IOC Report
gPEbJi1xiY.exe

loading gif

Files

File Path
Type
Category
Malicious
gPEbJi1xiY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\kasper.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kasper.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1s4oruvu.z0d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3yzocwq.fmu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eexe00xp.tol.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gl2qsjwo.paa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gv2svidy.dzv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhhsipqs.tgr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5lnkf1s.isu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itm1cf0j.5dw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4soey0k.q0g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwsfh325.sns.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lcbrqs5z.mwl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhihxn5t.f0w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5gd5v4e.hhq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_reocv4yq.42c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_whwszewt.uoj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yr0wtw0h.ryb.psm1
ASCII text, with no line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\gPEbJi1xiY.exe
"C:\Users\user\Desktop\gPEbJi1xiY.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\gPEbJi1xiY.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'gPEbJi1xiY.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\kasper.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kasper.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "kasper" /tr "C:\Users\user\AppData\Roaming\kasper.exe"
malicious
C:\Users\user\AppData\Roaming\kasper.exe
C:\Users\user\AppData\Roaming\kasper.exe
malicious
C:\Users\user\AppData\Roaming\kasper.exe
C:\Users\user\AppData\Roaming\kasper.exe
malicious
C:\Users\user\AppData\Roaming\kasper.exe
C:\Users\user\AppData\Roaming\kasper.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.microso
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
http://crl.micros
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
otherwise-puzzle.gl.at.ply.gg
147.185.221.22
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.22
otherwise-puzzle.gl.at.ply.gg
United States
malicious
127.0.0.1
unknown
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3C2000
unkown
page readonly
malicious
9BC000
heap
page read and write
2162B9D3000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
28C902F9000
trusted library allocation
page read and write
1CF1A431000
trusted library allocation
page read and write
1360000
heap
page read and write
28C812AC000
trusted library allocation
page read and write
2162BC1C000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
9CE000
stack
page read and write
28CF6BD7000
heap
page read and write
803000
heap
page read and write
859000
heap
page read and write
21FD2E6D000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1CF0A290000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
21FECE00000
heap
page read and write
21FE4BE2000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
28C81006000
trusted library allocation
page read and write
1CF08975000
heap
page read and write
28C80F97000
trusted library allocation
page read and write
21FD496B000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
21FE4964000
trusted library allocation
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
28C902EF000
trusted library allocation
page read and write
2162B9A7000
trusted library allocation
page read and write
1CF0A411000
trusted library allocation
page read and write
1CF1A71B000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
1B33E000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
28CF8F45000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
554000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1CF0B3B1000
trusted library allocation
page read and write
28C812DC000
trusted library allocation
page read and write
28C902EA000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
CE0000
heap
page read and write
742647E000
stack
page read and write
1CF22BC2000
heap
page read and write
1CF228DC000
heap
page read and write
21FD3015000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1CF0A2A0000
heap
page readonly
1CF228B0000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
9E5000
heap
page read and write
21FD2E77000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
21FD2E30000
heap
page read and write
28C81125000
trusted library allocation
page read and write
1CF22CE7000
heap
page read and write
1CF22B6B000
heap
page read and write
1B49E000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7426AFE000
stack
page read and write
28CF8F79000
heap
page read and write
AC3A5FF000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
9386D89000
stack
page read and write
28C90021000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
96BBC7B000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1CF22C21000
heap
page read and write
2162B4FC000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2162C17D000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
28C81787000
trusted library allocation
page read and write
1AF4E000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
2162B890000
trusted library allocation
page read and write
742774C000
stack
page read and write
5B0000
heap
page read and write
28CF8EA8000
heap
page read and write
96BC13B000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
D30000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
28CF6DD0000
trusted library allocation
page read and write
28C80D09000
trusted library allocation
page read and write
21628E28000
heap
page read and write
1CF0B5ED000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
28C81E26000
trusted library allocation
page read and write
1CF0896E000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
21628E62000
heap
page read and write
21628DA5000
heap
page read and write
264E000
stack
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
1CE46260000
heap
page read and write
28CF8D10000
heap
page read and write
21FECDF8000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
AC3AD7E000
stack
page read and write
7FFD9B912000
trusted library allocation
page read and write
9385DFD000
stack
page read and write
1B2A0000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9B866000
trusted library allocation
page execute and read and write
21628D60000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
7DF485960000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1C22C000
stack
page read and write
C90000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
AC3ABFD000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
21FECD80000
heap
page read and write
12651000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
2162A780000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
28C80085000
trusted library allocation
page read and write
21FD2E75000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
21FECFF0000
heap
page execute and read and write
7FFD9B856000
trusted library allocation
page execute and read and write
28CF6BD3000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
9B9000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1CF0C237000
trusted library allocation
page read and write
21FD4B18000
trusted library allocation
page read and write
9FD000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
21FE4BEC000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1CF0B4A6000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1B301000
heap
page read and write
2771000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
BEE000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
5D0000
heap
page read and write
129E000
stack
page read and write
7FFD9B750000
trusted library allocation
page read and write
21628E6A000
heap
page read and write
12778000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
742697F000
stack
page read and write
2162B362000
trusted library allocation
page read and write
28CF8F14000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
28CF9160000
heap
page read and write
21FED17D000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
96BB763000
stack
page read and write
AC3A9FE000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
21FD5CB3000
trusted library allocation
page read and write
1CF1A484000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
EC0000
trusted library allocation
page read and write
21FE48F1000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
28CF8CA2000
heap
page read and write
21FED167000
heap
page read and write
28CF8E26000
heap
page read and write
21FD5B99000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
9FE000
heap
page read and write
1CF22B7F000
heap
page read and write
9386D0D000
stack
page read and write
21628DF0000
trusted library allocation
page read and write
2164315E000
heap
page read and write
2162B887000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
BCF000
stack
page read and write
2162B88C000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
2162C6F1000
trusted library allocation
page read and write
1B1DE000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
1CF22AE0000
heap
page execute and read and write
2162B883000
trusted library allocation
page read and write
A55000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
28CF8E6A000
heap
page read and write
21628DE0000
trusted library section
page read and write
21FED012000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1CF0B416000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
21FD2FBA000
heap
page read and write
96BBA7E000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1CF1A411000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
1CF0B7D7000
trusted library allocation
page read and write
1CF0B6BA000
trusted library allocation
page read and write
DC5000
heap
page read and write
1CF22C02000
heap
page read and write
1190000
heap
page read and write
21643220000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
AC3AFFC000
stack
page read and write
1CF08979000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
21628E7E000
heap
page read and write
9386E8E000
stack
page read and write
1CF1A420000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page execute and read and write
21FD2FB5000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2162C1A3000
trusted library allocation
page read and write
28C81E2B000
trusted library allocation
page read and write
1CF22A0D000
heap
page read and write
277C000
trusted library allocation
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
1CF22B73000
heap
page read and write
8A0000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9BADC000
trusted library allocation
page read and write
1CF22C49000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1B9AE000
stack
page read and write
2581000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
7DF497370000
trusted library allocation
page execute and read and write
D10000
heap
page execute and read and write
AC3AA79000
stack
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
1CF0B5B9000
trusted library allocation
page read and write
2162BCD9000
trusted library allocation
page read and write
21FD5BCA000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7EF000
heap
page read and write
66C5279000
stack
page read and write
21FD2F50000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7CC000
heap
page read and write
2390000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
21FD2FF0000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
21FE4B35000
trusted library allocation
page read and write
28C90309000
trusted library allocation
page read and write
2162A8FE000
heap
page read and write
2164318A000
heap
page read and write
1B5DE000
stack
page read and write
1CF1A701000
trusted library allocation
page read and write
2162A785000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
28C81347000
trusted library allocation
page read and write
28CF6E10000
heap
page read and write
7FFD9BB63000
trusted library allocation
page read and write
7DF485950000
trusted library allocation
page execute and read and write
74269FE000
stack
page read and write
7FFD9B954000
trusted library allocation
page read and write
216431C7000
heap
page read and write
1CF22966000
heap
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
96BC0BE000
stack
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
1CF0BB99000
trusted library allocation
page read and write
21FD5A14000
trusted library allocation
page read and write
3C0000
unkown
page readonly
9385F39000
stack
page read and write
96BBB79000
stack
page read and write
74260A3000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
21FD47E0000
heap
page execute and read and write
7FFD9BB60000
trusted library allocation
page read and write
1CF0C1F2000
trusted library allocation
page read and write
21FED198000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
21FE4BE4000
trusted library allocation
page read and write
2163AC02000
trusted library allocation
page read and write
21FD6240000
trusted library allocation
page read and write
C30000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
9FC000
heap
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
28C81954000
trusted library allocation
page read and write
21FD2D40000
heap
page read and write
2C11000
trusted library allocation
page read and write
21628E66000
heap
page read and write
21628DD0000
trusted library section
page read and write
28C811AB000
trusted library allocation
page read and write
7DF47AE90000
trusted library allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
9385EBE000
stack
page read and write
1CF0A2C0000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
21FECE04000
heap
page read and write
1B323000
heap
page read and write
8A7000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
9E6000
heap
page read and write
9385AFD000
stack
page read and write
AC3BC4E000
stack
page read and write
1CF08A30000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2162B87B000
trusted library allocation
page read and write
21FE4900000
trusted library allocation
page read and write
AC3ACF7000
stack
page read and write
1CE46230000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
25F6000
trusted library allocation
page read and write
28CF8F63000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
21FD6712000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1BD70000
heap
page read and write
21FED010000
heap
page read and write
AC3AEFF000
stack
page read and write
1CF22860000
heap
page read and write
21FD48E0000
heap
page read and write
9385A73000
stack
page read and write
21FD59B1000
trusted library allocation
page read and write
21642F00000
heap
page execute and read and write
7DF4BB6B0000
trusted library allocation
page execute and read and write
990000
heap
page read and write
21FD47F0000
trusted library allocation
page read and write
21FD4820000
trusted library allocation
page read and write
21642F57000
heap
page execute and read and write
28CF6B90000
heap
page read and write
28CF6D40000
trusted library allocation
page read and write
28C810C3000
trusted library allocation
page read and write
21FD5985000
trusted library allocation
page read and write
9C4000
heap
page read and write
21FED240000
trusted library allocation
page read and write
28CF8867000
heap
page execute and read and write
28C81063000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
A07000
heap
page read and write
2162C206000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
21FD3010000
heap
page read and write
2164314B000
heap
page read and write
AEE000
stack
page read and write
96BB7ED000
stack
page read and write
A5D000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
2163A911000
trusted library allocation
page read and write
7B5000
heap
page read and write
1A5B0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1B69E000
stack
page read and write
7426879000
stack
page read and write
28CF6D90000
trusted library allocation
page read and write
21FED320000
heap
page read and write
21FD66CD000
trusted library allocation
page read and write
21FD2F80000
heap
page read and write
7FFD9BAB2000
trusted library allocation
page read and write
A40000
heap
page read and write
1CF0C217000
trusted library allocation
page read and write
96BBF3A000
stack
page read and write
21FED13D000
heap
page read and write
1CF1A6FD000
trusted library allocation
page read and write
C10000
heap
page read and write
74264FE000
stack
page read and write
96BBD79000
stack
page read and write
2162A6D0000
trusted library allocation
page read and write
28CF8C4F000
heap
page read and write
28C90031000
trusted library allocation
page read and write
7FFD9B94A000
trusted library allocation
page read and write
28C902F1000
trusted library allocation
page read and write
1CF0B71B000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
FC2000
heap
page read and write
7FF4E63E0000
trusted library allocation
page execute and read and write
96BC03F000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
1BFAA000
stack
page read and write
21FD54F8000
trusted library allocation
page read and write
9D0000
heap
page read and write
1CF0A8DD000
trusted library allocation
page read and write
1CF2294F000
heap
page read and write
21628EAA000
heap
page read and write
9E0000
heap
page read and write
21628D40000
heap
page read and write
1B2F6000
heap
page read and write
1B8AE000
stack
page read and write
21642F50000
heap
page execute and read and write
7FFD9B932000
trusted library allocation
page read and write
1CF08942000
heap
page read and write
2162AB39000
trusted library allocation
page read and write
28C81160000
trusted library allocation
page read and write
21643201000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
2162A6C0000
heap
page readonly
1CF22B77000
heap
page read and write
21FD6119000
trusted library allocation
page read and write
9D5000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1CF1A441000
trusted library allocation
page read and write
1180000
heap
page execute and read and write
28C81DE1000
trusted library allocation
page read and write
7426677000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
28C8186C000
trusted library allocation
page read and write
5A0000
heap
page read and write
AC3ADF8000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
AC3A873000
stack
page read and write
21642F60000
trusted library allocation
page read and write
28CF87F0000
heap
page execute and read and write
A14000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1CF089B9000
heap
page read and write
1B340000
heap
page read and write
21628E6C000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
96BBEB8000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1B7AE000
stack
page read and write
21FD3000000
heap
page readonly
1CF089B7000
heap
page read and write
C70000
heap
page execute and read and write
21FD5ACC000
trusted library allocation
page read and write
28CF6D50000
heap
page readonly
28C80A55000
trusted library allocation
page read and write
28CF6BA2000
heap
page read and write
DB0000
heap
page execute and read and write
CF4000
stack
page read and write
28CF6C17000
heap
page read and write
2C1C000
trusted library allocation
page read and write
21FD2FD0000
trusted library allocation
page read and write
2162A900000
heap
page read and write
21FD47C0000
heap
page execute and read and write
28CF6D20000
trusted library allocation
page read and write
12C13000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7426A7C000
stack
page read and write
9F3000
heap
page read and write
21FD6717000
trusted library allocation
page read and write
276F000
stack
page read and write
28C90001000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1B30E000
heap
page read and write
21628DA0000
heap
page read and write
2164291B000
heap
page read and write
DA5000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
28CF6C90000
heap
page read and write
21643164000
heap
page read and write
C35000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
93861BE000
stack
page read and write
28CF6BD1000
heap
page read and write
21FD2EB6000
heap
page read and write
1CF22CB5000
heap
page read and write
AC3AF7E000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
9385CFE000
stack
page read and write
21FD54EE000
trusted library allocation
page read and write
1CF0A48F000
trusted library allocation
page read and write
21643239000
heap
page read and write
590000
heap
page read and write
1CF22A17000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
B8F000
stack
page read and write
1CF0B017000
trusted library allocation
page read and write
DA0000
heap
page read and write
7B0000
heap
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1CF1A70B000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
21FECE08000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
28CF8C91000
heap
page read and write
28CF8C6F000
heap
page read and write
1B23E000
stack
page read and write
1ABDD000
stack
page read and write
28CF8720000
heap
page read and write
AC3A8FE000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
265C000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
21628E60000
heap
page read and write
21FD5891000
trusted library allocation
page read and write
7FFD9BAA4000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
21FECD72000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
F8F000
heap
page read and write
257E000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1CF0A400000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7DF497380000
trusted library allocation
page execute and read and write
7FFD9BA83000
trusted library allocation
page read and write
96BCD8C000
stack
page read and write
23D3000
trusted library allocation
page read and write
5A0000
heap
page read and write
1CF0B442000
trusted library allocation
page read and write
1B43F000
stack
page read and write
1A909000
heap
page read and write
28C80C31000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
96BCD0C000
stack
page read and write
2162A8A5000
heap
page read and write
742774E000
stack
page read and write
28C90071000
trusted library allocation
page read and write
7426B7B000
stack
page read and write
28CF8C10000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1CF22A00000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2C0E000
stack
page read and write
28CF6AA0000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
1CF08977000
heap
page read and write
900000
trusted library allocation
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
9D2000
heap
page read and write
1130000
heap
page read and write
96BCC87000
stack
page read and write
1CF22C92000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2162BBBB000
trusted library allocation
page read and write
21FD2FB0000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
9385BFE000
stack
page read and write
1CE46309000
heap
page read and write
21FD58F6000
trusted library allocation
page read and write
216430C0000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2162B946000
trusted library allocation
page read and write
66C52FE000
unkown
page read and write
21628E20000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
28C813C9000
trusted library allocation
page read and write
AC3AB77000
stack
page read and write
D20000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1CF1A709000
trusted library allocation
page read and write
1CE46240000
heap
page read and write
28CF8C26000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
F3B000
heap
page read and write
28CF6E40000
heap
page read and write
1B90A000
stack
page read and write
7FFD9B958000
trusted library allocation
page read and write
AC3A97E000
stack
page read and write
2162C716000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7EA000
heap
page read and write
7FFD9B995000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
28C81032000
trusted library allocation
page read and write
21FD47C6000
heap
page execute and read and write
21FD2FA0000
trusted library section
page read and write
21643229000
heap
page read and write
74261AE000
stack
page read and write
1CF08930000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
21FECE35000
heap
page read and write
1CF22C8C000
heap
page read and write
1CF08938000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1CE46300000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
66C537F000
stack
page read and write
21FECDFC000
heap
page read and write
FC5000
heap
page read and write
7426579000
stack
page read and write
21FED179000
heap
page read and write
74265FE000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
21FED072000
heap
page read and write
1CF08C10000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9BABC000
trusted library allocation
page read and write
96BCC0E000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
2922000
trusted library allocation
page read and write
1CF0A2B5000
heap
page read and write
AC3BB49000
stack
page read and write
1CF0B74F000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page read and write
21FD5341000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
1CF0B56F000
trusted library allocation
page read and write
990000
heap
page read and write
266F000
stack
page read and write
2163A984000
trusted library allocation
page read and write
1CF0A2B0000
heap
page read and write
28CF8D30000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
AC3AAFE000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
216430D4000
heap
page read and write
21FD2FC0000
trusted library section
page read and write
1AFF0000
heap
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
21FD6073000
trusted library allocation
page read and write
21FD66F2000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
28CF8860000
heap
page execute and read and write
28C80D72000
trusted library allocation
page read and write
28CF8E18000
heap
page read and write
7FFD9BAA9000
trusted library allocation
page read and write
1B6A0000
heap
page execute and read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1CE46625000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
2162C098000
trusted library allocation
page read and write
21FD617F000
trusted library allocation
page read and write
A51000
heap
page read and write
9385C79000
stack
page read and write
DC0000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1CF0B18D000
trusted library allocation
page read and write
12C18000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
96BBDBE000
stack
page read and write
28CF6E45000
heap
page read and write
21FE4911000
trusted library allocation
page read and write
28CF6E15000
heap
page read and write
1CF22CD1000
heap
page read and write
21FECD40000
heap
page read and write
1B0FE000
stack
page read and write
1CF22960000
heap
page execute and read and write
28CF6B98000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
21FD5922000
trusted library allocation
page read and write
938603C000
stack
page read and write
2162B87F000
trusted library allocation
page read and write
1CF0BC7E000
trusted library allocation
page read and write
F3D000
heap
page read and write
1CF22B7B000
heap
page read and write
1B19D000
stack
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
28CF6BDB000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2453000
heap
page read and write
12773000
trusted library allocation
page read and write
1CF22B83000
heap
page read and write
F30000
heap
page read and write
2162A7C0000
trusted library allocation
page read and write
1CF0897B000
heap
page read and write
F40000
heap
page read and write
800000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
F07000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
E10000
heap
page read and write
21FE4BFC000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
21FED180000
heap
page read and write
21628EA5000
heap
page read and write
1CF22B20000
heap
page read and write
28C811DE000
trusted library allocation
page read and write
2162A790000
trusted library allocation
page read and write
21FD4DBD000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
12C11000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
9385FB9000
stack
page read and write
99C000
heap
page read and write
7FFD9B90A000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
920000
trusted library allocation
page read and write
FC0000
heap
page read and write
74276CD000
stack
page read and write
2C1F000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7427649000
stack
page read and write
21FE4BEA000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
853000
heap
page read and write
28C81893000
trusted library allocation
page read and write
28C81342000
trusted library allocation
page read and write
2163ABFD000
trusted library allocation
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
74261EF000
stack
page read and write
1CF0B11D000
trusted library allocation
page read and write
28CF6CB0000
heap
page read and write
9E2000
heap
page read and write
1CE46620000
heap
page read and write
7FFD9BAB8000
trusted library allocation
page read and write
2163AC1C000
trusted library allocation
page read and write
BF0000
heap
page execute and read and write
1CF08C15000
heap
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B7B0000
trusted library allocation
page read and write
28CF8F25000
heap
page read and write
1CF22D40000
trusted library allocation
page read and write
96BBE36000
stack
page read and write
21FD2EB4000
heap
page read and write
AC3BA4C000
stack
page read and write
5E0000
heap
page read and write
21628DB0000
heap
page read and write
96BCB8C000
stack
page read and write
714000
stack
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
74268F9000
stack
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
28CF85F0000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
E50000
heap
page read and write
2163A931000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2450000
heap
page read and write
1CE4630E000
heap
page read and write
1BC70000
heap
page read and write
AC3B9CF000
stack
page read and write
28CF6BCC000
heap
page read and write
2162C736000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
770000
heap
page read and write
BD0000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1CF08A50000
heap
page read and write
C43000
trusted library allocation
page read and write
12658000
trusted library allocation
page read and write
1CF0A300000
heap
page execute and read and write
9D8000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
2162A710000
heap
page execute and read and write
1CF0BD60000
trusted library allocation
page read and write
1CF0B00F000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
74267F7000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1CF0BCA5000
trusted library allocation
page read and write
2162B697000
trusted library allocation
page read and write
96BBFBE000
stack
page read and write
F28000
heap
page read and write
1B13E000
stack
page read and write
28C804CD000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
96BBAFE000
stack
page read and write
21FECF00000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
74266FD000
stack
page read and write
9386E0C000
stack
page read and write
1CF228B8000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
9386C0E000
stack
page read and write
AC3AE7E000
stack
page read and write
28CF6CE0000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
7FFD9BAC4000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1CF0B382000
trusted library allocation
page read and write
1BC5C000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7426779000
stack
page read and write
1CF22B6F000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
96BBBFE000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
28CF8F54000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B752000
trusted library allocation
page read and write
28C8130F000
trusted library allocation
page read and write
2162B877000
trusted library allocation
page read and write
A59000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
21FD2E8D000
heap
page read and write
21FD2E6F000
heap
page read and write
3F0000
unkown
page readonly
9D0000
heap
page read and write
21FD2F21000
heap
page read and write
21FD2E38000
heap
page read and write
1365000
heap
page read and write
1CF22CBD000
heap
page read and write
5C0000
heap
page read and write
21FD5CB7000
trusted library allocation
page read and write
96BCB0E000
stack
page read and write
2162A845000
heap
page read and write
12653000
trusted library allocation
page read and write
1CF0AE62000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
9385B7E000
stack
page read and write
2163A941000
trusted library allocation
page read and write
1CF22CCC000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
1CF0B055000
trusted library allocation
page read and write
7FFD9BBA6000
trusted library allocation
page read and write
2162C265000
trusted library allocation
page read and write
1B2D0000
heap
page read and write
1ACFE000
stack
page read and write
F00000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
1CF0BD66000
trusted library allocation
page read and write
1CF0898F000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
790000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9BA10000
trusted library allocation
page read and write
E30000
heap
page read and write
21FD6158000
trusted library allocation
page read and write
1B79E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1CF0A340000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1CF22BA9000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
21FD2F30000
heap
page read and write
2470000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B7B4000
trusted library allocation
page read and write
12581000
trusted library allocation
page read and write
7FFD9BADA000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
21FD2EB9000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
10FF000
stack
page read and write
544000
stack
page read and write
1CF0A230000
heap
page read and write
21FEC8FD000
heap
page read and write
2162BC9B000
trusted library allocation
page read and write
21628C60000
heap
page read and write
1195000
heap
page read and write
2162A862000
heap
page read and write
1350000
heap
page read and write
9385E77000
stack
page read and write
28C80001000
trusted library allocation
page read and write
74275CE000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1CF22DF0000
heap
page read and write
1CF228A4000
heap
page read and write
7C0000
heap
page read and write
A01000
heap
page read and write
28C81097000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
216430D0000
heap
page read and write
1AB0C000
stack
page read and write
742612E000
stack
page read and write
1CF0A270000
trusted library allocation
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
AC3AC79000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
82C000
heap
page read and write
21FD5BFC000
trusted library allocation
page read and write
1CF22418000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7DF485940000
trusted library allocation
page execute and read and write
AC3BACE000
stack
page read and write
96BCE0E000
stack
page read and write
7FFD9B76B000
trusted library allocation
page read and write
1CF08973000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
21FECD79000
heap
page read and write
1CF08840000
heap
page read and write
2651000
trusted library allocation
page read and write
7DF47AE80000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
996000
heap
page read and write
28C80229000
trusted library allocation
page read and write
1CF0A639000
trusted library allocation
page read and write
21FD47D0000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
9385D77000
stack
page read and write
28CF8E10000
heap
page read and write
1B59E000
stack
page read and write
C40000
trusted library allocation
page read and write
760000
heap
page read and write
21FD5522000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
742754E000
stack
page read and write
1B0F0000
heap
page read and write
F67000
heap
page read and write
28CF6C1A000
heap
page read and write
93860BF000
stack
page read and write
2162A998000
trusted library allocation
page read and write
1BA14000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
1CF22A28000
heap
page read and write
1CF0C23C000
trusted library allocation
page read and write
1CF0B534000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
21628E5E000
heap
page read and write
1CF22CDF000
heap
page read and write
1CF0B4D2000
trusted library allocation
page read and write
2162A803000
heap
page read and write
1CF0C07D000
trusted library allocation
page read and write
28CF88C0000
heap
page execute and read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
23B0000
trusted library allocation
page read and write
96BBCFE000
stack
page read and write
1CF22B31000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9BB9C000
trusted library allocation
page read and write
28CF8E35000
heap
page read and write
2C21000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
21642E20000
heap
page read and write
A12000
heap
page read and write
2162B513000
trusted library allocation
page read and write
28CF8CA5000
heap
page read and write
938613E000
stack
page read and write
2162C73B000
trusted library allocation
page read and write
2163AC0C000
trusted library allocation
page read and write
9386C8C000
stack
page read and write
28CF8840000
trusted library allocation
page read and write
938623B000
stack
page read and write
7C6000
heap
page read and write
23C0000
heap
page execute and read and write
2162BA37000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
AC3BBCC000
stack
page read and write
21FE4921000
trusted library allocation
page read and write
21FD48F1000
trusted library allocation
page read and write
2163AC04000
trusted library allocation
page read and write
21FD5670000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
21FECDD0000
heap
page read and write
28CF6BED000
heap
page read and write
1CF2288D000
heap
page read and write
2162A800000
heap
page read and write
1BFEF000
stack
page read and write
12588000
trusted library allocation
page read and write
21FECE10000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
12771000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2162A911000
trusted library allocation
page read and write
28C81E06000
trusted library allocation
page read and write
2162ADDD000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
2162B521000
trusted library allocation
page read and write
21628E10000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2162BAEE000
trusted library allocation
page read and write
28CF6C15000
heap
page read and write
7DF4BB6C0000
trusted library allocation
page execute and read and write
21FE4BDD000
trusted library allocation
page read and write
2162B8E9000
trusted library allocation
page read and write
836000
heap
page read and write
There are 1016 hidden memdumps, click here to show them.