IOC Report
kBY9lgRaca.exe

loading gif

Files

File Path
Type
Category
Malicious
kBY9lgRaca.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\RuntimeDll\PBs3ExWWgPs.vbe
data
dropped
malicious
C:\RuntimeDll\cef_process.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\CNRzgtSC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CfUiBMYm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CtGsekUC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DJEawqoG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DhKAQyQA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FelIlyfv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GWKYIJYf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HOdrnIxw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HTmgdJna.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KMBPPFZY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MOnylpdT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ORagGYiO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PqvOIQVP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QEeosldM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UdNNkMkD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UicXeyNX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WkOFzhSS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WtmFjUlP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Yimecftu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YmBoVQXN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YztwqAnw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZVuWGvdL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZfOmxfIp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cmPeMAqD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\djqniAFy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eNXvjbiz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hCXTblqe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hiNMadse.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iesEpfvs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iqbcNzlc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jBpuMXxn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jJYMqGYt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jWRUMqoc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lYDDhZsX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\owqLTDnh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pPutoWtQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rAZKvkEJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tFkkvTtJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\uqHSBmkN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vZJioLKA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vdXshwoU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wjWAnjWL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ykSQugis.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zLeRKKNH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zPzZvHLt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zlIjJSaG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\9e8d7a4ca61bd9
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\Modules\6203df4a6bafc7
ASCII text, with very long lines (816), with no line terminators
dropped
C:\Program Files\Microsoft\OneDrive\ListSync\settings\07a615e8f2b317
ASCII text, with very long lines (769), with no line terminators
dropped
C:\Program Files\Windows Portable Devices\07a615e8f2b317
ASCII text, with very long lines (397), with no line terminators
dropped
C:\RuntimeDll\07a615e8f2b317
ASCII text, with very long lines (368), with no line terminators
dropped
C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cef_process.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jicts5u.2ua.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0l0tkgwa.oz2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0yjhscru.aym.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4of5xyid.r2w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4slo1ov4.qpv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52vjzlx5.ba3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c2h10ylj.l3k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_canc0hgc.blq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0djxqrm.i5l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejnryuvo.ux0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvkccjkd.dyv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g35gsewh.h35.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghu0wjrk.bza.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kq0332s1.c2h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmlu1ctz.3b5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m30f3fgk.pxf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmsjatds.yl3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ubuae1sx.5u3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ya3jxzld.g0d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z04i3w4y.fez.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\npEqFN9XfG
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kBY9lgRaca.exe
"C:\Users\user\Desktop\kBY9lgRaca.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe"
malicious
C:\Windows\SysWOW64\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
malicious
C:\RuntimeDll\cef_process.exe
"C:\RuntimeDll/cef_process.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
"C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.199.45.187/eternalgameSqlflowerDownloads.php
91.199.45.187
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microso
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.microsoft.co.
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://91.199.45.187
unknown
http://91.199.45.187/
unknown
http://crl.mi
unknown
There are 9 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
91.199.45.187
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\ec04d320eb9e8def9a5576336ff358d992d0f276
c8a612a5317e09eeb6057abe138cef54d9666039
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
FileDirectory
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B12000
unkown
page readonly
malicious
4E3F000
heap
page read and write
malicious
135E7000
trusted library allocation
page read and write
malicious
23A50610000
heap
page read and write
739D000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
7FFAAC608000
trusted library allocation
page read and write
2E20000
heap
page read and write
174634F0000
heap
page read and write
28365350000
heap
page read and write
1FE5250D000
trusted library allocation
page read and write
7FFAACBDA000
trusted library allocation
page read and write
7FFAAC762000
trusted library allocation
page read and write
1FE68EF0000
heap
page read and write
2F92000
heap
page read and write
203147E000
stack
page read and write
2FD9000
heap
page read and write
72F1000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
23A50760000
trusted library allocation
page read and write
7FFAAC516000
trusted library allocation
page execute and read and write
1802C1CA000
trusted library allocation
page read and write
7FFAACA80000
trusted library allocation
page read and write
AF0000
heap
page read and write
7391000
heap
page read and write
1FE4F010000
trusted library allocation
page read and write
2E99000
heap
page read and write
1FE51D91000
trusted library allocation
page read and write
23A50700000
heap
page execute and read and write
1801BEC1000
trusted library allocation
page read and write
769000
stack
page read and write
7FFAACBC8000
trusted library allocation
page read and write
7FFAAC7C5000
trusted library allocation
page read and write
1FE61195000
trusted library allocation
page read and write
1FE52B66000
trusted library allocation
page read and write
2F95000
heap
page read and write
1744C77B000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
543D000
stack
page read and write
13307000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page read and write
2031B3C000
stack
page read and write
2FF2000
unkown
page readonly
1BF02000
unkown
page readonly
1746374E000
heap
page read and write
17449570000
trusted library allocation
page read and write
1FE68F17000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page execute and read and write
1801BA90000
heap
page read and write
2AF480E000
stack
page read and write
7FFAACB20000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
2AF377E000
stack
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
2F2A000
heap
page read and write
7FFAAC886000
trusted library allocation
page read and write
23A60833000
trusted library allocation
page read and write
1BEB2000
unkown
page readonly
1801BE40000
heap
page read and write
6D80000
heap
page read and write
1FE4EE70000
heap
page read and write
17463729000
heap
page read and write
D12000
unkown
page read and write
7FFAAC870000
trusted library allocation
page read and write
7FFAAC85D000
trusted library allocation
page read and write
1C803000
heap
page read and write
1801D6E3000
trusted library allocation
page read and write
203173E000
stack
page read and write
1B9D2000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
D13000
unkown
page write copy
23A68A15000
heap
page read and write
E7664BE000
stack
page read and write
14565000
trusted library allocation
page read and write
2F77000
heap
page read and write
23A51AA1000
trusted library allocation
page read and write
92FB4FF000
stack
page read and write
7FFAAC605000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
23A51252000
trusted library allocation
page read and write
396C000
trusted library allocation
page read and write
7FFAACE00000
trusted library allocation
page read and write
7FFAACE00000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
20316F8000
stack
page read and write
1801A084000
heap
page read and write
7FFAAC9EF000
trusted library allocation
page read and write
23A4E6F9000
heap
page read and write
7FFAAC5FA000
trusted library allocation
page read and write
15BE000
stack
page read and write
2DE000
stack
page read and write
1FE6910C000
heap
page read and write
1FE69104000
heap
page read and write
7FFAACAD0000
trusted library allocation
page read and write
7FFAAC714000
trusted library allocation
page read and write
23A68B00000
heap
page read and write
3110000
unkown
page readonly
7FFAAC793000
trusted library allocation
page read and write
1366D000
trusted library allocation
page read and write
23A60AF2000
trusted library allocation
page read and write
341E000
trusted library allocation
page read and write
7FFB1DE60000
unkown
page read and write
AE0000
heap
page readonly
1FE691CA000
heap
page read and write
3AB8000
trusted library allocation
page read and write
1FE52B8B000
trusted library allocation
page read and write
7FFAACD95000
trusted library allocation
page read and write
1FE4F020000
heap
page readonly
2834CE30000
heap
page read and write
1FE5125C000
trusted library allocation
page read and write
23A518BA000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
1FE50BF7000
heap
page read and write
7FFAAC730000
trusted library allocation
page execute and read and write
1744ADB0000
trusted library allocation
page read and write
1580000
heap
page execute and read and write
7FFAAC6D0000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
92FC80E000
stack
page read and write
2ED0000
heap
page read and write
7FFAAC798000
trusted library allocation
page read and write
1FE4EEB0000
heap
page read and write
23A525D8000
trusted library allocation
page read and write
23A50CCE000
trusted library allocation
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
1BE72000
unkown
page readonly
2E99000
heap
page read and write
1720000
heap
page read and write
2E96000
heap
page read and write
14853000
trusted library allocation
page read and write
23A68800000
heap
page read and write
7FFAAC7B9000
trusted library allocation
page read and write
283658BF000
heap
page read and write
7FFAAC432000
trusted library allocation
page read and write
7FFAAC82A000
trusted library allocation
page read and write
3072000
unkown
page readonly
1744AE20000
heap
page read and write
7293000
heap
page read and write
3091000
trusted library allocation
page read and write
1BD63000
heap
page execute and read and write
92FBA3E000
stack
page read and write
7FFAACE50000
trusted library allocation
page read and write
3120000
heap
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
203183B000
stack
page read and write
7FFAAC45D000
trusted library allocation
page execute and read and write
1746363F000
heap
page read and write
7FFAAC500000
trusted library allocation
page read and write
26E0000
heap
page read and write
2032607000
stack
page read and write
20317B6000
stack
page read and write
1BF52000
unkown
page readonly
7FFAAC5D2000
trusted library allocation
page read and write
2AF3AB7000
stack
page read and write
1FE51EE6000
trusted library allocation
page read and write
2EB3000
heap
page read and write
1801D80A000
trusted library allocation
page read and write
1BB3A000
heap
page read and write
1CCFE000
stack
page read and write
2836539D000
heap
page read and write
7FFAAC642000
trusted library allocation
page read and write
142B5000
trusted library allocation
page read and write
174634BA000
heap
page read and write
3ACF000
trusted library allocation
page read and write
1802C1BA000
trusted library allocation
page read and write
7FFAAC47B000
trusted library allocation
page read and write
7353000
heap
page read and write
1BB38000
heap
page read and write
7FFAAC870000
trusted library allocation
page read and write
7FFAAC61A000
trusted library allocation
page read and write
1321B000
trusted library allocation
page read and write
E7665BF000
stack
page read and write
7FFAAC789000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
1CD4E000
stack
page read and write
7FFAAC720000
trusted library allocation
page read and write
1B7BB000
stack
page read and write
14499000
trusted library allocation
page read and write
13F58000
trusted library allocation
page read and write
B57000
unkown
page readonly
CE3000
unkown
page readonly
62A4D0D000
stack
page read and write
7FFAAC8C6000
trusted library allocation
page read and write
7FFAAC794000
trusted library allocation
page read and write
7FFAACA20000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
7421F000
unkown
page readonly
2EAE000
heap
page read and write
7FFAACD00000
trusted library allocation
page read and write
2031A3C000
stack
page read and write
7FFAAC720000
trusted library allocation
page read and write
2834E523000
trusted library allocation
page read and write
2FAE000
heap
page read and write
2FB7000
heap
page read and write
2834E70B000
trusted library allocation
page read and write
1FE69010000
heap
page read and write
23A507F0000
heap
page execute and read and write
1801BA50000
trusted library section
page read and write
7FFAAC4FE000
trusted library allocation
page execute and read and write
14838000
trusted library allocation
page read and write
2ED8000
heap
page read and write
2835D65A000
trusted library allocation
page read and write
1346F000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page read and write
7FFAACDE0000
trusted library allocation
page read and write
1744C4DD000
trusted library allocation
page read and write
2FB6000
heap
page read and write
2F80000
heap
page read and write
7322000
heap
page read and write
1FE68FB9000
heap
page read and write
1801C0E8000
trusted library allocation
page read and write
2834E650000
trusted library allocation
page read and write
7FFAAC5E2000
trusted library allocation
page read and write
1CE30000
heap
page read and write
180343E2000
heap
page read and write
1270000
heap
page read and write
1FE69100000
heap
page read and write
2F99000
heap
page read and write
4BFA000
trusted library allocation
page read and write
1745B3C1000
trusted library allocation
page read and write
1FE51B44000
trusted library allocation
page read and write
2F21000
heap
page read and write
92FBC3C000
stack
page read and write
1745B432000
trusted library allocation
page read and write
23A51803000
trusted library allocation
page read and write
2FAF000
heap
page read and write
1BE6D000
stack
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
7FFAAC546000
trusted library allocation
page execute and read and write
7FFAAC880000
trusted library allocation
page read and write
13B6B000
trusted library allocation
page read and write
7394000
heap
page read and write
2E8F000
heap
page read and write
1BD52000
unkown
page readonly
7FFAAC860000
trusted library allocation
page execute and read and write
92FB47E000
unkown
page read and write
7FFAACB40000
trusted library allocation
page read and write
23A500A0000
trusted library allocation
page read and write
72F2000
heap
page read and write
2FB8000
heap
page read and write
7FFAAC8C2000
trusted library allocation
page read and write
1801CE5C000
trusted library allocation
page read and write
7323000
heap
page read and write
1420B000
trusted library allocation
page read and write
7FFAACD36000
trusted library allocation
page read and write
7FFAAC7CC000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
AF5000
heap
page read and write
1801A210000
heap
page read and write
7FFAAC510000
trusted library allocation
page read and write
7FFAAC611000
trusted library allocation
page read and write
E765DEF000
stack
page read and write
1FE4F0A0000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
1801BA20000
heap
page read and write
7FFAAC620000
trusted library allocation
page execute and read and write
7FFAACDA0000
trusted library allocation
page read and write
92FB5F9000
stack
page read and write
1801A07B000
heap
page read and write
23A504DD000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
2835D640000
trusted library allocation
page read and write
2ECD000
heap
page read and write
1540000
trusted library allocation
page read and write
2EB6000
heap
page read and write
7FFAACB50000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
23A4E680000
heap
page read and write
1801D63D000
trusted library allocation
page read and write
2FB8000
heap
page read and write
62A4C0E000
stack
page read and write
1801BA94000
heap
page read and write
7354000
heap
page read and write
CB0000
unkown
page readonly
1FE6929E000
heap
page read and write
2835D64A000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
17463494000
heap
page read and write
1744B350000
heap
page execute and read and write
2834DF4F000
trusted library allocation
page read and write
1744B357000
heap
page execute and read and write
2834E0C5000
trusted library allocation
page read and write
93C647F000
stack
page read and write
180341F0000
heap
page read and write
7FFAAC474000
trusted library allocation
page read and write
2F8E000
heap
page read and write
1801DCE0000
trusted library allocation
page read and write
2AF3BBA000
stack
page read and write
7FFAACA75000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
148ED000
trusted library allocation
page read and write
2834E5EF000
trusted library allocation
page read and write
7FFAACC10000
trusted library allocation
page read and write
144AF000
trusted library allocation
page read and write
CEE000
unkown
page read and write
7FFAAC51F000
trusted library allocation
page execute and read and write
7FFAACC40000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
2E9D000
heap
page read and write
1FE690F4000
heap
page read and write
2835D351000
trusted library allocation
page read and write
2E89000
heap
page read and write
7FFAAC7CA000
trusted library allocation
page read and write
1FE69240000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
1745B6BA000
trusted library allocation
page read and write
7DF4CB880000
trusted library allocation
page execute and read and write
778000
stack
page read and write
7FFAAC876000
trusted library allocation
page read and write
1299000
heap
page read and write
2E99000
heap
page read and write
4BE1000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
7DF4CB890000
trusted library allocation
page execute and read and write
20311FF000
stack
page read and write
1FE61082000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
76E000
stack
page read and write
7FFAAC710000
trusted library allocation
page read and write
23A50886000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
1FE4F064000
heap
page read and write
1801A040000
heap
page read and write
1801BDE0000
heap
page readonly
2AF4A0C000
stack
page read and write
7FFAAC680000
trusted library allocation
page read and write
17463771000
heap
page read and write
1BB4A000
heap
page read and write
1FE692A2000
heap
page read and write
2834E2CA000
trusted library allocation
page read and write
23A51770000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
CE3000
unkown
page readonly
7FFAAC7CC000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page execute and read and write
7FFAACB50000
trusted library allocation
page read and write
322E000
stack
page read and write
23A51B93000
trusted library allocation
page read and write
E765D6F000
unkown
page read and write
1B419000
heap
page read and write
2FBD000
heap
page read and write
13FE7000
trusted library allocation
page read and write
145E9000
trusted library allocation
page read and write
23A500D0000
heap
page readonly
7FFAAC770000
trusted library allocation
page read and write
23A68839000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
1FE4EF34000
heap
page read and write
2E2E000
stack
page read and write
7FFAAC610000
trusted library allocation
page read and write
7FFAACAE0000
trusted library allocation
page read and write
145C1000
trusted library allocation
page read and write
2FB6000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
6E83000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
513F000
stack
page read and write
1801D749000
trusted library allocation
page read and write
1BEF2000
unkown
page readonly
180344F1000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
2835D642000
trusted library allocation
page read and write
3102000
unkown
page readonly
7FFAAC640000
trusted library allocation
page read and write
7FFAAC7A4000
trusted library allocation
page read and write
23A68AC7000
heap
page read and write
1744B1D6000
heap
page read and write
7FFB1DE65000
unkown
page readonly
7FFAAC64A000
trusted library allocation
page read and write
2E85000
heap
page read and write
6578000
heap
page read and write
7FFAAC546000
trusted library allocation
page execute and read and write
7FFAACAE0000
trusted library allocation
page read and write
314F000
stack
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
7FFAAC612000
trusted library allocation
page read and write
180344B3000
heap
page read and write
2834B500000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
7FFAACA60000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
1724000
heap
page read and write
135C000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC470000
trusted library allocation
page read and write
1315F000
trusted library allocation
page read and write
7FFAACA60000
trusted library allocation
page read and write
30E2000
unkown
page readonly
7FFAAC720000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
92FB6F7000
stack
page read and write
1C1DE000
stack
page read and write
17463403000
heap
page read and write
2FAD000
heap
page read and write
2834B580000
trusted library section
page read and write
7FFAAC506000
trusted library allocation
page read and write
2834E40A000
trusted library allocation
page read and write
1272000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
2EB0000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAAC886000
trusted library allocation
page read and write
23A518EC000
trusted library allocation
page read and write
7422000
heap
page read and write
1FE692A7000
heap
page read and write
23A5156E000
trusted library allocation
page read and write
1FE4EF76000
heap
page read and write
1B9C0000
heap
page read and write
2834D3CF000
trusted library allocation
page read and write
2836582D000
heap
page read and write
18033EF0000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
73F2000
heap
page read and write
7FFAAC48D000
trusted library allocation
page execute and read and write
3AA4000
trusted library allocation
page read and write
7FFAACBF0000
trusted library allocation
page read and write
2FB2000
heap
page read and write
74201000
unkown
page execute read
308E000
stack
page read and write
1FE6914B000
heap
page read and write
7FFAACB10000
trusted library allocation
page read and write
23A50150000
trusted library allocation
page read and write
1B9BA000
heap
page read and write
73F1000
heap
page read and write
23A68B16000
heap
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
92FB9B9000
stack
page read and write
7FFAAC464000
trusted library allocation
page read and write
CB1000
unkown
page execute read
7FFAAC6BE000
trusted library allocation
page read and write
1C846000
heap
page read and write
2AF488E000
stack
page read and write
13231000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
7FFAAC7B9000
trusted library allocation
page read and write
23A51A0E000
trusted library allocation
page read and write
7FFAAC7C8000
trusted library allocation
page read and write
2834B35F000
heap
page read and write
38C7000
trusted library allocation
page read and write
1330000
heap
page read and write
2E00000
heap
page read and write
7FFAAC6A6000
trusted library allocation
page read and write
23A68A86000
heap
page read and write
13A6F000
trusted library allocation
page read and write
1FE60FA2000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
7DF415070000
trusted library allocation
page execute and read and write
7FFAACA00000
trusted library allocation
page read and write
328E000
stack
page read and write
203268C000
stack
page read and write
2835D63B000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
28365875000
heap
page read and write
1FE6107B000
trusted library allocation
page read and write
2F96000
heap
page read and write
2FBB000
heap
page read and write
7FFAACAC0000
trusted library allocation
page read and write
2836539F000
heap
page read and write
7FFAACC90000
trusted library allocation
page execute and read and write
7FFAAC670000
trusted library allocation
page read and write
23FF000
stack
page read and write
7FFAAC690000
trusted library allocation
page read and write
7FFAAC620000
trusted library allocation
page read and write
2835D383000
trusted library allocation
page read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
1744AE84000
heap
page read and write
133DD000
trusted library allocation
page read and write
7FFAAC48C000
trusted library allocation
page execute and read and write
2ED0000
heap
page read and write
7FFAAC614000
trusted library allocation
page read and write
7FFAACAA0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
7FFAAC50C000
trusted library allocation
page execute and read and write
1803409F000
heap
page read and write
7FFAACA63000
trusted library allocation
page read and write
28365620000
trusted library allocation
page read and write
1801A030000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page read and write
62A3C7E000
stack
page read and write
1C7CA000
heap
page read and write
1FE6923E000
heap
page read and write
1744C083000
trusted library allocation
page read and write
17463480000
heap
page read and write
7FFAACC00000
trusted library allocation
page read and write
7FFAAC463000
trusted library allocation
page execute and read and write
23A51577000
trusted library allocation
page read and write
1744D1BD000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1C002000
unkown
page readonly
2AF367F000
unkown
page read and write
194E1990000
heap
page read and write
2834B3A6000
heap
page read and write
7FFAAC46D000
trusted library allocation
page execute and read and write
1744B533000
trusted library allocation
page read and write
503E000
stack
page read and write
7FFAAC660000
trusted library allocation
page read and write
78B000
stack
page read and write
717C000
stack
page read and write
194E1D34000
heap
page read and write
28365881000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
7FFAACA80000
trusted library allocation
page read and write
20310F3000
stack
page read and write
283654E0000
heap
page read and write
2FAC000
heap
page read and write
23A4E6F2000
heap
page read and write
1244000
heap
page read and write
7FFAACAB0000
trusted library allocation
page read and write
2834D81E000
trusted library allocation
page read and write
92FB7F8000
stack
page read and write
1801BF47000
trusted library allocation
page read and write
1BB40000
heap
page read and write
7FFAAC624000
trusted library allocation
page read and write
7FFAAC8C2000
trusted library allocation
page read and write
13187000
trusted library allocation
page read and write
4DCC000
heap
page read and write
1801A09C000
heap
page read and write
7FFAACA53000
trusted library allocation
page read and write
1745B6AB000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page read and write
2AF3DBE000
stack
page read and write
1801BEB0000
heap
page execute and read and write
7FFAAC7A8000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
2834E4A7000
trusted library allocation
page read and write
4C14000
heap
page read and write
7FFAAC793000
trusted library allocation
page read and write
4E3B000
heap
page read and write
7FFAAC7B4000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page execute and read and write
1FE4EEF0000
heap
page read and write
7FFB1DE60000
unkown
page read and write
7FFAAC790000
trusted library allocation
page read and write
3010000
heap
page execute and read and write
194E1A67000
heap
page read and write
1744B446000
trusted library allocation
page read and write
1333000
heap
page read and write
283654F6000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
519E000
stack
page read and write
A00000
heap
page read and write
23A688AA000
heap
page read and write
7FFB1DE60000
unkown
page read and write
2834B420000
heap
page read and write
7FFAAC690000
trusted library allocation
page read and write
B10000
unkown
page readonly
7FFAAC840000
trusted library allocation
page read and write
18034112000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
7FFAAC763000
trusted library allocation
page read and write
92FB57E000
stack
page read and write
7FFAAC4AC000
trusted library allocation
page execute and read and write
1801DCBC000
trusted library allocation
page read and write
20314F9000
stack
page read and write
1FE526DA000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
7FFB1DE41000
unkown
page execute read
14806000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
1309000
heap
page read and write
7FFAAC440000
trusted library allocation
page read and write
7FFAAC51C000
trusted library allocation
page execute and read and write
7FFAAC790000
trusted library allocation
page read and write
1FE50D80000
heap
page execute and read and write
135E000
heap
page read and write
7FFAAC7C8000
trusted library allocation
page read and write
1BEF0000
unkown
page readonly
1FE69490000
heap
page read and write
2D8B000
stack
page read and write
28365837000
heap
page read and write
7FFAAC7C8000
trusted library allocation
page read and write
1801BE27000
heap
page execute and read and write
7FFAACDF0000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
1C0A5000
heap
page read and write
1746375C000
heap
page read and write
E76627D000
stack
page read and write
2F2E000
heap
page read and write
7FFAAC516000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
1250000
heap
page read and write
7FFAAC85A000
trusted library allocation
page read and write
2F21000
heap
page read and write
1FE69152000
heap
page read and write
1323D000
trusted library allocation
page read and write
1FE6929B000
heap
page read and write
7FFAAC792000
trusted library allocation
page read and write
2F9E000
heap
page read and write
7FFAAC464000
trusted library allocation
page read and write
7FFAAC830000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page read and write
17449530000
heap
page read and write
7384000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
30C2000
unkown
page readonly
7FFAAC680000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
1801BDF0000
trusted library allocation
page read and write
1801D722000
trusted library allocation
page read and write
174636C7000
heap
page read and write
23A50184000
heap
page read and write
2834B365000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
62A40BE000
stack
page read and write
31F000
stack
page read and write
7FFAACBE0000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page execute and read and write
7FFAAC516000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7FFAAC793000
trusted library allocation
page read and write
1BEC2000
unkown
page readonly
1FE52BB0000
trusted library allocation
page read and write
1C050000
heap
page read and write
592F000
stack
page read and write
180340EA000
heap
page read and write
7FFAACB33000
trusted library allocation
page read and write
7FFAACDA5000
trusted library allocation
page read and write
1802BEC1000
trusted library allocation
page read and write
7FFAACBD8000
trusted library allocation
page read and write
180344DA000
heap
page read and write
7FFAAC462000
trusted library allocation
page read and write
2834CE34000
heap
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
174493F0000
heap
page read and write
2834F14C000
trusted library allocation
page read and write
283653FB000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
62A3E3E000
stack
page read and write
1744C47A000
trusted library allocation
page read and write
13091000
trusted library allocation
page read and write
23A60821000
trusted library allocation
page read and write
1C34E000
stack
page read and write
2FA9000
heap
page read and write
7421D000
unkown
page read and write
1801D016000
trusted library allocation
page read and write
1FE68EE7000
heap
page execute and read and write
7FFAAC6C0000
trusted library allocation
page read and write
1CB4E000
stack
page read and write
1744BFB5000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page read and write
FB0000
heap
page read and write
7FFAAC760000
trusted library allocation
page read and write
15F4000
heap
page read and write
23A500E0000
trusted library allocation
page read and write
2FD9000
heap
page read and write
17463687000
heap
page read and write
7FFAAC478000
trusted library allocation
page read and write
1744C6C0000
trusted library allocation
page read and write
1744CBE4000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
2FA1000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
23A5214B000
trusted library allocation
page read and write
1801A048000
heap
page read and write
1BF00000
unkown
page readonly
2834D2D0000
heap
page execute and read and write
1468F000
trusted library allocation
page read and write
1BED2000
unkown
page readonly
1C7C0000
heap
page read and write
6E80000
heap
page read and write
1BA2E000
heap
page read and write
2FB3000
heap
page read and write
62A41BE000
stack
page read and write
7FFAAC600000
trusted library allocation
page execute and read and write
7FFAAC460000
trusted library allocation
page read and write
1FE4F104000
heap
page read and write
74216000
unkown
page readonly
7FFAAC730000
trusted library allocation
page read and write
7FFAAC7B4000
trusted library allocation
page read and write
2DFE000
stack
page read and write
2C8B000
stack
page read and write
1744944F000
heap
page read and write
283655D0000
heap
page execute and read and write
12D000
stack
page read and write
7FFAACE40000
trusted library allocation
page read and write
1744CC23000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
2834B361000
heap
page read and write
7FFAACAF0000
trusted library allocation
page read and write
7FFAAC470000
trusted library allocation
page read and write
1290000
heap
page read and write
7FFAAC7C2000
trusted library allocation
page read and write
3058000
unkown
page readonly
4BE0000
heap
page read and write
2F93000
heap
page read and write
7FFAAC84C000
trusted library allocation
page read and write
2F97000
heap
page read and write
E7661F7000
stack
page read and write
7FFAAC642000
trusted library allocation
page read and write
3005000
heap
page read and write
1FE519EF000
trusted library allocation
page read and write
2F40000
heap
page read and write
1BD50000
unkown
page readonly
E76607F000
stack
page read and write
7FFAACDA0000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
23A68A8D000
heap
page read and write
7FFAAC51C000
trusted library allocation
page execute and read and write
E76710E000
stack
page read and write
7DF4CB870000
trusted library allocation
page execute and read and write
2835D381000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
62A3CFB000
stack
page read and write
2F92000
heap
page read and write
283658E0000
heap
page read and write
2834DDA2000
trusted library allocation
page read and write
17463401000
heap
page read and write
14311000
trusted library allocation
page read and write
1744B3C1000
trusted library allocation
page read and write
1FE4F060000
heap
page read and write
7FFAAC452000
trusted library allocation
page read and write
7FFAACDB9000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
2AF397D000
stack
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
B53000
unkown
page readonly
7FFAAC8BD000
trusted library allocation
page read and write
283658C9000
heap
page read and write
2835D7BB000
trusted library allocation
page read and write
1FE4F100000
heap
page read and write
23A51401000
trusted library allocation
page read and write
23A525FD000
trusted library allocation
page read and write
2834B5C0000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page read and write
3AD6000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page execute and read and write
20318B9000
stack
page read and write
7FFAAC660000
trusted library allocation
page read and write
2FF0000
heap
page read and write
2834E21B000
trusted library allocation
page read and write
2FF0000
unkown
page readonly
7FFAACD90000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
62A423B000
stack
page read and write
62A4D8E000
stack
page read and write
1520000
trusted library allocation
page read and write
7FFAAC6D2000
trusted library allocation
page read and write
7FFAAC43D000
trusted library allocation
page execute and read and write
203270C000
stack
page read and write
7FFAAC642000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
1B61A000
stack
page read and write
7FFAAC72F000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
1802C1B0000
trusted library allocation
page read and write
283658D2000
heap
page read and write
1C0DE000
stack
page read and write
72F1000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
92FC709000
stack
page read and write
2F10000
heap
page read and write
23A4E670000
heap
page read and write
3060000
unkown
page readonly
7FFAACDD0000
trusted library allocation
page read and write
7394000
heap
page read and write
2834D340000
heap
page read and write
7FFAAC7CA000
trusted library allocation
page read and write
2FD9000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
7FFAAC536000
trusted library allocation
page execute and read and write
7FFAACB7D000
trusted library allocation
page read and write
7FFAAC644000
trusted library allocation
page read and write
6570000
heap
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
2834EC9B000
trusted library allocation
page read and write
7FFAAC70C000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
E76663C000
stack
page read and write
1FE60DB1000
trusted library allocation
page read and write
2836581F000
heap
page read and write
3231000
trusted library allocation
page read and write
23A520ED000
trusted library allocation
page read and write
2834B590000
trusted library section
page read and write
2AF38F9000
stack
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1FE6928A000
heap
page read and write
2E9E000
heap
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
1FE4ED70000
heap
page read and write
4FD0000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
92FB1E3000
stack
page read and write
129B000
heap
page read and write
7FFAACA70000
trusted library allocation
page read and write
1FE60DC1000
trusted library allocation
page read and write
174495A0000
heap
page readonly
E76617E000
stack
page read and write
23A68874000
heap
page read and write
7FFAAC442000
trusted library allocation
page read and write
17449431000
heap
page read and write
142CE000
trusted library allocation
page read and write
2F90000
heap
page read and write
7FFAAC886000
trusted library allocation
page read and write
62A3FB9000
stack
page read and write
1FE4F070000
trusted library allocation
page read and write
7392000
heap
page read and write
2FF0000
heap
page read and write
2834B5A0000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
1FE68E10000
heap
page execute and read and write
1BB33000
heap
page execute and read and write
1200000
heap
page read and write
18034330000
trusted library allocation
page read and write
1FE69132000
heap
page read and write
7FFAAC8B6000
trusted library allocation
page read and write
7FFAAC4EE000
trusted library allocation
page execute and read and write
7FFAAC6F0000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page read and write
2E60000
heap
page read and write
1744C593000
trusted library allocation
page read and write
7422000
heap
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
7FFAACD30000
trusted library allocation
page read and write
2F21000
heap
page read and write
23A50720000
heap
page execute and read and write
23A50801000
trusted library allocation
page read and write
377F000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
14443000
trusted library allocation
page read and write
2F8F000
heap
page read and write
2AF36FF000
stack
page read and write
23A68920000
heap
page read and write
7FFB1DE60000
unkown
page read and write
1745B3F1000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page read and write
28365354000
heap
page read and write
7384000
heap
page read and write
C3E000
stack
page read and write
7FFAACC00000
trusted library allocation
page read and write
7FFAAC51C000
trusted library allocation
page execute and read and write
2834E2B2000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page read and write
1B0C0000
trusted library allocation
page read and write
2AF4A8E000
stack
page read and write
7FFAAC48B000
trusted library allocation
page execute and read and write
30D4000
unkown
page readonly
7FFAAC6A0000
trusted library allocation
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
1FE51B01000
trusted library allocation
page read and write
52F0000
heap
page read and write
17449433000
heap
page read and write
1801CEC1000
trusted library allocation
page read and write
15F0000
heap
page read and write
1553000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page execute and read and write
1FE4EF16000
heap
page read and write
760000
stack
page read and write
62A3F39000
stack
page read and write
7FFAAC620000
trusted library allocation
page read and write
13D61000
trusted library allocation
page read and write
2AF3B3E000
stack
page read and write
23A4E880000
heap
page read and write
4DC0000
trusted library allocation
page read and write
7FFAAC49C000
trusted library allocation
page execute and read and write
283658CB000
heap
page read and write
7FFAAC453000
trusted library allocation
page execute and read and write
2834E353000
trusted library allocation
page read and write
174495D4000
heap
page read and write
23A6883B000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
2834D579000
trusted library allocation
page read and write
2834B36B000
heap
page read and write
7FFAACA30000
trusted library allocation
page read and write
7FFAAC51C000
trusted library allocation
page execute and read and write
38C1000
trusted library allocation
page read and write
1FE4EFE8000
heap
page read and write
2EF5000
heap
page read and write
7FFAAC460000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAACDE7000
trusted library allocation
page read and write
17449590000
trusted library allocation
page read and write
72C2000
heap
page read and write
1FE5214A000
trusted library allocation
page read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
7FFAACA30000
trusted library allocation
page read and write
1CDFD000
stack
page read and write
7FFAAC600000
trusted library allocation
page execute and read and write
1744D1DD000
trusted library allocation
page read and write
2EEB000
heap
page read and write
180344DE000
heap
page read and write
2AF3A3F000
stack
page read and write
7FFAAC740000
trusted library allocation
page read and write
7FFAAC684000
trusted library allocation
page read and write
1801A230000
heap
page read and write
E76673B000
stack
page read and write
174495D0000
heap
page read and write
369D000
trusted library allocation
page read and write
1746348C000
heap
page read and write
131B000
heap
page read and write
1803413C000
heap
page read and write
2ED8000
heap
page read and write
1BB2B000
heap
page read and write
7FFAAC853000
trusted library allocation
page read and write
1BE90000
unkown
page readonly
23A6889F000
heap
page read and write
2834E46D000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
2834B401000
heap
page read and write
1745B736000
trusted library allocation
page read and write
2AF39F9000
stack
page read and write
23A513EB000
trusted library allocation
page read and write
2F9A000
heap
page read and write
1FE69183000
heap
page read and write
23A60873000
trusted library allocation
page read and write
7FFAAC86E000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
62A413C000
stack
page read and write
2AF33E3000
stack
page read and write
7FFAACD40000
trusted library allocation
page read and write
7391000
heap
page read and write
1744C3EF000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
180340DE000
heap
page read and write
2834EACE000
trusted library allocation
page read and write
92FBB3C000
stack
page read and write
2EF5000
heap
page read and write
2F50000
heap
page read and write
7FFAAC7AC000
trusted library allocation
page read and write
1FE4EFF0000
trusted library allocation
page read and write
79A000
stack
page read and write
7FFAAC830000
trusted library allocation
page read and write
518E000
stack
page read and write
1550000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page read and write
147DF000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
2FB9000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
1FE60E02000
trusted library allocation
page read and write
1BEA2000
unkown
page readonly
E7666BE000
stack
page read and write
2834E37E000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
2F20000
heap
page read and write
7FFAACAF0000
trusted library allocation
page read and write
1FE517E1000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
B12000
unkown
page readonly
92FC60E000
stack
page read and write
2FD9000
heap
page read and write
23A60AFA000
trusted library allocation
page read and write
28365740000
heap
page read and write
1FE61080000
trusted library allocation
page read and write
2F9D000
heap
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
17BF000
stack
page read and write
28365759000
heap
page read and write
7FFAAC4EC000
trusted library allocation
page execute and read and write
23A519D5000
trusted library allocation
page read and write
18034136000
heap
page read and write
7391000
heap
page read and write
23A50070000
heap
page read and write
23A52064000
trusted library allocation
page read and write
7FFAACC33000
trusted library allocation
page read and write
7FFAACBF0000
trusted library allocation
page read and write
72C0000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
1FE690FC000
heap
page read and write
7FFAAC720000
trusted library allocation
page execute and read and write
3797000
trusted library allocation
page read and write
1CF3E000
stack
page read and write
7FFAAC516000
trusted library allocation
page read and write
203157E000
stack
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
7FFAACC30000
trusted library allocation
page read and write
528E000
stack
page read and write
7FFAAC61A000
trusted library allocation
page read and write
1FE4F0E0000
heap
page read and write
2834B320000
heap
page read and write
3769000
trusted library allocation
page read and write
35E000
stack
page read and write
7FFAAC690000
trusted library allocation
page read and write
62A3DF9000
stack
page read and write
7FFAAC468000
trusted library allocation
page read and write
7FFAAC860000
trusted library allocation
page read and write
7FFAAC615000
trusted library allocation
page read and write
2FF0000
heap
page read and write
133D5000
trusted library allocation
page read and write
7FFAAC454000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
17449439000
heap
page read and write
CB1000
unkown
page execute read
1745B695000
trusted library allocation
page read and write
2AF498C000
stack
page read and write
7FFAAC463000
trusted library allocation
page execute and read and write
1FE5202E000
trusted library allocation
page read and write
62A4C87000
stack
page read and write
7FFAAC8C6000
trusted library allocation
page read and write
1802BF32000
trusted library allocation
page read and write
CF5000
unkown
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
7FFAAC9DE000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
7FFAAC799000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page read and write
7FFAAC473000
trusted library allocation
page read and write
7FFAAC7B9000
trusted library allocation
page read and write
1B960000
heap
page read and write
7FFAACC20000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page read and write
23A5261D000
trusted library allocation
page read and write
1FE690F0000
heap
page read and write
7DF453080000
trusted library allocation
page execute and read and write
3070000
unkown
page readonly
7FFAAC546000
trusted library allocation
page execute and read and write
203250E000
stack
page read and write
1801BA60000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
1FE5208F000
trusted library allocation
page read and write
23A68AD6000
heap
page read and write
30E0000
unkown
page readonly
7FFAACAA0000
trusted library allocation
page read and write
1FE6108A000
trusted library allocation
page read and write
7FFAAC618000
trusted library allocation
page read and write
7FFAAC611000
trusted library allocation
page read and write
2F93000
heap
page read and write
7FFAAC44B000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
E765CE3000
stack
page read and write
7FFAACA13000
trusted library allocation
page read and write
23A68A00000
heap
page read and write
7FFAACB00000
trusted library allocation
page read and write
23A60831000
trusted library allocation
page read and write
7FFAAC444000
trusted library allocation
page read and write
92FB83E000
stack
page read and write
1C000000
unkown
page readonly
203278E000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
2FBD000
heap
page read and write
2F21000
heap
page read and write
2834B3AA000
heap
page read and write
92FBBBE000
stack
page read and write
312D000
heap
page read and write
567F000
stack
page read and write
7FFAAC470000
trusted library allocation
page read and write
194E1D30000
heap
page read and write
7FFAACC20000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
1801D27A000
trusted library allocation
page read and write
1FE51F62000
trusted library allocation
page read and write
2836583B000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
7FFAAC484000
trusted library allocation
page read and write
30A2000
unkown
page readonly
7FFAAC46D000
trusted library allocation
page execute and read and write
1801CFDB000
trusted library allocation
page read and write
7FFAAC47D000
trusted library allocation
page execute and read and write
7FFAAC8E0000
trusted library allocation
page read and write
13471000
trusted library allocation
page read and write
2834B332000
heap
page read and write
7FFAACA40000
trusted library allocation
page read and write
529C000
stack
page read and write
174636CF000
heap
page read and write
1FE4EF38000
heap
page read and write
2AF37F9000
stack
page read and write
1801A0C7000
heap
page read and write
3571000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
1FE52BAB000
trusted library allocation
page read and write
7FFAAC7C2000
trusted library allocation
page read and write
1FE69288000
heap
page read and write
7FFAAC690000
trusted library allocation
page read and write
1801D092000
trusted library allocation
page read and write
7FFAAC5EA000
trusted library allocation
page read and write
2834DF45000
trusted library allocation
page read and write
B3E000
stack
page read and write
1744D198000
trusted library allocation
page read and write
30F8000
unkown
page readonly
62A403F000
stack
page read and write
17463800000
heap
page read and write
174493D0000
heap
page read and write
23A50A2A000
trusted library allocation
page read and write
FC0000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page execute and read and write
2835D371000
trusted library allocation
page read and write
1FE60D91000
trusted library allocation
page read and write
3092000
unkown
page readonly
7FFAAC8A0000
trusted library allocation
page read and write
7FFAAC463000
trusted library allocation
page read and write
1700000
heap
page execute and read and write
6580000
trusted library allocation
page read and write
1801D15E000
trusted library allocation
page read and write
7FFAAC516000
trusted library allocation
page read and write
7FFAAC45B000
trusted library allocation
page read and write
1744C3C3000
trusted library allocation
page read and write
789000
stack
page read and write
2834D189000
heap
page read and write
7FFAAC648000
trusted library allocation
page read and write
7FFAACBE8000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
2FB0000
heap
page read and write
1802BEF3000
trusted library allocation
page read and write
2748000
heap
page read and write
18033F3A000
heap
page read and write
4E25000
heap
page read and write
2834CE10000
trusted library allocation
page read and write
1FE6926E000
heap
page read and write
582E000
stack
page read and write
1744C5CC000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
707F000
stack
page read and write
7FFAAC7C5000
trusted library allocation
page read and write
3686000
trusted library allocation
page read and write
1745B6B2000
trusted library allocation
page read and write
7FFAACA2D000
trusted library allocation
page read and write
7FFAACAD0000
trusted library allocation
page read and write
2AF387E000
stack
page read and write
174635D0000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
28365720000
heap
page read and write
1744CD0B000
trusted library allocation
page read and write
14789000
trusted library allocation
page read and write
12A0000
heap
page read and write
7FFAAC663000
trusted library allocation
page read and write
521E000
stack
page read and write
7FFAACE30000
trusted library allocation
page read and write
36B7000
trusted library allocation
page read and write
7DF4DACF0000
trusted library allocation
page execute and read and write
143FB000
trusted library allocation
page read and write
1BF22000
unkown
page readonly
7FFAACD80000
trusted library allocation
page read and write
14608000
trusted library allocation
page read and write
1230000
heap
page read and write
23A68DD0000
heap
page read and write
7FFAAC896000
trusted library allocation
page read and write
1FE50FB8000
trusted library allocation
page read and write
7FFAAC526000
trusted library allocation
page execute and read and write
2834B5E0000
heap
page read and write
1801D1BF000
trusted library allocation
page read and write
14283000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
1FE68FA7000
heap
page read and write
23A500C0000
trusted library allocation
page read and write
7FFAAC870000
trusted library allocation
page read and write
23A4E6C2000
heap
page read and write
23A4E6B0000
heap
page read and write
7FFB1DE60000
unkown
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
1801A080000
heap
page read and write
7FFAAC443000
trusted library allocation
page execute and read and write
2E67000
heap
page read and write
174492F0000
heap
page read and write
7FFAAC85C000
trusted library allocation
page read and write
596B000
stack
page read and write
2834CDC0000
trusted library allocation
page read and write
C40000
heap
page read and write
2FBE000
heap
page read and write
20315FB000
stack
page read and write
2E89000
heap
page read and write
30B2000
unkown
page readonly
174633C0000
heap
page read and write
7FFAAC644000
trusted library allocation
page read and write
283658A2000
heap
page read and write
7FFAAC430000
trusted library allocation
page read and write
7DF4E21C0000
trusted library allocation
page execute and read and write
15A0000
heap
page read and write
7FFAAC5E1000
trusted library allocation
page read and write
F5A000
stack
page read and write
23A68A94000
heap
page read and write
1744CC4A000
trusted library allocation
page read and write
1BE70000
unkown
page readonly
7FFAAC83C000
trusted library allocation
page read and write
2834EBDA000
trusted library allocation
page read and write
2835D3C2000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAAC88D000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
1801C38C000
trusted library allocation
page read and write
FE0000
heap
page read and write
17463769000
heap
page read and write
7FFAACC80000
trusted library allocation
page read and write
1365000
heap
page read and write
92FC78C000
stack
page read and write
1744C65F000
trusted library allocation
page read and write
7FFAAC7B4000
trusted library allocation
page read and write
1744D1E2000
trusted library allocation
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
1B260000
trusted library allocation
page read and write
1434F000
trusted library allocation
page read and write
1745B6B0000
trusted library allocation
page read and write
1801CC78000
trusted library allocation
page read and write
2834B328000
heap
page read and write
92FB8B7000
stack
page read and write
7FFAAC700000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
7FFAACDB0000
trusted library allocation
page read and write
62A3D7E000
stack
page read and write
16BE000
stack
page read and write
7FFAAC460000
trusted library allocation
page read and write
92FBABF000
stack
page read and write
785000
stack
page read and write
2834F16C000
trusted library allocation
page read and write
7FFAAC47D000
trusted library allocation
page execute and read and write
7FFAAC648000
trusted library allocation
page read and write
1802BEE1000
trusted library allocation
page read and write
1744B88E000
trusted library allocation
page read and write
13244000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
23A51B3B000
trusted library allocation
page read and write
2836584F000
heap
page read and write
509D000
stack
page read and write
1FE50D91000
trusted library allocation
page read and write
72F1000
heap
page read and write
174494F0000
heap
page read and write
17463484000
heap
page read and write
7FFAAC89D000
trusted library allocation
page read and write
125B000
heap
page read and write
12D0000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
1801CEED000
trusted library allocation
page read and write
30F0000
unkown
page readonly
174637F0000
trusted library allocation
page read and write
1CA4E000
stack
page read and write
2834D2D7000
heap
page execute and read and write
23A5182F000
trusted library allocation
page read and write
2FA8000
heap
page read and write
13875000
trusted library allocation
page read and write
2E90000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
D13000
unkown
page readonly
1802BEF1000
trusted library allocation
page read and write
FCB000
stack
page read and write
1BB30000
heap
page execute and read and write
1745B842000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
2AF3D3C000
stack
page read and write
7FFAAC470000
trusted library allocation
page read and write
14483000
trusted library allocation
page read and write
123C000
heap
page read and write
23A515B4000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page execute and read and write
283657C1000
heap
page read and write
23A4E8C0000
heap
page read and write
1746361C000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
2E26000
heap
page read and write
7290000
heap
page read and write
1440E000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
7FFAAC650000
trusted library allocation
page read and write
2834DF57000
trusted library allocation
page read and write
7FFAAC47B000
trusted library allocation
page execute and read and write
2834B36D000
heap
page read and write
7FFAACA90000
trusted library allocation
page read and write
7FFAACA40000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
17463473000
heap
page read and write
174636E7000
heap
page read and write
657E000
heap
page read and write
2AF4907000
stack
page read and write
2F89000
heap
page read and write
2F99000
heap
page read and write
62A3BFA000
stack
page read and write
1801A0C4000
heap
page read and write
6F7E000
stack
page read and write
7FFAACA50000
trusted library allocation
page read and write
7FFAACC53000
trusted library allocation
page read and write
73C0000
heap
page read and write
7FFAAC770000
trusted library allocation
page read and write
1BC00000
heap
page read and write
7FFAACD70000
trusted library allocation
page read and write
5A6C000
stack
page read and write
7384000
heap
page read and write
7FFAACB10000
trusted library allocation
page read and write
7FFAAC9F0000
trusted library allocation
page read and write
7FFB1DE56000
unkown
page readonly
1745B617000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
7FFAAC4E6000
trusted library allocation
page read and write
7FFAAC5F1000
trusted library allocation
page read and write
1367B000
trusted library allocation
page read and write
7FFAAC628000
trusted library allocation
page read and write
2DB0000
heap
page read and write
318E000
stack
page read and write
3042000
unkown
page readonly
7FFAAC620000
trusted library allocation
page execute and read and write
7FFAAC740000
trusted library allocation
page read and write
E7662F9000
stack
page read and write
74200000
unkown
page readonly
7FFAAC4FC000
trusted library allocation
page execute and read and write
7FFAAC660000
trusted library allocation
page execute and read and write
7FFAAC46D000
trusted library allocation
page execute and read and write
7FFAAC710000
trusted library allocation
page read and write
1FE68E60000
trusted library allocation
page read and write
30A0000
unkown
page readonly
1253000
heap
page read and write
2740000
heap
page read and write
7FFAACD1D000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page read and write
7FFAACD3A000
trusted library allocation
page read and write
23A4E8C4000
heap
page read and write
3062000
unkown
page readonly
35BD000
trusted library allocation
page read and write
3000000
unkown
page readonly
23A68AD2000
heap
page read and write
4E29000
heap
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
1FE6109A000
trusted library allocation
page read and write
1824000
heap
page read and write
7FFAAC510000
trusted library allocation
page read and write
62A3EB7000
stack
page read and write
3099000
trusted library allocation
page read and write
7FFAAC440000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
2834B37F000
heap
page read and write
1801CF79000
trusted library allocation
page read and write
2FF0000
heap
page read and write
E76738E000
stack
page read and write
7384000
heap
page read and write
7FFAAC622000
trusted library allocation
page read and write
7FFAAC46D000
trusted library allocation
page execute and read and write
1FE525F2000
trusted library allocation
page read and write
1FE4EF50000
heap
page read and write
1744AE80000
heap
page read and write
62A3A7F000
unkown
page read and write
174633D6000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
2F22000
heap
page read and write
7FFAACC7A000
trusted library allocation
page read and write
283653F0000
heap
page read and write
1220000
heap
page read and write
2836583F000
heap
page read and write
93C61BF000
stack
page read and write
23A51B36000
trusted library allocation
page read and write
23A50180000
heap
page read and write
7FFB1DE62000
unkown
page readonly
23A60AEC000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
7FFB1DE40000
unkown
page readonly
7FFAAC480000
trusted library allocation
page read and write
2FD9000
heap
page read and write
1BEB0000
unkown
page readonly
23A60801000
trusted library allocation
page read and write
23A68900000
heap
page read and write
17449437000
heap
page read and write
1744942F000
heap
page read and write
1744B5E9000
trusted library allocation
page read and write
7390000
heap
page read and write
2FA4000
heap
page read and write
1745B3E1000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
174493F8000
heap
page read and write
1FE4EF3A000
heap
page read and write
1BF50000
unkown
page readonly
E7660F9000
stack
page read and write
1FE68F36000
heap
page read and write
7FFAAC790000
trusted library allocation
page read and write
2F92000
heap
page read and write
1744BE13000
trusted library allocation
page read and write
1C0000
heap
page read and write
142FB000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
23A4E735000
heap
page read and write
30F2000
unkown
page readonly
7FFAAC463000
trusted library allocation
page execute and read and write
1801BA80000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
7FFAACC30000
trusted library allocation
page read and write
3701000
trusted library allocation
page read and write
1801BA40000
trusted library section
page read and write
3002000
unkown
page readonly
2834EBB3000
trusted library allocation
page read and write
143AF000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
2834D351000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
2834B5E4000
heap
page read and write
1D03B000
stack
page read and write
18033EC0000
trusted library allocation
page read and write
7FFAACA70000
trusted library allocation
page read and write
2836574E000
heap
page read and write
1270000
heap
page read and write
2FD0000
heap
page read and write
2F19000
heap
page read and write
141AF000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
2F58000
heap
page read and write
1745B3F3000
trusted library allocation
page read and write
1FE51D2A000
trusted library allocation
page read and write
E7663B7000
stack
page read and write
62A37E3000
stack
page read and write
7FFAAC464000
trusted library allocation
page read and write
23A51BBE000
trusted library allocation
page read and write
23A52622000
trusted library allocation
page read and write
17449435000
heap
page read and write
2AF3E3B000
stack
page read and write
1BF20000
unkown
page readonly
12F0000
heap
page read and write
7FFAAC860000
trusted library allocation
page read and write
E76653E000
stack
page read and write
7FFAAC7C0000
trusted library allocation
page execute and read and write
1801DC96000
trusted library allocation
page read and write
72F1000
heap
page read and write
23A50110000
trusted library allocation
page read and write
7FFAACA90000
trusted library allocation
page read and write
2AF3C3E000
stack
page read and write
7291000
heap
page read and write
283654EF000
heap
page read and write
1FE51E49000
trusted library allocation
page read and write
1744B3B0000
heap
page execute and read and write
7FFAAC6D0000
trusted library allocation
page read and write
1803407B000
heap
page read and write
180343B0000
heap
page read and write
1744CB3E000
trusted library allocation
page read and write
7FFB1DE60000
unkown
page read and write
1744B380000
heap
page execute and read and write
17449414000
heap
page read and write
1446D000
trusted library allocation
page read and write
C8D000
stack
page read and write
7FFAAC47B000
trusted library allocation
page read and write
7FFAAC480000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
E76633F000
stack
page read and write
1746365D000
heap
page read and write
1BB62000
heap
page read and write
23A4E70C000
heap
page read and write
7FFAACC10000
trusted library allocation
page read and write
1FE4EEF8000
heap
page read and write
2834CE00000
heap
page execute and read and write
7DF415060000
trusted library allocation
page execute and read and write
1CEFD000
stack
page read and write
7FFAACA50000
trusted library allocation
page read and write
23A4E77C000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
2F80000
heap
page read and write
7FFAAC8B6000
trusted library allocation
page read and write
142F0000
trusted library allocation
page read and write
D14000
unkown
page readonly
7DF4E21B0000
trusted library allocation
page execute and read and write
B45000
unkown
page readonly
7FFAAC463000
trusted library allocation
page execute and read and write
4DCA000
heap
page read and write
2EEB000
heap
page read and write
1801A404000
heap
page read and write
7DF4DAD00000
trusted library allocation
page execute and read and write
7FFAACC80000
trusted library allocation
page execute and read and write
13206000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
1FE4EF36000
heap
page read and write
CB0000
unkown
page readonly
7FFAAC710000
trusted library allocation
page read and write
23A513F9000
trusted library allocation
page read and write
696000
stack
page read and write
194E1890000
heap
page read and write
2FA1000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
7FFAAC546000
trusted library allocation
page execute and read and write
23A4E6EC000
heap
page read and write
7FFAAC790000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
52A0000
heap
page read and write
2F20000
heap
page read and write
1A0000
heap
page read and write
23A51F7E000
trusted library allocation
page read and write
194E1A60000
heap
page read and write
525E000
stack
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
1802C346000
trusted library allocation
page read and write
23A5191F000
trusted library allocation
page read and write
1801A400000
heap
page read and write
1240000
heap
page read and write
3112000
unkown
page readonly
7FFAAC464000
trusted library allocation
page read and write
1B5BB000
heap
page read and write
23A60AF0000
trusted library allocation
page read and write
7FFAAC784000
trusted library allocation
page read and write
7FFAAC47B000
trusted library allocation
page read and write
2AF3CBE000
stack
page read and write
E76730C000
stack
page read and write
1801A088000
heap
page read and write
7FFAAC611000
trusted library allocation
page read and write
1802C1B2000
trusted library allocation
page read and write
28365357000
heap
page read and write
1BED0000
unkown
page readonly
1BEA0000
unkown
page readonly
7FFAAC580000
trusted library allocation
page execute and read and write
7FFAAC680000
trusted library allocation
page read and write
92FC68E000
stack
page read and write
131D7000
trusted library allocation
page read and write
203117F000
unkown
page read and write
30C0000
unkown
page readonly
7FFAAC5F0000
trusted library allocation
page read and write
2834B520000
heap
page read and write
7FFAAC7CC000
trusted library allocation
page read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
174495B0000
trusted library allocation
page read and write
23A5179E000
trusted library allocation
page read and write
7FFAAC6A8000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
7FFAAC9F0000
trusted library allocation
page read and write
28365730000
heap
page read and write
1820000
heap
page read and write
62A3B7F000
stack
page read and write
1FE68EE0000
heap
page execute and read and write
1744940E000
heap
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
7FFAAC5FC000
trusted library allocation
page read and write
1802C1AB000
trusted library allocation
page read and write
7FFAAC7A2000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
203258E000
stack
page read and write
13231000
trusted library allocation
page read and write
2834F171000
trusted library allocation
page read and write
7FFAACAB0000
trusted library allocation
page read and write
131F0000
trusted library allocation
page read and write
23A68B3E000
heap
page read and write
7FFAAC674000
trusted library allocation
page read and write
2031ABE000
stack
page read and write
7FFAAC840000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
17463490000
heap
page read and write
1745B6CA000
trusted library allocation
page read and write
CEE000
unkown
page write copy
1FE51DBD000
trusted library allocation
page read and write
17449476000
heap
page read and write
23A60B0A000
trusted library allocation
page read and write
B10000
unkown
page readonly
7FFAAC8D0000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page execute and read and write
194E1970000
heap
page read and write
28365505000
heap
page read and write
1450A000
trusted library allocation
page read and write
ED000
stack
page read and write
1FE51EAB000
trusted library allocation
page read and write
7FFAAC7B4000
trusted library allocation
page read and write
2F2A000
heap
page read and write
180343C0000
heap
page read and write
7FFAACA20000
trusted library allocation
page read and write
7FF4C4DD0000
trusted library allocation
page execute and read and write
E76718E000
stack
page read and write
7FFAAC520000
trusted library allocation
page execute and read and write
7FFAAC580000
trusted library allocation
page execute and read and write
7FFAAC86E000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
1744BFBF000
trusted library allocation
page read and write
92FB77D000
stack
page read and write
7FFAAC660000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page read and write
2E9A000
heap
page read and write
23A5208A000
trusted library allocation
page read and write
7FFAAC762000
trusted library allocation
page read and write
30B0000
unkown
page readonly
7FFAAC8A0000
trusted library allocation
page read and write
23A51B03000
trusted library allocation
page read and write
553E000
stack
page read and write
20319BE000
stack
page read and write
7FFAAC61A000
trusted library allocation
page read and write
1801BE20000
heap
page execute and read and write
7FFAAC648000
trusted library allocation
page read and write
1BE92000
unkown
page readonly
1744AD80000
trusted library allocation
page read and write
7FFAAC602000
trusted library allocation
page read and write
7FFAACA00000
trusted library allocation
page read and write
203193E000
stack
page read and write
4C10000
heap
page read and write
23A688E0000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
1FE6913B000
heap
page read and write
23A4E6B8000
heap
page read and write
7FFAAC79C000
trusted library allocation
page read and write
1FE4EE50000
heap
page read and write
4E2E000
heap
page read and write
1FE50E16000
trusted library allocation
page read and write
7FFAAC8BD000
trusted library allocation
page read and write
72C1000
heap
page read and write
7FFAAC890000
trusted library allocation
page execute and read and write
2F8D000
heap
page read and write
2F23000
heap
page read and write
3030000
heap
page execute and read and write
1FE690F8000
heap
page read and write
180342E0000
heap
page execute and read and write
7FFAAC44D000
trusted library allocation
page execute and read and write
7FFAAC643000
trusted library allocation
page read and write
E76728C000
stack
page read and write
7FFAAC730000
trusted library allocation
page read and write
7422000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
12FC000
heap
page read and write
7422000
heap
page read and write
1FE691A8000
heap
page read and write
92FB939000
stack
page read and write
7FFAAC650000
trusted library allocation
page read and write
1FE52618000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
1FE4EF30000
heap
page read and write
7FFAAC773000
trusted library allocation
page read and write
7FFAAC9E0000
trusted library allocation
page read and write
1BFDE000
stack
page read and write
3040000
unkown
page readonly
557E000
stack
page read and write
2FB4000
heap
page read and write
E766438000
stack
page read and write
7FFAACB00000
trusted library allocation
page read and write
203167D000
stack
page read and write
23A50727000
heap
page execute and read and write
1FE4F030000
trusted library allocation
page read and write
7FFAAC6C2000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
E76720E000
stack
page read and write
23A4E738000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
1BD60000
heap
page execute and read and write
28365821000
heap
page read and write
283658E2000
heap
page read and write
17463705000
heap
page read and write
7FFAACDD0000
trusted library allocation
page read and write
1801DCDB000
trusted library allocation
page read and write
7FFAACB40000
trusted library allocation
page read and write
180343C3000
heap
page read and write
7FFAAC610000
trusted library allocation
page execute and read and write
7FFAAC73F000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
7FFAAC433000
trusted library allocation
page execute and read and write
2834F127000
trusted library allocation
page read and write
1FE4EF7C000
heap
page read and write
1BB00000
heap
page read and write
18034040000
heap
page read and write
1C07B000
heap
page read and write
1801C911000
trusted library allocation
page read and write
7FFAAC602000
trusted library allocation
page read and write
2834B5D0000
heap
page readonly
14150000
trusted library allocation
page read and write
2FD9000
heap
page read and write
73C1000
heap
page read and write
7FFAAC434000
trusted library allocation
page read and write
92FB67E000
stack
page read and write
1BB16000
heap
page read and write
2E99000
heap
page read and write
1BB2E000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page execute and read and write
93C613C000
stack
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
2F81000
heap
page read and write
7FFAACB60000
trusted library allocation
page read and write
2834B560000
heap
page read and write
7FFAAC71C000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
792000
stack
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
13235000
trusted library allocation
page read and write
3956000
trusted library allocation
page read and write
7FFAAC83A000
trusted library allocation
page read and write
62A3AFF000
stack
page read and write
739D000
heap
page read and write
17463458000
heap
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
13447000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
1FE69108000
heap
page read and write
1744947B000
heap
page read and write
194E1A6A000
heap
page read and write
14667000
trusted library allocation
page read and write
7FFAAC46D000
trusted library allocation
page execute and read and write
190000
heap
page read and write
17463749000
heap
page read and write
3100000
unkown
page readonly
7FFAAC4F6000
trusted library allocation
page read and write
7DF453090000
trusted library allocation
page execute and read and write
7FFAAC8D0000
trusted library allocation
page read and write
7FFAAC570000
trusted library allocation
page execute and read and write
1744943D000
heap
page read and write
7FFAAC644000
trusted library allocation
page read and write
There are 1683 hidden memdumps, click here to show them.