IOC Report
2RM12KtuNp.exe

loading gif

Files

File Path
Type
Category
Malicious
2RM12KtuNp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\fuBYljHeUjtkgvlnN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\sppsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\sppsvc.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2RM12KtuNp.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\6097a71ae8c8063dafca0bb1115c8c625898b3ca.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6097a71ae8c8063dafca0bb1115c8c625898b3ca.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\7e00ec7d-7c2b-46a0-b437-c1650ed4cfe9.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\95f930af-8a5c-4110-bf02-41517346f671.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\LsQlNPpiOn.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\b0c9a6b4-f4b7-4599-b561-a3049e581ced.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\df7dcee1-31d9-41cd-9118-ff1c3adb1964.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Microsoft Office 15\ClientX64\69ddcba757bf72
ASCII text, with very long lines (490), with no line terminators
dropped
C:\Program Files\Windows Mail\c321b7ff01a2d7
ASCII text, with very long lines (405), with no line terminators
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\24dbde2999530e
ASCII text, with very long lines (972), with no line terminators
dropped
C:\Recovery\0a1fd5f707cd16
ASCII text, with very long lines (570), with no line terminators
dropped
C:\Recovery\c321b7ff01a2d7
ASCII text, with no line terminators
dropped
C:\Recovery\fuBYljHeUjtkgvlnN.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fuBYljHeUjtkgvlnN.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smss.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sppsvc.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\23hskQW7hB
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2RM12KtuNp.exe
"C:\Users\user\Desktop\2RM12KtuNp.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
"C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\smss.exe'" /f
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
"C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\smss.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\smss.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fuBYljHeUjtkgvlnN" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\sppsvc.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\sppsvc.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\sppsvc.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 12 /tr "'C:\Recovery\fuBYljHeUjtkgvlnN.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fuBYljHeUjtkgvlnN" /sc ONLOGON /tr "'C:\Recovery\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 13 /tr "'C:\Recovery\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST /f
malicious
C:\Recovery\fuBYljHeUjtkgvlnN.exe
C:\Recovery\fuBYljHeUjtkgvlnN.exe
malicious
C:\Recovery\fuBYljHeUjtkgvlnN.exe
C:\Recovery\fuBYljHeUjtkgvlnN.exe
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
malicious
C:\Recovery\sppsvc.exe
C:\Recovery\sppsvc.exe
malicious
C:\Recovery\sppsvc.exe
C:\Recovery\sppsvc.exe
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
"C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe"
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\df7dcee1-31d9-41cd-9118-ff1c3adb1964.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\95f930af-8a5c-4110-bf02-41517346f671.vbs"
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
malicious
C:\Recovery\fuBYljHeUjtkgvlnN.exe
"C:\Recovery\fuBYljHeUjtkgvlnN.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\b0c9a6b4-f4b7-4599-b561-a3049e581ced.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\7e00ec7d-7c2b-46a0-b437-c1650ed4cfe9.vbs"
malicious
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
malicious
C:\Recovery\sppsvc.exe
"C:\Recovery\sppsvc.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\LsQlNPpiOn.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://rustpidc.beget.tech/L1nc0In.php?BUISt3=gMc0F&6MLl4TR7bW=lK7at6jiv9hnPMHdbskIx3H&JkwIAjLj8Zrj5q=Q2STSZi6ZxzzP0N4rChRJJbhM&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&BUISt3=gMc0F&6MLl4TR7bW=lK7at6jiv9hnPMHdbskIx3H&JkwIAjLj8Zrj5q=Q2STSZi6ZxzzP0N4rChRJJbhM
5.101.153.173
malicious
http://rustpidc.beget.tech/L1nc0In.php?N39Ok=XWYIyBbUvr4DFdLfiF&4i2q7jz9vgbe7=vWHj0x15g3ZlPI26sU&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&N39Ok=XWYIyBbUvr4DFdLfiF&4i2q7jz9vgbe7=vWHj0x15g3ZlPI26sU
5.101.153.173
malicious
http://rustpidc.beget.tech/L1nc0In.php?BuNhwMAFa=QXwieGICprMaqtoXap&jd0MRJxHvBVhUH6JQRzFfcK0KC=Ed2ZvUQ1DZLfYr8WAUJ&TtkYFlkTGTABPiso2mjMEP3tEvaY=FKgAKRV3eTJu7uuZJQ&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&BuNhwMAFa=QXwieGICprMaqtoXap&jd0MRJxHvBVhUH6JQRzFfcK0KC=Ed2ZvUQ1DZLfYr8WAUJ&TtkYFlkTGTABPiso2mjMEP3tEvaY=FKgAKRV3eTJu7uuZJQ
5.101.153.173
malicious
http://rustpidc.beget.tech/L1nc0In.php?hL1oib=F7svBDITavvsiMUM48DwwrYA4a2M&CPaHE=J0wQF4pCw3PU7M87pf&GYis1kL6LYgVkdnLVHs71=omGpF&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&hL1oib=F7svBDITavvsiMUM48DwwrYA4a2M&CPaHE=J0wQF4pCw3PU7M87pf&GYis1kL6LYgVkdnLVHs71=omGpF
5.101.153.173
malicious
http://rustpidc.beget.tech/L1nc0In.php?06RoA4NR89d4K3EShtj=aSiNSsqThhMbt535NoXiND&R2rvqZ8E8OS=iXDVRO&tawCKOAIE3WBcX8RVl794idNNaxU=JSFTUT2e0hgqQ3KmN0&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&06RoA4NR89d4K3EShtj=aSiNSsqThhMbt535NoXiND&R2rvqZ8E8OS=iXDVRO&tawCKOAIE3WBcX8RVl794idNNaxU=JSFTUT2e0hgqQ3KmN0
5.101.153.173
malicious
http://rustpidc.beget.tech/L1nc0In.php?pmv=PZopg0ihS&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&pmv=PZopg0ihS
5.101.153.173
malicious
http://rustpidc.beget.tech/
unknown
http://rustpidc.beget.tech/L1nc0In.php?N39Ok=XWYIyBbUvr4DFdLfiF&4i2q7jz9vgbe7=vWHj0x15g3ZlPI26sU&f14
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://rustpidc.beget.tech
unknown
http://rustpidc.bePb
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rustpidc.beget.tech
5.101.153.173
malicious

IPs

IP
Domain
Country
Malicious
5.101.153.173
rustpidc.beget.tech
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
smss
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fuBYljHeUjtkgvlnN
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fuBYljHeUjtkgvlnN
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
sppsvc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
sppsvc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fuBYljHeUjtkgvlnN
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fuBYljHeUjtkgvlnN
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\ae183e70fa10b40c51d2985e629a5c1ffae1fca0
6d20079632e1c7e3d849bbfc8a5577e0c16b9b53
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
FileDirectory
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2491000
trusted library allocation
page read and write
malicious
1249D000
trusted library allocation
page read and write
malicious
286D000
trusted library allocation
page read and write
malicious
2CFD000
trusted library allocation
page read and write
malicious
27C1000
trusted library allocation
page read and write
malicious
2B01000
trusted library allocation
page read and write
malicious
2EA1000
trusted library allocation
page read and write
malicious
3061000
trusted library allocation
page read and write
malicious
2952000
trusted library allocation
page read and write
malicious
29A1000
trusted library allocation
page read and write
malicious
2831000
trusted library allocation
page read and write
malicious
2E11000
trusted library allocation
page read and write
malicious
2B10000
trusted library allocation
page read and write
malicious
2D01000
trusted library allocation
page read and write
malicious
2CC1000
trusted library allocation
page read and write
malicious
2FAD000
trusted library allocation
page read and write
malicious
2F71000
trusted library allocation
page read and write
malicious
7FF848CBC000
trusted library allocation
page execute and read and write
7FF848C83000
trusted library allocation
page execute and read and write
5D2000
heap
page read and write
7FF848E0C000
trusted library allocation
page read and write
1B369000
heap
page read and write
130D000
heap
page read and write
DB0000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1B4EE000
stack
page read and write
7FF848CA0000
trusted library allocation
page read and write
27C244C8000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
CC8000
heap
page read and write
5C303FD000
stack
page read and write
22B0000
heap
page read and write
7FF848C87000
trusted library allocation
page read and write
27C25F20000
heap
page read and write
129F1000
trusted library allocation
page read and write
127CD000
trusted library allocation
page read and write
13063000
trusted library allocation
page read and write
28CA000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
107E000
heap
page read and write
2A6D000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1B07E000
stack
page read and write
1BB10000
heap
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
7FF848D3C000
trusted library allocation
page execute and read and write
27C244CE000
heap
page read and write
7FF848C88000
trusted library allocation
page read and write
1A97AF88000
heap
page read and write
27F1000
trusted library allocation
page read and write
7FF848D46000
trusted library allocation
page execute and read and write
2569000
trusted library allocation
page read and write
A83000
heap
page read and write
1C0A9000
heap
page read and write
7FF848EED000
trusted library allocation
page read and write
1CEAC000
heap
page read and write
2270000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
1B61D000
stack
page read and write
27D7000
trusted library allocation
page read and write
7FF848C83000
trusted library allocation
page read and write
D40000
heap
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
7FF848E31000
trusted library allocation
page read and write
26162CEB000
heap
page read and write
1E35D000
stack
page read and write
1B7BF000
stack
page read and write
27C244B0000
heap
page read and write
106D000
heap
page read and write
7FF848E3C000
trusted library allocation
page read and write
AA0000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
1062000
heap
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
7FF848E41000
trusted library allocation
page read and write
850000
heap
page read and write
7FF848C83000
trusted library allocation
page read and write
26A6000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1C13C000
heap
page read and write
12CC3000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
26162F05000
heap
page read and write
7C0000
heap
page read and write
7FF848C92000
trusted library allocation
page read and write
7FF848C9C000
trusted library allocation
page read and write
7FF848C73000
trusted library allocation
page execute and read and write
C85000
heap
page read and write
26162D18000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
29E1000
trusted library allocation
page read and write
A75000
heap
page read and write
12FC4000
trusted library allocation
page read and write
1BBBE000
stack
page read and write
1FA91847000
heap
page read and write
1B3BE000
stack
page read and write
7FF848C93000
trusted library allocation
page read and write
1C121000
heap
page read and write
12E21000
trusted library allocation
page read and write
1B383000
heap
page read and write
28C4000
trusted library allocation
page read and write
2D7C000
trusted library allocation
page read and write
FD0000
heap
page read and write
7FF848C73000
trusted library allocation
page execute and read and write
7FF848E2C000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
1FA91A60000
heap
page read and write
1350000
trusted library allocation
page read and write
12B8000
heap
page read and write
7FF848D76000
trusted library allocation
page execute and read and write
7FF848C63000
trusted library allocation
page execute and read and write
261646D0000
heap
page read and write
1AF7D000
stack
page read and write
26162CED000
heap
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
7FF848F8A000
trusted library allocation
page read and write
1A860000
trusted library allocation
page read and write
1BDDE000
stack
page read and write
C0B000
heap
page read and write
1B5E3000
stack
page read and write
1B348000
heap
page read and write
E7F000
stack
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
12A08000
trusted library allocation
page read and write
1B376000
heap
page read and write
1013000
heap
page read and write
2802000
trusted library allocation
page read and write
7FF848DC1000
trusted library allocation
page execute and read and write
5BB000
heap
page read and write
E1B000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
5A6000
stack
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
1C12C000
heap
page read and write
12A0C000
trusted library allocation
page read and write
DF1533A000
stack
page read and write
7FF848E2E000
trusted library allocation
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
1B02E000
stack
page read and write
8B5000
heap
page read and write
ABD000
heap
page read and write
1B7EE000
stack
page read and write
1B97E000
stack
page read and write
3030000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page read and write
7FF848E61000
trusted library allocation
page read and write
27C2448B000
heap
page read and write
27C244C3000
heap
page read and write
1260000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FF848E61000
trusted library allocation
page read and write
1B9B4000
stack
page read and write
EB3FBFF000
stack
page read and write
12491000
trusted library allocation
page read and write
2B10000
heap
page read and write
310F000
trusted library allocation
page read and write
7FF848C93000
trusted library allocation
page execute and read and write
7FF848CCC000
trusted library allocation
page execute and read and write
E91000
heap
page read and write
1B93F000
stack
page read and write
2BAD000
trusted library allocation
page read and write
12CD1000
trusted library allocation
page read and write
7FF848D46000
trusted library allocation
page execute and read and write
12A04000
trusted library allocation
page read and write
7FF848D16000
trusted library allocation
page read and write
26162D38000
heap
page read and write
1C154000
heap
page read and write
5CF000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848CCC000
trusted library allocation
page execute and read and write
F6F000
stack
page read and write
2563000
trusted library allocation
page read and write
129E5000
trusted library allocation
page read and write
26162CB0000
heap
page read and write
1B0C0000
heap
page read and write
7FF848C78000
trusted library allocation
page read and write
12BB1000
trusted library allocation
page read and write
15A0000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
EB3F7FE000
stack
page read and write
3121000
trusted library allocation
page read and write
10AE000
stack
page read and write
DC0000
heap
page read and write
159E000
stack
page read and write
12FF7000
trusted library allocation
page read and write
12A2A000
trusted library allocation
page read and write
7FF848C84000
trusted library allocation
page read and write
7FF848D8F000
trusted library allocation
page execute and read and write
8B7000
heap
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
7FF848C93000
trusted library allocation
page read and write
26162D0B000
heap
page read and write
15D0000
trusted library allocation
page read and write
ACC000
heap
page read and write
7FF848C7C000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
2758AFF000
stack
page read and write
12A1E000
trusted library allocation
page read and write
130F5000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page execute and read and write
11D0000
heap
page read and write
EB3F6FA000
stack
page read and write
2CC2000
trusted library allocation
page read and write
D0F000
stack
page read and write
12FAF000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
1CAFE000
stack
page read and write
26162CCD000
heap
page read and write
27E7000
trusted library allocation
page read and write
7FF848CA4000
trusted library allocation
page read and write
7FF848C74000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
1100000
heap
page read and write
C58000
heap
page read and write
1B72E000
stack
page read and write
12D03000
trusted library allocation
page read and write
7FF848CB4000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
2F60000
heap
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
26A0000
trusted library allocation
page read and write
27C24496000
heap
page read and write
7FF848D88000
trusted library allocation
page execute and read and write
CD6000
heap
page read and write
106D000
heap
page read and write
1265000
heap
page read and write
26162D25000
heap
page read and write
7FF848E23000
trusted library allocation
page read and write
1C0E4000
heap
page read and write
27C24480000
heap
page read and write
27C24496000
heap
page read and write
D95000
heap
page read and write
129A1000
trusted library allocation
page read and write
7E0000
heap
page read and write
27C244AE000
heap
page read and write
27C244F4000
heap
page read and write
29E5000
trusted library allocation
page read and write
2FAE000
stack
page read and write
1A814000
heap
page read and write
12FC6000
trusted library allocation
page read and write
12A06000
trusted library allocation
page read and write
1AA1C000
stack
page read and write
1C3CE000
stack
page read and write
127C8000
trusted library allocation
page read and write
1B5ED000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848E64000
trusted library allocation
page read and write
129ED000
trusted library allocation
page read and write
1B4BF000
stack
page read and write
27C244D2000
heap
page read and write
12EA1000
trusted library allocation
page read and write
12D08000
trusted library allocation
page read and write
12A02000
trusted library allocation
page read and write
12CF000
stack
page read and write
1B355000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
800000
heap
page read and write
12D51000
trusted library allocation
page read and write
27C244ED000
heap
page read and write
2A4F000
trusted library allocation
page read and write
1B1CE000
stack
page read and write
1BA50000
heap
page read and write
E0E000
heap
page read and write
7FF848E0E000
trusted library allocation
page read and write
1039000
heap
page read and write
13D0000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
CBA000
heap
page read and write
C2C000
heap
page read and write
1B3F2000
heap
page read and write
CCE000
heap
page read and write
1CF11000
heap
page read and write
27C24440000
heap
page read and write
129FE000
trusted library allocation
page read and write
1B17D000
stack
page read and write
7FF848EB7000
trusted library allocation
page read and write
12D61000
trusted library allocation
page read and write
C44000
heap
page read and write
C00000
heap
page read and write
1AB30000
trusted library allocation
page read and write
5F9000
heap
page read and write
1AF80000
heap
page read and write
26162D26000
heap
page read and write
2A69000
trusted library allocation
page read and write
27C244F5000
heap
page read and write
F60000
heap
page read and write
1BD80000
heap
page read and write
10C0000
heap
page read and write
68C000
heap
page read and write
2A90000
trusted library allocation
page read and write
26162D1E000
heap
page read and write
12A8000
heap
page read and write
A4B000
heap
page read and write
2E30000
heap
page execute and read and write
1B970000
heap
page execute and read and write
1FA91847000
heap
page read and write
27F5000
trusted library allocation
page read and write
A6C000
heap
page read and write
7FF848DA8000
trusted library allocation
page execute and read and write
27C244F5000
heap
page read and write
1CE4E000
heap
page read and write
12FD5000
trusted library allocation
page read and write
7FF848D8F000
trusted library allocation
page execute and read and write
7FF848C83000
trusted library allocation
page execute and read and write
2A70000
trusted library allocation
page read and write
1C135000
heap
page read and write
1B4FD000
stack
page read and write
D70000
heap
page read and write
AF6000
stack
page read and write
C13000
heap
page read and write
AF6000
stack
page read and write
130FB000
trusted library allocation
page read and write
1124000
heap
page read and write
DF15CFF000
stack
page read and write
12FCD000
trusted library allocation
page read and write
1AC3D000
stack
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
129F8000
trusted library allocation
page read and write
7FF848E31000
trusted library allocation
page read and write
26162CE1000
heap
page read and write
DF156FF000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
27C244DD000
heap
page read and write
26162D0F000
heap
page read and write
2DF3000
trusted library allocation
page read and write
5C306FF000
stack
page read and write
129EF000
trusted library allocation
page read and write
1308000
heap
page read and write
7FF848D2C000
trusted library allocation
page execute and read and write
27C244BD000
heap
page read and write
7FF848EED000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page execute and read and write
7FF848D46000
trusted library allocation
page execute and read and write
2565000
trusted library allocation
page read and write
1650000
heap
page read and write
2DBF000
trusted library allocation
page read and write
7FF848E43000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
7FF848D30000
trusted library allocation
page read and write
129F5000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
5E0000
heap
page read and write
7FF848C94000
trusted library allocation
page read and write
2BBC000
trusted library allocation
page read and write
1BF2E000
stack
page read and write
1B210000
heap
page execute and read and write
1BA2E000
stack
page read and write
1530000
heap
page read and write
12FE3000
trusted library allocation
page read and write
1106000
heap
page read and write
1230000
heap
page read and write
1B7BE000
stack
page read and write
12A24000
trusted library allocation
page read and write
12D01000
trusted library allocation
page read and write
22A0000
trusted library section
page read and write
1010000
heap
page read and write
13021000
trusted library allocation
page read and write
7FF848D16000
trusted library allocation
page read and write
1B6B4000
stack
page read and write
7FF848C62000
trusted library allocation
page read and write
280E000
stack
page read and write
29E0000
heap
page read and write
1BA74000
stack
page read and write
12FBE000
trusted library allocation
page read and write
7FF848E51000
trusted library allocation
page read and write
12B0D000
trusted library allocation
page read and write
1BBE0000
heap
page execute and read and write
27C244F5000
heap
page read and write
27F9000
trusted library allocation
page read and write
7FF848C78000
trusted library allocation
page read and write
12FD1000
trusted library allocation
page read and write
7FF848E4B000
trusted library allocation
page read and write
7FF848D46000
trusted library allocation
page execute and read and write
7FF848C8D000
trusted library allocation
page execute and read and write
12BA6000
trusted library allocation
page read and write
26162D0F000
heap
page read and write
1A97AFB6000
heap
page read and write
C3A000
heap
page read and write
12DC000
heap
page read and write
7FF848C7C000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
7FF848E97000
trusted library allocation
page read and write
DE8000
heap
page read and write
1ACF0000
trusted library allocation
page read and write
1AE40000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
D60000
heap
page read and write
7FF848C64000
trusted library allocation
page read and write
1CCF7000
stack
page read and write
7FF848C80000
trusted library allocation
page read and write
CBF000
heap
page read and write
12CB000
heap
page read and write
7FF848E3E000
trusted library allocation
page read and write
26162CC7000
heap
page read and write
1B920000
heap
page read and write
1B270000
heap
page execute and read and write
7FF848E33000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
27C244DB000
heap
page read and write
7FF848E53000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
27C0000
heap
page read and write
1B3EE000
stack
page read and write
29EC000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
7FF848D88000
trusted library allocation
page execute and read and write
27E3000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
12FF9000
trusted library allocation
page read and write
A35000
heap
page read and write
7FF848E1A000
trusted library allocation
page read and write
27C244E1000
heap
page read and write
7FF848EB2000
trusted library allocation
page read and write
2D6D000
trusted library allocation
page read and write
7FF848CBC000
trusted library allocation
page execute and read and write
7FF848C7C000
trusted library allocation
page read and write
27C244D2000
heap
page read and write
275F000
trusted library allocation
page read and write
D02000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
132AC000
trusted library allocation
page read and write
7FF848DA8000
trusted library allocation
page execute and read and write
A2B000
heap
page read and write
1EB009FB000
heap
page read and write
2F3E000
stack
page read and write
27FF000
trusted library allocation
page read and write
1C0DC000
heap
page read and write
29E0000
heap
page read and write
DC0000
heap
page read and write
2CFA000
trusted library allocation
page read and write
12D54000
trusted library allocation
page read and write
10000
unkown
page readonly
29EA000
trusted library allocation
page read and write
12B08000
trusted library allocation
page read and write
1B3B5000
heap
page read and write
2AFE000
stack
page read and write
1C0FD000
heap
page read and write
27B0000
heap
page execute and read and write
EC5000
heap
page read and write
26162CE3000
heap
page read and write
780000
heap
page read and write
12D33000
trusted library allocation
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
1B8CE000
stack
page read and write
15E0000
heap
page read and write
157E000
stack
page read and write
1BB5E000
stack
page read and write
29E7000
trusted library allocation
page read and write
E47000
heap
page read and write
12B01000
trusted library allocation
page read and write
1B32E000
stack
page read and write
2942000
trusted library allocation
page read and write
12DD9000
trusted library allocation
page read and write
130C0000
trusted library allocation
page read and write
110C000
heap
page read and write
12FEF000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
6D3078F000
stack
page read and write
7FF848D46000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
EB3FAFF000
stack
page read and write
1ADB0000
trusted library section
page read and write
1B8BE000
stack
page read and write
27C24489000
heap
page read and write
1EB00900000
heap
page read and write
A7D000
heap
page read and write
12FD7000
trusted library allocation
page read and write
29E3000
trusted library allocation
page read and write
1C0AE000
heap
page read and write
2FB9000
trusted library allocation
page read and write
1318000
heap
page read and write
2D44000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FF848D36000
trusted library allocation
page read and write
CD3000
heap
page read and write
1143000
heap
page read and write
7FF848E1C000
trusted library allocation
page read and write
7FF4E0B80000
trusted library allocation
page execute and read and write
8F5000
heap
page read and write
DE0000
heap
page read and write
26162CBA000
heap
page read and write
129E3000
trusted library allocation
page read and write
12A0E000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
B8E000
stack
page read and write
7FF848F95000
trusted library allocation
page read and write
6D3070B000
stack
page read and write
C63000
heap
page read and write
26162D36000
heap
page read and write
1BB73000
stack
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
133A4000
trusted library allocation
page read and write
7FF848CDC000
trusted library allocation
page execute and read and write
1A7F0000
trusted library allocation
page read and write
27C244C3000
heap
page read and write
7FF848E2E000
trusted library allocation
page read and write
1300000
heap
page read and write
F40000
heap
page read and write
255F000
trusted library allocation
page read and write
12A16000
trusted library allocation
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
1250000
heap
page read and write
12871000
trusted library allocation
page read and write
1B6B0000
heap
page read and write
6D30A7F000
stack
page read and write
7FF848CDC000
trusted library allocation
page execute and read and write
FFF000
stack
page read and write
7FF848C9B000
trusted library allocation
page execute and read and write
12FF1000
trusted library allocation
page read and write
7FF848D91000
trusted library allocation
page execute and read and write
7FF848CA3000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
13CE000
stack
page read and write
27C244AF000
heap
page read and write
28C8000
trusted library allocation
page read and write
7FF848D66000
trusted library allocation
page execute and read and write
820000
heap
page read and write
12B0D000
trusted library allocation
page read and write
A70000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848E0C000
trusted library allocation
page read and write
F20000
heap
page read and write
30A5000
trusted library allocation
page read and write
129A3000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
12FC9000
trusted library allocation
page read and write
EFF000
unkown
page read and write
12BB000
heap
page read and write
1B010000
heap
page read and write
2950000
trusted library allocation
page read and write
E06000
heap
page read and write
7FF848E1A000
trusted library allocation
page read and write
1B5B3000
stack
page read and write
1E13D000
stack
page read and write
27C24496000
heap
page read and write
7FF848CAC000
trusted library allocation
page read and write
1C57E000
stack
page read and write
12D6000
heap
page read and write
1CE67000
heap
page read and write
1510000
trusted library allocation
page read and write
A9E000
heap
page read and write
26162D08000
heap
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
12FDB000
trusted library allocation
page read and write
27C244D8000
heap
page read and write
1B9DF000
stack
page read and write
26162D01000
heap
page read and write
100D000
heap
page read and write
7FF848F48000
trusted library allocation
page read and write
27E5000
trusted library allocation
page read and write
7FF848C84000
trusted library allocation
page read and write
1BC2F000
stack
page read and write
26162CE2000
heap
page read and write
C56000
heap
page read and write
12D1000
heap
page read and write
1CF06000
heap
page read and write
26162CF5000
heap
page read and write
1133000
heap
page read and write
12CCD000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
27C2448F000
heap
page read and write
1CAF2000
stack
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
12A20000
trusted library allocation
page read and write
26162D17000
heap
page read and write
7FF848C97000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page read and write
134C000
heap
page read and write
26162D1D000
heap
page read and write
7FF848D8F000
trusted library allocation
page execute and read and write
12DE000
heap
page read and write
12B01000
trusted library allocation
page read and write
26162D0F000
heap
page read and write
12BB1000
trusted library allocation
page read and write
7FF848F48000
trusted library allocation
page read and write
27C244C8000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
1A97AF75000
heap
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
A4D000
heap
page read and write
A10000
heap
page read and write
7FF848D46000
trusted library allocation
page read and write
1B39D000
stack
page read and write
129AD000
trusted library allocation
page read and write
7E0000
heap
page read and write
C98000
heap
page read and write
130E000
stack
page read and write
1B42D000
stack
page read and write
D13000
heap
page read and write
301E000
trusted library allocation
page read and write
A77000
heap
page read and write
27C244C8000
heap
page read and write
26162B10000
heap
page read and write
1A97ADB0000
heap
page read and write
27C244C8000
heap
page read and write
EC3000
heap
page read and write
248E000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848C74000
trusted library allocation
page read and write
1C13F000
heap
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
12D71000
trusted library allocation
page read and write
7FF848C73000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
26162CE3000
heap
page read and write
2DAA000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
C3A000
heap
page read and write
26162CF6000
heap
page read and write
2FAF000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
131F0000
trusted library allocation
page read and write
7FF848CA4000
trusted library allocation
page read and write
27C2448F000
heap
page read and write
2E59000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
26162CBC000
heap
page read and write
2C75000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
12000
unkown
page readonly
12D11000
trusted library allocation
page read and write
2DEE000
stack
page read and write
112E000
heap
page read and write
2380000
heap
page execute and read and write
12A0000
heap
page read and write
12F71000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
26162D10000
heap
page read and write
7FF848C98000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page read and write
1FA91839000
heap
page read and write
149E000
stack
page read and write
12833000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
7FF848E41000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
1C502000
heap
page execute and read and write
1AD30000
trusted library allocation
page read and write
CDF000
heap
page read and write
16EF000
stack
page read and write
7FF848D20000
trusted library allocation
page read and write
12B0000
heap
page read and write
29DF000
trusted library allocation
page read and write
2BB3000
trusted library allocation
page read and write
293A000
trusted library allocation
page read and write
7FF848CB4000
trusted library allocation
page read and write
1ADC0000
trusted library section
page read and write
7FF848E33000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
1270000
trusted library allocation
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
12EAD000
trusted library allocation
page read and write
CFF000
heap
page read and write
790000
heap
page read and write
CF6000
stack
page read and write
27C244EA000
heap
page read and write
26162D08000
heap
page read and write
1BDE4000
stack
page read and write
DF15BFF000
stack
page read and write
1000000
heap
page read and write
11D9000
heap
page read and write
1B87E000
stack
page read and write
1B222000
stack
page read and write
1ADBD000
stack
page read and write
12E1D000
trusted library allocation
page read and write
D90000
heap
page read and write
7FF848C94000
trusted library allocation
page read and write
27C244C8000
heap
page read and write
15E0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
100B000
heap
page read and write
7FF848D16000
trusted library allocation
page read and write
2ECA000
trusted library allocation
page read and write
7FF848E11000
trusted library allocation
page read and write
1B6EE000
stack
page read and write
1C7FF000
stack
page read and write
7FF848E58000
trusted library allocation
page read and write
293E000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
27C2449C000
heap
page read and write
7FF848E11000
trusted library allocation
page read and write
7FF848E0E000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
27C244D2000
heap
page read and write
2E8F000
trusted library allocation
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
1B2E0000
heap
page read and write
7FF848DAF000
trusted library allocation
page execute and read and write
2BB0000
trusted library allocation
page read and write
2765000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
275814A000
stack
page read and write
26162D31000
heap
page read and write
13061000
trusted library allocation
page read and write
12841000
trusted library allocation
page read and write
26162CCC000
heap
page read and write
2761000
trusted library allocation
page read and write
7FF848C7C000
trusted library allocation
page read and write
1AE20000
heap
page execute and read and write
26162D15000
heap
page read and write
7FF848D94000
trusted library allocation
page execute and read and write
7FF848E46000
trusted library allocation
page read and write
1655000
heap
page read and write
130BD000
trusted library allocation
page read and write
27C244EC000
heap
page read and write
7FF848EDC000
trusted library allocation
page read and write
1C9F4000
stack
page read and write
12E11000
trusted library allocation
page read and write
27C244FD000
heap
page read and write
7FF848E23000
trusted library allocation
page read and write
7FF848E11000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
1BA55000
stack
page read and write
7FF848C82000
trusted library allocation
page read and write
1EB009F0000
heap
page read and write
15E5000
heap
page read and write
2240000
trusted library allocation
page read and write
27C24715000
heap
page read and write
26162CE1000
heap
page read and write
A5E000
stack
page read and write
C73000
heap
page read and write
BF0000
heap
page read and write
7FF848DB1000
trusted library allocation
page execute and read and write
2843000
trusted library allocation
page read and write
7FF848C78000
trusted library allocation
page read and write
FD8000
heap
page read and write
1B71A000
stack
page read and write
26162D01000
heap
page read and write
7FF848EB2000
trusted library allocation
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
275D000
trusted library allocation
page read and write
1283D000
trusted library allocation
page read and write
116D000
heap
page read and write
1B3E6000
heap
page read and write
269E000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
26162D2F000
heap
page read and write
1C174000
heap
page read and write
1037000
heap
page read and write
1EB008E0000
heap
page read and write
C4F000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
27589FF000
stack
page read and write
12DF7000
trusted library allocation
page read and write
12FB8000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
C51000
heap
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
1E25E000
stack
page read and write
7FF848E0E000
trusted library allocation
page read and write
3050000
heap
page execute and read and write
27C244D2000
heap
page read and write
7F0000
heap
page read and write
13364000
trusted library allocation
page read and write
1C099000
heap
page read and write
1B4B0000
trusted library section
page read and write
D20000
heap
page read and write
1A97AF7B000
heap
page read and write
12FB6000
trusted library allocation
page read and write
1020000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
C24000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
1C01E000
stack
page read and write
12FD3000
trusted library allocation
page read and write
12A22000
trusted library allocation
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
12B03000
trusted library allocation
page read and write
7FF848C9C000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page read and write
EFE000
unkown
page read and write
1BCB3000
stack
page read and write
1C402000
heap
page read and write
E60000
heap
page read and write
2D6A000
trusted library allocation
page read and write
1CE0B000
heap
page read and write
2940000
trusted library allocation
page read and write
27C2449A000
heap
page read and write
12A51000
trusted library allocation
page read and write
112B000
heap
page read and write
27C244EE000
heap
page read and write
1F0000
heap
page read and write
1C10C000
heap
page read and write
26162F00000
heap
page read and write
7FF848C84000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
7FF848D26000
trusted library allocation
page read and write
26162CDF000
heap
page read and write
1BC1F000
stack
page read and write
1BADE000
stack
page read and write
12FE9000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
7FF848E60000
trusted library allocation
page read and write
596000
heap
page read and write
12F81000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
26162C10000
heap
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
129E7000
trusted library allocation
page read and write
129B1000
trusted library allocation
page read and write
12FE7000
trusted library allocation
page read and write
590000
heap
page read and write
12FBC000
trusted library allocation
page read and write
1C02E000
stack
page read and write
510000
heap
page read and write
2BB6000
trusted library allocation
page read and write
126F1000
trusted library allocation
page read and write
27C244E9000
heap
page read and write
7FF848CAB000
trusted library allocation
page execute and read and write
D02000
heap
page read and write
26162D33000
heap
page read and write
26162D22000
heap
page read and write
540000
heap
page read and write
1B86E000
stack
page read and write
5C304FF000
stack
page read and write
1B090000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
10000
unkown
page readonly
262E000
stack
page read and write
11F0000
heap
page read and write
7D0000
heap
page read and write
7FF848D56000
trusted library allocation
page execute and read and write
7FF848EDA000
trusted library allocation
page read and write
26162BF0000
heap
page read and write
27C244F3000
heap
page read and write
28C6000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
1B346000
heap
page read and write
12F7D000
trusted library allocation
page read and write
1CEE9000
heap
page read and write
7FF848C84000
trusted library allocation
page read and write
27C24360000
heap
page read and write
1BD13000
stack
page read and write
282F000
trusted library allocation
page read and write
FFF000
stack
page read and write
1C402000
heap
page read and write
2567000
trusted library allocation
page read and write
1AF7D000
stack
page read and write
1CF0C000
heap
page read and write
7FF848D91000
trusted library allocation
page execute and read and write
2820000
heap
page read and write
127C3000
trusted library allocation
page read and write
27C2447B000
heap
page read and write
27C244D8000
heap
page read and write
2FC5000
trusted library allocation
page read and write
129F3000
trusted library allocation
page read and write
1CE95000
heap
page read and write
1CE00000
heap
page read and write
2871000
trusted library allocation
page read and write
1AF80000
heap
page read and write
C11000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
26162CC7000
heap
page read and write
2A67000
trusted library allocation
page read and write
1B7C0000
heap
page execute and read and write
27586FD000
stack
page read and write
2A4C000
trusted library allocation
page read and write
12A1A000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
12F10000
trusted library allocation
page read and write
12A10000
trusted library allocation
page read and write
1C8FE000
stack
page read and write
12A00000
trusted library allocation
page read and write
A79000
heap
page read and write
2BAA000
trusted library allocation
page read and write
27C244D7000
heap
page read and write
7FF848C8C000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
7FF848DBF000
trusted library allocation
page execute and read and write
7FF848CBC000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
12DB1000
trusted library allocation
page read and write
12D26000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
1B220000
heap
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
26162CE3000
heap
page read and write
26162D08000
heap
page read and write
2833000
trusted library allocation
page read and write
2BB0000
heap
page execute and read and write
1305000
heap
page read and write
14AE000
stack
page read and write
D80000
trusted library allocation
page read and write
F15000
heap
page read and write
7FF848D91000
trusted library allocation
page execute and read and write
2A61000
trusted library allocation
page read and write
1700000
heap
page read and write
1BA20000
heap
page read and write
1CEE5000
heap
page read and write
1B32A000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848E53000
trusted library allocation
page read and write
1B000000
heap
page read and write
27C244D2000
heap
page read and write
10C5000
heap
page read and write
27C244FA000
heap
page read and write
A18000
heap
page read and write
27C244E9000
heap
page read and write
1B334000
heap
page read and write
7FF848E03000
trusted library allocation
page read and write
88C000
heap
page read and write
7FF848E0C000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
1AFC0000
trusted library allocation
page read and write
128E1000
trusted library allocation
page read and write
129DE000
trusted library allocation
page read and write
26162D01000
heap
page read and write
29F8000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
13071000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
1171000
heap
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
7FF848C7C000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
27C244D2000
heap
page read and write
1BB2E000
stack
page read and write
3115000
trusted library allocation
page read and write
282D000
trusted library allocation
page read and write
134D000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
1AFA0000
trusted library allocation
page read and write
7B0000
heap
page read and write
7FF848D98000
trusted library allocation
page execute and read and write
1C67E000
stack
page read and write
27C244EE000
heap
page read and write
1EB009B0000
heap
page read and write
1C148000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
A85000
heap
page read and write
7D6000
stack
page read and write
1BCDB000
stack
page read and write
12498000
trusted library allocation
page read and write
129A8000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
A66000
heap
page read and write
7FF848C84000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
2AD0000
heap
page read and write
12E18000
trusted library allocation
page read and write
1CF02000
heap
page read and write
12D73000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
7FF848E41000
trusted library allocation
page read and write
C00000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
1B62F000
stack
page read and write
7FF848E2C000
trusted library allocation
page read and write
27C244F6000
heap
page read and write
1E03B000
stack
page read and write
1C167000
heap
page read and write
1BEEB000
stack
page read and write
2CF0000
heap
page execute and read and write
7FF848E50000
trusted library allocation
page read and write
7FF848CA7000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
7FF848E0C000
trusted library allocation
page read and write
2767000
trusted library allocation
page read and write
DF157FF000
stack
page read and write
7FF848E5A000
trusted library allocation
page read and write
7FF848C64000
trusted library allocation
page read and write
29F0000
heap
page execute and read and write
1DF2D000
stack
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
1B8D0000
heap
page read and write
515000
heap
page read and write
2E6E000
trusted library allocation
page read and write
7FF848D9F000
trusted library allocation
page execute and read and write
26162D3B000
heap
page read and write
12FDD000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
12EE000
heap
page read and write
127D1000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
12EC1000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
7FF848E37000
trusted library allocation
page read and write
27C244CD000
heap
page read and write
EB3FCFE000
stack
page read and write
27C244C3000
heap
page read and write
1FA917C0000
heap
page read and write
C2C000
heap
page read and write
CB5000
heap
page read and write
1B330000
heap
page read and write
1D29A000
stack
page read and write
1EB009F5000
heap
page read and write
CAD000
heap
page read and write
1AED0000
trusted library allocation
page read and write
1B430000
trusted library section
page read and write
2370000
trusted library section
page read and write
7FF848E36000
trusted library allocation
page read and write
1C8FF000
stack
page read and write
7FF848D94000
trusted library allocation
page execute and read and write
7FF848C78000
trusted library allocation
page read and write
12FED000
trusted library allocation
page read and write
C33000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
DE0000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
7FF848E0A000
trusted library allocation
page read and write
26162D27000
heap
page read and write
1B81A000
stack
page read and write
7FF848C8B000
trusted library allocation
page execute and read and write
5C300FA000
stack
page read and write
7FF848CBD000
trusted library allocation
page execute and read and write
27C244B0000
heap
page read and write
C88000
heap
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
7FF848D66000
trusted library allocation
page execute and read and write
1A97AF70000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
26162C90000
heap
page read and write
EB3FDFE000
stack
page read and write
7FF848D8F000
trusted library allocation
page execute and read and write
1B41F000
heap
page read and write
7FF848C8C000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
27C24489000
heap
page read and write
1590000
trusted library allocation
page read and write
7FF848E0E000
trusted library allocation
page read and write
1C183000
heap
page read and write
12FEB000
trusted library allocation
page read and write
85E000
stack
page read and write
1210000
heap
page read and write
1D19A000
stack
page read and write
1B3CE000
heap
page read and write
EB3F8FE000
stack
page read and write
DB0000
heap
page read and write
A92000
heap
page read and write
12E13000
trusted library allocation
page read and write
27C244BC000
heap
page read and write
26162CBB000
heap
page read and write
1B396000
heap
page read and write
2360000
heap
page read and write
1535000
heap
page read and write
D86000
stack
page read and write
26162D15000
heap
page read and write
1B42E000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848DB4000
trusted library allocation
page execute and read and write
13068000
trusted library allocation
page read and write
1C0ED000
heap
page read and write
12FE1000
trusted library allocation
page read and write
CAB000
heap
page read and write
7F0000
heap
page read and write
F10000
heap
page read and write
1002000
heap
page read and write
7FF848CDC000
trusted library allocation
page execute and read and write
26162D2B000
heap
page read and write
1BE2E000
stack
page read and write
1C080000
heap
page read and write
D75000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
26162D33000
heap
page read and write
12F51000
trusted library allocation
page read and write
1A97AEB0000
heap
page read and write
2AFE000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
269A000
trusted library allocation
page read and write
269C000
trusted library allocation
page read and write
1B8BE000
stack
page read and write
2A6B000
trusted library allocation
page read and write
13111000
trusted library allocation
page read and write
E30000
heap
page read and write
1119000
heap
page read and write
107D000
heap
page read and write
1EB00815000
heap
page read and write
29F0000
heap
page execute and read and write
10F6000
stack
page read and write
1C0EE000
stack
page read and write
2763000
trusted library allocation
page read and write
12D3C000
trusted library allocation
page read and write
1080000
heap
page read and write
27C244F0000
heap
page read and write
7FF848C77000
trusted library allocation
page read and write
746000
stack
page read and write
1CE86000
heap
page read and write
12FF3000
trusted library allocation
page read and write
7FF848E43000
trusted library allocation
page read and write
129FC000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
7FF848E66000
trusted library allocation
page read and write
7FF848DAF000
trusted library allocation
page execute and read and write
1AFA0000
heap
page execute and read and write
1B3A9000
heap
page read and write
12D0D000
trusted library allocation
page read and write
E10000
heap
page execute and read and write
1AF2E000
stack
page read and write
1CE4A000
heap
page read and write
12C3C000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
1CEF0000
heap
page read and write
12838000
trusted library allocation
page read and write
27C24494000
heap
page read and write
C80000
heap
page read and write
1B24D000
stack
page read and write
1002000
heap
page read and write
7FF848D36000
trusted library allocation
page read and write
1C093000
heap
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
12831000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
EB3FEFF000
stack
page read and write
7FF848E71000
trusted library allocation
page read and write
27C24480000
heap
page read and write
1CDFD000
stack
page read and write
7FF848C73000
trusted library allocation
page read and write
CDD000
heap
page read and write
27EB000
trusted library allocation
page read and write
7FF848E5D000
trusted library allocation
page read and write
7FF848DB8000
trusted library allocation
page execute and read and write
1BCEE000
stack
page read and write
26162D0F000
heap
page read and write
12CC8000
trusted library allocation
page read and write
1AB30000
trusted library allocation
page read and write
27C244D8000
heap
page read and write
12A26000
trusted library allocation
page read and write
13005000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
7FF848D66000
trusted library allocation
page execute and read and write
10AC000
heap
page read and write
11CE000
stack
page read and write
2CF0000
heap
page read and write
8F8000
heap
page read and write
129EB000
trusted library allocation
page read and write
2AB0000
heap
page execute and read and write
7FF848E70000
trusted library allocation
page read and write
7FF848C84000
trusted library allocation
page read and write
1AE1D000
stack
page read and write
E65000
heap
page read and write
2BD0000
trusted library allocation
page read and write
7FF848E97000
trusted library allocation
page read and write
176000
unkown
page readonly
26162D15000
heap
page read and write
26162CB0000
heap
page read and write
2DBC000
trusted library allocation
page read and write
7FF848E99000
trusted library allocation
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
560000
heap
page read and write
2E90000
heap
page read and write
26162D08000
heap
page read and write
D90000
heap
page read and write
C13000
heap
page read and write
B3B000
heap
page read and write
FC6000
stack
page read and write
DF15DFF000
stack
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
1BE14000
stack
page read and write
DD5000
heap
page read and write
12FFB000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
1FA917D0000
heap
page read and write
2E10000
trusted library allocation
page read and write
1CE3D000
heap
page read and write
12EA8000
trusted library allocation
page read and write
26A4000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
27C244F5000
heap
page read and write
1EB007E0000
heap
page read and write
26162D2C000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
12FD9000
trusted library allocation
page read and write
7FF848DB4000
trusted library allocation
page execute and read and write
2CFE000
trusted library allocation
page read and write
27C244F5000
heap
page read and write
DF15AFE000
stack
page read and write
2C79000
trusted library allocation
page read and write
27C244B0000
heap
page read and write
1049000
heap
page read and write
1C81B000
stack
page read and write
2FA7000
trusted library allocation
page read and write
7FF848C94000
trusted library allocation
page read and write
1102000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
127C1000
trusted library allocation
page read and write
1141000
heap
page read and write
29B0000
trusted library allocation
page read and write
1BD23000
stack
page read and write
12F78000
trusted library allocation
page read and write
7FF848E68000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page execute and read and write
7FF848CBB000
trusted library allocation
page execute and read and write
7FF848C93000
trusted library allocation
page execute and read and write
1102000
heap
page read and write
7FF848C73000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
7FF848CAC000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
2DFE000
stack
page read and write
1072000
heap
page read and write
26162CAB000
heap
page read and write
293C000
trusted library allocation
page read and write
1BA2E000
stack
page read and write
7FF848E11000
trusted library allocation
page read and write
7C0000
heap
page read and write
4F6000
stack
page read and write
1C502000
heap
page execute and read and write
BD0000
heap
page read and write
1A97C8D0000
heap
page read and write
26162D01000
heap
page read and write
12EB1000
trusted library allocation
page read and write
7FF848F6E000
trusted library allocation
page read and write
1CBFA000
stack
page read and write
7FF848C98000
trusted library allocation
page read and write
27FB000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
E1D000
heap
page read and write
26162D14000
heap
page read and write
7FF848EB4000
trusted library allocation
page read and write
12FC2000
trusted library allocation
page read and write
27ED000
trusted library allocation
page read and write
12A0A000
trusted library allocation
page read and write
606000
heap
page read and write
27C244D3000
heap
page read and write
27C24710000
heap
page read and write
29F2000
trusted library allocation
page read and write
1B5BE000
stack
page read and write
1B25F000
stack
page read and write
12EC000
heap
page read and write
12A18000
trusted library allocation
page read and write
27C244B3000
heap
page read and write
7FF848D56000
trusted library allocation
page execute and read and write
BF6000
stack
page read and write
1B423000
stack
page read and write
129FA000
trusted library allocation
page read and write
12E0D000
trusted library allocation
page read and write
D2F000
stack
page read and write
1A9D0000
trusted library allocation
page read and write
E09000
heap
page read and write
1BED3000
stack
page read and write
A40000
trusted library allocation
page read and write
1CE02000
heap
page read and write
27C24460000
heap
page read and write
27DD000
trusted library allocation
page read and write
12F73000
trusted library allocation
page read and write
272E000
stack
page read and write
12FB4000
trusted library allocation
page read and write
12CC1000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
C21000
heap
page read and write
1705000
heap
page read and write
DD0000
heap
page read and write
7FF848CBC000
trusted library allocation
page execute and read and write
12E1A000
trusted library allocation
page read and write
26162D01000
heap
page read and write
1EB007E9000
heap
page read and write
520000
heap
page read and write
26162CB9000
heap
page read and write
1000000
heap
page read and write
1306D000
trusted library allocation
page read and write
5FB000
heap
page read and write
BD0000
heap
page read and write
7FF848C83000
trusted library allocation
page execute and read and write
7FF848E0C000
trusted library allocation
page read and write
26164870000
heap
page read and write
2DB6000
trusted library allocation
page read and write
1A97AE90000
heap
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
A60000
heap
page read and write
D10000
heap
page read and write
1CE65000
heap
page read and write
27C24468000
heap
page read and write
7FF848C73000
trusted library allocation
page read and write
7FF848C93000
trusted library allocation
page read and write
130A000
heap
page read and write
1A97AF80000
heap
page read and write
1380000
heap
page read and write
27C244B2000
heap
page read and write
26162CC0000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
AD0000
heap
page read and write
7FF848D10000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
15E5000
heap
page read and write
2CB1000
trusted library allocation
page read and write
1C116000
heap
page read and write
A80000
heap
page read and write
26162C98000
heap
page read and write
7FF848C80000
trusted library allocation
page read and write
D10000
heap
page read and write
1B77E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
12FBA000
trusted library allocation
page read and write
14EF000
stack
page read and write
5C307FE000
stack
page read and write
1200000
heap
page read and write
27C244C3000
heap
page read and write
C40000
heap
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
7FF848DB1000
trusted library allocation
page execute and read and write
12FF5000
trusted library allocation
page read and write
7FF848D16000
trusted library allocation
page read and write
D8F000
stack
page read and write
7FF848D20000
trusted library allocation
page read and write
7FF848E41000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
1FA917F0000
heap
page read and write
26162D0F000
heap
page read and write
A8D000
heap
page read and write
1BC7E000
stack
page read and write
27C244D2000
heap
page read and write
7FF848D1C000
trusted library allocation
page execute and read and write
27C26060000
heap
page read and write
27C244B0000
heap
page read and write
27C244E8000
heap
page read and write
CC8000
heap
page read and write
7FF848D26000
trusted library allocation
page read and write
10F6000
stack
page read and write
7FF848E1E000
trusted library allocation
page read and write
12A1C000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page execute and read and write
12FC0000
trusted library allocation
page read and write
7FF848C9B000
trusted library allocation
page execute and read and write
D30000
heap
page read and write
2640000
heap
page read and write
7FF848E41000
trusted library allocation
page read and write
129E9000
trusted library allocation
page read and write
27C24489000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
2A6E000
stack
page read and write
27587FF000
stack
page read and write
12A12000
trusted library allocation
page read and write
1AD60000
trusted library section
page read and write
1FA91830000
heap
page read and write
1BD7E000
stack
page read and write
7FF848CA3000
trusted library allocation
page read and write
7FF848E43000
trusted library allocation
page read and write
2E40000
heap
page execute and read and write
1B1FF000
stack
page read and write
7FF848E16000
trusted library allocation
page read and write
7FF848C9C000
trusted library allocation
page read and write
A8A000
heap
page read and write
7FF848E23000
trusted library allocation
page read and write
1AFC0000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
7FF848F82000
trusted library allocation
page read and write
2B00000
heap
page read and write
7FF848CA4000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
B10000
heap
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
7FF848E60000
trusted library allocation
page read and write
26162CC0000
heap
page read and write
1B3B1000
heap
page read and write
7FF848D36000
trusted library allocation
page read and write
27C244EE000
heap
page read and write
12A28000
trusted library allocation
page read and write
1C6FF000
stack
page read and write
1BBD4000
stack
page read and write
1B2B0000
heap
page read and write
E49000
heap
page read and write
1B670000
heap
page execute and read and write
1CCFF000
stack
page read and write
287A000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
1AFA0000
heap
page execute and read and write
12EA3000
trusted library allocation
page read and write
1B8EE000
stack
page read and write
7FF848E6C000
trusted library allocation
page read and write
1D4DE000
unkown
page read and write
2B01000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page read and write
27C2448A000
heap
page read and write
13A5000
heap
page read and write
1C0BB000
heap
page read and write
2E6C000
trusted library allocation
page read and write
2350000
trusted library section
page read and write
1AD80000
trusted library section
page read and write
1040000
heap
page read and write
1B52E000
stack
page read and write
1CE9F000
heap
page read and write
12FCB000
trusted library allocation
page read and write
2CBE000
stack
page read and write
2220000
trusted library allocation
page read and write
DB5000
heap
page read and write
27C24496000
heap
page read and write
7FF848DC4000
trusted library allocation
page execute and read and write
95E000
stack
page read and write
1A4C0000
trusted library allocation
page read and write
2561000
trusted library allocation
page read and write
26162CDE000
heap
page read and write
1C9F3000
stack
page read and write
126E4000
trusted library allocation
page read and write
12FDF000
trusted library allocation
page read and write
1C6FE000
stack
page read and write
CAB000
heap
page read and write
7FF848D46000
trusted library allocation
page execute and read and write
FF5000
heap
page read and write
7FF848D91000
trusted library allocation
page execute and read and write
1B3C9000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
7FF848D16000
trusted library allocation
page read and write
7FF848D2C000
trusted library allocation
page execute and read and write
1BFE3000
stack
page read and write
27C24488000
heap
page read and write
12B11000
trusted library allocation
page read and write
1BF1E000
stack
page read and write
13A0000
heap
page read and write
12C50000
trusted library allocation
page read and write
10F2000
heap
page read and write
88A000
heap
page read and write
7FF848DA1000
trusted library allocation
page execute and read and write
27C244E0000
heap
page read and write
27C244E0000
heap
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
27C244C3000
heap
page read and write
7FF848C73000
trusted library allocation
page read and write
1015000
heap
page read and write
29B0000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848CBC000
trusted library allocation
page execute and read and write
1EB006F0000
heap
page read and write
1B12E000
stack
page read and write
26162D08000
heap
page read and write
26162CC7000
heap
page read and write
7FF848CA8000
trusted library allocation
page read and write
C3C000
heap
page read and write
7FF848E9D000
trusted library allocation
page read and write
27C24560000
heap
page read and write
7FF848E3C000
trusted library allocation
page read and write
7FF848D76000
trusted library allocation
page execute and read and write
1C7FE000
stack
page read and write
234E000
stack
page read and write
858000
heap
page read and write
AA2000
heap
page read and write
27DF000
trusted library allocation
page read and write
1C37E000
stack
page read and write
1BABE000
stack
page read and write
7FF848C76000
trusted library allocation
page read and write
2E6A000
trusted library allocation
page read and write
12FCF000
trusted library allocation
page read and write
7FF848D4C000
trusted library allocation
page execute and read and write
DF159FF000
stack
page read and write
1B39C000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
2C7D000
trusted library allocation
page read and write
2944000
trusted library allocation
page read and write
12D08000
trusted library allocation
page read and write
There are 1463 hidden memdumps, click here to show them.