IOC Report
Fulloption_V2.1.exe

loading gif

Files

File Path
Type
Category
Malicious
Fulloption_V2.1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Fulloption_V2.1.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0b5tsa0x.avl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0soqawef.b1t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0urdr2wd.rza.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cidhn5k.gc4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2hmxwhrd.llm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ar1pyaf.c1l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bhpygqr4.zno.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cchnrycx.wfb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmfcoaaw.gnq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inp3lahv.cnd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jhrc3s11.3id.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jykicnug.yyi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o35e3weu.0gv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ok5n1vgm.m3i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quescxip.gbd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yo1g1c0h.gx4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 20 08:38:07 2024, mtime=Wed Nov 20 08:38:07 2024, atime=Wed Nov 20 08:38:07 2024, length=75264, window=hide
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fulloption_V2.1.exe
"C:\Users\user\Desktop\Fulloption_V2.1.exe"
malicious
C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe
"C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
malicious
C:\ProgramData\svchost.exe
C:\ProgramData\svchost.exe
malicious
C:\ProgramData\svchost.exe
C:\ProgramData\svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.141.27.248
malicious
https://scripts.sil.org/OFLThis
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://github.com/Pester/Pester
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
http://crl.m
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://go.microsoft.c
unknown
http://go.microsoft.ctain
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/itfoundry/Poppins)&&&&s
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
45.141.27.248
unknown
Netherlands
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost

Memdumps

Base Address
Regiontype
Protect
Malicious
E72000
unkown
page readonly
malicious
3251000
trusted library allocation
page read and write
malicious
32EC000
trusted library allocation
page read and write
malicious
336E000
trusted library allocation
page read and write
malicious
32A1000
trusted library allocation
page read and write
malicious
1E35A000
stack
page read and write
132A8000
trusted library allocation
page read and write
172E5F11000
trusted library allocation
page read and write
22B6C7F0000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
359F8E3000
stack
page read and write
7FFD34972000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
12B2000
heap
page read and write
22B6E7AC000
heap
page read and write
1D200000
heap
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
132AE000
trusted library allocation
page read and write
164EE820000
heap
page read and write
164EE8C0000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
22B00088000
trusted library allocation
page read and write
1F82AE68000
trusted library allocation
page read and write
1F8282C0000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
16481069000
trusted library allocation
page read and write
CF1000
stack
page read and write
22B6EB90000
trusted library allocation
page read and write
12DA8000
trusted library allocation
page read and write
172E3598000
heap
page read and write
22B011DB000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
1220000
heap
page read and write
ADA7DF7000
stack
page read and write
1BC02000
heap
page read and write
131C000
heap
page read and write
1D302000
heap
page read and write
5DF8E7E000
stack
page read and write
1F829DD0000
heap
page execute and read and write
35A02BC000
stack
page read and write
25D4442C000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
16481345000
trusted library allocation
page read and write
22B00BEC000
trusted library allocation
page read and write
1310000
heap
page read and write
1F8285A0000
heap
page read and write
164F07AF000
heap
page read and write
7FFD34BF0000
trusted library allocation
page read and write
22B00229000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
1BAFE000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
164902EA000
trusted library allocation
page read and write
22B01E03000
trusted library allocation
page read and write
1405000
heap
page read and write
7FF6AE6D0000
unkown
page readonly
7FFD3494A000
trusted library allocation
page read and write
5A97477000
stack
page read and write
22B00F62000
trusted library allocation
page read and write
16490021000
trusted library allocation
page read and write
172E60C1000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
172F4F4D000
trusted library allocation
page read and write
5A977FE000
stack
page read and write
1AC51EB0000
heap
page read and write
ADA8F8E000
stack
page read and write
7FFD34BB0000
trusted library allocation
page read and write
1500000
heap
page read and write
16480086000
trusted library allocation
page read and write
172FD735000
heap
page read and write
164902AD000
trusted library allocation
page read and write
1F842510000
heap
page execute and read and write
7FFD34AC3000
trusted library allocation
page read and write
15C0000
heap
page execute and read and write
143F000
heap
page read and write
172FD739000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
1F828304000
heap
page read and write
164EE720000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
172E5EE6000
trusted library allocation
page read and write
ADA8E8C000
stack
page read and write
7FFD34BB6000
trusted library allocation
page read and write
7FFD34763000
trusted library allocation
page execute and read and write
7FFD34980000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
164F0967000
heap
page execute and read and write
1B61E000
stack
page read and write
7FFD34AE9000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
172FD727000
heap
page read and write
22B6E7D9000
heap
page read and write
7FFD3478B000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD348B6000
trusted library allocation
page execute and read and write
1F82B84E000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
E3C000
heap
page read and write
124A000
heap
page read and write
1813000
heap
page read and write
1D0FE000
stack
page read and write
1F82B207000
trusted library allocation
page read and write
5DF9038000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
22B01DDE000
trusted library allocation
page read and write
172E53AD000
trusted library allocation
page read and write
1F842760000
trusted library allocation
page read and write
164EE910000
trusted library allocation
page read and write
22B6C790000
heap
page read and write
7DF4ABE20000
trusted library allocation
page execute and read and write
1648169F000
trusted library allocation
page read and write
22B004CD000
trusted library allocation
page read and write
7FFD34AFA000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
359F96E000
stack
page read and write
7FFD34A90000
trusted library allocation
page read and write
1F828540000
heap
page execute and read and write
172E618D000
trusted library allocation
page read and write
22B6C87A000
heap
page read and write
172E5C51000
trusted library allocation
page read and write
172E67D5000
trusted library allocation
page read and write
1238000
heap
page read and write
14D4000
heap
page read and write
1F82ACEC000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
16481E27000
trusted library allocation
page read and write
359FD79000
stack
page read and write
22B012AA000
trusted library allocation
page read and write
16481957000
trusted library allocation
page read and write
22B6C7D0000
heap
page read and write
ADA813E000
stack
page read and write
22B6E99F000
heap
page read and write
7FFD34B90000
trusted library allocation
page execute and read and write
22B01038000
trusted library allocation
page read and write
7FFD34972000
trusted library allocation
page read and write
172E4E67000
heap
page execute and read and write
1D29A000
heap
page read and write
7FFD34AD2000
trusted library allocation
page read and write
1F82BCDB000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
5A98449000
stack
page read and write
172E4EE1000
trusted library allocation
page read and write
164F0C02000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
1F829DE2000
heap
page read and write
1F8282E5000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
164F0A95000
heap
page read and write
164812AC000
trusted library allocation
page read and write
172E3590000
heap
page read and write
22B00A53000
trusted library allocation
page read and write
B40000
unkown
page readonly
172E3490000
heap
page read and write
22B1006D000
trusted library allocation
page read and write
1802000
heap
page read and write
7FFD34974000
trusted library allocation
page read and write
5A9727E000
stack
page read and write
22B6C838000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
164EE661000
heap
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
31A0000
heap
page read and write
7FFD34792000
trusted library allocation
page read and write
F3A000
unkown
page readonly
7FFD347EC000
trusted library allocation
page execute and read and write
7FFD34902000
trusted library allocation
page read and write
172E6222000
trusted library allocation
page read and write
1F82831E000
heap
page read and write
164F03B0000
heap
page execute and read and write
164F0790000
heap
page read and write
16481CB9000
trusted library allocation
page read and write
164F07FB000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
172FD5FC000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD3492A000
trusted library allocation
page read and write
172FD5C0000
heap
page read and write
3389000
trusted library allocation
page read and write
1D93D000
stack
page read and write
22B6EA77000
heap
page read and write
1BFFF000
stack
page read and write
1345000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
172E35DD000
heap
page read and write
1F842560000
heap
page read and write
1580000
heap
page execute and read and write
1F828570000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34954000
trusted library allocation
page read and write
22B6C8B4000
heap
page read and write
172F51E5000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
1C0FE000
stack
page read and write
7FFD34840000
trusted library allocation
page read and write
172E6CE5000
trusted library allocation
page read and write
188F000
stack
page read and write
D70000
heap
page read and write
172FD71C000
heap
page read and write
5A9787F000
stack
page read and write
1BCF0000
heap
page execute and read and write
1F842640000
heap
page read and write
22B6E380000
heap
page execute and read and write
164EE6AE000
heap
page read and write
7FFD34C00000
trusted library allocation
page read and write
16480001000
trusted library allocation
page read and write
1F828348000
heap
page read and write
1402000
heap
page read and write
16480A52000
trusted library allocation
page read and write
22B6C690000
heap
page read and write
35A01BF000
stack
page read and write
22B6E0A0000
trusted library section
page read and write
7FFD349F0000
trusted library allocation
page read and write
DE0000
heap
page read and write
1AC51FB0000
heap
page read and write
5DF8FB6000
stack
page read and write
1AC522F0000
heap
page read and write
1E55C000
stack
page read and write
E00000
heap
page read and write
F02000
heap
page read and write
5A984CC000
stack
page read and write
22B6EC30000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD34978000
trusted library allocation
page read and write
D60000
heap
page read and write
1450000
heap
page read and write
ADA81BE000
stack
page read and write
1C4FE000
stack
page read and write
7FFD34A12000
trusted library allocation
page read and write
1602000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
7FF6AE6D1000
unkown
page execute read
172FD550000
heap
page execute and read and write
91A19FE000
stack
page read and write
7FFD34BA0000
trusted library allocation
page read and write
132A1000
trusted library allocation
page read and write
1F829F87000
trusted library allocation
page read and write
1F8422E0000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
22B6E782000
heap
page read and write
5DF92BB000
stack
page read and write
22B10031000
trusted library allocation
page read and write
1B7DD000
stack
page read and write
7DF49C650000
trusted library allocation
page execute and read and write
5A974FD000
stack
page read and write
7FFD34941000
trusted library allocation
page read and write
22B0133F000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
22B0130C000
trusted library allocation
page read and write
143D000
heap
page read and write
5DF9C8E000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
164EE665000
heap
page read and write
164F0A9E000
heap
page read and write
338B000
trusted library allocation
page read and write
1445000
heap
page read and write
172E6009000
trusted library allocation
page read and write
5A978FB000
stack
page read and write
35A023E000
stack
page read and write
1B9FE000
stack
page read and write
35A033E000
stack
page read and write
172F51CB000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD348B8000
trusted library allocation
page execute and read and write
164EE681000
heap
page read and write
1F82B111000
trusted library allocation
page read and write
22B00F6F000
trusted library allocation
page read and write
22B6E880000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1F84256F000
heap
page read and write
1816000
heap
page read and write
ADA7CF9000
stack
page read and write
132B2000
trusted library allocation
page read and write
3170000
heap
page execute and read and write
7FFD3478B000
trusted library allocation
page execute and read and write
164F03A0000
trusted library allocation
page read and write
22B6E761000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
172FD70C000
heap
page read and write
172FD60D000
heap
page read and write
7FF4E8170000
trusted library allocation
page execute and read and write
131A1000
trusted library allocation
page read and write
1F8282C8000
heap
page read and write
122E000
heap
page read and write
7FFD34952000
trusted library allocation
page read and write
7FFD34BD0000
trusted library allocation
page read and write
7FFD3476D000
trusted library allocation
page execute and read and write
7FFD34880000
trusted library allocation
page execute and read and write
7FFD34772000
trusted library allocation
page read and write
ADA7C7E000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
172E3580000
trusted library allocation
page read and write
164813C7000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD34AE4000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
16481127000
trusted library allocation
page read and write
1E25E000
stack
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
16481783000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
5A9834C000
stack
page read and write
3030000
trusted library allocation
page read and write
16480228000
trusted library allocation
page read and write
35A0D8E000
stack
page read and write
1BDFE000
stack
page read and write
22B01869000
trusted library allocation
page read and write
35A00BA000
stack
page read and write
1F842680000
heap
page read and write
1F83A107000
trusted library allocation
page read and write
1229000
heap
page read and write
16480C06000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FF6AE88B000
unkown
page write copy
7FFD349E0000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page execute and read and write
172E35CE000
heap
page read and write
164811AC000
trusted library allocation
page read and write
172FD6C9000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
7DF4F7A80000
trusted library allocation
page execute and read and write
7FFD34B80000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
1F83A13E000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
1D2D5000
heap
page read and write
1BCFE000
stack
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
7FFD347CC000
trusted library allocation
page execute and read and write
1648130D000
trusted library allocation
page read and write
172FDA5B000
heap
page read and write
1F82BD20000
trusted library allocation
page read and write
172E34F0000
heap
page read and write
7FFD34AF5000
trusted library allocation
page read and write
1D73E000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD3481C000
trusted library allocation
page execute and read and write
1F828270000
heap
page read and write
1F842294000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
5DF8DF9000
stack
page read and write
22B6E190000
heap
page execute and read and write
131A3000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
22B00001000
trusted library allocation
page read and write
1F82B767000
trusted library allocation
page read and write
164F0C11000
heap
page read and write
359FCFF000
stack
page read and write
16481950000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
7FFD34974000
trusted library allocation
page read and write
1F839F10000
trusted library allocation
page read and write
1F842583000
heap
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
3240000
heap
page read and write
7FFD348B5000
trusted library allocation
page execute and read and write
1F8426C5000
heap
page read and write
140B000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
5DF8EF9000
stack
page read and write
E38000
heap
page read and write
7FFD34B60000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34816000
trusted library allocation
page read and write
35A0E0D000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
22B6E0E0000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
7FFD34941000
trusted library allocation
page read and write
7FFD34BED000
trusted library allocation
page read and write
7DF49C640000
trusted library allocation
page execute and read and write
172E6CC0000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
1F842655000
heap
page read and write
1649006C000
trusted library allocation
page read and write
164EE890000
trusted library section
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34A20000
trusted library allocation
page read and write
E22000
heap
page read and write
164F0A99000
heap
page read and write
7FFD34974000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
164EE975000
heap
page read and write
164F0ACF000
heap
page read and write
16481E0C000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
B40000
unkown
page readonly
5DF8CF9000
stack
page read and write
164804CD000
trusted library allocation
page read and write
7FF6AEAA2000
unkown
page read and write
1478000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
5A9777E000
stack
page read and write
1E45A000
stack
page read and write
7FFD34A19000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
5DF923E000
stack
page read and write
7FFD347A4000
trusted library allocation
page read and write
1F82AFBD000
trusted library allocation
page read and write
13251000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
1279000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
172F51CD000
trusted library allocation
page read and write
22B00F80000
trusted library allocation
page read and write
7FFD34941000
trusted library allocation
page read and write
22B00F6B000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
1F8282D2000
heap
page read and write
1F8285A5000
heap
page read and write
ADA8E0C000
stack
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page execute and read and write
1F8282FD000
heap
page read and write
172E61EE000
trusted library allocation
page read and write
10F1000
stack
page read and write
7FF6AE88C000
unkown
page write copy
172FD737000
heap
page read and write
172E3618000
heap
page read and write
14E0000
heap
page read and write
7FFD34A75000
trusted library allocation
page read and write
7FFD34AE9000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
1382000
heap
page read and write
2DAC000
trusted library allocation
page read and write
1BEFF000
stack
page read and write
13CF000
heap
page read and write
7FFD349D3000
trusted library allocation
page read and write
1BA02000
heap
page read and write
7FFD34BB6000
trusted library allocation
page read and write
359FFBF000
stack
page read and write
164EE701000
heap
page read and write
16490031000
trusted library allocation
page read and write
5DF9F0E000
stack
page read and write
1F828290000
heap
page read and write
7FFD34B8A000
trusted library allocation
page read and write
133B000
heap
page read and write
8F96EFF000
stack
page read and write
ADA8D0C000
stack
page read and write
7FFD34A80000
trusted library allocation
page read and write
1B560000
heap
page execute and read and write
7FFD34A70000
trusted library allocation
page read and write
1D63E000
stack
page read and write
7FFD34773000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
1B602000
heap
page read and write
16481651000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
359F9EE000
stack
page read and write
172E5F9F000
trusted library allocation
page read and write
164F0A70000
heap
page read and write
1F82AE70000
trusted library allocation
page read and write
7FFD34C18000
trusted library allocation
page read and write
359FEFD000
stack
page read and write
1F83A205000
trusted library allocation
page read and write
1F828500000
trusted library allocation
page read and write
172E3510000
heap
page read and write
1F839F31000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
13CF000
stack
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD34C00000
trusted library allocation
page read and write
172E4F66000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
22B6E758000
heap
page read and write
22B01123000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
172E3570000
heap
page readonly
22B6C836000
heap
page read and write
172E6D0A000
trusted library allocation
page read and write
22B01036000
trusted library allocation
page read and write
1227000
heap
page read and write
1F82A952000
trusted library allocation
page read and write
1F8284A0000
heap
page read and write
8F96BC9000
stack
page read and write
164EE66F000
heap
page read and write
22B01784000
trusted library allocation
page read and write
13258000
trusted library allocation
page read and write
7FFD34BF0000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
1F82B287000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
22B6E1E0000
heap
page read and write
7FFD34AC3000
trusted library allocation
page read and write
12CE000
stack
page read and write
13253000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
5A982CE000
stack
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
7FFD34773000
trusted library allocation
page execute and read and write
1F8284E0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
172FD600000
heap
page read and write
7FF6AE88B000
unkown
page read and write
EBF000
heap
page read and write
22B013C7000
trusted library allocation
page read and write
22B6E3A0000
heap
page read and write
7FFD347AB000
trusted library allocation
page read and write
1DE5A000
stack
page read and write
7FFD34B70000
trusted library allocation
page read and write
172FD5FE000
heap
page read and write
172FCF10000
trusted library allocation
page read and write
172FD5A0000
trusted library allocation
page read and write
172E5C5A000
trusted library allocation
page read and write
172E62A7000
trusted library allocation
page read and write
172E35EF000
heap
page read and write
172E3540000
trusted library allocation
page read and write
1F82AE74000
trusted library allocation
page read and write
5A975F7000
stack
page read and write
7FFD34B01000
trusted library allocation
page read and write
7FFD34BEE000
trusted library allocation
page read and write
1E15E000
stack
page read and write
22B10001000
trusted library allocation
page read and write
359FDFE000
stack
page read and write
1BD02000
heap
page execute and read and write
ADA7D7E000
stack
page read and write
7FFD34921000
trusted library allocation
page read and write
7FFD34C1F000
trusted library allocation
page read and write
1300000
heap
page read and write
5DF89CE000
stack
page read and write
16481E02000
trusted library allocation
page read and write
22B00F66000
trusted library allocation
page read and write
1F82B2C3000
trusted library allocation
page read and write
1F82BD00000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
142D000
heap
page read and write
1D24C000
heap
page read and write
1F82B681000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
7FFD34780000
trusted library allocation
page read and write
164F0410000
heap
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
35A0E87000
stack
page read and write
7FFD34BD0000
trusted library allocation
page read and write
172E3825000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34AFC000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
11F0000
heap
page read and write
1200000
heap
page read and write
1C3FC000
stack
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
22B102EB000
trusted library allocation
page read and write
7FFD34764000
trusted library allocation
page read and write
1F82AE7D000
trusted library allocation
page read and write
F75000
unkown
page readonly
22B6CA80000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
22B0182A000
trusted library allocation
page read and write
1F82834B000
heap
page read and write
7FFD34B90000
trusted library allocation
page read and write
1F828546000
heap
page execute and read and write
7FFD34AC0000
trusted library allocation
page read and write
22B6E70E000
heap
page read and write
172E6772000
trusted library allocation
page read and write
7FFD34BA0000
trusted library allocation
page read and write
164F0370000
heap
page execute and read and write
22B6C803000
heap
page read and write
7FFD34846000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
164EE66D000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
164818F2000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
172FD715000
heap
page read and write
172E674C000
trusted library allocation
page read and write
1F842589000
heap
page read and write
7FFD34942000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34AE4000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
1F82B1A6000
trusted library allocation
page read and write
359FC7E000
stack
page read and write
1D2C5000
heap
page read and write
1F842325000
heap
page read and write
7FFD347B4000
trusted library allocation
page read and write
172E34B0000
heap
page read and write
22B6E970000
heap
page read and write
1DD55000
stack
page read and write
16481869000
trusted library allocation
page read and write
7FFD34972000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
1785000
heap
page read and write
7FFD347AB000
trusted library allocation
page read and write
13D0000
heap
page execute and read and write
172FD9E0000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
319E000
stack
page read and write
1F82B7F0000
trusted library allocation
page read and write
16481032000
trusted library allocation
page read and write
35A0F0C000
stack
page read and write
5A9737A000
stack
page read and write
1D2C7000
heap
page read and write
1B2D0000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
1F828520000
trusted library allocation
page read and write
E2D000
heap
page read and write
164F0250000
heap
page read and write
1F839F6D000
trusted library allocation
page read and write
7FFD34A91000
trusted library allocation
page read and write
22B6C8A7000
heap
page read and write
22B6E370000
heap
page execute and read and write
164F0A92000
heap
page read and write
5DF8D7E000
stack
page read and write
1AC51F90000
heap
page read and write
22B6E0C0000
trusted library allocation
page read and write
7FFD34B8A000
trusted library allocation
page read and write
7FFD34912000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
5DF9E8C000
stack
page read and write
1F842646000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD34BF0000
trusted library allocation
page read and write
164EE635000
heap
page read and write
7FFD34A3C000
trusted library allocation
page read and write
1247000
heap
page read and write
22B01951000
trusted library allocation
page read and write
164F0864000
heap
page read and write
1AC52039000
heap
page read and write
E41000
heap
page read and write
1110000
heap
page read and write
1BFFE000
stack
page read and write
1BBFF000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
14FA000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34792000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
172E5E77000
trusted library allocation
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
7FFD3494A000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
22B6E197000
heap
page execute and read and write
E70000
unkown
page readonly
12DA3000
trusted library allocation
page read and write
1F82BD25000
trusted library allocation
page read and write
164F0BD0000
heap
page read and write
35A0F8C000
stack
page read and write
7FFD34826000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
172E3820000
heap
page read and write
164F085B000
heap
page read and write
172E3616000
heap
page read and write
172F4F01000
trusted library allocation
page read and write
5A972FE000
stack
page read and write
16481E17000
trusted library allocation
page read and write
1380000
heap
page read and write
359FE79000
stack
page read and write
35A0138000
stack
page read and write
164EE970000
heap
page read and write
7FF6AE833000
unkown
page readonly
5DF9E07000
stack
page read and write
7FFD34ADC000
trusted library allocation
page read and write
22B6E1F2000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
1B8FF000
stack
page read and write
1F82A3CE000
trusted library allocation
page read and write
1F83A1E6000
trusted library allocation
page read and write
1648193B000
trusted library allocation
page read and write
ADA7E7D000
stack
page read and write
2DA1000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
7FFD34AF2000
trusted library allocation
page read and write
5DF91BE000
stack
page read and write
1B21D000
stack
page read and write
1F828510000
heap
page readonly
7FFD34770000
trusted library allocation
page read and write
ADA8D8E000
stack
page read and write
1570000
heap
page read and write
3316000
trusted library allocation
page read and write
ADA7FB6000
stack
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34BC0000
trusted library allocation
page execute and read and write
7FFD34978000
trusted library allocation
page read and write
1F82AE6C000
trusted library allocation
page read and write
25D443F0000
heap
page read and write
1310000
heap
page read and write
164F0857000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1C1FE000
stack
page read and write
7DF4F7A70000
trusted library allocation
page execute and read and write
7FFD349F0000
trusted library allocation
page read and write
5A96FAD000
stack
page read and write
172E4E70000
heap
page read and write
1BF00000
heap
page read and write
137C000
heap
page read and write
22B6C84E000
heap
page read and write
172F4F11000
trusted library allocation
page read and write
7FFD34AC4000
trusted library allocation
page read and write
172FD665000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
164F07A7000
heap
page read and write
164F0B2D000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
1413000
heap
page read and write
22B6C877000
heap
page read and write
ADA80B9000
stack
page read and write
7DF4ABE10000
trusted library allocation
page execute and read and write
7FFD349E0000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
164902F4000
trusted library allocation
page read and write
ADA7F3E000
stack
page read and write
1F842780000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
16481604000
trusted library allocation
page read and write
22B6E6F0000
heap
page read and write
22B6C830000
heap
page read and write
16490001000
trusted library allocation
page read and write
35A0037000
stack
page read and write
1F83A1F5000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
5A9854C000
stack
page read and write
7FFD34846000
trusted library allocation
page read and write
22B6EA9D000
heap
page read and write
1F839F01000
trusted library allocation
page read and write
1493000
heap
page read and write
22B6C770000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
D30000
heap
page read and write
DB0000
trusted library allocation
page read and write
164F0255000
heap
page read and write
7FFD34BE7000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
1400000
heap
page read and write
144A000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
1245000
heap
page read and write
3325000
trusted library allocation
page read and write
7FFD34AF2000
trusted library allocation
page read and write
16480F9D000
trusted library allocation
page read and write
5A9767A000
stack
page read and write
22B10304000
trusted library allocation
page read and write
172E35D1000
heap
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
5DF9D0C000
stack
page read and write
5A97579000
stack
page read and write
5DF90BB000
stack
page read and write
164EE667000
heap
page read and write
1F828260000
heap
page read and write
164F0C17000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
1F82AE64000
trusted library allocation
page read and write
1F842290000
heap
page read and write
16FF000
stack
page read and write
164EE6AC000
heap
page read and write
7FFD34BE0000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD3479D000
trusted library allocation
page execute and read and write
1302000
heap
page read and write
1F84230C000
heap
page read and write
7DF49C630000
trusted library allocation
page execute and read and write
1513000
heap
page read and write
22B102E6000
trusted library allocation
page read and write
7FFD34978000
trusted library allocation
page read and write
1AFF000
stack
page read and write
7FFD34AF8000
trusted library allocation
page read and write
35A03BB000
stack
page read and write
7FFD349D0000
trusted library allocation
page read and write
172E6834000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
7DF48DF60000
trusted library allocation
page execute and read and write
7FFD34B8C000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
1D245000
heap
page read and write
1F829D80000
trusted library allocation
page read and write
B42000
unkown
page readonly
1730000
heap
page read and write
1BEFE000
stack
page read and write
91A159C000
stack
page read and write
7FFD34932000
trusted library allocation
page read and write
22B6C83C000
heap
page read and write
172FDA6D000
heap
page read and write
12DA1000
trusted library allocation
page read and write
7FF6AE6D1000
unkown
page execute read
1F842597000
heap
page read and write
16481DFE000
trusted library allocation
page read and write
164F0A8C000
heap
page read and write
7FFD34774000
trusted library allocation
page read and write
1350000
heap
page read and write
13A0000
heap
page read and write
1F84269E000
heap
page read and write
13B3000
trusted library allocation
page read and write
172E4E60000
heap
page execute and read and write
172E5931000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
172E5FD1000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
1F839F21000
trusted library allocation
page read and write
22B01E23000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD34BC0000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
7FFD34930000
trusted library allocation
page read and write
172FD67A000
heap
page read and write
7FFD34B83000
trusted library allocation
page read and write
22B010BF000
trusted library allocation
page read and write
1AC52030000
heap
page read and write
DF0000
heap
page execute and read and write
22B6E1E5000
heap
page read and write
131A8000
trusted library allocation
page read and write
1D83D000
stack
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
164EE6A7000
heap
page read and write
172FCF5D000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
22B102F3000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
5DF9D8E000
stack
page read and write
7FFD34BD0000
trusted library allocation
page read and write
1702000
heap
page read and write
13D0000
heap
page read and write
172F51C6000
trusted library allocation
page read and write
1390000
heap
page execute and read and write
7FF6AE6D0000
unkown
page readonly
7FFD34AF8000
trusted library allocation
page read and write
172E35D7000
heap
page read and write
22B00F77000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
1F829F01000
trusted library allocation
page read and write
1F8426D1000
heap
page read and write
3362000
trusted library allocation
page read and write
172F51D5000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD34A00000
trusted library allocation
page read and write
25D44420000
heap
page read and write
164F0C0E000
heap
page read and write
7FFD34BE0000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
7DF48DF50000
trusted library allocation
page execute and read and write
7FFD34AC3000
trusted library allocation
page read and write
164F0851000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
1300000
heap
page read and write
22B6E711000
heap
page read and write
31A1000
trusted library allocation
page read and write
164EE860000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
1F828346000
heap
page read and write
ADA78D3000
stack
page read and write
ADA8F8C000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
1D21B000
heap
page read and write
7FFD34A91000
trusted library allocation
page read and write
1648188F000
trusted library allocation
page read and write
172E35A2000
heap
page read and write
172E3515000
heap
page read and write
164F0440000
heap
page read and write
22B6E0F0000
heap
page readonly
5A985CE000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
7FFD34AFC000
trusted library allocation
page read and write
359FF77000
stack
page read and write
22B6E75A000
heap
page read and write
1243000
heap
page read and write
16481006000
trusted library allocation
page read and write
1F842632000
heap
page read and write
ADA79DE000
stack
page read and write
1F842658000
heap
page read and write
1F842605000
heap
page read and write
172FD960000
heap
page read and write
1DF58000
stack
page read and write
164810C1000
trusted library allocation
page read and write
7FFD34797000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34BE6000
trusted library allocation
page read and write
1600000
heap
page read and write
172E3560000
trusted library allocation
page read and write
172F4EE1000
trusted library allocation
page read and write
E13000
heap
page read and write
7FFD34B20000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
ADA823F000
stack
page read and write
1426000
heap
page read and write
172FCEE0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34AF5000
trusted library allocation
page read and write
ADA795E000
stack
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
2DB1000
trusted library allocation
page read and write
172E33B0000
heap
page read and write
1E05D000
stack
page read and write
7FFD34840000
trusted library allocation
page read and write
5A976F8000
stack
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
172FD748000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
22B6C834000
heap
page read and write
1F842420000
heap
page read and write
7FFD347BC000
trusted library allocation
page execute and read and write
22B00D7D000
trusted library allocation
page read and write
1F82B78D000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
22B00C11000
trusted library allocation
page read and write
7FF6AE834000
unkown
page readonly
1502000
heap
page read and write
E51000
heap
page read and write
7FFD34BD0000
trusted library allocation
page read and write
164EE8E0000
trusted library allocation
page read and write
1F8426A5000
heap
page read and write
ADA8F0C000
stack
page read and write
1BB5A000
stack
page read and write
22B01890000
trusted library allocation
page read and write
1F83A1ED000
trusted library allocation
page read and write
164F012F000
heap
page read and write
1F83A1F3000
trusted library allocation
page read and write
22B6E170000
trusted library allocation
page read and write
164811DF000
trusted library allocation
page read and write
164EE800000
heap
page read and write
164F0AA2000
heap
page read and write
1502000
heap
page read and write
7FF6AEAA6000
unkown
page readonly
7FFD34C1F000
trusted library allocation
page read and write
1C2FE000
stack
page read and write
ADA7EF8000
stack
page read and write
123D000
heap
page read and write
7FFD34AFC000
trusted library allocation
page read and write
14FF000
stack
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
172E608F000
trusted library allocation
page read and write
172FD6E0000
heap
page read and write
164EE8D0000
heap
page readonly
1F82AB03000
trusted library allocation
page read and write
5DF88C3000
stack
page read and write
DF0000
heap
page read and write
13D8000
heap
page read and write
172FD688000
heap
page read and write
164F0960000
heap
page execute and read and write
25D443E0000
heap
page read and write
7FF6AE833000
unkown
page read and write
172E6D05000
trusted library allocation
page read and write
16481E1E000
trusted library allocation
page read and write
1BEFE000
stack
page read and write
172FD625000
heap
page read and write
1B71D000
stack
page read and write
1D28E000
heap
page read and write
164F0BE4000
heap
page read and write
15FE000
stack
page read and write
7FFD34930000
trusted library allocation
page read and write
8F96E7E000
unkown
page read and write
7FFD3494A000
trusted library allocation
page read and write
1F842573000
heap
page read and write
E9A000
heap
page read and write
7FFD34910000
trusted library allocation
page execute and read and write
172FD647000
heap
page read and write
1251000
heap
page read and write
5DF8F3E000
stack
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
5DF913F000
stack
page read and write
EC5000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34958000
trusted library allocation
page read and write
D50000
heap
page read and write
172E361B000
heap
page read and write
1F829EF5000
heap
page read and write
7FFD34B03000
trusted library allocation
page read and write
1902000
heap
page read and write
1620000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
D60000
unkown
page readonly
FC1000
stack
page read and write
172E35D9000
heap
page read and write
22B01E28000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
1F828308000
heap
page read and write
7FFD34AFA000
trusted library allocation
page read and write
7FFD34BC0000
trusted library allocation
page execute and read and write
5A96F23000
stack
page read and write
164902EC000
trusted library allocation
page read and write
7FFD34B7C000
trusted library allocation
page read and write
164EE880000
trusted library section
page read and write
16481E22000
trusted library allocation
page read and write
7FFD34AE9000
trusted library allocation
page read and write
16480D72000
trusted library allocation
page read and write
164EE620000
heap
page read and write
2DAF000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
7FFD34B00000
trusted library allocation
page read and write
164F0822000
heap
page read and write
7FFD34AD8000
trusted library allocation
page read and write
12F4000
stack
page read and write
7FFD34C00000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
172E6044000
trusted library allocation
page read and write
164EE950000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
7FFD34912000
trusted library allocation
page read and write
172E6666000
trusted library allocation
page read and write
1F83A1EB000
trusted library allocation
page read and write
5A973FF000
stack
page read and write
172E000
stack
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
172FD5D1000
heap
page read and write
172FD470000
heap
page read and write
1AC522F5000
heap
page read and write
7FFD34AE4000
trusted library allocation
page read and write
22B10021000
trusted library allocation
page read and write
1F82B0D8000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
5DF8C7E000
stack
page read and write
5DF894E000
stack
page read and write
1F82AE79000
trusted library allocation
page read and write
22B6EA37000
heap
page read and write
137E000
heap
page read and write
E45000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
1720000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
1F82A129000
trusted library allocation
page read and write
164F0C31000
heap
page read and write
7FFD34846000
trusted library allocation
page read and write
172E4ED0000
heap
page execute and read and write
1E800000
heap
page read and write
EC2000
heap
page read and write
5A983CE000
stack
page read and write
7FFD34C10000
trusted library allocation
page read and write
ADA82BB000
stack
page read and write
7FFD34AA3000
trusted library allocation
page read and write
1299000
heap
page read and write
7FFD34BC0000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
172E60FA000
trusted library allocation
page read and write
7FFD34B80000
trusted library allocation
page read and write
164F0B07000
heap
page read and write
315E000
stack
page read and write
7FFD34830000
trusted library allocation
page read and write
22B6E130000
trusted library allocation
page read and write
1F8283B3000
heap
page read and write
16490304000
trusted library allocation
page read and write
164F0AAA000
heap
page read and write
7FFD34B8C000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
22B6CA85000
heap
page read and write
164F0AE9000
heap
page read and write
7FFD34AC9000
trusted library allocation
page read and write
ADA8039000
stack
page read and write
1F82830A000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
1780000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
1BDFD000
stack
page read and write
172E5FDB000
trusted library allocation
page read and write
1F82B020000
trusted library allocation
page read and write
1D2CB000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
1352000
heap
page read and write
22B00F73000
trusted library allocation
page read and write
164902E5000
trusted library allocation
page read and write
164F0990000
heap
page read and write
172E5109000
trusted library allocation
page read and write
E77000
heap
page read and write
329E000
stack
page read and write
ADA8C8F000
stack
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
12C9000
heap
page read and write
164EE8A0000
trusted library allocation
page read and write
1D2AA000
heap
page read and write
1447000
heap
page read and write
7FFD34AF8000
trusted library allocation
page read and write
1625000
heap
page read and write
7FFD34932000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
1F82AE5F000
trusted library allocation
page read and write
1F829EF0000
heap
page read and write
16481DDD000
trusted library allocation
page read and write
7FF6AEAA6000
unkown
page readonly
22B6E0B0000
trusted library section
page read and write
1590000
heap
page read and write
1200000
heap
page read and write
14B0000
heap
page read and write
1213000
heap
page read and write
25D44426000
heap
page read and write
5A96FEE000
stack
page read and write
1DC4E000
stack
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
1800000
heap
page read and write
7FFD34B20000
trusted library allocation
page read and write
22B6C82D000
heap
page read and write
172E5FCF000
trusted library allocation
page read and write
There are 1093 hidden memdumps, click here to show them.