IOC Report
jcMcDQ11pZ.exe

loading gif

Files

File Path
Type
Category
Malicious
jcMcDQ11pZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\AdobeIPC
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\AdobeIPC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Guna.UI2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Stellar Generator.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\jcMcDQ11pZ.exe.log
CSV text
dropped
malicious
C:\ProgramData\Stellar Generator.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Stellar Generator.pdb
MSVC program database ver 7.00, 512*71 bytes
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AdobeIPC.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AdobeIPC.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2psyogwv.k3s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xothryz.ijd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ogmuane.uyt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uz3ohrq.kz4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gparxsgw.ehe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_htybpzt4.kpx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivhoya4t.z0t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0bwt0ye.50r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldkyqj5g.mfs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oknxujmk.cja.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwfw5dkb.v3d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgt1coh3.510.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzsuz335.ltx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vqn1ceza.owy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wziq02vf.kdq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xrxerhss.qec.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeIPC.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 16:07:58 2024, mtime=Sun Oct 13 16:07:58 2024, atime=Sun Oct 13 16:07:58 2024, length=67072, window=hide
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jcMcDQ11pZ.exe
"C:\Users\user\Desktop\jcMcDQ11pZ.exe"
malicious
C:\ProgramData\Stellar Generator.exe
"C:\ProgramData\Stellar Generator.exe"
malicious
C:\ProgramData\AdobeIPC.exe
"C:\ProgramData\AdobeIPC.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\AdobeIPC.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AdobeIPC.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\AdobeIPC'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AdobeIPC'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "AdobeIPC" /tr "C:\ProgramData\AdobeIPC"
malicious
C:\ProgramData\AdobeIPC
C:\ProgramData\AdobeIPC
malicious
C:\ProgramData\AdobeIPC.exe
"C:\ProgramData\AdobeIPC.exe"
malicious
C:\ProgramData\AdobeIPC.exe
"C:\ProgramData\AdobeIPC.exe"
malicious
C:\ProgramData\AdobeIPC
C:\ProgramData\AdobeIPC
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pastebin.com/raw/LsuynkUz
172.67.19.24
malicious
https://pastebin.com
unknown
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://pastebin.com/raw/LSuWhARfChttps://pastebin.com/raw/j4XYdsdHChttps://paste.fo/raw/9fc49c53951
unknown
https://contoso.com/License
unknown
http://www.tiro.com
unknown
https://gunaframework.com/api/licensing.phpLR
unknown
http://www.fontbureau.com/designers
unknown
https://gunaui.com/api/licensing.phpLR
unknown
http://www.goodfont.co.kr
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.microsoft.Q
unknown
https://gunaui.com/pricingLR
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://gunaui.com/pricing
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://gunaui.com/LR
unknown
https://gunaframework.com/api/licensing.php
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://gunaui.com/api/licensing.php
unknown
https://aka.ms/pscore68
unknown
https://gunaui.com/
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pastebin.com
172.67.19.24
malicious

IPs

IP
Domain
Country
Malicious
172.67.19.24
pastebin.com
United States
malicious
193.161.193.99
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
AdobeIPC
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A01000
trusted library allocation
page read and write
malicious
AF2000
unkown
page readonly
malicious
1E2A12EF000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
D0991FD000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1B37F000
stack
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
2BD0000
heap
page read and write
13B58FE000
stack
page read and write
FCE000
stack
page read and write
27F7B7DB000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
160000
heap
page read and write
D75000
heap
page read and write
7DF4ACA30000
trusted library allocation
page execute and read and write
5140000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
BFAE479000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
20C75C5F000
heap
page read and write
D09A1CC000
stack
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
299A5FA0000
trusted library allocation
page read and write
13B587F000
stack
page read and write
20C75F4C000
heap
page read and write
7FFD9B8C2000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
AA0333E000
stack
page read and write
20C004CD000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B6FB000
trusted library allocation
page execute and read and write
1AD10000
trusted library allocation
page read and write
A16000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
299BCBBE000
heap
page read and write
954000
unkown
page readonly
F30000
heap
page read and write
1E2A12F1000
trusted library allocation
page read and write
20C01097000
trusted library allocation
page read and write
1E2A900E000
heap
page read and write
2ACC000
trusted library allocation
page read and write
7DF4552D0000
trusted library allocation
page execute and read and write
133F000
stack
page read and write
1E2A9450000
heap
page read and write
1B3B0000
heap
page execute and read and write
299BCD70000
heap
page read and write
27F7B7FC000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
D098FFE000
stack
page read and write
170000
heap
page read and write
FDB000
heap
page read and write
12D78000
trusted library allocation
page read and write
2351000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1E292097000
trusted library allocation
page read and write
20C75BF4000
heap
page read and write
AA02CFD000
stack
page read and write
562000
heap
page read and write
CDA000
heap
page read and write
1E2A96CC000
heap
page read and write
2CEE000
trusted library allocation
page read and write
13B5C37000
stack
page read and write
7FFD9BA04000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
27F647C2000
trusted library allocation
page read and write
27F7B8F2000
heap
page read and write
27F63F1A000
trusted library allocation
page read and write
14C5000
heap
page read and write
D70000
heap
page read and write
1CA56000
heap
page read and write
2CDE000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page read and write
299BCF2E000
heap
page read and write
27F73003000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
51D3000
heap
page execute and read and write
D098B93000
stack
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
AB4000
heap
page read and write
20C00F60000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
12CD8000
trusted library allocation
page read and write
299A56B2000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1B25D000
stack
page read and write
1E2A1071000
trusted library allocation
page read and write
3C66000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
27F61442000
heap
page read and write
1E2A97F4000
heap
page read and write
1E2914CF000
trusted library allocation
page read and write
27F73283000
trusted library allocation
page read and write
BC0000
heap
page read and write
12D71000
trusted library allocation
page read and write
1C5FE000
stack
page read and write
970000
heap
page read and write
13B5F3B000
stack
page read and write
20C73C34000
heap
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
1B7AE000
stack
page read and write
7FFD9BB36000
trusted library allocation
page read and write
7FFD9BA39000
trusted library allocation
page read and write
7FFD9BA03000
trusted library allocation
page read and write
1C97CF19000
heap
page read and write
3C19000
trusted library allocation
page read and write
1056000
heap
page read and write
D09967C000
stack
page read and write
1E2A949B000
heap
page read and write
2CDF000
trusted library allocation
page read and write
2CC0000
heap
page execute and read and write
1E2A1021000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
10FA000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
20C73E80000
heap
page read and write
1BCBE000
stack
page read and write
BFAF48E000
stack
page read and write
92D000
unkown
page readonly
299A2C80000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BB06000
trusted library allocation
page read and write
1E291086000
trusted library allocation
page read and write
299B4741000
trusted library allocation
page read and write
57EC000
stack
page read and write
B90000
heap
page read and write
299A4700000
heap
page read and write
27F63F05000
trusted library allocation
page read and write
EB2000
heap
page read and write
577E000
stack
page read and write
7FFD9B700000
trusted library allocation
page read and write
E10000
heap
page read and write
7FF44B690000
trusted library allocation
page execute and read and write
1E292DDE000
trusted library allocation
page read and write
27F7B82C000
heap
page read and write
27F7B3B8000
heap
page read and write
27F61455000
heap
page read and write
1B61E000
stack
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
299A2C60000
trusted library allocation
page read and write
27F63B9F000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
2CD1000
trusted library allocation
page read and write
1E291C0F000
trusted library allocation
page read and write
20C01E29000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
7A50000
heap
page read and write
920000
unkown
page readonly
7FFD9B9BF000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
5340000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
27F6471C000
trusted library allocation
page read and write
1E2A9827000
heap
page read and write
1BA3F000
stack
page read and write
3C53000
trusted library allocation
page read and write
1E2A9576000
heap
page execute and read and write
27F6148F000
heap
page read and write
FF5000
heap
page read and write
1E292891000
trusted library allocation
page read and write
7FFD9B6E2000
trusted library allocation
page read and write
533E000
stack
page read and write
1E2921E0000
trusted library allocation
page read and write
D0990FE000
stack
page read and write
20C75BB2000
heap
page read and write
7FFD9B891000
trusted library allocation
page read and write
1E2A94A5000
heap
page read and write
FA4000
heap
page read and write
AA02FFE000
stack
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
105B000
trusted library allocation
page execute and read and write
29FE000
stack
page read and write
104A000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
7FFD9BAEE000
trusted library allocation
page read and write
BFAE639000
stack
page read and write
7FFD9B79C000
trusted library allocation
page execute and read and write
1E291C05000
trusted library allocation
page read and write
1B0000
heap
page read and write
1E28F6A0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
EF1000
stack
page read and write
27F64299000
trusted library allocation
page read and write
1B03E000
stack
page read and write
20C75F3E000
heap
page read and write
20C75C17000
heap
page read and write
6150000
heap
page read and write
FF0000
heap
page read and write
13B5979000
stack
page read and write
20C00D1B000
trusted library allocation
page read and write
20C75EC8000
heap
page read and write
7923000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
BE0000
heap
page read and write
299A6061000
trusted library allocation
page read and write
1B91E000
stack
page read and write
299A5719000
trusted library allocation
page read and write
20C102F0000
trusted library allocation
page read and write
1E292E28000
trusted library allocation
page read and write
4F1000
stack
page read and write
F99000
heap
page read and write
1E291DC0000
trusted library allocation
page read and write
299BCF37000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
27F7B859000
heap
page read and write
AA0323A000
stack
page read and write
27F7B4F4000
heap
page read and write
1E28F610000
heap
page readonly
7FFD9BA40000
trusted library allocation
page read and write
F5E000
heap
page read and write
BD0000
heap
page read and write
1E28F650000
trusted library allocation
page read and write
12D73000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
20C102F2000
trusted library allocation
page read and write
27F6416B000
trusted library allocation
page read and write
20C73D10000
heap
page read and write
20C73E40000
trusted library allocation
page read and write
1E2920C3000
trusted library allocation
page read and write
D09A0CE000
stack
page read and write
1E292128000
trusted library allocation
page read and write
299A598B000
trusted library allocation
page read and write
1C24E000
stack
page read and write
1E28F390000
heap
page read and write
1040000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
1E28F745000
heap
page read and write
1E291A54000
trusted library allocation
page read and write
10E0000
heap
page read and write
BFAE73E000
stack
page read and write
1E2A9680000
heap
page read and write
123E000
stack
page read and write
1E28F430000
heap
page read and write
7FFD9BA34000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
9E0000
heap
page read and write
20C73C3E000
heap
page read and write
1E28F48C000
heap
page read and write
1B2FE000
stack
page read and write
27F7B900000
heap
page read and write
13B690E000
stack
page read and write
1E28F370000
heap
page read and write
7FFD9B6E1000
trusted library allocation
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
20C75F13000
heap
page read and write
7FFD9B796000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
27F631B9000
trusted library allocation
page read and write
27F7B320000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
1E2923C9000
trusted library allocation
page read and write
13B55DF000
stack
page read and write
10F0000
heap
page read and write
27F64355000
trusted library allocation
page read and write
20C10021000
trusted library allocation
page read and write
3BE9000
trusted library allocation
page read and write
27F63F00000
trusted library allocation
page read and write
27F63B91000
trusted library allocation
page read and write
1CE4E000
stack
page read and write
299A58EF000
trusted library allocation
page read and write
105C000
heap
page read and write
27F7329B000
trusted library allocation
page read and write
EAF000
heap
page read and write
20C73E00000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
C25000
heap
page read and write
20C102EC000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
890000
heap
page read and write
27F7B8C0000
heap
page read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
1B69E000
stack
page read and write
7FFD9B89A000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
1C63E000
stack
page read and write
20C00F64000
trusted library allocation
page read and write
20C75CB0000
heap
page read and write
1030000
trusted library allocation
page read and write
27F614B7000
heap
page read and write
299A5837000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1C355000
stack
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
299A5E94000
trusted library allocation
page read and write
27F7B418000
heap
page read and write
27F72FA1000
trusted library allocation
page read and write
1AF30000
heap
page execute and read and write
20C73DA0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1125000
heap
page read and write
C00000
trusted library allocation
page read and write
1E291001000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
1E291F68000
trusted library allocation
page read and write
299A59BE000
trusted library allocation
page read and write
20C75C24000
heap
page read and write
5126000
trusted library allocation
page read and write
7FFD9B881000
trusted library allocation
page read and write
D60000
heap
page read and write
BFAE3FD000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9B6E0000
trusted library allocation
page read and write
299BCF4A000
heap
page read and write
27F61473000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
1080000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
27F7327C000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
299A5162000
trusted library allocation
page read and write
20C00F75000
trusted library allocation
page read and write
5780000
trusted library allocation
page execute and read and write
4DBE000
stack
page read and write
550000
heap
page read and write
9B9377E000
stack
page read and write
27F7B620000
trusted library allocation
page read and write
20C73CE6000
heap
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
27F639E2000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
2C90000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
1E28F3F0000
trusted library section
page read and write
27F61665000
heap
page read and write
D099177000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
27F63017000
trusted library allocation
page read and write
299BD170000
heap
page read and write
20C75E6C000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B89A000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
D1B000
heap
page read and write
13B5DBE000
stack
page read and write
72D0000
trusted library allocation
page read and write
27F72FC1000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
299BCF3A000
heap
page read and write
12AC3000
trusted library allocation
page read and write
51C9000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
20C75FE0000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
10EC000
heap
page read and write
7FFD9B6EB000
trusted library allocation
page read and write
7FFD9B9A1000
trusted library allocation
page read and write
27F648E9000
trusted library allocation
page read and write
27F7B365000
heap
page read and write
1B89E000
stack
page read and write
A0E000
heap
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
1E28F6A5000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
27F62E2D000
heap
page read and write
2D71000
trusted library allocation
page read and write
20C75E91000
heap
page read and write
2BD0000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
20C10010000
trusted library allocation
page read and write
D80000
heap
page read and write
BFAF40C000
stack
page read and write
1E2A1309000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
10AE000
stack
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
9EC000
heap
page read and write
1E2A974D000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
12DF000
stack
page read and write
5145000
trusted library allocation
page read and write
380000
unkown
page readonly
27F61519000
heap
page read and write
2AA0000
heap
page read and write
5293000
heap
page read and write
1024000
trusted library allocation
page read and write
AA02E79000
stack
page read and write
27F7B4FC000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B86A000
trusted library allocation
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
1BB3E000
stack
page read and write
27F6146F000
heap
page read and write
1C97D285000
heap
page read and write
CE2000
heap
page read and write
20C1030A000
trusted library allocation
page read and write
AA03E8C000
stack
page read and write
9B936FF000
unkown
page read and write
3BE1000
trusted library allocation
page read and write
190000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
20C10247000
trusted library allocation
page read and write
20C73D40000
heap
page read and write
7320000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
9A0000
heap
page read and write
563E000
stack
page read and write
20C0007A000
trusted library allocation
page read and write
95D000
unkown
page readonly
BFAE83C000
stack
page read and write
7FFD9B88A000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
7FFD9B8C4000
trusted library allocation
page read and write
299A2CCF000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1BB1B000
stack
page read and write
299BCF11000
heap
page read and write
20C75C3F000
heap
page read and write
1E2A94D4000
heap
page read and write
20C75F5E000
heap
page read and write
1B6A0000
heap
page execute and read and write
5800000
trusted library section
page readonly
CF7000
stack
page read and write
A54000
heap
page read and write
299A2D1B000
heap
page read and write
AA02D7E000
stack
page read and write
7FFD9B9EF000
trusted library allocation
page read and write
299A2C90000
heap
page read and write
F70000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1E291F7D000
trusted library allocation
page read and write
AA0408E000
stack
page read and write
1BDBE000
stack
page read and write
9E6000
heap
page read and write
D71000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1E290FF0000
heap
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
7FFD9B8F0000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
1E28F476000
heap
page read and write
2AD1000
trusted library allocation
page read and write
20C73E76000
heap
page execute and read and write
1E292E23000
trusted library allocation
page read and write
1B47E000
stack
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
299A6533000
trusted library allocation
page read and write
20C75B74000
heap
page read and write
9C0000
heap
page read and write
5280000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
27F64828000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
27F615F0000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
1E28F4B4000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
D0995FE000
stack
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
72F0000
trusted library allocation
page read and write
7FFD9B872000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
548000
heap
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
20C73BF0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
BC0000
heap
page read and write
1023000
trusted library allocation
page execute and read and write
299A2D60000
heap
page read and write
1C97D110000
heap
page read and write
1E291F64000
trusted library allocation
page read and write
5121000
trusted library allocation
page read and write
20C73E85000
heap
page read and write
7FFD9BA39000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2B40000
heap
page execute and read and write
299B4A09000
trusted library allocation
page read and write
299B49FD000
trusted library allocation
page read and write
299A2C98000
heap
page read and write
20C75B80000
heap
page read and write
20C73C50000
heap
page read and write
BFAE4BE000
stack
page read and write
7DF4552E0000
trusted library allocation
page execute and read and write
20C01E05000
trusted library allocation
page read and write
235C000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
13B698C000
stack
page read and write
1E2A981D000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
299A5928000
trusted library allocation
page read and write
1E2A94B1000
heap
page read and write
1E2A96D0000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
20C10001000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
299A2CEF000
heap
page read and write
BF0000
heap
page read and write
12AC8000
trusted library allocation
page read and write
7DF4506E0000
trusted library allocation
page execute and read and write
13B5A77000
stack
page read and write
27F64D9B000
trusted library allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
5E5000
heap
page read and write
20C00C03000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
12CE1000
trusted library allocation
page read and write
1BD1E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
EC4000
heap
page read and write
1E2A97E6000
heap
page read and write
1BBBF000
stack
page read and write
13B5E3E000
stack
page read and write
1080000
heap
page read and write
7FFD9B786000
trusted library allocation
page read and write
1437000
heap
page read and write
12CD1000
trusted library allocation
page read and write
FAE000
stack
page read and write
CEF000
heap
page read and write
AA0408C000
stack
page read and write
BFAE17D000
stack
page read and write
7FFD9B894000
trusted library allocation
page read and write
13B6A89000
stack
page read and write
3C96000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1E2A9835000
heap
page read and write
299BCF77000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page read and write
AA02DFE000
stack
page read and write
F55000
heap
page read and write
B10000
unkown
page readonly
7FFD9B8B0000
trusted library allocation
page read and write
27F64DBF000
trusted library allocation
page read and write
20C73C30000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2AB0000
heap
page execute and read and write
7FFD9B6C0000
trusted library allocation
page read and write
20C75F62000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
F7C000
heap
page read and write
7DF4ACA20000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
51B0000
heap
page read and write
12CED000
trusted library allocation
page read and write
20C01DDF000
trusted library allocation
page read and write
F9C000
heap
page read and write
27F6144F000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
299A57D5000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page read and write
5DC000
unkown
page readonly
7FFD9BA24000
trusted library allocation
page read and write
20C75F0B000
heap
page read and write
7FFD9B9AE000
trusted library allocation
page read and write
20C73E70000
heap
page execute and read and write
7FFD9B780000
trusted library allocation
page execute and read and write
13B5B79000
stack
page read and write
BFAF387000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
1E2A9751000
heap
page read and write
1E28F410000
trusted library allocation
page read and write
D0993F8000
stack
page read and write
ED9000
heap
page read and write
299A478B000
trusted library allocation
page read and write
2340000
heap
page execute and read and write
299A5AD8000
trusted library allocation
page read and write
1E28F400000
trusted library section
page read and write
922000
unkown
page readonly
20C75DB0000
heap
page execute and read and write
299BCBB6000
heap
page read and write
1E28F740000
heap
page read and write
BFAF20E000
stack
page read and write
C50000
heap
page read and write
AA0400D000
stack
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
13B5BBE000
stack
page read and write
20C00001000
trusted library allocation
page read and write
1C97CF10000
heap
page read and write
20C01034000
trusted library allocation
page read and write
27F64025000
trusted library allocation
page read and write
1E2A96D4000
heap
page read and write
20C012AA000
trusted library allocation
page read and write
7FFD9B8C8000
trusted library allocation
page read and write
D098EFE000
stack
page read and write
FB1000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
CB8000
heap
page read and write
1B93E000
stack
page read and write
20C75EED000
heap
page read and write
1C97D0F0000
heap
page read and write
ACE000
heap
page read and write
299B4731000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
20C10031000
trusted library allocation
page read and write
20C75740000
heap
page execute and read and write
7FFD9BA48000
trusted library allocation
page read and write
299B4711000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
27F73281000
trusted library allocation
page read and write
D0992F7000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1B06D000
heap
page read and write
1C650000
heap
page read and write
1E292952000
trusted library allocation
page read and write
980000
heap
page read and write
6120000
heap
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
1E28F47A000
heap
page read and write
AA030BF000
stack
page read and write
EA2000
heap
page read and write
3C2E000
trusted library allocation
page read and write
27F7B363000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
20C75E24000
heap
page read and write
13B6B8E000
stack
page read and write
299B4A01000
trusted library allocation
page read and write
AA029C3000
stack
page read and write
ED1000
heap
page read and write
F25000
heap
page read and write
20C75CD0000
heap
page read and write
5810000
heap
page read and write
1010000
trusted library allocation
page read and write
27F63B89000
trusted library allocation
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
12358000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
27F63EF8000
trusted library allocation
page read and write
7FFD9BABC000
trusted library allocation
page read and write
7FFD9BA13000
trusted library allocation
page read and write
1E290F90000
heap
page execute and read and write
7FFD9B6B0000
trusted library allocation
page read and write
BB0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
CEC000
heap
page read and write
2BC0000
trusted library allocation
page read and write
7FFD9BA42000
trusted library allocation
page read and write
1E28F620000
trusted library allocation
page read and write
BFAF30E000
stack
page read and write
2CD3000
trusted library allocation
page read and write
BFAE5B8000
stack
page read and write
20C01786000
trusted library allocation
page read and write
299A4BDE000
trusted library allocation
page read and write
1093000
heap
page read and write
5150000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
299BCB60000
heap
page read and write
7FFD9BA38000
trusted library allocation
page read and write
27F63F09000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
1E2A9714000
heap
page read and write
AC5000
heap
page read and write
12A03000
trusted library allocation
page read and write
1E2A1355000
trusted library allocation
page read and write
20C0182C000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
C20000
heap
page read and write
A4F000
heap
page read and write
2FF0000
trusted library allocation
page read and write
299A2C50000
trusted library section
page read and write
2C10000
heap
page execute and read and write
20C102FA000
trusted library allocation
page read and write
11D5000
heap
page read and write
E40000
heap
page read and write
1046000
heap
page read and write
20C00F69000
trusted library allocation
page read and write
1B710000
heap
page execute and read and write
27F7B502000
heap
page read and write
E9E000
heap
page read and write
BFAE279000
stack
page read and write
1070000
trusted library allocation
page read and write
27F7B826000
heap
page read and write
1043000
trusted library allocation
page read and write
7DF412710000
trusted library allocation
page execute and read and write
20C73CC9000
heap
page read and write
2ACF000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
1CA50000
heap
page read and write
1040000
trusted library allocation
page read and write
20C75EEA000
heap
page read and write
20C75F42000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
1E29122B000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
7FFD9B8C8000
trusted library allocation
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
12A01000
trusted library allocation
page read and write
D099379000
stack
page read and write
27F64051000
trusted library allocation
page read and write
7FFD9B6FB000
trusted library allocation
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
27F62F30000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
13B5553000
stack
page read and write
20C75B84000
heap
page read and write
5100000
trusted library allocation
page read and write
C55000
heap
page read and write
2D00000
trusted library allocation
page read and write
A87000
heap
page read and write
27F615A0000
trusted library allocation
page read and write
7FFD9B766000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1E28F438000
heap
page read and write
299BCE5A000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
2B8E000
stack
page read and write
7FFD9B861000
trusted library allocation
page read and write
2BF0000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1E2A96E0000
heap
page read and write
1140000
heap
page read and write
299A57A9000
trusted library allocation
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
7FFD9B6E0000
trusted library allocation
page read and write
D098BDE000
stack
page read and write
1C564000
stack
page read and write
299BCC17000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
299BCB88000
heap
page read and write
27F7B37D000
heap
page read and write
1050000
trusted library allocation
page read and write
D09A04E000
stack
page read and write
299BC717000
heap
page read and write
27F640B5000
trusted library allocation
page read and write
1B410000
heap
page read and write
5DD000
heap
page read and write
934000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
1B8C0000
heap
page read and write
20C73C40000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
27F641A4000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
AA0343B000
stack
page read and write
7FFD9B862000
trusted library allocation
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
1E2921AC000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
D099079000
stack
page read and write
299A2BA0000
heap
page read and write
27F7328B000
trusted library allocation
page read and write
D09947E000
stack
page read and write
20C00BF8000
trusted library allocation
page read and write
7DF412700000
trusted library allocation
page execute and read and write
7FFD9B6E3000
trusted library allocation
page read and write
D09A149000
stack
page read and write
1AE6F000
stack
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
20C01127000
trusted library allocation
page read and write
20C102F8000
trusted library allocation
page read and write
13B6A0E000
stack
page read and write
611E000
stack
page read and write
1E28F44E000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
27F7B4D0000
heap
page read and write
E90000
heap
page read and write
103D000
trusted library allocation
page execute and read and write
2BDE000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
2BDE000
stack
page read and write
299A2BE5000
heap
page read and write
20C75820000
heap
page read and write
BFAE073000
stack
page read and write
EAE000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
299A2C40000
trusted library section
page read and write
380000
unkown
page readonly
1C45A000
stack
page read and write
D098E7E000
stack
page read and write
10F5000
heap
page read and write
1E28F4B8000
heap
page read and write
228E000
stack
page read and write
7A75000
heap
page read and write
27F61479000
heap
page read and write
1120000
heap
page read and write
299A2BC0000
heap
page read and write
118F000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
299A5A1F000
trusted library allocation
page read and write
AA03E0E000
stack
page read and write
20C75BF2000
heap
page read and write
1050000
heap
page read and write
299A5872000
trusted library allocation
page read and write
13B6B0C000
stack
page read and write
1091000
heap
page read and write
7FFD9B8B4000
trusted library allocation
page read and write
20C011AB000
trusted library allocation
page read and write
299A2CD1000
heap
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
20C73DB5000
heap
page read and write
1E291DC2000
trusted library allocation
page read and write
27F7B790000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
12CD3000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
9F8000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
20C75E69000
heap
page read and write
1420000
trusted library allocation
page execute and read and write
27F61430000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
299A4711000
trusted library allocation
page read and write
7FFD9B882000
trusted library allocation
page read and write
2CDE000
stack
page read and write
D09957D000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
1C04E000
stack
page read and write
299A6513000
trusted library allocation
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
7FFD9B6F0000
trusted library allocation
page read and write
12CE8000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BA34000
trusted library allocation
page read and write
F87000
heap
page read and write
5E00000
unkown
page readonly
895000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
7FFD9BA29000
trusted library allocation
page read and write
12CEF000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
51C6000
trusted library allocation
page read and write
3C68000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
A0C000
heap
page read and write
7FFD9BA4A000
trusted library allocation
page read and write
27F6345D000
trusted library allocation
page read and write
299A4600000
heap
page execute and read and write
FB0000
heap
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
20C75E51000
heap
page read and write
299A2BE0000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
299B4A1B000
trusted library allocation
page read and write
92F000
unkown
page readonly
299BCC60000
heap
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
1031000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
299A4570000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
299BCC53000
heap
page read and write
3C2C000
trusted library allocation
page read and write
299BCD36000
heap
page execute and read and write
2B73000
heap
page read and write
299BCF90000
heap
page read and write
1E2A98B0000
heap
page read and write
9B93679000
stack
page read and write
299BCED8000
heap
page read and write
2D7C000
trusted library allocation
page read and write
20C0130B000
trusted library allocation
page read and write
1135000
heap
page read and write
1B81F000
stack
page read and write
F00000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
CA0000
heap
page execute and read and write
27F615D0000
heap
page read and write
12CF1000
trusted library allocation
page read and write
1E292E03000
trusted library allocation
page read and write
3C8D000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
20C75E07000
heap
page read and write
299BCEC9000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
BFAE379000
stack
page read and write
1E2A94B3000
heap
page read and write
27F61320000
heap
page read and write
7FFD9BA45000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B6B2000
trusted library allocation
page read and write
E77000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
1E292785000
trusted library allocation
page read and write
1C97D280000
heap
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
299BCCB0000
trusted library allocation
page read and write
1E291F75000
trusted library allocation
page read and write
299BCE84000
heap
page read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page read and write
5AB000
unkown
page readonly
27F7B8B0000
heap
page read and write
E5E000
stack
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
FB4000
heap
page read and write
BC1000
stack
page read and write
1A8DD000
stack
page read and write
1130000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1E2A9830000
heap
page read and write
1E29203A000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1122000
heap
page read and write
11D0000
heap
page read and write
AA03F89000
stack
page read and write
6140000
heap
page read and write
20C01953000
trusted library allocation
page read and write
299A5315000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
12353000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
7FFD9B6CB000
trusted library allocation
page read and write
529000
heap
page read and write
1030000
trusted library allocation
page read and write
299A2C35000
heap
page read and write
1E2A95A0000
heap
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
1C97D010000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1E2A9570000
heap
page execute and read and write
2CE1000
trusted library allocation
page read and write
AA03138000
stack
page read and write
1B620000
heap
page read and write
299A45B0000
trusted library allocation
page read and write
F61000
heap
page read and write
1B6AD000
stack
page read and write
1AF3E000
stack
page read and write
27F61670000
heap
page read and write
AA031BE000
stack
page read and write
20C75F57000
heap
page read and write
20C0194A000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1042000
trusted library allocation
page read and write
27F61620000
trusted library allocation
page read and write
1C590000
heap
page read and write
20C73DB0000
heap
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
20C76010000
trusted library allocation
page read and write
20C01892000
trusted library allocation
page read and write
1E2A97E4000
heap
page read and write
5820000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9BA13000
trusted library allocation
page read and write
5E02000
unkown
page readonly
27F7B8DE000
heap
page read and write
1E28F600000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1E29286A000
trusted library allocation
page read and write
27F63D17000
trusted library allocation
page read and write
1E2A9493000
heap
page read and write
1B26D000
stack
page read and write
299A6538000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
F1D000
heap
page read and write
1E2922AD000
trusted library allocation
page read and write
27F7B5D0000
heap
page execute and read and write
27F62F76000
heap
page execute and read and write
27F7B87F000
heap
page read and write
A79000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
7FFD9B6FB000
trusted library allocation
page read and write
299A64EE000
trusted library allocation
page read and write
D40000
heap
page read and write
20C73B00000
heap
page read and write
1430000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1E291F71000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1052000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
7FFD9BA42000
trusted library allocation
page read and write
20C75EF3000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
4CBE000
stack
page read and write
1B57E000
stack
page read and write
27F62F80000
heap
page execute and read and write
7FFD9B8D0000
trusted library allocation
page read and write
20C00F71000
trusted library allocation
page read and write
A23000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
1E2A12F9000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
299BCEDD000
heap
page read and write
299A4530000
heap
page readonly
7FFD9B970000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
27F64DBA000
trusted library allocation
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
D09A24E000
stack
page read and write
20C75DD0000
heap
page read and write
E98000
heap
page read and write
F50000
trusted library allocation
page read and write
BA0000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2D60000
heap
page execute and read and write
7FFD9B872000
trusted library allocation
page read and write
55C000
heap
page read and write
7FFD9B8B8000
trusted library allocation
page read and write
CB0000
heap
page read and write
7FFD9BA48000
trusted library allocation
page read and write
299A5604000
trusted library allocation
page read and write
2CFF000
stack
page read and write
1E2A1001000
trusted library allocation
page read and write
27F63E24000
trusted library allocation
page read and write
7D0000
heap
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
299A2D17000
heap
page read and write
1C14D000
stack
page read and write
BFAE0FE000
stack
page read and write
20C00A52000
trusted library allocation
page read and write
20C73CF0000
heap
page read and write
27F61660000
heap
page read and write
7E0000
heap
page read and write
AF1000
stack
page read and write
102D000
trusted library allocation
page execute and read and write
1E29202E000
trusted library allocation
page read and write
51C2000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B882000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
20C00228000
trusted library allocation
page read and write
51D0000
heap
page execute and read and write
7FFD9BA09000
trusted library allocation
page read and write
7960000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
27F6147B000
heap
page read and write
28F0000
heap
page read and write
20C75B70000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
D099279000
stack
page read and write
2BA0000
heap
page execute and read and write
FB5000
heap
page read and write
AA03078000
stack
page read and write
1E2A9706000
heap
page read and write
1046000
trusted library allocation
page execute and read and write
27F63EFC000
trusted library allocation
page read and write
299A5F79000
trusted library allocation
page read and write
7DF4506F0000
trusted library allocation
page execute and read and write
299BCD60000
heap
page read and write
299BCE40000
heap
page read and write
20C00D85000
trusted library allocation
page read and write
20C00C0D000
trusted library allocation
page read and write
1B830000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
6130000
heap
page read and write
1AF8D000
stack
page read and write
E20000
heap
page read and write
BFAE2FE000
stack
page read and write
20C7563A000
heap
page read and write
7342000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
AA032BE000
stack
page read and write
512D000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
1B13F000
stack
page read and write
1E2A9530000
heap
page read and write
299BCF6F000
heap
page read and write
7FFD9B882000
trusted library allocation
page read and write
D098F7E000
stack
page read and write
1B51E000
stack
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
299A2C30000
heap
page read and write
7FFD9B852000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
A21000
heap
page read and write
99F000
stack
page read and write
2C8D000
trusted library allocation
page read and write
20C73D80000
trusted library allocation
page read and write
7720000
heap
page read and write
1B79F000
stack
page read and write
27F615E0000
heap
page readonly
7FFD9B6E4000
trusted library allocation
page read and write
382000
unkown
page readonly
AA033BE000
stack
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
D0994FE000
stack
page read and write
20C75B78000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page read and write
27F7B862000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
1E2A96D8000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1275000
heap
page read and write
27F63CA5000
trusted library allocation
page read and write
EAD000
heap
page read and write
7DF4552C0000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
299A2AC0000
heap
page read and write
27F63F0D000
trusted library allocation
page read and write
299B4A03000
trusted library allocation
page read and write
F5E000
stack
page read and write
27F7B40C000
heap
page read and write
BFAE537000
stack
page read and write
20C0186B000
trusted library allocation
page read and write
1E28F472000
heap
page read and write
7FFD9B8B2000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2B70000
heap
page read and write
299A5745000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B8C2000
trusted library allocation
page read and write
1E28F360000
heap
page read and write
20C75F6A000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
7FFD9BA1C000
trusted library allocation
page read and write
1E2A1010000
trusted library allocation
page read and write
111D000
heap
page read and write
C70000
trusted library allocation
page read and write
1044000
heap
page read and write
299BCF32000
heap
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
1E2A1031000
trusted library allocation
page read and write
7940000
trusted library allocation
page execute and read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
1E2A9550000
trusted library allocation
page read and write
7FFD9BB3D000
trusted library allocation
page read and write
13B5EBE000
stack
page read and write
20C01E24000
trusted library allocation
page read and write
1BABE000
stack
page read and write
299A4939000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
510B000
trusted library allocation
page read and write
1B95F000
heap
page read and write
20C013C7000
trusted library allocation
page read and write
12A08000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
12351000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
27F64238000
trusted library allocation
page read and write
1E2A125A000
trusted library allocation
page read and write
AF0000
unkown
page readonly
299A2CD9000
heap
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
20C011DE000
trusted library allocation
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1110000
heap
page read and write
20C75F6C000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1033000
trusted library allocation
page read and write
FDD000
heap
page read and write
1018000
heap
page read and write
1E291D85000
trusted library allocation
page read and write
20C010C3000
trusted library allocation
page read and write
20C01217000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
27F61400000
heap
page read and write
E70000
heap
page read and write
1E292310000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
1E291F8A000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
299B4720000
trusted library allocation
page read and write
AA03F0E000
stack
page read and write
20C00F82000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
55E000
heap
page read and write
1E28F46C000
heap
page read and write
1CD4C000
stack
page read and write
27F7B4F0000
heap
page read and write
299BCD30000
heap
page execute and read and write
10BD000
heap
page read and write
1E290FB0000
heap
page execute and read and write
20C73C3A000
heap
page read and write
BE0000
heap
page read and write
7FFD9B8C4000
trusted library allocation
page read and write
1E291F6C000
trusted library allocation
page read and write
AA02F77000
stack
page read and write
1057000
trusted library allocation
page execute and read and write
7FFD9B6D0000
trusted library allocation
page read and write
1E2A12EA000
trusted library allocation
page read and write
27F7B7A0000
heap
page read and write
27F62F70000
heap
page execute and read and write
299B4A0B000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
B75000
heap
page read and write
D5E000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page execute and read and write
7FFD9BA18000
trusted library allocation
page read and write
5132000
trusted library allocation
page read and write
1BA1F000
stack
page read and write
2A8E000
stack
page read and write
7FFD9BA12000
trusted library allocation
page read and write
F76000
heap
page read and write
3C5C000
trusted library allocation
page read and write
2800000
heap
page execute and read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
1E291F79000
trusted library allocation
page read and write
545000
heap
page read and write
72E0000
trusted library allocation
page execute and read and write
1E28F3D0000
heap
page read and write
AA02C7E000
stack
page read and write
7FFD9B880000
trusted library allocation
page read and write
20C10073000
trusted library allocation
page read and write
D19000
heap
page read and write
B70000
heap
page read and write
124E000
stack
page read and write
27F72FB1000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1E2A9819000
heap
page read and write
20C73DC0000
heap
page readonly
BFAE7BE000
stack
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
27F61530000
heap
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
13B5AFD000
stack
page read and write
27F62F91000
trusted library allocation
page read and write
588000
heap
page read and write
299B4783000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
520000
heap
page read and write
27F615C0000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
20C73C78000
heap
page read and write
1E28F690000
trusted library allocation
page read and write
10BF000
heap
page read and write
27F64D75000
trusted library allocation
page read and write
13B59FF000
stack
page read and write
13B5CBA000
stack
page read and write
20C75C68000
heap
page read and write
567E000
stack
page read and write
13B5D39000
stack
page read and write
20C00C5F000
trusted library allocation
page read and write
12AC1000
trusted library allocation
page read and write
27F7B323000
heap
page read and write
2C6B000
trusted library allocation
page read and write
299A2C10000
heap
page read and write
299A5602000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1E2A96DC000
heap
page read and write
860000
heap
page read and write
1AD1E000
stack
page read and write
EF1000
stack
page read and write
1270000
heap
page read and write
2AC1000
trusted library allocation
page read and write
BFAE1FF000
stack
page read and write
7FFD9B898000
trusted library allocation
page read and write
5290000
heap
page read and write
BFAF28C000
stack
page read and write
27F61675000
heap
page read and write
27F61560000
heap
page read and write
6135000
heap
page read and write
1B81E000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
AA02EFF000
stack
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
27F63B87000
trusted library allocation
page read and write
299A2D6A000
heap
page read and write
27F64801000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
BFAE6BE000
stack
page read and write
7EE000
stack
page read and write
7FFD9BB0D000
trusted library allocation
page read and write
20C00F6D000
trusted library allocation
page read and write
A4D000
heap
page read and write
3BF4000
trusted library allocation
page read and write
7FFD9B892000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1E2A96C8000
heap
page read and write
773D000
heap
page read and write
E98000
heap
page read and write
1AD60000
heap
page read and write
C50000
trusted library allocation
page read and write
27F72F91000
trusted library allocation
page read and write
FAF000
heap
page read and write
There are 1301 hidden memdumps, click here to show them.