IOC Report
owuP726k3d.exe

loading gif

Files

File Path
Type
Category
Malicious
owuP726k3d.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Windows Defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0nx1v3hw.fij.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14togbwg.ute.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_342w5sga.kmf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41bky102.isw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ztbimda.0ta.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ber4toij.pl1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bqeupybr.nad.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4jr02t4.yhf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clxt30k0.v4n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmw1hgce.5hd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ede2s5uo.ic4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gxdcoy4i.x2u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_in3wnjfa.i20.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twgmggrt.lw2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2ewjlvd.vk4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywleyvwn.jhl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 19:09:12 2024, mtime=Sat Nov 23 19:09:12 2024, atime=Sat Nov 23 19:09:12 2024, length=46080, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\owuP726k3d.exe
"C:\Users\user\Desktop\owuP726k3d.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\owuP726k3d.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'owuP726k3d.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows Defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
malicious
C:\Users\user\AppData\Roaming\Windows Defender.exe
"C:\Users\user\AppData\Roaming\Windows Defender.exe"
malicious
C:\Users\user\AppData\Roaming\Windows Defender.exe
"C:\Users\user\AppData\Roaming\Windows Defender.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
george-liechtenstein.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://rentry.co/8wum7vax/raw
172.67.75.40
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://rentry.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://.VisualC
unknown
https://aka.ms/pscore68
unknown
http://www.microsofm/pki/certs/MicRooCerAut_2010-06-23.
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.microsoft.co
unknown
https://github.com/Pester/Pester
unknown
https://rentry.co
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.mH
unknown
http://crl.micros
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
george-liechtenstein.gl.at.ply.gg
147.185.221.19
malicious
rentry.co
172.67.75.40
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
147.185.221.19
george-liechtenstein.gl.at.ply.gg
United States
malicious
208.95.112.1
ip-api.com
United States
172.67.75.40
rentry.co
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\owuP726k3d_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Defender
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C91000
trusted library allocation
page read and write
malicious
8D2000
unkown
page readonly
malicious
278102F8000
trusted library allocation
page read and write
7FFB4AFEA000
trusted library allocation
page read and write
19499D28000
trusted library allocation
page read and write
1B1340C0000
trusted library allocation
page read and write
7FFB4AEC7000
trusted library allocation
page read and write
194B1537000
heap
page read and write
7FFB4ACF6000
trusted library allocation
page execute and read and write
278102F0000
trusted library allocation
page read and write
1C765000
heap
page read and write
7FFB4AD30000
trusted library allocation
page execute and read and write
1B13C4DB000
heap
page read and write
19499DF4000
trusted library allocation
page read and write
251F11E0000
heap
page read and write
1370000
heap
page read and write
1B13C4A7000
heap
page read and write
FE0000
unkown
page readonly
7FFB4AE80000
trusted library allocation
page read and write
1380000
heap
page read and write
19499D31000
trusted library allocation
page read and write
251F0DA4000
heap
page read and write
278696BC000
heap
page read and write
7FFB4AE60000
trusted library allocation
page read and write
7FFB4ACD6000
trusted library allocation
page execute and read and write
251F0CCD000
heap
page read and write
7FFB4AF78000
trusted library allocation
page read and write
7DF441340000
trusted library allocation
page execute and read and write
251F0CDD000
heap
page read and write
1949ABE2000
trusted library allocation
page read and write
7FFB4AC00000
trusted library allocation
page read and write
10623FF000
stack
page read and write
1B124D4F000
trusted library allocation
page read and write
19499D20000
trusted library allocation
page read and write
1949A063000
trusted library allocation
page read and write
19496F88000
heap
page read and write
2786B7B0000
heap
page read and write
7FFB4AD90000
trusted library allocation
page read and write
F726979000
stack
page read and write
278699B0000
heap
page read and write
251F0D90000
heap
page read and write
19496F10000
heap
page read and write
1B124FAB000
trusted library allocation
page read and write
1B996000
heap
page read and write
F72774E000
stack
page read and write
251811DB000
trusted library allocation
page read and write
A955A77000
stack
page read and write
F726A7B000
stack
page read and write
25180BFA000
trusted library allocation
page read and write
7FFB4ACB0000
trusted library allocation
page execute and read and write
194B13E8000
heap
page read and write
19497004000
heap
page read and write
7FFB4AC03000
trusted library allocation
page execute and read and write
900000
heap
page read and write
1B125BCE000
trusted library allocation
page read and write
7FFB4AE20000
trusted library allocation
page read and write
1B952000
heap
page read and write
278000EC000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
31C0000
heap
page execute and read and write
25180A52000
trusted library allocation
page read and write
7FFB4ACB6000
trusted library allocation
page read and write
1B124D4B000
trusted library allocation
page read and write
251F0E7B000
heap
page read and write
1B122162000
heap
page read and write
7FFB4AF44000
trusted library allocation
page read and write
7FFB4B010000
trusted library allocation
page read and write
1B1220A0000
heap
page read and write
1B93F000
stack
page read and write
25180F6F000
trusted library allocation
page read and write
278102EE000
trusted library allocation
page read and write
251EEDF0000
trusted library allocation
page read and write
A956A0A000
stack
page read and write
251EEE35000
heap
page read and write
B89D4FF000
stack
page read and write
27801E27000
trusted library allocation
page read and write
7FFB4B030000
trusted library allocation
page read and write
278010BE000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
19496FBD000
heap
page read and write
1B13C256000
heap
page execute and read and write
2786B190000
heap
page execute and read and write
251F0870000
heap
page execute and read and write
25181063000
trusted library allocation
page read and write
1B9E7000
heap
page read and write
278697C0000
heap
page read and write
1061F79000
stack
page read and write
1C32C000
stack
page read and write
1061B13000
stack
page read and write
27801306000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page read and write
12C91000
trusted library allocation
page read and write
19496FDD000
heap
page read and write
1949A629000
trusted library allocation
page read and write
194B13D4000
heap
page read and write
7FFB4AE00000
trusted library allocation
page read and write
7FFB4ACD6000
trusted library allocation
page execute and read and write
1B1224C5000
heap
page read and write
251EEC30000
heap
page read and write
7FFB4AF60000
trusted library allocation
page read and write
1B13C524000
heap
page read and write
D90000
heap
page read and write
2D70000
trusted library allocation
page read and write
DEB000
heap
page read and write
1B1E0000
heap
page read and write
7FFB4ACA6000
trusted library allocation
page read and write
19499EDF000
trusted library allocation
page read and write
B89E5CC000
stack
page read and write
A955BBE000
stack
page read and write
27801E2C000
trusted library allocation
page read and write
251F06D0000
heap
page read and write
2786B9E4000
heap
page read and write
9A0000
heap
page read and write
2786BA63000
heap
page read and write
2DFB000
trusted library allocation
page read and write
194B155B000
heap
page read and write
7FFB4AC14000
trusted library allocation
page read and write
1C42A000
stack
page read and write
194A90BA000
trusted library allocation
page read and write
1063047000
stack
page read and write
7FFB4AE30000
trusted library allocation
page read and write
7DF4E5270000
trusted library allocation
page execute and read and write
2786B6B0000
heap
page read and write
251F0D9D000
heap
page read and write
1B124D53000
trusted library allocation
page read and write
27800DB7000
trusted library allocation
page read and write
7FFB4AC30000
trusted library allocation
page read and write
251902F0000
trusted library allocation
page read and write
27800001000
trusted library allocation
page read and write
251F0C98000
heap
page read and write
194B14B4000
heap
page read and write
7FFB4AD30000
trusted library allocation
page execute and read and write
2D4A000
trusted library allocation
page read and write
1061EFF000
stack
page read and write
180F000
stack
page read and write
9E4000
heap
page read and write
1B13C183000
heap
page read and write
7FFB4ACAC000
trusted library allocation
page execute and read and write
7FFB4ADF0000
trusted library allocation
page read and write
1B13C161000
heap
page read and write
2786B197000
heap
page execute and read and write
18F0000
heap
page read and write
7FFB4AE50000
trusted library allocation
page read and write
27801121000
trusted library allocation
page read and write
2780188D000
trusted library allocation
page read and write
7FFB4B06D000
trusted library allocation
page read and write
7FFB4ABF2000
trusted library allocation
page read and write
1061FFE000
stack
page read and write
7DF437A70000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
1C95F000
stack
page read and write
1B3EF000
stack
page read and write
1B13C389000
heap
page read and write
1C625000
stack
page read and write
7FFB4ADA1000
trusted library allocation
page read and write
7FFB4AF20000
trusted library allocation
page read and write
251F0CB5000
heap
page read and write
251F05E0000
trusted library allocation
page read and write
251F0CD1000
heap
page read and write
1B13C3FA000
heap
page read and write
25181038000
trusted library allocation
page read and write
7FFB4AF00000
trusted library allocation
page read and write
1B8B0000
heap
page read and write
27810031000
trusted library allocation
page read and write
1062178000
stack
page read and write
D10000
trusted library allocation
page read and write
1B124F76000
trusted library allocation
page read and write
7FFB4ACB0000
trusted library allocation
page read and write
1390000
heap
page read and write
2786B010000
trusted library allocation
page read and write
2786AFD0000
heap
page read and write
19498B40000
heap
page execute and read and write
19499F97000
trusted library allocation
page read and write
2786B090000
heap
page read and write
7FFB4B060000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
1B123DC0000
heap
page execute and read and write
251F06D5000
heap
page read and write
1B125BEE000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
7FFB4AD10000
trusted library allocation
page execute and read and write
7FFB4AF70000
trusted library allocation
page read and write
7FFB4AC00000
trusted library allocation
page read and write
A955F3B000
stack
page read and write
19496FCB000
heap
page read and write
7FFB4AF00000
trusted library allocation
page read and write
F726313000
stack
page read and write
2786B9BF000
heap
page read and write
B89DA7E000
stack
page read and write
25190001000
trusted library allocation
page read and write
2786B77C000
heap
page read and write
25180F80000
trusted library allocation
page read and write
7FFB4AE88000
trusted library allocation
page read and write
1BF8D000
stack
page read and write
1B1220C0000
heap
page read and write
2D98000
trusted library allocation
page read and write
7FFB4ADE2000
trusted library allocation
page read and write
1B124D46000
trusted library allocation
page read and write
278695E2000
heap
page read and write
106314E000
stack
page read and write
27800D7A000
trusted library allocation
page read and write
7FFB4AC00000
trusted library allocation
page read and write
1B12429E000
trusted library allocation
page read and write
19497200000
trusted library allocation
page read and write
251810BF000
trusted library allocation
page read and write
F726AF7000
stack
page read and write
F727847000
stack
page read and write
1C76D000
heap
page read and write
7FFB4ADE8000
trusted library allocation
page read and write
251F0EE4000
heap
page read and write
25181869000
trusted library allocation
page read and write
1B133DE0000
trusted library allocation
page read and write
7DF43DC50000
trusted library allocation
page execute and read and write
1B12222D000
heap
page read and write
1B89F000
unkown
page read and write
251F0C16000
heap
page read and write
950000
trusted library allocation
page read and write
194B156C000
heap
page read and write
27801957000
trusted library allocation
page read and write
251F0C10000
heap
page read and write
194B119C000
heap
page read and write
F72667E000
stack
page read and write
1B124825000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
194B12F0000
heap
page read and write
A955EBE000
stack
page read and write
B89D9FE000
stack
page read and write
194B11ED000
heap
page read and write
1BD8E000
stack
page read and write
7FFB4ADC1000
trusted library allocation
page read and write
A95698C000
stack
page read and write
7FFB4B040000
trusted library allocation
page read and write
194B14BA000
heap
page read and write
F726CFE000
stack
page read and write
27869657000
heap
page read and write
1B123AE0000
trusted library allocation
page read and write
106247E000
stack
page read and write
251F0F91000
heap
page read and write
7FFB4ADD0000
trusted library allocation
page execute and read and write
7FFB4AEE0000
trusted library allocation
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
2786B6FD000
heap
page read and write
1062079000
stack
page read and write
13243000
trusted library allocation
page read and write
2786B6D1000
heap
page read and write
7FFB4ADE8000
trusted library allocation
page read and write
7FFB4AC10000
trusted library allocation
page read and write
194B1100000
heap
page read and write
251EECD5000
heap
page read and write
A955E3E000
stack
page read and write
1B123AF0000
heap
page readonly
7FFB4AF10000
trusted library allocation
page read and write
7FFB4AC04000
trusted library allocation
page read and write
7FFB4ABFD000
trusted library allocation
page execute and read and write
251F08C0000
heap
page read and write
2D75000
trusted library allocation
page read and write
25181951000
trusted library allocation
page read and write
7FFB4ACA0000
trusted library allocation
page read and write
7FFB4ADD0000
trusted library allocation
page execute and read and write
A955979000
stack
page read and write
8F1000
stack
page read and write
251EECEE000
heap
page read and write
251F08B0000
trusted library allocation
page read and write
7FFB4ADF2000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
7FFB4AF52000
trusted library allocation
page read and write
A955C37000
stack
page read and write
7FFB4ACCC000
trusted library allocation
page execute and read and write
7FFB4AC02000
trusted library allocation
page read and write
DCC000
heap
page read and write
251F0FB2000
heap
page read and write
1B10D000
stack
page read and write
251F0CC9000
heap
page read and write
251F0E90000
heap
page read and write
2786B040000
heap
page readonly
1BF3F000
stack
page read and write
7FFB4AC6C000
trusted library allocation
page execute and read and write
2D43000
trusted library allocation
page read and write
2786962D000
heap
page read and write
12731000
trusted library allocation
page read and write
E00000
heap
page read and write
7FFB4B057000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
1B125BA9000
trusted library allocation
page read and write
194B14E9000
heap
page read and write
A24000
heap
page read and write
7FFB4AF6C000
trusted library allocation
page read and write
251EEB30000
heap
page read and write
251F0EC6000
heap
page read and write
7FFB4ACA0000
trusted library allocation
page read and write
1B123BD0000
heap
page read and write
194A90CA000
trusted library allocation
page read and write
7FFB4ACB0000
trusted library allocation
page read and write
1CC7E000
stack
page read and write
2786B9E0000
heap
page read and write
27869615000
heap
page read and write
7FFB4AE50000
trusted library allocation
page read and write
2786BA81000
heap
page read and write
251EEDD0000
trusted library allocation
page read and write
10624FB000
stack
page read and write
1B74E000
stack
page read and write
B89E74C000
stack
page read and write
27801210000
trusted library allocation
page read and write
7FFB4ADE4000
trusted library allocation
page read and write
7FFB4AF62000
trusted library allocation
page read and write
7FFB4ACCF000
trusted library allocation
page execute and read and write
7FFB4AFFC000
trusted library allocation
page read and write
1BA2C000
heap
page read and write
7FFB4ADD4000
trusted library allocation
page read and write
1CE7F000
stack
page read and write
1B13C3C8000
heap
page read and write
251902F2000
trusted library allocation
page read and write
7FFB4AC13000
trusted library allocation
page execute and read and write
7FFB4AE50000
trusted library allocation
page read and write
278695D0000
heap
page read and write
2660000
heap
page execute and read and write
D40000
trusted library allocation
page read and write
7FFB4AE40000
trusted library allocation
page read and write
194B13D0000
heap
page read and write
1CB5E000
stack
page read and write
25181E27000
trusted library allocation
page read and write
194B1760000
heap
page read and write
25190072000
trusted library allocation
page read and write
194B1559000
heap
page read and write
7FFB4AF20000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
1B124D3E000
trusted library allocation
page read and write
1B13C3C4000
heap
page read and write
1B1250A9000
trusted library allocation
page read and write
1B123B00000
trusted library allocation
page read and write
A79000
heap
page read and write
251F06E2000
heap
page read and write
7FFB4AF50000
trusted library allocation
page read and write
7DF43DC40000
trusted library allocation
page execute and read and write
1331000
stack
page read and write
E2C000
heap
page read and write
194971B0000
trusted library allocation
page read and write
1B13C380000
heap
page read and write
251F0CC5000
heap
page read and write
251F0D70000
heap
page read and write
7FFB4ABF4000
trusted library allocation
page read and write
7FFB4AC5C000
trusted library allocation
page execute and read and write
7FFB4AF20000
trusted library allocation
page read and write
7FFB4B060000
trusted library allocation
page read and write
27869613000
heap
page read and write
7FFB4B070000
trusted library allocation
page read and write
2780186E000
trusted library allocation
page read and write
7FFB4AC4C000
trusted library allocation
page execute and read and write
7FFB4B080000
trusted library allocation
page read and write
194A90AB000
trusted library allocation
page read and write
251EEC10000
heap
page read and write
194B1554000
heap
page read and write
1B1249D8000
trusted library allocation
page read and write
251F0F95000
heap
page read and write
7FFB4AC10000
trusted library allocation
page read and write
19496FCD000
heap
page read and write
27801955000
trusted library allocation
page read and write
7FFB4B040000
trusted library allocation
page read and write
DC6000
heap
page read and write
251F0F08000
heap
page read and write
1B1249E2000
trusted library allocation
page read and write
25180F73000
trusted library allocation
page read and write
7FFB4AC24000
trusted library allocation
page read and write
A956B0D000
stack
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
1B13C3C0000
heap
page read and write
194B1150000
heap
page read and write
19498FE9000
trusted library allocation
page read and write
7FFB4ACB6000
trusted library allocation
page read and write
7FFB4AE30000
trusted library allocation
page read and write
B89D7F9000
stack
page read and write
7FFB4AF54000
trusted library allocation
page read and write
1B13C250000
heap
page execute and read and write
27810021000
trusted library allocation
page read and write
19497006000
heap
page read and write
1062F4C000
stack
page read and write
7FFB4AF01000
trusted library allocation
page read and write
7FFB4B060000
trusted library allocation
page read and write
278102F6000
trusted library allocation
page read and write
19499813000
trusted library allocation
page read and write
7FFB4AC10000
trusted library allocation
page read and write
7FFB4AE40000
trusted library allocation
page read and write
A9555FE000
stack
page read and write
27869655000
heap
page read and write
9C0000
heap
page read and write
7FFB4AF23000
trusted library allocation
page read and write
25190031000
trusted library allocation
page read and write
7FFB4ADB0000
trusted library allocation
page read and write
7FFB4AF58000
trusted library allocation
page read and write
251EEDE0000
heap
page readonly
1CF7E000
stack
page read and write
7FFB4AD20000
trusted library allocation
page execute and read and write
7FFB4AE80000
trusted library allocation
page read and write
7FFB4AC20000
trusted library allocation
page read and write
1B13413A000
trusted library allocation
page read and write
278697E0000
heap
page read and write
7DF441330000
trusted library allocation
page execute and read and write
12733000
trusted library allocation
page read and write
7FFB4AF20000
trusted library allocation
page read and write
1B13C110000
heap
page read and write
7FFB4B08F000
trusted library allocation
page read and write
251EECF4000
heap
page read and write
1B64E000
stack
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
7FFB4AC10000
trusted library allocation
page read and write
2786BA40000
heap
page read and write
B89D97B000
stack
page read and write
7FFB4B000000
trusted library allocation
page read and write
7FFB4AE80000
trusted library allocation
page read and write
7FFB4AC00000
trusted library allocation
page read and write
F72639E000
stack
page read and write
19498E47000
trusted library allocation
page read and write
7FFB4B066000
trusted library allocation
page read and write
7FFB4AD90000
trusted library allocation
page read and write
1B1221D8000
heap
page read and write
7FFB4AD10000
trusted library allocation
page execute and read and write
7FFB4AC2D000
trusted library allocation
page execute and read and write
7FF4131F0000
trusted library allocation
page execute and read and write
7FFB4B000000
trusted library allocation
page read and write
251F1004000
heap
page read and write
7FFB4ADC0000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
7FFB4AC0B000
trusted library allocation
page read and write
194B12C0000
heap
page execute and read and write
7FFB4B070000
trusted library allocation
page read and write
D95000
heap
page read and write
7FFB4AD20000
trusted library allocation
page execute and read and write
A9559FE000
stack
page read and write
194999CF000
trusted library allocation
page read and write
251F0660000
heap
page execute and read and write
7FFB4AE50000
trusted library allocation
page read and write
1B1221D3000
heap
page read and write
D43000
trusted library allocation
page read and write
251EECF0000
heap
page read and write
1949AB9D000
trusted library allocation
page read and write
D50000
heap
page read and write
7FFB4AF33000
trusted library allocation
page read and write
251804CD000
trusted library allocation
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
13B0000
heap
page read and write
1B13C5A0000
trusted library allocation
page read and write
251818F2000
trusted library allocation
page read and write
1B124D36000
trusted library allocation
page read and write
7FFB4ACD6000
trusted library allocation
page execute and read and write
7FFB4AF90000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page read and write
7FFB4ABF4000
trusted library allocation
page read and write
149D000
heap
page read and write
1B125635000
trusted library allocation
page read and write
25180F6B000
trusted library allocation
page read and write
27801006000
trusted library allocation
page read and write
1B124D42000
trusted library allocation
page read and write
2786BA1E000
heap
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
1B13C3BC000
heap
page read and write
278011D7000
trusted library allocation
page read and write
1B122100000
heap
page read and write
A956A89000
stack
page read and write
7FFB4AD90000
trusted library allocation
page read and write
7FFB4ADF0000
trusted library allocation
page execute and read and write
194B14DB000
heap
page read and write
27810071000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
2519030A000
trusted library allocation
page read and write
278013C3000
trusted library allocation
page read and write
7FFB4ADB0000
trusted library allocation
page execute and read and write
B89E64E000
stack
page read and write
251EEDA9000
heap
page read and write
25180F77000
trusted library allocation
page read and write
7FFB4AF54000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
7FFB4AE70000
trusted library allocation
page read and write
7FFB4AF64000
trusted library allocation
page read and write
25181E22000
trusted library allocation
page read and write
1B13C3D4000
heap
page read and write
7FFB4AF70000
trusted library allocation
page read and write
7FFB4AF5C000
trusted library allocation
page read and write
1B54B000
stack
page read and write
1B1340BB000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
27800DE3000
trusted library allocation
page read and write
7FFB4AC1B000
trusted library allocation
page execute and read and write
7FFB4AC6C000
trusted library allocation
page execute and read and write
1B133DD1000
trusted library allocation
page read and write
1B1224C0000
heap
page read and write
CF1000
stack
page read and write
7FFB4ADF8000
trusted library allocation
page read and write
194B156A000
heap
page read and write
B89E54E000
stack
page read and write
B89D6F9000
stack
page read and write
7FFB4ADC0000
trusted library allocation
page execute and read and write
7FFB4ABF4000
trusted library allocation
page read and write
1BA29000
heap
page read and write
7FFB4B040000
trusted library allocation
page read and write
7FFB4AC5C000
trusted library allocation
page execute and read and write
7FFB4AEC0000
trusted library allocation
page read and write
12C9E000
trusted library allocation
page read and write
7FFB4AD92000
trusted library allocation
page read and write
1B1256BE000
trusted library allocation
page read and write
2786BA83000
heap
page read and write
1061E7F000
stack
page read and write
1B13C4E9000
heap
page read and write
9F9000
heap
page read and write
7FFB4ADE2000
trusted library allocation
page read and write
251EED36000
heap
page read and write
7FFB4ABFD000
trusted library allocation
page execute and read and write
27810494000
trusted library allocation
page read and write
27800D71000
trusted library allocation
page read and write
7FFB4AC02000
trusted library allocation
page read and write
1B13C1D3000
heap
page read and write
25181E02000
trusted library allocation
page read and write
E39000
heap
page read and write
7FFB4AF72000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
7FFB4AE30000
trusted library allocation
page read and write
27800F9D000
trusted library allocation
page read and write
F726BFE000
stack
page read and write
1B13C1FE000
heap
page read and write
B89DB7B000
stack
page read and write
1B124D3A000
trusted library allocation
page read and write
19498DC1000
trusted library allocation
page read and write
251813C7000
trusted library allocation
page read and write
1BC8E000
stack
page read and write
25180BEE000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
2A8E000
stack
page read and write
7FFB4ACB0000
trusted library allocation
page execute and read and write
7FFB4AF30000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
27869619000
heap
page read and write
251F0FED000
heap
page read and write
1B13C511000
heap
page read and write
1949A181000
trusted library allocation
page read and write
1C12B000
stack
page read and write
251F0D60000
heap
page execute and read and write
1B13C414000
heap
page read and write
B89D77D000
stack
page read and write
1B950000
heap
page read and write
1B1250DC000
trusted library allocation
page read and write
2786960B000
heap
page read and write
2786B6C3000
heap
page read and write
A32000
heap
page read and write
194B1412000
heap
page read and write
7FFB4ADBA000
trusted library allocation
page read and write
1B124E8D000
trusted library allocation
page read and write
1C225000
stack
page read and write
7FFB4AC00000
trusted library allocation
page read and write
251F0FDB000
heap
page read and write
7FFB4AC03000
trusted library allocation
page execute and read and write
194B14D3000
heap
page read and write
25180228000
trusted library allocation
page read and write
1C76B000
heap
page read and write
278699B5000
heap
page read and write
A26000
heap
page read and write
2780003B000
trusted library allocation
page read and write
7FFB4AF6A000
trusted library allocation
page read and write
B89DAFF000
stack
page read and write
7DF437A60000
trusted library allocation
page execute and read and write
7FFB4AF59000
trusted library allocation
page read and write
7FFB4B040000
trusted library allocation
page read and write
7FFB4ABF0000
trusted library allocation
page read and write
7FFB4AE00000
trusted library allocation
page read and write
7FFB4AED0000
trusted library allocation
page read and write
19496FBF000
heap
page read and write
25181DDD000
trusted library allocation
page read and write
19498B90000
trusted library allocation
page read and write
1350000
heap
page execute and read and write
7FFB4ACA6000
trusted library allocation
page read and write
251F0FE3000
heap
page read and write
7FFB4B070000
trusted library allocation
page read and write
194B11E1000
heap
page read and write
1B1249D4000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
194999C5000
trusted library allocation
page read and write
7FFB4AF10000
trusted library allocation
page read and write
F726D7B000
stack
page read and write
1949A6B2000
trusted library allocation
page read and write
7FFB4AC2B000
trusted library allocation
page read and write
7FFB4AF65000
trusted library allocation
page read and write
1B13C6C0000
heap
page read and write
1B12571D000
trusted library allocation
page read and write
1B123BD5000
heap
page read and write
1CD7A000
stack
page read and write
27810308000
trusted library allocation
page read and write
7FFB4AC04000
trusted library allocation
page read and write
25181784000
trusted library allocation
page read and write
1C528000
stack
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
251EECC2000
heap
page read and write
1B122243000
heap
page read and write
194971C0000
heap
page readonly
106237E000
stack
page read and write
251F0D67000
heap
page execute and read and write
7FFB4AED0000
trusted library allocation
page read and write
7FFB4AC1D000
trusted library allocation
page execute and read and write
19496F20000
heap
page read and write
19499D24000
trusted library allocation
page read and write
B89D8F8000
stack
page read and write
7FFB4B030000
trusted library allocation
page execute and read and write
7FFB4AF90000
trusted library allocation
page read and write
5B5000
heap
page read and write
7FFB4AE70000
trusted library allocation
page read and write
7FFB4AC20000
trusted library allocation
page read and write
9E7000
heap
page read and write
7FFB4ACAC000
trusted library allocation
page execute and read and write
B89D183000
stack
page read and write
2D33000
trusted library allocation
page read and write
F7268FD000
stack
page read and write
F7266FF000
stack
page read and write
194A90B2000
trusted library allocation
page read and write
1B124EF0000
trusted library allocation
page read and write
10621F7000
stack
page read and write
7FFB4B020000
trusted library allocation
page read and write
7FFB4ACBC000
trusted library allocation
page execute and read and write
7FFB4ADE0000
trusted library allocation
page execute and read and write
1B125BF3000
trusted library allocation
page read and write
251F0610000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
1062ECE000
stack
page read and write
7FFB4ABF0000
trusted library allocation
page read and write
13248000
trusted library allocation
page read and write
19498BF0000
heap
page read and write
A955B79000
stack
page read and write
7FFB4B05D000
trusted library allocation
page read and write
251EEDA5000
heap
page read and write
DC0000
heap
page read and write
27801DE2000
trusted library allocation
page read and write
251EEE30000
heap
page read and write
19499D2C000
trusted library allocation
page read and write
7FFB4AE20000
trusted library allocation
page read and write
7FFB4AF6C000
trusted library allocation
page read and write
251EED0E000
heap
page read and write
7FFB4ACF6000
trusted library allocation
page execute and read and write
1B123BB0000
heap
page read and write
7FFB4B010000
trusted library allocation
page read and write
7FFB4AF90000
trusted library allocation
page read and write
19497009000
heap
page read and write
19497270000
heap
page read and write
1949ABC2000
trusted library allocation
page read and write
25180F66000
trusted library allocation
page read and write
7FFB4ADE0000
trusted library allocation
page execute and read and write
F7278CC000
stack
page read and write
980000
heap
page read and write
7FFB4AF59000
trusted library allocation
page read and write
7FFB4B010000
trusted library allocation
page read and write
2786BA5E000
heap
page read and write
9FC000
heap
page read and write
251811A9000
trusted library allocation
page read and write
7FFB4ABF3000
trusted library allocation
page execute and read and write
7FFB4AE40000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
194B13DC000
heap
page read and write
7FFB4AE10000
trusted library allocation
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
1B133E01000
trusted library allocation
page read and write
251EEDB0000
trusted library allocation
page read and write
7FFB4AE10000
trusted library allocation
page read and write
7FFB4ACE6000
trusted library allocation
page execute and read and write
7FFB4AC20000
trusted library allocation
page read and write
1B122192000
heap
page read and write
1949A0C4000
trusted library allocation
page read and write
1B84E000
stack
page read and write
7FFB4ADF4000
trusted library allocation
page read and write
2786B711000
heap
page read and write
1062FCE000
stack
page read and write
7FFB4AED0000
trusted library allocation
page read and write
1B123FFB000
trusted library allocation
page read and write
7FFB4AC02000
trusted library allocation
page read and write
10620FE000
stack
page read and write
2786BAD0000
trusted library allocation
page read and write
25180001000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
1B12218C000
heap
page read and write
194A912E000
trusted library allocation
page read and write
1B13C280000
heap
page read and write
7FFB4AF68000
trusted library allocation
page read and write
F7267FF000
stack
page read and write
F726779000
stack
page read and write
19498B10000
heap
page read and write
A9558FF000
stack
page read and write
1BBD0000
heap
page execute and read and write
7FFB4ADA0000
trusted library allocation
page execute and read and write
2786B8D0000
heap
page read and write
7FFB4AF80000
trusted library allocation
page read and write
19499D3D000
trusted library allocation
page read and write
7FFB4AE80000
trusted library allocation
page read and write
7FFB4B010000
trusted library allocation
page read and write
7FFB4AC22000
trusted library allocation
page read and write
1B123BEF000
heap
page read and write
1C73D000
heap
page read and write
1705000
heap
page read and write
1949A156000
trusted library allocation
page read and write
2786B050000
trusted library allocation
page read and write
7FFB4AF30000
trusted library allocation
page read and write
7DF4E5260000
trusted library allocation
page execute and read and write
16FE000
stack
page read and write
1061B9E000
stack
page read and write
1B13C1E3000
heap
page read and write
7FFB4ACA0000
trusted library allocation
page read and write
7FFB4AD28000
trusted library allocation
page execute and read and write
1B124D79000
trusted library allocation
page read and write
2786B240000
heap
page execute and read and write
25180C11000
trusted library allocation
page read and write
251F0D03000
heap
page read and write
7FFB4AC4C000
trusted library allocation
page execute and read and write
C8F000
stack
page read and write
7FFB4ADD2000
trusted library allocation
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
7FFB4AE00000
trusted library allocation
page execute and read and write
278695D9000
heap
page read and write
1B13C4B6000
heap
page read and write
2D3F000
trusted library allocation
page read and write
19497190000
trusted library allocation
page read and write
251F0D99000
heap
page read and write
2720000
heap
page execute and read and write
1B13C51E000
heap
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
1B2EE000
stack
page read and write
19498DB0000
heap
page execute and read and write
7FFB4AE20000
trusted library allocation
page read and write
7FFB4B046000
trusted library allocation
page read and write
12738000
trusted library allocation
page read and write
7FFB4ADC0000
trusted library allocation
page execute and read and write
7FFB4ADA2000
trusted library allocation
page read and write
251F0E70000
heap
page read and write
1B123E56000
trusted library allocation
page read and write
7FFB4ACBC000
trusted library allocation
page execute and read and write
2786961D000
heap
page read and write
1B125550000
trusted library allocation
page read and write
1BE8E000
stack
page read and write
19498C08000
heap
page read and write
7FFB4ACC6000
trusted library allocation
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
1B133DF1000
trusted library allocation
page read and write
1949A711000
trusted library allocation
page read and write
2AA0000
heap
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
7FFB4ADB2000
trusted library allocation
page read and write
27800086000
trusted library allocation
page read and write
1B12572E000
trusted library allocation
page read and write
1B1221AC000
heap
page read and write
13241000
trusted library allocation
page read and write
1B123DD1000
trusted library allocation
page read and write
2786B130000
heap
page read and write
7FFB4AE90000
trusted library allocation
page read and write
7FFB4AC1B000
trusted library allocation
page read and write
1C03E000
stack
page read and write
194B14DE000
heap
page read and write
1B0FE000
stack
page read and write
7FFB4AF40000
trusted library allocation
page read and write
1ACC0000
trusted library allocation
page read and write
7FFB4AE60000
trusted library allocation
page read and write
2786B7D0000
heap
page read and write
2786960F000
heap
page read and write
251EED3B000
heap
page read and write
149B000
heap
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page read and write
7FFB4B04D000
trusted library allocation
page read and write
5A0000
heap
page read and write
194B13E0000
heap
page read and write
1B13C3CC000
heap
page read and write
2786BAE0000
heap
page read and write
1AC90000
trusted library allocation
page read and write
2786BA70000
heap
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
2786B8B0000
heap
page execute and read and write
194B13E4000
heap
page read and write
27810001000
trusted library allocation
page read and write
194A8DC1000
trusted library allocation
page read and write
1949928D000
trusted library allocation
page read and write
7FFB4ADB0000
trusted library allocation
page read and write
10630CC000
stack
page read and write
E32000
heap
page read and write
25181214000
trusted library allocation
page read and write
194B13D8000
heap
page read and write
7FFB4B060000
trusted library allocation
page read and write
251812A8000
trusted library allocation
page read and write
1949A64F000
trusted library allocation
page read and write
1B124E09000
trusted library allocation
page read and write
1B13C4A2000
heap
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
194B12C7000
heap
page execute and read and write
2786B74E000
heap
page read and write
1B1340C9000
trusted library allocation
page read and write
278004CD000
trusted library allocation
page read and write
1061BDE000
stack
page read and write
D53000
heap
page read and write
7FFB4AF7C000
trusted library allocation
page read and write
A955CB8000
stack
page read and write
A955AFD000
stack
page read and write
18F5000
heap
page read and write
1430000
heap
page read and write
7FFB4AF49000
trusted library allocation
page read and write
7FFB4AC10000
trusted library allocation
page read and write
7FFB4AF68000
trusted library allocation
page read and write
12C98000
trusted library allocation
page read and write
194B1147000
heap
page read and write
7FFB4AED0000
trusted library allocation
page read and write
7FFB4ADA0000
trusted library allocation
page read and write
A955D39000
stack
page read and write
1B122120000
trusted library section
page read and write
7FFB4B080000
trusted library allocation
page read and write
1B125719000
trusted library allocation
page read and write
194B151E000
heap
page read and write
B89D67E000
stack
page read and write
7FFB4B030000
trusted library allocation
page execute and read and write
19499B3B000
trusted library allocation
page read and write
1B12515A000
trusted library allocation
page read and write
2786B135000
heap
page read and write
7FFB4AD10000
trusted library allocation
page execute and read and write
19499D35000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
7FFB4ABFD000
trusted library allocation
page execute and read and write
194B11D0000
heap
page read and write
145E000
heap
page read and write
7FFB4AF30000
trusted library allocation
page read and write
7FFB4AE60000
trusted library allocation
page read and write
194A8E32000
trusted library allocation
page read and write
251F0FD1000
heap
page read and write
7FFB4AC30000
trusted library allocation
page read and write
278696E0000
heap
page read and write
2518188F000
trusted library allocation
page read and write
1B13C230000
heap
page execute and read and write
1C720000
heap
page read and write
7FFB4AC0D000
trusted library allocation
page execute and read and write
2741000
trusted library allocation
page read and write
7FFB4AFFC000
trusted library allocation
page read and write
F7269F7000
stack
page read and write
194B155D000
heap
page read and write
B89D5FA000
stack
page read and write
7FFB4AF40000
trusted library allocation
page read and write
1B13C45E000
heap
page read and write
19496F80000
heap
page read and write
1949ABE7000
trusted library allocation
page read and write
7FFB4AE90000
trusted library allocation
page read and write
2786B030000
trusted library allocation
page read and write
1949A543000
trusted library allocation
page read and write
8DE000
unkown
page readonly
7FFB4ACE6000
trusted library allocation
page execute and read and write
7FFB4B080000
trusted library allocation
page read and write
2786BA91000
heap
page read and write
1B13C4BA000
heap
page read and write
7FFB4AF69000
trusted library allocation
page read and write
1B1340D9000
trusted library allocation
page read and write
F726B7E000
stack
page read and write
7FFB4AD26000
trusted library allocation
page execute and read and write
2CFA000
trusted library allocation
page read and write
7FFB4AE30000
trusted library allocation
page read and write
251EED00000
heap
page read and write
7FFB4AF60000
trusted library allocation
page read and write
19497275000
heap
page read and write
7FFB4ADB1000
trusted library allocation
page read and write
27801788000
trusted library allocation
page read and write
1375000
heap
page read and write
7FFB4AE10000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page read and write
A95587E000
stack
page read and write
12CA1000
trusted library allocation
page read and write
A955573000
stack
page read and write
7FFB4AFF3000
trusted library allocation
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
1B122130000
trusted library section
page read and write
1B7CD000
stack
page read and write
1502000
heap
page read and write
B89D1CE000
stack
page read and write
1B122150000
heap
page read and write
7FFB4B030000
trusted library allocation
page execute and read and write
7FFB4AC0D000
trusted library allocation
page execute and read and write
F7263DE000
stack
page read and write
7FFB4AEB0000
trusted library allocation
page read and write
F72794B000
stack
page read and write
7FFB4AC1D000
trusted library allocation
page execute and read and write
1B122140000
trusted library allocation
page read and write
2786960D000
heap
page read and write
7FFB4B020000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
E02000
heap
page read and write
7FFB4AC12000
trusted library allocation
page read and write
1B1249D0000
trusted library allocation
page read and write
1C76F000
heap
page read and write
1B123B70000
trusted library allocation
page read and write
2786B25F000
heap
page read and write
194A8DF1000
trusted library allocation
page read and write
7FFB4AEE5000
trusted library allocation
page read and write
7FFB4AC1D000
trusted library allocation
page execute and read and write
7FFB4AF43000
trusted library allocation
page read and write
F7277CE000
stack
page read and write
251F0D09000
heap
page read and write
2CFE000
trusted library allocation
page read and write
A956B8E000
stack
page read and write
27800229000
trusted library allocation
page read and write
9EF000
heap
page read and write
27801E07000
trusted library allocation
page read and write
1B13C4C2000
heap
page read and write
7FFB4B026000
trusted library allocation
page read and write
25190021000
trusted library allocation
page read and write
1B1249D2000
trusted library allocation
page read and write
7DF4E5250000
trusted library allocation
page execute and read and write
7FFB4AF33000
trusted library allocation
page read and write
9C0000
heap
page read and write
1B13C453000
heap
page read and write
A955DBE000
stack
page read and write
7FFB4ADE4000
trusted library allocation
page read and write
3230000
heap
page read and write
1B13C517000
heap
page read and write
1466000
heap
page read and write
1B125198000
trusted library allocation
page read and write
7FFB4B020000
trusted library allocation
page read and write
1BC30000
heap
page read and write
7FFB4AFFA000
trusted library allocation
page read and write
B89E7CE000
stack
page read and write
106227C000
stack
page read and write
319E000
stack
page read and write
1B133E42000
trusted library allocation
page read and write
19496F40000
heap
page read and write
1700000
heap
page read and write
251F0CD5000
heap
page read and write
F726C7C000
stack
page read and write
1B125079000
trusted library allocation
page read and write
194B1495000
heap
page read and write
13D0000
heap
page read and write
7FFB4AE40000
trusted library allocation
page read and write
194A90B0000
trusted library allocation
page read and write
7FFB4ACD0000
trusted library allocation
page execute and read and write
7FFB4ADB1000
trusted library allocation
page read and write
7FFB4ADAA000
trusted library allocation
page read and write
F726879000
stack
page read and write
1B122090000
heap
page read and write
7FFB4AF60000
trusted library allocation
page read and write
7FFB4AC0D000
trusted library allocation
page execute and read and write
27800A52000
trusted library allocation
page read and write
143C000
heap
page read and write
7FFB4B000000
trusted library allocation
page read and write
1BE3E000
stack
page read and write
10622F9000
stack
page read and write
B89D877000
stack
page read and write
B89D57E000
stack
page read and write
7FFB4AC1B000
trusted library allocation
page read and write
7FFB4ADB0000
trusted library allocation
page execute and read and write
251EECB0000
heap
page read and write
D8F000
stack
page read and write
990000
heap
page read and write
25181250000
trusted library allocation
page read and write
19499E7C000
trusted library allocation
page read and write
7FFB4B050000
trusted library allocation
page read and write
7FFB4AE10000
trusted library allocation
page read and write
9C8000
heap
page read and write
25180087000
trusted library allocation
page read and write
1B8F0000
heap
page read and write
7FFB4AC13000
trusted library allocation
page execute and read and write
194B13EC000
heap
page read and write
7FFB4AC10000
trusted library allocation
page read and write
1ACBD000
stack
page read and write
970000
heap
page read and write
7FFB4AEC0000
trusted library allocation
page read and write
19497150000
heap
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
278012A5000
trusted library allocation
page read and write
7FFB4AC0D000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
7FFB4AF50000
trusted library allocation
page read and write
1B13C3D0000
heap
page read and write
7FFB4ADF0000
trusted library allocation
page execute and read and write
2786B709000
heap
page read and write
2786B0D0000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
1CB60000
heap
page execute and read and write
7FFB4AE00000
trusted library allocation
page read and write
7FFB4B070000
trusted library allocation
page read and write
251EEC70000
heap
page read and write
194A8DE1000
trusted library allocation
page read and write
1B13C4CF000
heap
page read and write
7FFB4AC4C000
trusted library allocation
page execute and read and write
1B12565B000
trusted library allocation
page read and write
194B118D000
heap
page read and write
145C000
heap
page read and write
27801894000
trusted library allocation
page read and write
2786B961000
heap
page read and write
7FFB4AE70000
trusted library allocation
page read and write
7FFB4AC14000
trusted library allocation
page read and write
14F2000
heap
page read and write
7FFB4ACC0000
trusted library allocation
page read and write
7FFB4AF00000
trusted library allocation
page read and write
7FFB4AE60000
trusted library allocation
page read and write
7FFB4AE70000
trusted library allocation
page read and write
7FFB4AC04000
trusted library allocation
page read and write
7FFB4B01C000
trusted library allocation
page read and write
1B1252EA000
trusted library allocation
page read and write
1B123B30000
trusted library allocation
page read and write
7FFB4AE20000
trusted library allocation
page read and write
1B123BDA000
heap
page read and write
1472000
heap
page read and write
2C80000
heap
page execute and read and write
2518130B000
trusted library allocation
page read and write
B89E6C7000
stack
page read and write
25181036000
trusted library allocation
page read and write
7FFB4ADD0000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
278102EA000
trusted library allocation
page read and write
25181123000
trusted library allocation
page read and write
A85000
heap
page read and write
19499D46000
trusted library allocation
page read and write
D95000
heap
page read and write
7FFB4AC14000
trusted library allocation
page read and write
7FFB4ADD8000
trusted library allocation
page read and write
E2E000
heap
page read and write
251902EB000
trusted library allocation
page read and write
251F0F32000
heap
page read and write
19496FC9000
heap
page read and write
1B122158000
heap
page read and write
2786965A000
heap
page read and write
E8B000
heap
page read and write
7FFB4ADC0000
trusted library allocation
page read and write
8D0000
unkown
page readonly
2786B70F000
heap
page read and write
27801032000
trusted library allocation
page read and write
7FFB4ABF3000
trusted library allocation
page execute and read and write
1BD3E000
stack
page read and write
251EECFE000
heap
page read and write
7FFB4ABF3000
trusted library allocation
page execute and read and write
194971D0000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
7FFB4B088000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
19497240000
trusted library allocation
page read and write
7FFB4AF80000
trusted library allocation
page read and write
A95690E000
stack
page read and write
19498BF5000
heap
page read and write
19499D39000
trusted library allocation
page read and write
1B124F7C000
trusted library allocation
page read and write
2518115E000
trusted library allocation
page read and write
B89D47D000
stack
page read and write
7FFB4ADCA000
trusted library allocation
page read and write
263E000
stack
page read and write
7FFB4ADBA000
trusted library allocation
page read and write
1B13C39C000
heap
page read and write
There are 1029 hidden memdumps, click here to show them.