IOC Report
dLRcE11Dkl.exe

loading gif

Files

File Path
Type
Category
Malicious
dLRcE11Dkl.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dLRcE11Dkl.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ratty_win32_directx11.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\All function.cmd
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\All function.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Task Manager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\All function.cmd.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\All function.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0bjsdv4i.tpz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0l51iffg.tq0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qmxwdfz.kse.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ztoew11.5c3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_31fndpky.03j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3acwfl2g.ba4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3adzek40.abk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hgzyfgm.tzf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44snx4vq.a5x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3d2m2j2.pui.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eazc3edu.5en.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmdifspy.1mi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3avciqn.tvq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4nuu035.qeb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkpfrirv.jmi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o4s02nie.c2c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5xjqxul.vnn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rp0gbebc.bft.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rshn4vvj.qmg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5hg4zfs.sgc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ty024g5m.g24.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5cn0wgk.1ix.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wolrdzkz.yq3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xopyyo5c.hm3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xx0xkgqf.4vk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y3120v30.dhg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yp4wtp3r.owu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvxhdpm1.1b1.ps1
ASCII text, with no line terminators
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dLRcE11Dkl.exe
"C:\Users\user\Desktop\dLRcE11Dkl.exe"
malicious
C:\Users\user\AppData\Roaming\All function.cmd
"C:\Users\user\AppData\Roaming\All function.cmd"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\Task Manager.exe
"C:\Users\user\AppData\Roaming\Task Manager.exe"
malicious
C:\Users\user\AppData\Roaming\All function.exe
"C:\Users\user\AppData\Roaming\All function.exe"
malicious
C:\Users\user\AppData\Local\Temp\Ratty_win32_directx11.exe
"C:\Users\user\AppData\Local\Temp\Ratty_win32_directx11.exe"
malicious
C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe
"C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Task Manager.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\BLACKGODDOM V.2 GOD BY LA.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BLACKGODDOM V.2 GOD BY LA.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Task Manager.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.141.27.222
malicious
https://scripts.sil.org/OFLThis
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://discord.gg/sGNBaJSzYDstart
unknown
https://qualityboy.rdcw.xyz/Rat
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
unknown
https://github.com/Pester/Pester
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
http://crl.m)IZ_
unknown
https://qualityboy.rdcw.xyz/
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://discord.gg/sGNBaJSzYD
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/itfoundry/Poppins)&&&&s
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Task Manager_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BLACKGODDOM V_RASMANCS
FileDirectory
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E91000
trusted library allocation
page read and write
malicious
27F1000
trusted library allocation
page read and write
malicious
E12000
unkown
page readonly
malicious
3B2000
unkown
page readonly
malicious
A22000
unkown
page readonly
malicious
2DF1000
trusted library allocation
page read and write
malicious
7FFD348F0000
trusted library allocation
page read and write
745D53F000
stack
page read and write
1BA10000
heap
page read and write
1A73E50A000
trusted library allocation
page read and write
1C4BB031000
trusted library allocation
page read and write
7FFD34640000
trusted library allocation
page read and write
1A73B4C4000
heap
page read and write
7FFD34868000
trusted library allocation
page read and write
2D65E6A7000
trusted library allocation
page read and write
23B5BFCF000
heap
page read and write
F2955BF000
stack
page read and write
1C4AC3EE000
trusted library allocation
page read and write
7FFD349B2000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
2398E8E3000
trusted library allocation
page read and write
7FFD3470C000
trusted library allocation
page execute and read and write
7FFD34830000
trusted library allocation
page execute and read and write
251DAB40000
heap
page read and write
23B43770000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page read and write
D05000
unkown
page readonly
1A73DF7E000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
7FFD34664000
trusted library allocation
page read and write
7FFD349D4000
trusted library allocation
page read and write
7FFD3491D000
trusted library allocation
page read and write
239A5FC6000
heap
page execute and read and write
2399DBDE000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page execute and read and write
7FFD349BC000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD3473C000
trusted library allocation
page execute and read and write
1B90F000
stack
page read and write
2D65F050000
trusted library allocation
page read and write
7FFD34983000
trusted library allocation
page read and write
239A61DA000
heap
page read and write
1A73B430000
heap
page read and write
7FF77147A000
unkown
page readonly
251D904D000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
25831F9000
stack
page read and write
12E91000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page execute and read and write
982000
heap
page read and write
1A73E167000
trusted library allocation
page read and write
1A75559E000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
A64D5BF000
stack
page read and write
2D66E900000
trusted library allocation
page read and write
1F4CA090000
trusted library allocation
page read and write
2399DB80000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page execute and read and write
1A7558CD000
heap
page read and write
F2FD4F9000
stack
page read and write
6BC364C000
stack
page read and write
23B5BC90000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
A64E10C000
stack
page read and write
1A73E180000
trusted library allocation
page read and write
7FFD34706000
trusted library allocation
page read and write
1A73B4C6000
heap
page read and write
1A73B6D0000
heap
page readonly
37D92F9000
stack
page read and write
7DF4856C0000
trusted library allocation
page execute and read and write
1A73E238000
trusted library allocation
page read and write
1F4CA74D000
trusted library allocation
page read and write
1325000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
A64D53F000
stack
page read and write
10D5000
heap
page read and write
1A73EFDA000
trusted library allocation
page read and write
7FFD34844000
trusted library allocation
page read and write
6BC34CD000
stack
page read and write
7FFD34AB0000
trusted library allocation
page read and write
C9E000
stack
page read and write
23B5BEA4000
heap
page read and write
1C4AC332000
trusted library allocation
page read and write
23B4576F000
trusted library allocation
page read and write
934000
heap
page read and write
DB0000
heap
page read and write
251D91C5000
heap
page read and write
1BD1E000
stack
page read and write
2398F3D6000
trusted library allocation
page read and write
6BC297C000
stack
page read and write
7DF4856B0000
trusted library allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
1F4C85C0000
heap
page read and write
7FFD349AC000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
2D65C5E8000
heap
page read and write
1090000
trusted library allocation
page read and write
251D8FF0000
heap
page read and write
1C4C37F5000
heap
page read and write
7FFD34736000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
1F4CB339000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
1C4AAD80000
trusted library allocation
page read and write
745D5BE000
stack
page read and write
251DBDC5000
trusted library allocation
page read and write
1C4ABFCC000
trusted library allocation
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
1C4AB0B0000
trusted library allocation
page read and write
1F4CA0D0000
heap
page read and write
F2FE6C7000
stack
page read and write
1A73B6E0000
trusted library allocation
page read and write
1A73B480000
heap
page read and write
1A73DF17000
trusted library allocation
page read and write
1C4A9368000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
1B41D000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
2D66E780000
trusted library allocation
page read and write
23B438A0000
heap
page execute and read and write
F29563E000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
23B44B5E000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD34682000
trusted library allocation
page read and write
27EE000
stack
page read and write
7FFD34726000
trusted library allocation
page read and write
7FFD3465D000
trusted library allocation
page execute and read and write
1A73EB4E000
trusted library allocation
page read and write
23B43B7A000
trusted library allocation
page read and write
1F4DA624000
trusted library allocation
page read and write
1F4C8647000
heap
page read and write
1C4C3756000
heap
page read and write
1C4AB4FE000
trusted library allocation
page read and write
2398D890000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
239A5F54000
heap
page read and write
2398F4BE000
trusted library allocation
page read and write
1C4C3854000
heap
page read and write
251DBE55000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
7FFD34683000
trusted library allocation
page execute and read and write
7FFD34684000
trusted library allocation
page read and write
1F4C8830000
heap
page readonly
1A74D210000
trusted library allocation
page read and write
A64CCF3000
stack
page read and write
7FFD349D4000
trusted library allocation
page read and write
23B41C28000
heap
page read and write
1F4E29C0000
heap
page read and write
1F4DA281000
trusted library allocation
page read and write
1F4CB51F000
trusted library allocation
page read and write
A34000
unkown
page readonly
251F339F000
heap
page read and write
7FFD34852000
trusted library allocation
page read and write
1F4CA060000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
1B800000
heap
page execute and read and write
F2FD67D000
stack
page read and write
7FFD34660000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
2D65FD5D000
trusted library allocation
page read and write
251EABBD000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
258367E000
stack
page read and write
7FFD348E0000
trusted library allocation
page read and write
23B43E1F000
trusted library allocation
page read and write
7FFD3471C000
trusted library allocation
page execute and read and write
93E000
heap
page read and write
23B41DE0000
trusted library allocation
page read and write
F29608E000
stack
page read and write
37D917F000
stack
page read and write
1B1E0000
heap
page read and write
7FFD34800000
trusted library allocation
page read and write
1F4C85E4000
heap
page read and write
916000
heap
page read and write
1C4C385F000
heap
page read and write
1F4C8800000
trusted library allocation
page read and write
DB5000
heap
page read and write
745E08D000
stack
page read and write
2D65F060000
trusted library allocation
page read and write
1A73E3A9000
trusted library allocation
page read and write
251EAE45000
trusted library allocation
page read and write
1F4E26F6000
heap
page read and write
1A74D4F5000
trusted library allocation
page read and write
23B41E00000
trusted library allocation
page read and write
2DFE000
stack
page read and write
1C4A93A2000
heap
page read and write
7FFD34868000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
1C4C3570000
heap
page read and write
23B5C0C1000
heap
page read and write
6BC344E000
stack
page read and write
1B1D0000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
7FFD3469B000
trusted library allocation
page read and write
1C4C3801000
heap
page read and write
7FFD349A4000
trusted library allocation
page read and write
251F2FFF000
heap
page read and write
1F4DA2A1000
trusted library allocation
page read and write
1F4CB21D000
trusted library allocation
page read and write
7FFD349E8000
trusted library allocation
page read and write
7FFD349DC000
trusted library allocation
page read and write
7FFD34834000
trusted library allocation
page read and write
A64D63E000
stack
page read and write
251F3391000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
251F3001000
heap
page read and write
10AC000
heap
page read and write
258317F000
stack
page read and write
7DF4B4E70000
trusted library allocation
page execute and read and write
7FFD34654000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
2398BFD5000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
7FFD348A7000
trusted library allocation
page read and write
1F4C8606000
heap
page read and write
7FFD34664000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
1C4C353F000
heap
page read and write
2D65E290000
trusted library allocation
page read and write
115C000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
1A74D26F000
trusted library allocation
page read and write
7FFD349B9000
trusted library allocation
page read and write
2398E927000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
1F4E27A6000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
1C4BB315000
trusted library allocation
page read and write
7FFD34A8E000
trusted library allocation
page read and write
2398F2F1000
trusted library allocation
page read and write
2398E768000
trusted library allocation
page read and write
251D9078000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
1F4CC059000
trusted library allocation
page read and write
12E93000
trusted library allocation
page read and write
1F4E2A99000
heap
page read and write
7FFD349EC000
trusted library allocation
page read and write
2D65F8AB000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
2D65E319000
heap
page read and write
7FFD347F5000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
37D957E000
stack
page read and write
1F4E270E000
heap
page read and write
2398BFAE000
heap
page read and write
2398BFDA000
heap
page read and write
2CEE000
stack
page read and write
1F4CB2AE000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
23B5BFF2000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
1A73CF70000
trusted library allocation
page read and write
7FFD34662000
trusted library allocation
page read and write
7FFD3473C000
trusted library allocation
page execute and read and write
1F4CA0D5000
heap
page read and write
1BC0E000
stack
page read and write
1C4AB4DE000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
1F4C8840000
heap
page read and write
745D279000
stack
page read and write
23B5C0FB000
heap
page read and write
7FFD349C9000
trusted library allocation
page read and write
A64D6BB000
stack
page read and write
6BC35CE000
stack
page read and write
D90000
heap
page read and write
1A73EA66000
trusted library allocation
page read and write
251DBB54000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD349CC000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD34832000
trusted library allocation
page read and write
1C4AC2D1000
trusted library allocation
page read and write
37DA0CC000
stack
page read and write
1C4A93AA000
heap
page read and write
1C4AC8BD000
trusted library allocation
page read and write
251DBC0B000
trusted library allocation
page read and write
1F4C85DE000
heap
page read and write
2D65C5A4000
heap
page read and write
1F4E2AC0000
heap
page read and write
1B60F000
stack
page read and write
1F4C85FE000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
251D91B0000
trusted library allocation
page read and write
10CD000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
23B43940000
heap
page execute and read and write
2582DFE000
stack
page read and write
1A73B6A0000
trusted library allocation
page read and write
7FFD34662000
trusted library allocation
page read and write
1F4CA050000
heap
page read and write
239A5F8E000
heap
page read and write
37D93FB000
stack
page read and write
251DC972000
trusted library allocation
page read and write
1A755690000
heap
page execute and read and write
2DEE000
stack
page read and write
2D66E765000
trusted library allocation
page read and write
1440000
heap
page read and write
986000
heap
page read and write
7FFD3480A000
trusted library allocation
page read and write
740000
heap
page read and write
1AD8D000
stack
page read and write
23B41C1C000
heap
page read and write
2398ED46000
trusted library allocation
page read and write
2D65E382000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
F294DCF000
stack
page read and write
1F4DA4BC000
trusted library allocation
page read and write
1A74D4E8000
trusted library allocation
page read and write
1F4CBB0B000
trusted library allocation
page read and write
1F4DA565000
trusted library allocation
page read and write
7FFD34AAD000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
1A7558DE000
heap
page read and write
2398EE73000
trusted library allocation
page read and write
1C4AC189000
trusted library allocation
page read and write
2D66E986000
trusted library allocation
page read and write
251DC928000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page execute and read and write
239A5EBE000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
7FFD349EC000
trusted library allocation
page read and write
7FFD34821000
trusted library allocation
page read and write
2398EBA0000
trusted library allocation
page read and write
F2FE5CA000
stack
page read and write
1A73E5C5000
trusted library allocation
page read and write
7FFD349B3000
trusted library allocation
page read and write
2D65C5AA000
heap
page read and write
2CE0000
trusted library allocation
page read and write
23B41BE0000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
1C4A93E7000
heap
page read and write
745E28D000
stack
page read and write
7FFD34A86000
trusted library allocation
page read and write
7FFD34673000
trusted library allocation
page execute and read and write
7FFD34A8C000
trusted library allocation
page read and write
239A6115000
heap
page read and write
1C4AAE20000
heap
page read and write
23B53951000
trusted library allocation
page read and write
1A73D429000
trusted library allocation
page read and write
258424D000
stack
page read and write
7FFD34684000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
1C4ACE0F000
trusted library allocation
page read and write
1C4ACE59000
trusted library allocation
page read and write
1F4E2667000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
2399DF0F000
trusted library allocation
page read and write
7FFD34726000
trusted library allocation
page execute and read and write
7FFD3465B000
trusted library allocation
page read and write
2D66E748000
trusted library allocation
page read and write
23B45774000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
251F3280000
heap
page read and write
116D000
heap
page read and write
23B5C01E000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD348A4000
trusted library allocation
page read and write
1C01E000
stack
page read and write
1C4AC336000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
7FF7720B5000
unkown
page write copy
A64D0F9000
stack
page read and write
7FFD34862000
trusted library allocation
page read and write
23B44BF2000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
1C4A9310000
heap
page read and write
2D65C59C000
heap
page read and write
23B43951000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
2398E959000
trusted library allocation
page read and write
23B44981000
trusted library allocation
page read and write
251D9075000
heap
page read and write
239A5F36000
heap
page read and write
1BA0E000
stack
page read and write
F2FD6F9000
stack
page read and write
1C4A93E5000
heap
page read and write
F2FD9FC000
stack
page read and write
7FFD34860000
trusted library allocation
page read and write
DC0000
heap
page read and write
1C4AAE25000
heap
page read and write
1BA1D000
stack
page read and write
1A73E17C000
trusted library allocation
page read and write
7FFD34674000
trusted library allocation
page read and write
25834FE000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
6BC237E000
stack
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
7FFD34830000
trusted library allocation
page execute and read and write
239A6214000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
E10000
unkown
page readonly
2D65E020000
trusted library allocation
page read and write
2398E03D000
trusted library allocation
page read and write
F29618E000
stack
page read and write
7FFD349EA000
trusted library allocation
page read and write
2D65C820000
heap
page readonly
6BC24FE000
stack
page read and write
258434E000
stack
page read and write
B60000
unkown
page readonly
1A73D080000
trusted library allocation
page read and write
1BE1E000
stack
page read and write
1F4E2780000
heap
page read and write
1A73B507000
heap
page read and write
7FFD34766000
trusted library allocation
page execute and read and write
1A73B790000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
2CF0000
heap
page execute and read and write
2D66E767000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page read and write
1C4BB3CD000
trusted library allocation
page read and write
7FFD346A0000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
1F4CB282000
trusted library allocation
page read and write
840000
heap
page read and write
A12000
unkown
page readonly
6BC22FE000
stack
page read and write
129F000
stack
page read and write
2399DB71000
trusted library allocation
page read and write
1A73F000000
trusted library allocation
page read and write
6BC2679000
stack
page read and write
7FF771351000
unkown
page execute read
258434C000
stack
page read and write
7FFD34900000
trusted library allocation
page read and write
1F4C860C000
heap
page read and write
1B1CE000
stack
page read and write
7FFD346DC000
trusted library allocation
page execute and read and write
2D65C5A6000
heap
page read and write
251EAB81000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
239A6251000
heap
page read and write
7DF4B4E60000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
6BC2273000
stack
page read and write
7FFD34854000
trusted library allocation
page read and write
23B41B40000
heap
page read and write
127F8000
trusted library allocation
page read and write
37DA2CC000
stack
page read and write
23B41C24000
heap
page read and write
1F4CC0A3000
trusted library allocation
page read and write
A64E30E000
stack
page read and write
1A73B50D000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
7FF4F14A0000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
1F4C8590000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
1175000
heap
page read and write
7FFD34811000
trusted library allocation
page read and write
251DBAEF000
trusted library allocation
page read and write
1F4E2A1B000
heap
page read and write
7FFD34831000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
1A73B4DE000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD34824000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
1100000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
1F4E2A58000
heap
page read and write
1A73B54C000
heap
page read and write
1520000
heap
page read and write
2D65C5E5000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34864000
trusted library allocation
page read and write
1F4CACD1000
trusted library allocation
page read and write
A64D4B8000
stack
page read and write
23B41BB0000
heap
page read and write
1F4E2AF0000
heap
page read and write
2398F970000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
23B53C3B000
trusted library allocation
page read and write
2398EE12000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
251D90F0000
heap
page read and write
F29517F000
stack
page read and write
12E98000
trusted library allocation
page read and write
F2FDA7F000
stack
page read and write
1C4A9720000
heap
page read and write
7FFD34644000
trusted library allocation
page read and write
2D65EEAB000
trusted library allocation
page read and write
10E2000
heap
page read and write
239A6320000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
2D65E2C0000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD349C2000
trusted library allocation
page read and write
7FFD3466B000
trusted library allocation
page read and write
F294CC2000
stack
page read and write
F2FE54F000
stack
page read and write
7FFD3473C000
trusted library allocation
page execute and read and write
37D8DCE000
stack
page read and write
1A73DF87000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
CD4000
unkown
page readonly
23B41E40000
heap
page read and write
6BC1FDE000
stack
page read and write
2D65F7C3000
trusted library allocation
page read and write
251F2FAF000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
F2FE74D000
stack
page read and write
1F4C86B1000
heap
page read and write
F29527E000
stack
page read and write
D55000
heap
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD346AC000
trusted library allocation
page execute and read and write
1F4E2A0E000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
1A73B420000
heap
page read and write
7FFD349D8000
trusted library allocation
page read and write
2398D9A9000
heap
page read and write
1A73E16B000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD3482A000
trusted library allocation
page read and write
1F4E2730000
heap
page execute and read and write
7FFD3470C000
trusted library allocation
page execute and read and write
7FFD34AA0000
trusted library allocation
page read and write
23B44C53000
trusted library allocation
page read and write
37DA1C9000
stack
page read and write
7FFD34710000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
1F4DA2B1000
trusted library allocation
page read and write
745D07F000
stack
page read and write
F2FD8FE000
stack
page read and write
251DC43D000
trusted library allocation
page read and write
7FFD346BC000
trusted library allocation
page execute and read and write
1A73E4A8000
trusted library allocation
page read and write
1C4BB333000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
1525000
heap
page read and write
37D8D8F000
stack
page read and write
23B446C7000
trusted library allocation
page read and write
1A755630000
heap
page read and write
23B5BD54000
heap
page read and write
1A73DE11000
trusted library allocation
page read and write
2398DD99000
trusted library allocation
page read and write
1310000
heap
page read and write
251F3180000
heap
page read and write
2D65C830000
trusted library allocation
page read and write
1F4CA281000
trusted library allocation
page read and write
7FFD349C8000
trusted library allocation
page read and write
1A73B553000
heap
page read and write
2399DE75000
trusted library allocation
page read and write
745D438000
stack
page read and write
2583377000
stack
page read and write
7FFD34AD0000
trusted library allocation
page read and write
251DC49C000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
1C4C385B000
heap
page read and write
7FFD34690000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page execute and read and write
A64D3B6000
stack
page read and write
239A624F000
heap
page read and write
F2951F7000
stack
page read and write
7FFD34674000
trusted library allocation
page read and write
1185000
heap
page read and write
7FFD3466D000
trusted library allocation
page execute and read and write
1A73E981000
trusted library allocation
page read and write
7FFD34736000
trusted library allocation
page execute and read and write
7FFD348E0000
trusted library allocation
page read and write
1C4A96F0000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
F29630E000
stack
page read and write
7FFD348A0000
trusted library allocation
page read and write
1F4CBD1D000
trusted library allocation
page read and write
1C4ABDAE000
trusted library allocation
page read and write
1A73EA8D000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
1C4C34C4000
heap
page read and write
251F3100000
trusted library allocation
page read and write
1C4AADC0000
trusted library allocation
page read and write
251F306D000
heap
page read and write
23B41B70000
heap
page read and write
37DA04E000
stack
page read and write
1A73B795000
heap
page read and write
1C11E000
stack
page read and write
7FFD34880000
trusted library allocation
page read and write
1A73E16F000
trusted library allocation
page read and write
7DF435620000
trusted library allocation
page execute and read and write
7FFD34683000
trusted library allocation
page execute and read and write
7FFD34A8D000
trusted library allocation
page read and write
7DF4411A0000
trusted library allocation
page execute and read and write
251F3170000
heap
page execute and read and write
1F4CA2FF000
trusted library allocation
page read and write
10A0000
heap
page read and write
251D90B0000
heap
page read and write
2398EB15000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD346FC000
trusted library allocation
page execute and read and write
2398F827000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page execute and read and write
23B44A6F000
trusted library allocation
page read and write
7FFD34A4A000
trusted library allocation
page read and write
1A73B680000
trusted library section
page read and write
1F4E2AA0000
heap
page read and write
B60000
unkown
page readonly
251F33E1000
heap
page read and write
1F4C864C000
heap
page read and write
1A755540000
heap
page read and write
141E000
stack
page read and write
F2FDAFB000
stack
page read and write
239A5FC0000
heap
page execute and read and write
1C4A93EA000
heap
page read and write
251F31A0000
heap
page read and write
745CF7E000
stack
page read and write
2398DB71000
trusted library allocation
page read and write
1BA0D000
stack
page read and write
251D9002000
heap
page read and write
2398E778000
trusted library allocation
page read and write
2398C1F0000
heap
page read and write
1BC1E000
stack
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
7FFD34A7A000
trusted library allocation
page read and write
251F33F0000
heap
page read and write
A64D1F9000
stack
page read and write
7FFD34810000
trusted library allocation
page read and write
23B451B6000
trusted library allocation
page read and write
1C4BB319000
trusted library allocation
page read and write
2398BE20000
heap
page read and write
2398D880000
heap
page readonly
23B4378F000
heap
page read and write
1B83A000
heap
page read and write
7FFD34822000
trusted library allocation
page read and write
F29507F000
stack
page read and write
7FFD34A6C000
trusted library allocation
page read and write
2D65E110000
heap
page execute and read and write
1A755696000
heap
page execute and read and write
7FFD34860000
trusted library allocation
page read and write
B70000
unkown
page readonly
7FFD34940000
trusted library allocation
page read and write
6BC287E000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
745CFF9000
stack
page read and write
7FFD3471C000
trusted library allocation
page execute and read and write
7FFD348D0000
trusted library allocation
page read and write
1C4C3447000
heap
page execute and read and write
7FFD34AA0000
trusted library allocation
page execute and read and write
7FFD347E2000
trusted library allocation
page read and write
1F4C8608000
heap
page read and write
F294D4F000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
23B41C20000
heap
page read and write
23B446BE000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page execute and read and write
7FFD34822000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
2582DBE000
stack
page read and write
1C4AC982000
trusted library allocation
page read and write
251DBD27000
trusted library allocation
page read and write
7DF49A5A0000
trusted library allocation
page execute and read and write
7FFD34864000
trusted library allocation
page read and write
1A7558BD000
heap
page read and write
7DF426500000
trusted library allocation
page execute and read and write
1BD0E000
stack
page read and write
7FFD34810000
trusted library allocation
page execute and read and write
F2FD7FA000
stack
page read and write
7FFD3467B000
trusted library allocation
page read and write
251F33ED000
heap
page read and write
1B820000
heap
page read and write
1A73E2BD000
trusted library allocation
page read and write
1C4A9725000
heap
page read and write
1C4A93A0000
heap
page read and write
7DF441190000
trusted library allocation
page execute and read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
1C4C3471000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
6BC26F7000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
F29610C000
stack
page read and write
2E80000
heap
page read and write
7FFD346AC000
trusted library allocation
page execute and read and write
745D4BE000
stack
page read and write
7FFD34690000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
F2956BB000
stack
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
1C4BB051000
trusted library allocation
page read and write
251DAA50000
heap
page execute and read and write
7FFD34930000
trusted library allocation
page read and write
2D65FD37000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
1195000
heap
page read and write
6BC36CC000
stack
page read and write
239A6045000
heap
page read and write
F2FD878000
stack
page read and write
1C4BB061000
trusted library allocation
page read and write
7FFD349E2000
trusted library allocation
page read and write
6BC2778000
stack
page read and write
23B41C3C000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
745E30E000
stack
page read and write
1C4C3370000
heap
page execute and read and write
1A73D287000
trusted library allocation
page read and write
1C4C34F6000
heap
page read and write
23B5BE66000
heap
page execute and read and write
1F4E2AD0000
heap
page read and write
1C4C3450000
heap
page read and write
1A7555CC000
heap
page read and write
251DAB45000
heap
page read and write
7FFD348D0000
trusted library allocation
page read and write
A10000
unkown
page readonly
117D000
heap
page read and write
B62000
unkown
page readonly
7FFD34770000
trusted library allocation
page execute and read and write
1C4AC14F000
trusted library allocation
page read and write
37DA24E000
stack
page read and write
7FFD349A3000
trusted library allocation
page read and write
1F4C85C8000
heap
page read and write
2582CB3000
stack
page read and write
2398DBEB000
trusted library allocation
page read and write
2398EC2D000
trusted library allocation
page read and write
1C4AC7B5000
trusted library allocation
page read and write
1C4ABA84000
trusted library allocation
page read and write
23B5C09F000
heap
page read and write
7FFD349C4000
trusted library allocation
page read and write
1A73E3DC000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
258327D000
stack
page read and write
1C4AC0EC000
trusted library allocation
page read and write
2D65E352000
heap
page read and write
745D2BE000
stack
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
23B451DC000
trusted library allocation
page read and write
7FFD349D9000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD349B3000
trusted library allocation
page read and write
F2FE4CE000
stack
page read and write
B0E000
stack
page read and write
1F4CBB6E000
trusted library allocation
page read and write
A64D43B000
stack
page read and write
1F4CB031000
trusted library allocation
page read and write
23B41C63000
heap
page read and write
F2FD18E000
stack
page read and write
1C4C3544000
heap
page read and write
23B5BEB5000
heap
page read and write
1A7557A3000
heap
page read and write
239A6440000
heap
page read and write
202000
unkown
page readonly
6BC25FD000
stack
page read and write
1F4DA571000
trusted library allocation
page read and write
2D65E3B8000
heap
page read and write
1F4E2880000
trusted library allocation
page read and write
251D8FF8000
heap
page read and write
251F3394000
heap
page read and write
7FF772136000
unkown
page readonly
239A6139000
heap
page read and write
7FFD34862000
trusted library allocation
page read and write
7FFD349A8000
trusted library allocation
page read and write
910000
heap
page read and write
23B41E90000
heap
page read and write
1C4ACE54000
trusted library allocation
page read and write
1A73E178000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
251DBCAD000
trusted library allocation
page read and write
1F4E2654000
heap
page read and write
23B5C067000
heap
page read and write
7FF771350000
unkown
page readonly
7FFD34850000
trusted library allocation
page execute and read and write
1F4CBBCD000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page execute and read and write
251DB8C4000
trusted library allocation
page read and write
1F4DA573000
trusted library allocation
page read and write
7FFD34736000
trusted library allocation
page read and write
3B0000
unkown
page readonly
23B43775000
heap
page read and write
1A73D6CD000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
127F3000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
1BA22000
heap
page read and write
2399DE5C000
trusted library allocation
page read and write
7FFD34802000
trusted library allocation
page read and write
1F4E26DB000
heap
page read and write
25841C6000
stack
page read and write
7FFD3465D000
trusted library allocation
page execute and read and write
1A755610000
heap
page read and write
1140000
trusted library allocation
page read and write
1020000
heap
page read and write
1F4CAE84000
trusted library allocation
page read and write
7FFD34652000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
1F4E29D0000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
1A7557C3000
heap
page read and write
23B5C0EE000
heap
page read and write
1A75590A000
heap
page read and write
1A73F025000
trusted library allocation
page read and write
251DBC6E000
trusted library allocation
page read and write
10F4000
stack
page read and write
7DF435610000
trusted library allocation
page execute and read and write
6F4000
stack
page read and write
F2952F8000
stack
page read and write
37D9377000
stack
page read and write
7FFD34AA6000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
A64E28C000
stack
page read and write
2D66E761000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
7FFD34858000
trusted library allocation
page read and write
2D65E2EE000
heap
page read and write
1320000
heap
page read and write
F29553E000
stack
page read and write
1C4A96C0000
heap
page read and write
200000
unkown
page readonly
7FFD3483A000
trusted library allocation
page read and write
2399DBA1000
trusted library allocation
page read and write
1F4CB581000
trusted library allocation
page read and write
251D8F10000
heap
page read and write
1A73B4BE000
heap
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
7FFD346A0000
trusted library allocation
page read and write
F29533E000
stack
page read and write
7FFD348A0000
trusted library allocation
page read and write
23B53971000
trusted library allocation
page read and write
251DAA00000
trusted library allocation
page read and write
200000
unkown
page readonly
1A73D1F0000
heap
page execute and read and write
7FFD34653000
trusted library allocation
page execute and read and write
1C4C384A000
heap
page read and write
1C4AAE31000
heap
page read and write
239A61A1000
heap
page read and write
1F4C9FF0000
trusted library allocation
page read and write
1A73D201000
trusted library allocation
page read and write
10DF000
heap
page read and write
2D65F784000
trusted library allocation
page read and write
7FFD349B4000
trusted library allocation
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
7FFD34642000
trusted library allocation
page read and write
7FFD34828000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
251DC2CE000
trusted library allocation
page read and write
F2FD57E000
stack
page read and write
7FFD34692000
trusted library allocation
page read and write
7FFD3496D000
trusted library allocation
page read and write
23B41BE8000
heap
page read and write
37D95FE000
stack
page read and write
1A74D231000
trusted library allocation
page read and write
A64E08E000
stack
page read and write
23B5C0DF000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
25832F9000
stack
page read and write
B95000
heap
page read and write
7FFD34683000
trusted library allocation
page execute and read and write
37D90FA000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
1F4E29E3000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
25E0000
heap
page execute and read and write
1C4C3862000
heap
page read and write
1C4AC034000
trusted library allocation
page read and write
946000
heap
page read and write
239A6028000
heap
page read and write
1C4A92E0000
heap
page read and write
1192000
heap
page read and write
37D927E000
stack
page read and write
745E20C000
stack
page read and write
7FFD346F6000
trusted library allocation
page read and write
7FFD34973000
trusted library allocation
page read and write
F2954BB000
stack
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page execute and read and write
7FFD3467D000
trusted library allocation
page execute and read and write
2399DE65000
trusted library allocation
page read and write
258414E000
stack
page read and write
2398BF62000
heap
page read and write
11BF000
heap
page read and write
2398BF8D000
heap
page read and write
1219000
heap
page read and write
1A7557A0000
heap
page read and write
953000
heap
page read and write
251EAB51000
trusted library allocation
page read and write
2398F94A000
trusted library allocation
page read and write
1F4CA4A8000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
23B5BE60000
heap
page execute and read and write
2398BF90000
heap
page read and write
251F301C000
heap
page read and write
251DBB80000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
251DBDF3000
trusted library allocation
page read and write
EF4000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
1F4CB452000
trusted library allocation
page read and write
7FFD34756000
trusted library allocation
page execute and read and write
7FFD34880000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34663000
trusted library allocation
page execute and read and write
23B44548000
trusted library allocation
page read and write
1C4C37EA000
heap
page read and write
2398EB17000
trusted library allocation
page read and write
7FFD34A33000
trusted library allocation
page read and write
F29543C000
stack
page read and write
37D907E000
stack
page read and write
2D65C845000
heap
page read and write
251DBD60000
trusted library allocation
page read and write
7FFD34643000
trusted library allocation
page execute and read and write
251D9110000
heap
page read and write
7FFD34746000
trusted library allocation
page execute and read and write
1F4E2B1A000
heap
page read and write
1C4AB000000
heap
page execute and read and write
1B300000
heap
page execute and read and write
251D902D000
heap
page read and write
1F4C8845000
heap
page read and write
745CE72000
stack
page read and write
1BF1B000
stack
page read and write
745D3BE000
stack
page read and write
1C4BB09C000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
2D65C560000
heap
page read and write
1A7558B8000
heap
page read and write
1F4C8790000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
1B80C000
stack
page read and write
2D65C750000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
1F4CB48B000
trusted library allocation
page read and write
1445000
heap
page read and write
1B8B0000
heap
page read and write
A07000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
251DAD79000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD34684000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page read and write
7FFD349A2000
trusted library allocation
page read and write
1C4A93BE000
heap
page read and write
1F4DA569000
trusted library allocation
page read and write
F2FE64E000
stack
page read and write
1F4C8580000
heap
page read and write
1C4C376E000
heap
page read and write
1F4CA270000
heap
page execute and read and write
1BB1E000
stack
page read and write
7FFD34910000
trusted library allocation
page read and write
1A73DC51000
trusted library allocation
page read and write
1F4CB16F000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page execute and read and write
127F1000
trusted library allocation
page read and write
2D65C59E000
heap
page read and write
7FFD34664000
trusted library allocation
page read and write
23B5BCD3000
heap
page read and write
2D65E147000
heap
page read and write
1C4ACE34000
trusted library allocation
page read and write
7FFD34672000
trusted library allocation
page read and write
7FFD3468B000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
F2FD10E000
stack
page read and write
23B5BD2D000
heap
page read and write
239A5FD0000
heap
page execute and read and write
745CEFF000
stack
page read and write
1F4CB632000
trusted library allocation
page read and write
118F000
heap
page read and write
23B4574F000
trusted library allocation
page read and write
F29628C000
stack
page read and write
251D9039000
heap
page read and write
7FFD34672000
trusted library allocation
page read and write
258357E000
stack
page read and write
745D338000
stack
page read and write
B90000
heap
page read and write
258347B000
stack
page read and write
1C4C3720000
heap
page read and write
1F4DA717000
trusted library allocation
page read and write
1BF0F000
stack
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page execute and read and write
1B50F000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
1C4A939E000
heap
page read and write
7FFD349E8000
trusted library allocation
page read and write
1C4AC8C1000
trusted library allocation
page read and write
1F4CA010000
heap
page execute and read and write
7FFD34840000
trusted library allocation
page execute and read and write
1F4DA583000
trusted library allocation
page read and write
A64CD7F000
stack
page read and write
7FFD34880000
trusted library allocation
page read and write
1B1F5000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
7FFD34994000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
1C4AC205000
trusted library allocation
page read and write
2398D990000
heap
page read and write
7FFD34A80000
trusted library allocation
page execute and read and write
2398EB0F000
trusted library allocation
page read and write
2D65C7F0000
trusted library allocation
page read and write
23B41B50000
heap
page read and write
151F000
stack
page read and write
251DC96D000
trusted library allocation
page read and write
23B5BD79000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
23B5BE9A000
heap
page read and write
239A6100000
heap
page read and write
2D65E2B0000
heap
page read and write
1F4CB63C000
trusted library allocation
page read and write
2D65FD7C000
trusted library allocation
page read and write
23B4529D000
trusted library allocation
page read and write
7FFD3464D000
trusted library allocation
page execute and read and write
1C4AAD40000
heap
page readonly
7FFD3466D000
trusted library allocation
page execute and read and write
251DA980000
trusted library allocation
page read and write
251DC94D000
trusted library allocation
page read and write
37D8D0F000
stack
page read and write
1150000
heap
page read and write
23B5BE50000
heap
page read and write
820000
heap
page read and write
1A74D201000
trusted library allocation
page read and write
A64E18E000
stack
page read and write
7FFD349B8000
trusted library allocation
page read and write
2D65C810000
trusted library allocation
page read and write
1C4C33D0000
trusted library allocation
page read and write
251DA9D0000
trusted library allocation
page read and write
7FFD34766000
trusted library allocation
page execute and read and write
1B70E000
stack
page read and write
6BC28FE000
stack
page read and write
1A73E320000
trusted library allocation
page read and write
7FFD347F2000
trusted library allocation
page read and write
2398D8B0000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
2D65E470000
heap
page execute and read and write
239A612C000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
1A74D4ED000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
2D65F6DE000
trusted library allocation
page read and write
7FFD34663000
trusted library allocation
page execute and read and write
7FFD34993000
trusted library allocation
page read and write
745D63B000
stack
page read and write
7FFD34653000
trusted library allocation
page execute and read and write
7FFD34831000
trusted library allocation
page read and write
1A73B730000
heap
page read and write
23B41C67000
heap
page read and write
251F33CD000
heap
page read and write
7FF7714CD000
unkown
page write copy
F2FD082000
stack
page read and write
91C000
heap
page read and write
1C4C3487000
heap
page read and write
2D66E4E7000
trusted library allocation
page read and write
1F4C86A0000
heap
page read and write
25840CE000
stack
page read and write
1C4C3795000
heap
page read and write
A64CDFF000
stack
page read and write
1B40E000
stack
page read and write
2398F397000
trusted library allocation
page read and write
2398D8F0000
trusted library allocation
page read and write
7FFD3472C000
trusted library allocation
page execute and read and write
2398DB60000
heap
page execute and read and write
1BA18000
heap
page read and write
1C4A9710000
trusted library allocation
page read and write
1A755898000
heap
page read and write
7FFD34AD3000
trusted library allocation
page read and write
23B5BC99000
heap
page read and write
1F4E2630000
heap
page read and write
1A73E23A000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
2398BF50000
heap
page read and write
6BC2579000
stack
page read and write
1A74D4F7000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
1F4E2AFD000
heap
page read and write
1111000
heap
page read and write
F2FD1CE000
stack
page read and write
1B7C0000
heap
page execute and read and write
A64D17E000
stack
page read and write
1C4BB23F000
trusted library allocation
page read and write
2399DB91000
trusted library allocation
page read and write
6BC2A7B000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
745E18B000
stack
page read and write
2398BF20000
heap
page read and write
1A73B6C0000
trusted library allocation
page read and write
F2FD47E000
stack
page read and write
23B43670000
trusted library allocation
page read and write
23B5C0F8000
heap
page read and write
23B5BF9B000
heap
page read and write
251F33D4000
heap
page read and write
2D65F7EA000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page execute and read and write
239A622A000
heap
page read and write
7FFD34736000
trusted library allocation
page read and write
23B443A4000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
2D65E135000
heap
page read and write
7FFD346DC000
trusted library allocation
page execute and read and write
A64D2F9000
stack
page read and write
745D177000
stack
page read and write
2D65C770000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
1F4CB9FF000
trusted library allocation
page read and write
1A73E163000
trusted library allocation
page read and write
251F3056000
heap
page read and write
37D8C83000
stack
page read and write
2399DE57000
trusted library allocation
page read and write
23B5BE9F000
heap
page read and write
23B44D0E000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD34746000
trusted library allocation
page execute and read and write
7FFD34999000
trusted library allocation
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34822000
trusted library allocation
page read and write
745D0FE000
stack
page read and write
25836FB000
stack
page read and write
1A73B735000
heap
page read and write
A10000
unkown
page readonly
AFB000
unkown
page readonly
7FFD34A40000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
1A74D221000
trusted library allocation
page read and write
251DA9C0000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
251EAB71000
trusted library allocation
page read and write
2398D870000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
1F4CC07E000
trusted library allocation
page read and write
745E10E000
stack
page read and write
251F30B0000
heap
page execute and read and write
F296209000
stack
page read and write
2398EF31000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
1F4DA2EC000
trusted library allocation
page read and write
23B451E1000
trusted library allocation
page read and write
A64D27E000
stack
page read and write
239A5EB0000
heap
page read and write
1F4C8820000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
251DBE22000
trusted library allocation
page read and write
7FFD349D9000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page read and write
F2FD97E000
stack
page read and write
7FFD3483A000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
2D66E490000
trusted library allocation
page read and write
1A7556C0000
heap
page read and write
7FFD3469D000
trusted library allocation
page execute and read and write
745D1FE000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
1C4A92F0000
heap
page read and write
7FFD34B00000
trusted library allocation
page read and write
2398E9FD000
trusted library allocation
page read and write
251EAE36000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
25833F8000
stack
page read and write
26E0000
heap
page read and write
2398E5C1000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
23B4572A000
trusted library allocation
page read and write
1C4A93A4000
heap
page read and write
251D902F000
heap
page read and write
1A73D050000
heap
page execute and read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD346DC000
trusted library allocation
page execute and read and write
23B539BD000
trusted library allocation
page read and write
23B53C36000
trusted library allocation
page read and write
239A6104000
heap
page read and write
1C4A9360000
heap
page read and write
7DF426520000
trusted library allocation
page execute and read and write
7FFD34AB0000
trusted library allocation
page execute and read and write
7FFD3481A000
trusted library allocation
page read and write
251DC3B4000
trusted library allocation
page read and write
251DAB51000
trusted library allocation
page read and write
1C4C3844000
heap
page read and write
FE0000
heap
page read and write
23B44955000
trusted library allocation
page read and write
251DC3DA000
trusted library allocation
page read and write
A20000
unkown
page readonly
1A73B690000
trusted library section
page read and write
23B438F0000
trusted library allocation
page read and write
1B82A000
heap
page read and write
2D65E4F4000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
25835FC000
stack
page read and write
1A73B450000
heap
page read and write
1C4AB020000
heap
page read and write
7FFD34766000
trusted library allocation
page execute and read and write
251F2B5A000
heap
page read and write
1C4AC060000
trusted library allocation
page read and write
1F4E2A33000
heap
page read and write
23B41DC0000
trusted library allocation
page read and write
23B41BFE000
heap
page read and write
23B5BE90000
heap
page read and write
251EAE3B000
trusted library allocation
page read and write
2398D8B5000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
251DB01D000
trusted library allocation
page read and write
2398C230000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
1F4CB579000
trusted library allocation
page read and write
7FFD34716000
trusted library allocation
page read and write
23B5BE70000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
1A73B4CC000
heap
page read and write
12DF3000
trusted library allocation
page read and write
251DA970000
heap
page readonly
13F0000
heap
page execute and read and write
2398EB74000
trusted library allocation
page read and write
F2FD778000
stack
page read and write
23B41C2A000
heap
page read and write
2D66E481000
trusted library allocation
page read and write
2582D3D000
stack
page read and write
2398EC90000
trusted library allocation
page read and write
23B41E95000
heap
page read and write
37DA14E000
stack
page read and write
2D65C5BC000
heap
page read and write
1A73D0A7000
heap
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
23B5BD50000
heap
page read and write
1F4CC09E000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD34654000
trusted library allocation
page read and write
239A6020000
heap
page read and write
1C4AB031000
trusted library allocation
page read and write
23B439C3000
trusted library allocation
page read and write
2D65C7B0000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
7FFD34650000
trusted library allocation
page read and write
2D66E621000
trusted library allocation
page read and write
251D90B5000
heap
page read and write
6BC29FE000
stack
page read and write
23B5C0E4000
heap
page read and write
930000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
F00000
heap
page read and write
2D65FD81000
trusted library allocation
page read and write
860000
heap
page read and write
251D91C0000
heap
page read and write
1A73D090000
heap
page read and write
1000000
heap
page read and write
2398BF9A000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
7FFD346CC000
trusted library allocation
page execute and read and write
7FFD34694000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
251F3177000
heap
page execute and read and write
2D65C5AC000
heap
page read and write
23B45312000
trusted library allocation
page read and write
1C4C381D000
heap
page read and write
7FFD34A4C000
trusted library allocation
page read and write
1C4C3724000
heap
page read and write
7FFD346BC000
trusted library allocation
page execute and read and write
7FFD349E5000
trusted library allocation
page read and write
12DF1000
trusted library allocation
page read and write
251D9035000
heap
page read and write
258307E000
stack
page read and write
7FFD3466D000
trusted library allocation
page execute and read and write
239A5EBA000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
1A74D4EF000
trusted library allocation
page read and write
1C4AC924000
trusted library allocation
page read and write
1A73B660000
heap
page read and write
12DF8000
trusted library allocation
page read and write
251F2FA0000
heap
page read and write
6BC3547000
stack
page read and write
23B5C043000
heap
page read and write
1F4CA0E2000
heap
page read and write
1C4BB322000
trusted library allocation
page read and write
23B5BD3C000
heap
page read and write
1C4C3440000
heap
page execute and read and write
37D947D000
stack
page read and write
23B5BD4C000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
23B5BCD5000
heap
page read and write
251DBF11000
trusted library allocation
page read and write
7FFD34838000
trusted library allocation
page read and write
1C4C3700000
heap
page read and write
1F4C861E000
heap
page read and write
1A73E173000
trusted library allocation
page read and write
2398F994000
trusted library allocation
page read and write
2D66E78F000
trusted library allocation
page read and write
1F4CA017000
heap
page execute and read and write
37DA34E000
stack
page read and write
23B53C54000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
1A7555A0000
heap
page read and write
1F4E2AF8000
heap
page read and write
2D65DFF0000
trusted library allocation
page read and write
2D65C670000
heap
page read and write
251F33AD000
heap
page read and write
A64D33E000
stack
page read and write
1C00C000
stack
page read and write
7FFD348F0000
trusted library allocation
page read and write
251DB5A2000
trusted library allocation
page read and write
1A73B505000
heap
page read and write
B48000
unkown
page readonly
1B37D000
stack
page read and write
37D91F7000
stack
page read and write
2D65C840000
heap
page read and write
1C4A9438000
heap
page read and write
23B41DF0000
heap
page readonly
7FFD34910000
trusted library allocation
page read and write
955000
heap
page read and write
7FFD349E2000
trusted library allocation
page read and write
1B810000
heap
page read and write
745E00E000
stack
page read and write
1F4E2788000
heap
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
1A73F01F000
trusted library allocation
page read and write
2398D850000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
1F4CB39C000
trusted library allocation
page read and write
25842CC000
stack
page read and write
23B53960000
trusted library allocation
page read and write
9DB000
heap
page read and write
2D65FD99000
trusted library allocation
page read and write
251EAE3D000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page read and write
2D65F058000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
251D9150000
heap
page read and write
1A73E4D8000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
1F4DA6EA000
trusted library allocation
page read and write
2D65E481000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page read and write
23B44A0C000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
F2950FA000
stack
page read and write
7FFD34930000
trusted library allocation
page read and write
23B44B25000
trusted library allocation
page read and write
251F3610000
heap
page read and write
23B5BF70000
heap
page read and write
6BC27F9000
stack
page read and write
23B450D0000
trusted library allocation
page read and write
7FFD349A9000
trusted library allocation
page read and write
2398BF00000
heap
page read and write
7DF49A590000
trusted library allocation
page execute and read and write
7FFD34801000
trusted library allocation
page read and write
F2FD5F9000
stack
page read and write
A64E207000
stack
page read and write
2398F3FD000
trusted library allocation
page read and write
6BC23FE000
stack
page read and write
7FFD3469B000
trusted library allocation
page read and write
25830FA000
stack
page read and write
7DF426510000
trusted library allocation
page execute and read and write
251DABD7000
trusted library allocation
page read and write
1A7555F0000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1F4E2B2C000
heap
page read and write
2D66E76F000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
2D65E130000
heap
page read and write
1C4AC89B000
trusted library allocation
page read and write
7FFD3469C000
trusted library allocation
page execute and read and write
7FFD34AC0000
trusted library allocation
page read and write
93C000
heap
page read and write
7FFD348D0000
trusted library allocation
page read and write
2398E8ED000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
2398C235000
heap
page read and write
23B5BD40000
heap
page read and write
1F4C87C0000
heap
page read and write
6BC247A000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
1F4CBAE5000
trusted library allocation
page read and write
1F4E271F000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
10CB000
heap
page read and write
23B41CA4000
heap
page read and write
1A755AB0000
heap
page read and write
110D000
heap
page read and write
A64D07F000
stack
page read and write
7FFD34AB6000
trusted library allocation
page read and write
1F4E2B1F000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1A74D507000
trusted library allocation
page read and write
23B53981000
trusted library allocation
page read and write
2398F98F000
trusted library allocation
page read and write
7FFD34A5C000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1A73E232000
trusted library allocation
page read and write
1C4C3710000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD34848000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
1C4AB25A000
trusted library allocation
page read and write
37D967B000
stack
page read and write
1F4E2B0F000
heap
page read and write
7FFD34842000
trusted library allocation
page read and write
251D9190000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
1A73EA27000
trusted library allocation
page read and write
F2953B8000
stack
page read and write
37D94FE000
stack
page read and write
7FFD34A90000
trusted library allocation
page read and write
251EAE55000
trusted library allocation
page read and write
1F4CB285000
trusted library allocation
page read and write
23B53C44000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
11BB000
heap
page read and write
7FFD347FA000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
There are 1424 hidden memdumps, click here to show them.