23756F2F000
heap
page read and write
210F2ADB000
trusted library allocation
page read and write
1EC01F13000
heap
page read and write
202E315D000
trusted library allocation
page read and write
282E081D000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
23756E4C000
heap
page read and write
1C248540000
heap
page read and write
282E0E7B000
heap
page read and write
1BDD7025000
heap
page read and write
210E3421000
trusted library allocation
page read and write
1690000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
1C24838D000
heap
page read and write
98B22FB000
stack
page read and write
23756E4C000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
23756E53000
heap
page read and write
23756E6E000
heap
page read and write
23756E3D000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1C25A123000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
5CA4DEE000
unkown
page read and write
23756E40000
heap
page read and write
23754FFD000
heap
page read and write
23756E61000
heap
page read and write
2880000
heap
page execute and read and write
210E39CD000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
22E285BB000
heap
page read and write
23756E4C000
heap
page read and write
23756E72000
heap
page read and write
210E2510000
heap
page readonly
202E2992000
trusted library allocation
page read and write
22E2AED5000
trusted library allocation
page read and write
1C248330000
trusted library allocation
page read and write
1B230000
heap
page execute and read and write
7D0000
heap
page read and write
F38B37F000
stack
page read and write
132E1000
trusted library allocation
page read and write
23756E6A000
heap
page read and write
1EC01E5C000
heap
page read and write
282E0FD8000
heap
page read and write
AF0000
heap
page read and write
282E0E5E000
heap
page read and write
22E2B28E000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
B69000
heap
page read and write
1C24B1AB000
trusted library allocation
page read and write
282E0FB6000
heap
page read and write
22E2BE06000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
202E3D47000
trusted library allocation
page read and write
210FAD50000
heap
page read and write
282E0E67000
heap
page read and write
210FAC10000
heap
page read and write
1310000
heap
page read and write
282E0E82000
heap
page read and write
23754FED000
heap
page read and write
1C2483D4000
heap
page read and write
202E03A5000
heap
page read and write
23756F56000
heap
page read and write
1C0E3000
heap
page read and write
202E36C9000
trusted library allocation
page read and write
210E0C0F000
heap
page read and write
22E3A2D7000
trusted library allocation
page read and write
251B6FE000
stack
page read and write
210FAF8D000
heap
page read and write
23756E40000
heap
page read and write
23756F3B000
heap
page read and write
1B52E000
stack
page read and write
282E0FEC000
heap
page read and write
23756E2C000
heap
page read and write
26ABAF7000
stack
page read and write
237595B3000
heap
page read and write
230B4F8000
stack
page read and write
251C07E000
unkown
page readonly
282E0F4E000
heap
page read and write
22E2AD52000
trusted library allocation
page read and write
23756E57000
heap
page read and write
15C2000
heap
page read and write
282E0E86000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
23756965000
heap
page read and write
7FF848ED6000
trusted library allocation
page read and write
23756E19000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
23755001000
heap
page read and write
22E29F30000
trusted library allocation
page read and write
1EC07610000
trusted library allocation
page read and write
26ABC79000
stack
page read and write
23756F5D000
heap
page read and write
282E0F5E000
heap
page read and write
12D0000
trusted library allocation
page read and write
1C248545000
heap
page read and write
1C2482A0000
heap
page read and write
1EC01E9E000
heap
page read and write
1C25A197000
trusted library allocation
page read and write
1352000
heap
page read and write
282DEEAC000
heap
page read and write
282E0E68000
heap
page read and write
1BDD6FC0000
heap
page read and write
282E0F6F000
heap
page read and write
7FF849280000
trusted library allocation
page read and write
22E428F9000
heap
page read and write
282E0E9B000
heap
page read and write
282E0E59000
heap
page read and write
166F000
stack
page read and write
1C24B0B6000
trusted library allocation
page read and write
282E5475000
heap
page read and write
22E42555000
heap
page read and write
22E428E2000
heap
page read and write
23756E66000
heap
page read and write
130D3000
trusted library allocation
page read and write
23759050000
trusted library allocation
page read and write
282E0FE8000
heap
page read and write
23756F62000
heap
page read and write
210F2AE8000
trusted library allocation
page read and write
22E284B0000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
23756E2B000
heap
page read and write
210E2550000
trusted library allocation
page read and write
210FAFB9000
heap
page read and write
282E0E97000
heap
page read and write
282E0E82000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
23756E40000
heap
page read and write
282E0E5D000
heap
page read and write
1BF5E000
stack
page read and write
210E2500000
trusted library allocation
page read and write
23756E57000
heap
page read and write
1EC074F3000
heap
page read and write
23756E5D000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
282E0F44000
heap
page read and write
98B1EFD000
stack
page read and write
1111000
stack
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
23756E6E000
heap
page read and write
23756E7E000
heap
page read and write
1C894000
stack
page read and write
5CA4D69000
stack
page read and write
1BDD6EA0000
heap
page read and write
1C259F10000
trusted library allocation
page read and write
202E2EA8000
trusted library allocation
page read and write
23756E4C000
heap
page read and write
282DEEA9000
heap
page read and write
282E0E54000
heap
page read and write
230B27E000
stack
page read and write
23756E3A000
heap
page read and write
202E1DB6000
heap
page read and write
282E0E76000
heap
page read and write
23756E1C000
heap
page read and write
282E5473000
heap
page read and write
1C24B227000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
1B310000
trusted library allocation
page read and write
22E2B2C2000
trusted library allocation
page read and write
282E0F9D000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
1C25A1A7000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
26ABE7E000
stack
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
22E285E7000
heap
page read and write
1EC07443000
heap
page read and write
F38B4F7000
stack
page read and write
282DEE9B000
heap
page read and write
23756F2A000
heap
page read and write
282E0E7B000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1EC07690000
trusted library allocation
page read and write
22E2B2F5000
trusted library allocation
page read and write
7DF4048D0000
trusted library allocation
page execute and read and write
23756F56000
heap
page read and write
282E0E9B000
heap
page read and write
251C67E000
unkown
page readonly
282E0E6D000
heap
page read and write
230AFFF000
stack
page read and write
23756E48000
heap
page read and write
1BDFF000
stack
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
282E0E65000
heap
page read and write
282E0E59000
heap
page read and write
2375500D000
heap
page read and write
282E5473000
heap
page read and write
282E0E64000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
22E427DA000
heap
page read and write
23756E12000
heap
page read and write
282E0FFC000
heap
page read and write
1620000
heap
page read and write
282E0E6D000
heap
page read and write
1C26258C000
heap
page read and write
251B977000
stack
page read and write
22E4250F000
heap
page read and write
23756E5D000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
131A1000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
282E0E6E000
heap
page read and write
23754FE7000
heap
page read and write
6339E09000
stack
page read and write
282E0E93000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
23756E4C000
heap
page read and write
1EC07320000
trusted library allocation
page read and write
282E0E5E000
heap
page read and write
F38C44D000
stack
page read and write
1430000
heap
page read and write
23756E6F000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1C248374000
heap
page read and write
1EC074EE000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
282E0F5C000
heap
page read and write
210E3887000
trusted library allocation
page read and write
F38B57D000
stack
page read and write
282DEE98000
heap
page read and write
230B87E000
stack
page read and write
230C34E000
stack
page read and write
1EC07380000
trusted library allocation
page read and write
1540000
heap
page read and write
282E0E7B000
heap
page read and write
202FA677000
heap
page read and write
282E0E5A000
heap
page read and write
282E0E6D000
heap
page read and write
26ACA4E000
stack
page read and write
23756E39000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1C2621E0000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
230AF3E000
stack
page read and write
282E0E71000
heap
page read and write
23756E57000
heap
page read and write
7FF84922C000
trusted library allocation
page read and write
210FAFB5000
heap
page read and write
131A3000
trusted library allocation
page read and write
23756E40000
heap
page read and write
282E0E54000
heap
page read and write
771000
stack
page read and write
23756E77000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
17B0000
heap
page read and write
23756E6A000
heap
page read and write
202FA687000
heap
page read and write
1C2622A8000
heap
page read and write
1EC076E0000
remote allocation
page read and write
282DEED3000
heap
page read and write
26ACB4C000
stack
page read and write
282E0E7B000
heap
page read and write
230B3F7000
stack
page read and write
1C248377000
heap
page read and write
1450000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
282DEE8B000
heap
page read and write
1C24AFC6000
trusted library allocation
page read and write
202E3252000
trusted library allocation
page read and write
282E0E72000
heap
page read and write
23756FEC000
heap
page read and write
1C262239000
heap
page read and write
23756E57000
heap
page read and write
23756E57000
heap
page read and write
2375503C000
heap
page read and write
210E25E0000
heap
page read and write
282E0E40000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
23754FFC000
heap
page read and write
282E0F7C000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
282E0E82000
heap
page read and write
23756E4C000
heap
page read and write
7FF849169000
trusted library allocation
page read and write
23756E57000
heap
page read and write
23754FFB000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
309E000
stack
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
282E0810000
heap
page read and write
1EC01E77000
heap
page read and write
22E3A051000
trusted library allocation
page read and write
282E0E90000
heap
page read and write
282E0E90000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
1EC076E0000
remote allocation
page read and write
7FF849110000
trusted library allocation
page read and write
210E0AB0000
heap
page read and write
23756E72000
heap
page read and write
237568D0000
heap
page read and write
251CB7E000
stack
page read and write
202E37AE000
trusted library allocation
page read and write
282E0E8B000
heap
page read and write
23756E53000
heap
page read and write
BC7000
heap
page read and write
202FA780000
heap
page read and write
7FF8491F3000
trusted library allocation
page read and write
282DEEB7000
heap
page read and write
202FA284000
heap
page read and write
282E0E95000
heap
page read and write
210FACA1000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
210E25E5000
heap
page read and write
251D17B000
stack
page read and write
282E0E7B000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
23756E11000
heap
page read and write
282DEE82000
heap
page read and write
282E0E7B000
heap
page read and write
A9F2D4E000
stack
page read and write
1EC01DC0000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
237595D7000
heap
page read and write
23756E57000
heap
page read and write
1340000
heap
page read and write
23756E48000
heap
page read and write
12F1000
stack
page read and write
23756E53000
heap
page read and write
202E3124000
trusted library allocation
page read and write
1C25A2FD000
trusted library allocation
page read and write
23756F56000
heap
page read and write
B60000
heap
page read and write
282DEE6F000
heap
page read and write
210E27F1000
trusted library allocation
page read and write
237595D7000
heap
page read and write
22E2AFE6000
trusted library allocation
page read and write
23756E4C000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF84927D000
trusted library allocation
page read and write
22E428EB000
heap
page read and write
1B86C000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
1EC07340000
trusted library allocation
page read and write
98B1FFE000
stack
page read and write
23756E48000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1335000
heap
page read and write
23756E67000
heap
page read and write
23754FED000
heap
page read and write
282E0E76000
heap
page read and write
1EC0271A000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
282E0E89000
heap
page read and write
1EC01D90000
heap
page read and write
2375504A000
heap
page read and write
202E31F1000
trusted library allocation
page read and write
22E3A2CF000
trusted library allocation
page read and write
1BE50000
heap
page execute and read and write
1EC02F50000
trusted library section
page readonly
134C000
heap
page read and write
282E0E8B000
heap
page read and write
202FA420000
heap
page execute and read and write
1BDD6DB0000
heap
page read and write
1EC02F30000
trusted library section
page readonly
F38B8FE000
stack
page read and write
1C2625D2000
heap
page read and write
1EC02702000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
282E0E7B000
heap
page read and write
23754FE7000
heap
page read and write
282E0FC8000
heap
page read and write
23756E77000
heap
page read and write
23756FAB000
heap
page read and write
7FF849188000
trusted library allocation
page read and write
282E0E50000
heap
page read and write
202E039C000
heap
page read and write
22E425C0000
heap
page execute and read and write
23756F1D000
heap
page read and write
22E285A9000
heap
page read and write
1379000
heap
page read and write
7FF4A32E0000
trusted library allocation
page execute and read and write
23756E26000
heap
page read and write
22E2ABE7000
trusted library allocation
page read and write
282E5AF0000
heap
page readonly
23756E1C000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
282E0E8B000
heap
page read and write
282E0E71000
heap
page read and write
7FF849182000
trusted library allocation
page read and write
282E0E97000
heap
page read and write
26AB97F000
stack
page read and write
12898000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
210FAEEE000
heap
page read and write
7FF849153000
trusted library allocation
page read and write
23756E53000
heap
page read and write
251BF7C000
stack
page read and write
1BDD6EA8000
heap
page read and write
98B1F7E000
stack
page read and write
282E0E9B000
heap
page read and write
23754FEC000
heap
page read and write
202FA32C000
heap
page read and write
23756E72000
heap
page read and write
1EC07680000
trusted library allocation
page read and write
32D0000
heap
page execute and read and write
23756E66000
heap
page read and write
1C262265000
heap
page read and write
282E07A0000
heap
page read and write
282E0E8B000
heap
page read and write
210E286A000
trusted library allocation
page read and write
23755044000
heap
page read and write
282E0E82000
heap
page read and write
282E0E9D000
heap
page read and write
23754F50000
heap
page read and write
282DEE74000
heap
page read and write
633913E000
stack
page read and write
282E0E72000
heap
page read and write
7FF84920E000
trusted library allocation
page read and write
282E0E8D000
heap
page read and write
7FF849240000
trusted library allocation
page execute and read and write
23756E40000
heap
page read and write
251B87E000
unkown
page readonly
202E03BD000
heap
page read and write
282E0FEB000
heap
page read and write
282E0F64000
heap
page read and write
202E2B39000
trusted library allocation
page read and write
1338000
heap
page read and write
282E0E84000
heap
page read and write
282E0E40000
heap
page read and write
282E0E76000
heap
page read and write
1C262222000
heap
page read and write
1EC02F20000
trusted library section
page readonly
7FF849260000
trusted library allocation
page read and write
1EC01EAE000
heap
page read and write
181E000
stack
page read and write
1EC02991000
trusted library allocation
page read and write
1C24B07D000
trusted library allocation
page read and write
7FF849178000
trusted library allocation
page read and write
202E2EB0000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
1EC01E00000
heap
page read and write
202FA3F0000
heap
page execute and read and write
282E0E82000
heap
page read and write
22E2B1C1000
trusted library allocation
page read and write
2F0E000
stack
page read and write
23756F25000
heap
page read and write
202FA654000
heap
page read and write
A9F34FB000
stack
page read and write
23756F2E000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
23756E6B000
heap
page read and write
23756E57000
heap
page read and write
23756E53000
heap
page read and write
202E30F1000
trusted library allocation
page read and write
23756E23000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
A9F2DCE000
stack
page read and write
130D1000
trusted library allocation
page read and write
1500000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
282E0F3B000
heap
page read and write
28A1000
trusted library allocation
page read and write
282E0E5F000
heap
page read and write
1C24AF61000
trusted library allocation
page read and write
1EC01EFE000
heap
page read and write
23756E79000
heap
page read and write
210E33E7000
trusted library allocation
page read and write
282E0E7F000
heap
page read and write
23756F2E000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
282DEE8F000
heap
page read and write
2375501C000
heap
page read and write
282E0E82000
heap
page read and write
22E429B0000
trusted library allocation
page read and write
22E2AC3B000
trusted library allocation
page read and write
1C24838F000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848FF2000
trusted library allocation
page read and write
23756FE8000
heap
page read and write
23754FE7000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
23756960000
heap
page read and write
16B0000
heap
page read and write
1EC07502000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
22E29FD0000
heap
page read and write
202E03A7000
heap
page read and write
22E28560000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
22E42569000
heap
page read and write
16FF000
stack
page read and write
282DEEA5000
heap
page read and write
23756E61000
heap
page read and write
230B77E000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
22E29ED0000
trusted library section
page read and write
282DEE79000
heap
page read and write
282E0E6D000
heap
page read and write
282E0E82000
heap
page read and write
3080000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1C2625B5000
heap
page read and write
282E5475000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
2375696D000
heap
page read and write
1C24B1E3000
trusted library allocation
page read and write
251B7FE000
stack
page read and write
282E5460000
heap
page read and write
1EC01DD0000
trusted library section
page read and write
156E000
heap
page read and write
251C77E000
unkown
page readonly
23755005000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
23756E6A000
heap
page read and write
23755044000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
282E3800000
heap
page read and write
202E2EA4000
trusted library allocation
page read and write
282E0E97000
heap
page read and write
1EC074F3000
heap
page read and write
2891000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page execute and read and write
282E0E6D000
heap
page read and write
1C2484A0000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
230B7FC000
stack
page read and write
633897F000
stack
page read and write
251CD7E000
unkown
page readonly
23756E77000
heap
page read and write
282E0F6F000
heap
page read and write
237595D9000
heap
page read and write
210E45F6000
trusted library allocation
page read and write
282DEE5D000
heap
page read and write
1542000
heap
page read and write
23756F2A000
heap
page read and write
210E37BC000
trusted library allocation
page read and write
1C2483AD000
heap
page read and write
1C25E000
stack
page read and write
22E2AF83000
trusted library allocation
page read and write
282E0E71000
heap
page read and write
22E3A2CA000
trusted library allocation
page read and write
23756E6E000
heap
page read and write
202E2D00000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
23754FDD000
heap
page read and write
282E0E93000
heap
page read and write
202E2EB9000
trusted library allocation
page read and write
1C24B267000
trusted library allocation
page read and write
282E0FFC000
heap
page read and write
23756E4C000
heap
page read and write
6338CF9000
stack
page read and write
22E2A4AD000
trusted library allocation
page read and write
282E0E30000
heap
page read and write
1B72C000
stack
page read and write
1EC072B0000
trusted library allocation
page read and write
23754FE7000
heap
page read and write
282E0EA1000
heap
page read and write
1BFFF000
stack
page read and write
7FF849159000
trusted library allocation
page read and write
1C2625BF000
heap
page read and write
1BDBE000
stack
page read and write
2375500A000
heap
page read and write
23755046000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
202E240D000
trusted library allocation
page read and write
7FF84920A000
trusted library allocation
page read and write
202E03E8000
heap
page read and write
282E0F68000
heap
page read and write
F38B677000
stack
page read and write
251C7FF000
stack
page read and write
7FF8491F0000
trusted library allocation
page read and write
22E2A208000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
22E2B18F000
trusted library allocation
page read and write
1380000
heap
page read and write
23756E53000
heap
page read and write
282E3080000
trusted library allocation
page read and write
23755017000
heap
page read and write
1EC0741F000
heap
page read and write
282E0F78000
heap
page read and write
23754FFD000
heap
page read and write
23756E5D000
heap
page read and write
23756E5D000
heap
page read and write
23754FFD000
heap
page read and write
C06000
heap
page read and write
282E0FD8000
heap
page read and write
23756E1F000
heap
page read and write
289C000
trusted library allocation
page read and write
282E0E7B000
heap
page read and write
282DEE93000
heap
page read and write
22E2B935000
trusted library allocation
page read and write
1C25A189000
trusted library allocation
page read and write
23754FF3000
heap
page read and write
1EC07450000
heap
page read and write
23756E61000
heap
page read and write
1C249CF7000
heap
page read and write
23756E74000
heap
page read and write
230AEB3000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
282E5BF0000
heap
page read and write
22E2B0A1000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
282E0E83000
heap
page read and write
202E1EE0000
heap
page execute and read and write
1C26257C000
heap
page read and write
23754FC6000
heap
page read and write
1EC07455000
heap
page read and write
1C2482F0000
heap
page read and write
23756F28000
heap
page read and write
22E29FD5000
heap
page read and write
1C24A36D000
trusted library allocation
page read and write
202FA6A4000
heap
page read and write
282DEE97000
heap
page read and write
23756E57000
heap
page read and write
1C2624F8000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
202E304D000
trusted library allocation
page read and write
1EC074E9000
heap
page read and write
210F2800000
trusted library allocation
page read and write
23756E30000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
282E0E87000
heap
page read and write
7FF84917C000
trusted library allocation
page read and write
282E0E6D000
heap
page read and write
7FF849143000
trusted library allocation
page read and write
210FABA0000
trusted library allocation
page read and write
230B8FC000
stack
page read and write
F38C3CC000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
22E285A1000
heap
page read and write
202E2B51000
trusted library allocation
page read and write
23759590000
heap
page read and write
282E0FFE000
heap
page read and write
23756E72000
heap
page read and write
282E0F7C000
heap
page read and write
14D0000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
23756E57000
heap
page read and write
202FA750000
trusted library allocation
page read and write
1C2482E5000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
202F2239000
trusted library allocation
page read and write
282DEEAC000
heap
page read and write
23756E3A000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
23755044000
heap
page read and write
23756F62000
heap
page read and write
23756E53000
heap
page read and write
23754FEE000
heap
page read and write
202FA37B000
heap
page read and write
23756E67000
heap
page read and write
1C24B627000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
EC0000
heap
page read and write
7FF84926D000
trusted library allocation
page read and write
23756E5A000
heap
page read and write
23754FEE000
heap
page read and write
7DF4D55B0000
trusted library allocation
page execute and read and write
282DEE90000
heap
page read and write
237595D9000
heap
page read and write
282DEFC0000
heap
page read and write
282E0F4E000
heap
page read and write
210FAD14000
heap
page read and write
1EC01E5A000
heap
page read and write
1EC074C2000
heap
page read and write
23756E3D000
heap
page read and write
202E0330000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
202E2EAC000
trusted library allocation
page read and write
23756E40000
heap
page read and write
1C24BC81000
trusted library allocation
page read and write
23756E61000
heap
page read and write
210E3243000
trusted library allocation
page read and write
282E0E56000
heap
page read and write
14D3000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
23754FF2000
heap
page read and write
282DEEC2000
heap
page read and write
23754DB0000
heap
page read and write
23756E77000
heap
page read and write
22E3A2E8000
trusted library allocation
page read and write
1BB20000
heap
page read and write
282E0E64000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
210FAEF4000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
6339D0D000
stack
page read and write
282E0E72000
heap
page read and write
1C24BCC6000
trusted library allocation
page read and write
A9F327B000
stack
page read and write
282E0E7B000
heap
page read and write
7FF849276000
trusted library allocation
page read and write
1BDD7020000
heap
page read and write
1C248350000
heap
page read and write
7FF848FF4000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
23754FFD000
heap
page read and write
210FAE67000
heap
page read and write
282E0E72000
heap
page read and write
5CA507F000
stack
page read and write
2375501C000
heap
page read and write
251D77B000
stack
page read and write
22E42892000
heap
page read and write
282E0E8B000
heap
page read and write
237595D9000
heap
page read and write
23756E77000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
202E3D67000
trusted library allocation
page read and write
22E41FE1000
heap
page read and write
1CD8A000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7DF4AF181000
trusted library allocation
page execute read
15D2000
heap
page read and write
23756F2C000
heap
page read and write
282E0EA2000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
23756FAB000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
1303000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
23756FD2000
heap
page read and write
237595D7000
heap
page read and write
23756FA4000
heap
page read and write
210E3916000
trusted library allocation
page read and write
23756E39000
heap
page read and write
22E428B7000
heap
page read and write
B90000
heap
page read and write
F38B2FE000
stack
page read and write
23754FF5000
heap
page read and write
98B207B000
stack
page read and write
23755044000
heap
page read and write
202FA5BC000
heap
page read and write
210FAC26000
heap
page execute and read and write
202E1CC0000
trusted library allocation
page read and write
23756E53000
heap
page read and write
202E3896000
trusted library allocation
page read and write
1EC074E7000
heap
page read and write
202E0460000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
202E1DA0000
heap
page read and write
1EC0750B000
heap
page read and write
230B37E000
stack
page read and write
23756E66000
heap
page read and write
26ABEFE000
stack
page read and write
F38B27E000
stack
page read and write
23756E6B000
heap
page read and write
22E3A011000
trusted library allocation
page read and write
23756E53000
heap
page read and write
23756E10000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
7FF84916A000
trusted library allocation
page read and write
23756F5D000
heap
page read and write
F38AFA3000
stack
page read and write
282E0EA1000
heap
page read and write
FE0000
unkown
page readonly
1150000
heap
page read and write
210FAF61000
heap
page read and write
282E0F7C000
heap
page read and write
237595D7000
heap
page read and write
23756E4C000
heap
page read and write
23756E49000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
1534000
heap
page read and write
1EC02600000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
23756E72000
heap
page read and write
23756F83000
heap
page read and write
282E0E89000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
282E0E9B000
heap
page read and write
1C140000
heap
page read and write
23755009000
heap
page read and write
1EC0740F000
heap
page read and write
7FF849133000
trusted library allocation
page read and write
30C0000
heap
page execute and read and write
1EC01F02000
heap
page read and write
1570000
heap
page read and write
1CE90000
heap
page read and write
23756E6A000
heap
page read and write
202E1CF0000
trusted library allocation
page read and write
1C259ED1000
trusted library allocation
page read and write
202E2CBD000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1EC072C0000
trusted library allocation
page read and write
23756E61000
heap
page read and write
22E2AA32000
trusted library allocation
page read and write
1290000
heap
page read and write
23756E67000
heap
page read and write
23756E48000
heap
page read and write
210E35E4000
trusted library allocation
page read and write
160E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
6338EF9000
stack
page read and write
23756E77000
heap
page read and write
282E0E53000
heap
page read and write
251BD7C000
stack
page read and write
251C9FE000
stack
page read and write
282DEE8E000
heap
page read and write
1EC0750F000
heap
page read and write
1EC07330000
trusted library allocation
page read and write
282E0E67000
heap
page read and write
1C2482E0000
heap
page read and write
7FF849168000
trusted library allocation
page read and write
22E28500000
heap
page read and write
282DEE7B000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
1C26223B000
heap
page read and write
1EC01D60000
heap
page read and write
26ABD79000
stack
page read and write
230B576000
stack
page read and write
22E2B18D000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
23756E4D000
heap
page read and write
B30000
trusted library allocation
page read and write
282E0E9D000
heap
page read and write
202E306C000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
251C17C000
stack
page read and write
23756E44000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
282DEEE0000
heap
page read and write
23756E61000
heap
page read and write
282E0E6D000
heap
page read and write
251B3DB000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
282E0E7B000
heap
page read and write
23756E6B000
heap
page read and write
98B1CFE000
stack
page read and write
1C24AAA4000
trusted library allocation
page read and write
23756E77000
heap
page read and write
23756E2C000
heap
page read and write
23756E48000
heap
page read and write
202E2B43000
trusted library allocation
page read and write
202FA2E4000
heap
page read and write
282E0E7B000
heap
page read and write
23756E30000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
1EC073B3000
trusted library allocation
page read and write
23755025000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
23754FFC000
heap
page read and write
282E0E50000
heap
page read and write
23755028000
heap
page read and write
210E0C52000
heap
page read and write
1C2481A0000
heap
page read and write
23756E48000
heap
page read and write
23756E39000
heap
page read and write
1C24AD93000
trusted library allocation
page read and write
FA0000
heap
page read and write
202FA582000
heap
page read and write
1420000
heap
page read and write
18B0000
heap
page read and write
23756F56000
heap
page read and write
210E38B3000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
282E0E5A000
heap
page read and write
210E24E0000
trusted library allocation
page read and write
282E5C10000
heap
page read and write
230C44C000
stack
page read and write
23756E39000
heap
page read and write
282E0E82000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
237595CF000
heap
page read and write
210E0E80000
heap
page read and write
23756E61000
heap
page read and write
202E0368000
heap
page read and write
FA5000
heap
page read and write
251C4FE000
stack
page read and write
282E0E72000
heap
page read and write
1C089000
heap
page read and write
23754FF3000
heap
page read and write
23756E63000
heap
page read and write
23756E57000
heap
page read and write
1BDD6FA0000
heap
page read and write
210FAEDB000
heap
page read and write
282E0F60000
heap
page read and write
210F2862000
trusted library allocation
page read and write
63388F3000
stack
page read and write
23756FB8000
heap
page read and write
282E0E6D000
heap
page read and write
1C695000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
202E03E5000
heap
page read and write
1EC07490000
trusted library allocation
page read and write
23756E43000
heap
page read and write
202FA6A1000
heap
page read and write
23756E6E000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
202FA561000
heap
page read and write
23756E72000
heap
page read and write
202E1FC8000
trusted library allocation
page read and write
1C35E000
stack
page read and write
23756E6A000
heap
page read and write
23756E57000
heap
page read and write
230B2F9000
stack
page read and write
23756E4C000
heap
page read and write
251D37E000
stack
page read and write
23756E77000
heap
page read and write
282E0E76000
heap
page read and write
230C4CE000
stack
page read and write
23756E57000
heap
page read and write
22E425C7000
heap
page execute and read and write
23756E61000
heap
page read and write
282E0E90000
heap
page read and write
282E0E42000
heap
page read and write
26ABB7D000
stack
page read and write
7FF848E21000
trusted library allocation
page read and write
23756E77000
heap
page read and write
23756F56000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
F38B87E000
stack
page read and write
23756E53000
heap
page read and write
1BCB0000
heap
page read and write
1EC01D80000
heap
page read and write
202FA59A000
heap
page read and write
1EC01E43000
heap
page read and write
23756F62000
heap
page read and write
23756E6B000
heap
page read and write
D5F000
stack
page read and write
63389FF000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
282E0E6D000
heap
page read and write
1C2624C0000
heap
page read and write
22E2BE0B000
trusted library allocation
page read and write
1EC02E20000
trusted library allocation
page read and write
282E0E93000
heap
page read and write
282E0E8D000
heap
page read and write
23756E5D000
heap
page read and write
1710000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
23756E48000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
2375696E000
heap
page read and write
23755044000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1318000
heap
page read and write
23756E61000
heap
page read and write
282E0E95000
heap
page read and write
251C87E000
unkown
page readonly
23754FEE000
heap
page read and write
282E0F66000
heap
page read and write
1425000
heap
page read and write
202E2EBD000
trusted library allocation
page read and write
282E0F30000
heap
page read and write
282E0E48000
heap
page read and write
23755045000
heap
page read and write
282E0E7B000
heap
page read and write
282E0E5E000
heap
page read and write
1C24B806000
trusted library allocation
page read and write
282E0E8B000
heap
page read and write
1820000
trusted library allocation
page read and write
17F0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
23756E66000
heap
page read and write
282E5463000
heap
page read and write
210FACC5000
heap
page read and write
282E0E67000
heap
page read and write
23756E77000
heap
page read and write
1C248470000
trusted library allocation
page read and write
23756E44000
heap
page read and write
251BB7E000
stack
page read and write
1C24AECF000
trusted library allocation
page read and write
23754FF3000
heap
page read and write
282E0E87000
heap
page read and write
7FF849159000
trusted library allocation
page read and write
1C248460000
heap
page readonly
23756F5D000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
152C000
heap
page read and write
230B5F9000
stack
page read and write
1EC07370000
trusted library allocation
page read and write
23756E5E000
heap
page read and write
282E0E8A000
heap
page read and write
23756E53000
heap
page read and write
1C2625C8000
heap
page read and write
30DC000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
282DEEAD000
heap
page read and write
22E42509000
heap
page read and write
15D4000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
23756E57000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
282E0E8B000
heap
page read and write
251D97D000
stack
page read and write
210FAF97000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
319F000
stack
page read and write
282E0E7B000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
23754FF2000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
282E0FFE000
heap
page read and write
23756FAE000
heap
page read and write
282DEEB9000
heap
page read and write
282E0FFD000
heap
page read and write
1C2624C6000
heap
page read and write
282E0FC8000
heap
page read and write
282E0E72000
heap
page read and write
B88000
heap
page read and write
23756E5A000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
23756E3A000
heap
page read and write
23756E18000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
284E000
stack
page read and write
1C248450000
trusted library allocation
page read and write
282E0E8F000
heap
page read and write
1C24A0C8000
trusted library allocation
page read and write
23756E30000
heap
page read and write
98B227C000
stack
page read and write
23756E6A000
heap
page read and write
15CF000
heap
page read and write
2375504A000
heap
page read and write
23754FF5000
heap
page read and write
282E0E82000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
282E0F9A000
heap
page read and write
22E2B106000
trusted library allocation
page read and write
282E0E5E000
heap
page read and write
1EC032B0000
trusted library allocation
page read and write
23756E00000
heap
page read and write
22E29FA0000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
1EC076E0000
remote allocation
page read and write
210E40E6000
trusted library allocation
page read and write
251CA7E000
unkown
page readonly
7C0000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
282E0FF4000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
282DEEB2000
heap
page read and write
23756E61000
heap
page read and write
B7B000
heap
page read and write
1CE8E000
stack
page read and write
1BCAD000
stack
page read and write
BC9000
heap
page read and write
7FF849162000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
282E0E71000
heap
page read and write
210F2821000
trusted library allocation
page read and write
7FF848FBA000
trusted library allocation
page read and write
7FF84921C000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
282E0E7B000
heap
page read and write
1470000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
202FA542000
heap
page read and write
22E29F00000
trusted library allocation
page read and write
282E0E53000
heap
page read and write
2375501D000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
282DEE90000
heap
page read and write
282DEE6C000
heap
page read and write
23756E1B000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
23756E77000
heap
page read and write
26ABBF7000
stack
page read and write
7FF849190000
trusted library allocation
page read and write
282E0E82000
heap
page read and write
210E4145000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
230C3C9000
stack
page read and write
7FF849150000
trusted library allocation
page read and write
282E0FB4000
heap
page read and write
1B960000
heap
page execute and read and write
7FF849002000
trusted library allocation
page read and write
1C249EA1000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
23756F09000
heap
page read and write
23756FC9000
heap
page read and write
23756E12000
heap
page read and write
210E0C15000
heap
page read and write
15B6000
heap
page read and write
23756E4C000
heap
page read and write
14FE000
heap
page read and write
23756E67000
heap
page read and write
1C248520000
heap
page read and write
1490000
heap
page read and write
282DEE88000
heap
page read and write
22E2B18B000
trusted library allocation
page read and write
23754FF7000
heap
page read and write
1EC0271A000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1C262380000
heap
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1EC02F10000
trusted library section
page readonly
7FF848EE6000
trusted library allocation
page execute and read and write
282E0E72000
heap
page read and write
282E0E76000
heap
page read and write
282E0E76000
heap
page read and write
F38B778000
stack
page read and write
7FF849165000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849266000
trusted library allocation
page read and write
23756FB8000
heap
page read and write
210E461B000
trusted library allocation
page read and write
202F1F71000
trusted library allocation
page read and write
282DEE81000
heap
page read and write
23756E53000
heap
page read and write
282E0FFC000
heap
page read and write
202E1CA0000
trusted library allocation
page read and write
1C262387000
heap
page execute and read and write
23756E5D000
heap
page read and write
282DEE52000
heap
page read and write
F38C4C9000
stack
page read and write
7FF849179000
trusted library allocation
page read and write
1EC074C0000
heap
page read and write
23754FF5000
heap
page read and write
26ACBCE000
stack
page read and write
237595C7000
heap
page read and write
1EC01E13000
heap
page read and write
F38B97C000
stack
page read and write
23756FFA000
heap
page read and write
23756E24000
heap
page read and write
23756E63000
heap
page read and write
237595C9000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
23756F26000
heap
page read and write
1B42E000
stack
page read and write
282E0E65000
heap
page read and write
F38B6F9000
stack
page read and write
237595D9000
heap
page read and write
23756E35000
heap
page read and write
63392BC000
stack
page read and write
1945000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
98B1DFE000
stack
page read and write
210E24D0000
trusted library section
page read and write
132F1000
trusted library allocation
page read and write
7DF4BC4F0000
trusted library allocation
page execute and read and write
23756E40000
heap
page read and write
23756E61000
heap
page read and write
23754FF4000
heap
page read and write
23754FEB000
heap
page read and write
23756FC9000
heap
page read and write
282E0E97000
heap
page read and write
A9F31FE000
stack
page read and write
23755048000
heap
page read and write
22E42670000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
23756E2A000
heap
page read and write
202E0250000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
282E0E5D000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
150F000
stack
page read and write
22E284C0000
heap
page read and write
1C24AC12000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
22E42840000
heap
page read and write
282DEE84000
heap
page read and write
23756E6E000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
2F10000
heap
page read and write
6338D7F000
stack
page read and write
23756E6A000
heap
page read and write
23756F28000
heap
page read and write
210E399A000
trusted library allocation
page read and write
26AB87D000
stack
page read and write
22E28568000
heap
page read and write
1C262880000
heap
page read and write
1EC07517000
heap
page read and write
282E0E7B000
heap
page read and write
282E0E4D000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
210E2CBE000
trusted library allocation
page read and write
23756E72000
heap
page read and write
A9F317E000
stack
page read and write
1460000
heap
page read and write
22E42514000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1EC025E1000
trusted library allocation
page read and write
210E25FD000
heap
page read and write
282E0E82000
heap
page read and write
23756F3B000
heap
page read and write
282E0E8F000
heap
page read and write
282E0F78000
heap
page read and write
23756E6E000
heap
page read and write
282E0E82000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
23756E72000
heap
page read and write
210E0C29000
heap
page read and write
23756E35000
heap
page read and write
282E0F6F000
heap
page read and write
282E0FD8000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
1C24BCCB000
trusted library allocation
page read and write
14FC000
heap
page read and write
1C2625CF000
heap
page read and write
22E428E8000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
23756E1C000
heap
page read and write
1EC01E8E000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
23756E66000
heap
page read and write
210E3822000
trusted library allocation
page read and write
23756E67000
heap
page read and write
202FA280000
heap
page read and write
210E2770000
heap
page execute and read and write
12891000
trusted library allocation
page read and write
22E2856F000
heap
page read and write
282E0E9B000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1C24A8F2000
trusted library allocation
page read and write
23756F62000
heap
page read and write
1EC07341000
trusted library allocation
page read and write
23756E5D000
heap
page read and write
282DEE87000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
1571000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
202E2FDC000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
1C249E90000
heap
page execute and read and write
7FF849060000
trusted library allocation
page read and write
23756E6E000
heap
page read and write
1C262370000
trusted library allocation
page read and write
7FF849154000
trusted library allocation
page read and write
6338E7D000
stack
page read and write
282E0E88000
heap
page read and write
23756E30000
heap
page read and write
210E0BD0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
210E0EB0000
heap
page read and write
210E0C09000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
1C2483D6000
heap
page read and write
63391BE000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
F38AFEE000
stack
page read and write
7FF849172000
trusted library allocation
page read and write
1C262525000
heap
page read and write
282E0E53000
heap
page read and write
23756E32000
heap
page read and write
1660000
heap
page read and write
26AB593000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FB1000
trusted library allocation
page read and write
282E0E87000
heap
page read and write
282E0E67000
heap
page read and write
210E0BD8000
heap
page read and write
282E0F7C000
heap
page read and write
202E1C50000
heap
page read and write
7FF84916C000
trusted library allocation
page read and write
251C27E000
unkown
page readonly
282DEE89000
heap
page read and write
22E2A066000
trusted library allocation
page read and write
1EC07513000
heap
page read and write
202E2F78000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
282E0F78000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
A9F30FE000
stack
page read and write
1C24836E000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
23756F00000
heap
page read and write
251C57E000
unkown
page readonly
282E5AE0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
23756FAE000
heap
page read and write
251CC7E000
unkown
page readonly
23756E6A000
heap
page read and write
202E3D6C000
trusted library allocation
page read and write
202FA450000
heap
page read and write
22E428D9000
heap
page read and write
1EC01E93000
heap
page read and write
282E081E000
heap
page read and write
282E0E6D000
heap
page read and write
1C0B8000
heap
page read and write
98B1C77000
stack
page read and write
1EC07620000
trusted library allocation
page read and write
1250000
heap
page read and write
282DEE90000
heap
page read and write
282E0F62000
heap
page read and write
132E8000
trusted library allocation
page read and write
23756E61000
heap
page read and write
282E0E90000
heap
page read and write
23756E57000
heap
page read and write
1EC01E27000
heap
page read and write
282E0FE8000
heap
page read and write
202FA30E000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
282E0E8F000
heap
page read and write
282DEE78000
heap
page read and write
1C262490000
heap
page read and write
23756E73000
heap
page read and write
282E5463000
heap
page read and write
26AC9CD000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
AD0000
heap
page read and write
282DEE90000
heap
page read and write
26ACAC9000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
23756E57000
heap
page read and write
23756E72000
heap
page read and write
210FAC30000
heap
page read and write
22E29F60000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
23756E39000
heap
page read and write
23756E53000
heap
page read and write
251DE7E000
unkown
page readonly
1C24AEA3000
trusted library allocation
page read and write
23756E10000
heap
page read and write
202E1D30000
trusted library allocation
page read and write
251BE7E000
unkown
page readonly
7FF849100000
trusted library allocation
page read and write
202E03A3000
heap
page read and write
1EC01E7C000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848E6C000
trusted library allocation
page execute and read and write
F38B3F9000
stack
page read and write
282E5480000
heap
page read and write
282E0E82000
heap
page read and write
23756E14000
heap
page read and write
1EC074EA000
heap
page read and write
F90000
unkown
page readonly
7FF849120000
trusted library allocation
page read and write
23756F2C000
heap
page read and write
282E0E65000
heap
page read and write
210E4616000
trusted library allocation
page read and write
23756E72000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
230B47E000
stack
page read and write
202FA6A6000
heap
page read and write
282E0E64000
heap
page read and write
23756E48000
heap
page read and write
1C259EA1000
trusted library allocation
page read and write
282E0E97000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
202E2B3D000
trusted library allocation
page read and write
251DA7E000
unkown
page readonly
7FF848E03000
trusted library allocation
page execute and read and write
1EC08000000
heap
page read and write
202F1FB2000
trusted library allocation
page read and write
251BC7E000
unkown
page readonly
282E0E99000
heap
page read and write
23756E61000
heap
page read and write
22E2AD97000
trusted library allocation
page read and write
282E0E76000
heap
page read and write
282E0FE8000
heap
page read and write
23756FC8000
heap
page read and write
1B62F000
stack
page read and write
202E3008000
trusted library allocation
page read and write
251D579000
stack
page read and write
7DF4EEA50000
trusted library allocation
page execute and read and write
230B679000
stack
page read and write
1330000
heap
page read and write
A9F307F000
stack
page read and write
1EC02C40000
trusted library allocation
page read and write
1C248280000
heap
page read and write
282E0FE8000
heap
page read and write
282E0FFC000
heap
page read and write
7DF4048E0000
trusted library allocation
page execute and read and write
23755049000
heap
page read and write
32E1000
trusted library allocation
page read and write
23756F13000
heap
page read and write
230AFBE000
stack
page read and write
23756E72000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
282E07C0000
heap
page read and write
1EC074C8000
heap
page read and write
23756E72000
heap
page read and write
251D27E000
unkown
page readonly
23756E57000
heap
page read and write
23756E44000
heap
page read and write
210F2AF9000
trusted library allocation
page read and write
202E330D000
trusted library allocation
page read and write
251D87E000
unkown
page readonly
7FF848F06000
trusted library allocation
page execute and read and write
1EC07360000
trusted library allocation
page read and write
B9B000
heap
page read and write
23756F3B000
heap
page read and write
15F0000
heap
page read and write
251CE7E000
stack
page read and write
23755038000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
202FA427000
heap
page execute and read and write
1C24B7F5000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
633923E000
stack
page read and write
251C5FE000
stack
page read and write
23756E77000
heap
page read and write
202F222B000
trusted library allocation
page read and write
202E2EB5000
trusted library allocation
page read and write
282E0E82000
heap
page read and write
1EC07340000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
251B77E000
unkown
page readonly
1B54E000
stack
page read and write
210FAC20000
heap
page execute and read and write
D65000
heap
page read and write
22E3A280000
trusted library allocation
page read and write
2375696E000
heap
page read and write
F38B7FF000
stack
page read and write
16F0000
trusted library allocation
page read and write
23756E6E000
heap
page read and write
7FF849154000
trusted library allocation
page read and write
282E0FC8000
heap
page read and write
149C000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7DF4BC500000
trusted library allocation
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1EC07670000
trusted library allocation
page read and write
1EC01E79000
heap
page read and write
2375501C000
heap
page read and write
23756E72000
heap
page read and write
1270000
heap
page read and write
1BDFE000
stack
page read and write
1506000
heap
page read and write
1C0B2000
heap
page read and write
22E29F20000
heap
page read and write
282E0E5D000
heap
page read and write
1EC07400000
heap
page read and write
282E0F4E000
heap
page read and write
23756E39000
heap
page read and write
1EC02700000
heap
page read and write
282E0F6F000
heap
page read and write
31EE000
stack
page read and write
22E424E9000
heap
page read and write
22E3A001000
trusted library allocation
page read and write
202E03AB000
heap
page read and write
282E0E68000
heap
page read and write
1BBF0000
heap
page execute and read and write
7FF849190000
trusted library allocation
page read and write
282E0E44000
heap
page read and write
23756E6B000
heap
page read and write
22E427B0000
heap
page read and write
23756E40000
heap
page read and write
1C10B000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1C24B733000
trusted library allocation
page read and write
282E0E60000
heap
page read and write
23756E57000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
23756E30000
heap
page read and write
210FAEE1000
heap
page read and write
23756E67000
heap
page read and write
282E0E5D000
heap
page read and write
26ABA7F000
stack
page read and write
1EC01EB8000
heap
page read and write
7FF848FF8000
trusted library allocation
page read and write
F38C5CE000
stack
page read and write
282E0FD8000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
6339F0E000
stack
page read and write
23756FE8000
heap
page read and write
23756E61000
heap
page read and write
282DEE83000
heap
page read and write
282E0FE8000
heap
page read and write
7FF848FDA000
trusted library allocation
page read and write
22E2BDE7000
trusted library allocation
page read and write
23756E4D000
heap
page read and write
282E0F54000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
237595D0000
heap
page read and write
23756FD2000
heap
page read and write
282DEE6C000
heap
page read and write
210E37F6000
trusted library allocation
page read and write
23756E61000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
202E2B2B000
trusted library allocation
page read and write
23756E10000
heap
page read and write
282E0E8D000
heap
page read and write
23756E66000
heap
page read and write
1BCB3000
heap
page read and write
23756E21000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
1C2623B0000
heap
page read and write
23755021000
heap
page read and write
6338DF7000
stack
page read and write
210F27F1000
trusted library allocation
page read and write
1506000
heap
page read and write
23759860000
heap
page read and write
23756E6B000
heap
page read and write
23756E72000
heap
page read and write
210E3565000
trusted library allocation
page read and write
210E0BB0000
heap
page read and write
1665000
heap
page read and write
202F1F41000
trusted library allocation
page read and write
282E0E93000
heap
page read and write
282E0F46000
heap
page read and write
23756E54000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
22E2B012000
trusted library allocation
page read and write
282E0E90000
heap
page read and write
282E0E9B000
heap
page read and write
26AC94E000
stack
page read and write
22E42559000
heap
page read and write
282E0815000
heap
page read and write
1EC02F00000
trusted library section
page readonly
210FAF94000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
22E2B84D000
trusted library allocation
page read and write
7DF4EEA60000
trusted library allocation
page execute and read and write
23756E72000
heap
page read and write
1C060000
heap
page read and write
23756E61000
heap
page read and write
23756E30000
heap
page read and write
150C000
heap
page read and write
282E0F66000
heap
page read and write
282E0E47000
heap
page read and write
1C248397000
heap
page read and write
D60000
heap
page read and write
6339C8E000
stack
page read and write
22E28530000
heap
page read and write
22E427D6000
heap
page read and write
23756E48000
heap
page read and write
282E0E76000
heap
page read and write
1EC07484000
heap
page read and write
22E2859B000
heap
page read and write
1EC01E72000
heap
page read and write
282E0F62000
heap
page read and write
1C262544000
heap
page read and write
251C47E000
unkown
page readonly
1C79A000
stack
page read and write
282E0EA7000
heap
page read and write
210FAEF8000
heap
page read and write
23756E66000
heap
page read and write
282E0E69000
heap
page read and write
1C249F26000
trusted library allocation
page read and write
A9F347D000
stack
page read and write
23756E63000
heap
page read and write
23755044000
heap
page read and write
1C24BCA6000
trusted library allocation
page read and write
230B6FF000
stack
page read and write
2375959D000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
282E0E6D000
heap
page read and write
130D8000
trusted library allocation
page read and write
210E3BB6000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
23754FEE000
heap
page read and write
23756E15000
heap
page read and write
7FF849133000
trusted library allocation
page read and write
7FF849168000
trusted library allocation
page read and write
282E0E87000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
1C24AE41000
trusted library allocation
page read and write
282E0F52000
heap
page read and write
23756F62000
heap
page read and write
23756F2E000
heap
page read and write
282E1017000
heap
page read and write
23756E57000
heap
page read and write
23756E77000
heap
page read and write
23756E77000
heap
page read and write
63390BA000
stack
page read and write
1C2625AE000
heap
page read and write
282E0E4F000
heap
page read and write
282E0E84000
heap
page read and write
1C24AF35000
trusted library allocation
page read and write
1AE1D000
stack
page read and write
202E2169000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
23756F25000
heap
page read and write
202FA63D000
heap
page read and write
202E1DA5000
heap
page read and write
210E0C13000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
23754FE1000
heap
page read and write
1529000
heap
page read and write
23756E28000
heap
page read and write
282E0E5D000
heap
page read and write
202FA530000
heap
page read and write
23756E63000
heap
page read and write
22E2ABDF000
trusted library allocation
page read and write
282E0E82000
heap
page read and write
251D07E000
unkown
page readonly
7FF8490F0000
trusted library allocation
page read and write
23756F1B000
heap
page read and write
1715000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
282E0E99000
heap
page read and write
1B320000
heap
page read and write
1331000
stack
page read and write
23759580000
heap
page read and write
7FF848FE8000
trusted library allocation
page read and write
7FF848FE4000
trusted library allocation
page read and write
17F5000
heap
page read and write
6339D8D000
stack
page read and write
B9D000
heap
page read and write
23756F56000
heap
page read and write
282E546B000
heap
page read and write
210FAF7F000
heap
page read and write
22E424A0000
heap
page read and write
B85000
heap
page read and write
210E0EA0000
trusted library section
page read and write
7FF849240000
trusted library allocation
page execute and read and write
2375501A000
heap
page read and write
23756F5D000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
282DEE9B000
heap
page read and write
202F23D2000
trusted library allocation
page read and write
7FF848FB1000
trusted library allocation
page read and write
202E1F30000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
23756E61000
heap
page read and write
202FA6A9000
heap
page read and write
202E3D22000
trusted library allocation
page read and write
1EC07610000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
7FF848E7C000
trusted library allocation
page execute and read and write
1C262509000
heap
page read and write
23756E61000
heap
page read and write
23756F2C000
heap
page read and write
1C248393000
heap
page read and write
282E0E71000
heap
page read and write
282DEE94000
heap
page read and write
210E405D000
trusted library allocation
page read and write
22E39FE1000
trusted library allocation
page read and write
282E0F46000
heap
page read and write
251DDFE000
stack
page read and write
202E1F41000
trusted library allocation
page read and write
210E2A19000
trusted library allocation
page read and write
23755017000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
210E27E0000
heap
page read and write
23756E67000
heap
page read and write
22E29F10000
heap
page readonly
23756E6E000
heap
page read and write
282E0E9A000
heap
page read and write
210E3AFB000
trusted library allocation
page read and write
6339E8C000
stack
page read and write
7FF848FA2000
trusted library allocation
page read and write
23754FFD000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1EC07462000
heap
page read and write
F38C34E000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
22E285E4000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
282E0F64000
heap
page read and write
1EC0742C000
heap
page read and write
22E29FC0000
heap
page execute and read and write
22E2B075000
trusted library allocation
page read and write
1790000
heap
page execute and read and write
There are 1906 hidden memdumps, click here to show them.