IOC Report
Pnihosiyvr.exe

loading gif

Files

File Path
Type
Category
Malicious
Pnihosiyvr.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_6f7dcd1940ace3d3d06544b01a852bbab5b6d4_9e133ab6_1cc90496-baf4-4257-a69f-6b76b5dbc299\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BA4.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Apr 11 09:32:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D4B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D7B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MSBuild.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Pnihosiyvr.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sssssssssssssssss.exe.log
CSV text
dropped
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Pnihosiyvr.exe
"C:\Users\user\Desktop\Pnihosiyvr.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe
"C:\Users\user\AppData\Roaming\sssssssssssssssss.exe"
malicious
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe
"C:\Users\user\AppData\Roaming\sssssssssssssssss.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2128 -s 1412
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\choice.exe
choice /C Y /N /D Y /T 3

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
158.101.44.242
malicious
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://cdn.discordapp.com/attachments/1223189307423064096/1227506231204253746/Vfjvqmgnpj.mp3?ex=662
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://cdn.discordapp.com/attachments/1223189307423064096/1227506231204253746/Vfjvqmgnpj.mp3?ex=6628a743&is=66163243&hm=e36bea9e5aea3063f473ba3c29865ff160adc592430b1e4958d27899b61679dc&
162.159.135.233
http://checkip.dyndns.org/q
unknown
https://scratchdreams.tk
unknown
http://reallyfreegeoip.org
unknown
http://crl.microsoftS
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
http://upx.sf.net
unknown
https://reallyfreegeoip.org/xml/156.146.36.197
172.67.177.134
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
https://cdn.discordapp.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/156.146.36.197p
unknown
http://checkip.dyndns.org/P6
unknown
http://checkip.dyndns.org/A
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.com
158.101.44.242
malicious
checkip.dyndns.org
unknown
malicious
bg.microsoft.map.fastly.net
199.232.214.172
cdn.discordapp.com
162.159.135.233
reallyfreegeoip.org
172.67.177.134
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
158.101.44.242
checkip.dyndns.com
United States
malicious
162.159.135.233
cdn.discordapp.com
United States
172.67.177.134
reallyfreegeoip.org
United States
162.159.134.233
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
sssssssssssssssss
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
ProgramId
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
FileId
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
LowerCaseLongPath
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
LongPathHash
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
Name
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
OriginalFileName
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
Publisher
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
Version
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
BinFileVersion
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
BinaryType
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
ProductName
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
ProductVersion
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
LinkDate
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
BinProductVersion
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
AppxPackageFullName
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
AppxPackageRelativeId
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
Size
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
Language
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
IsOsComponent
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
FileDirectory
There are 53 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A34568A000
heap
page read and write
malicious
1A33CFF1000
trusted library allocation
page read and write
malicious
16180001000
trusted library allocation
page read and write
malicious
1D298BAB000
trusted library allocation
page read and write
malicious
1D2B1430000
heap
page read and write
malicious
1D2A9703000
trusted library allocation
page read and write
malicious
20A90DE1000
trusted library allocation
page read and write
malicious
1A32CC78000
trusted library allocation
page read and write
malicious
1D298AE8000
trusted library allocation
page read and write
malicious
1A32CC01000
trusted library allocation
page read and write
malicious
1A33D6EA000
trusted library allocation
page read and write
malicious
1D2A9582000
trusted library allocation
page read and write
malicious
1D298B45000
trusted library allocation
page read and write
malicious
20A80380000
trusted library allocation
page read and write
malicious
18357C03000
trusted library allocation
page read and write
malicious
1D2A98B0000
trusted library allocation
page read and write
malicious
20A80001000
trusted library allocation
page read and write
malicious
2592BEA1000
trusted library allocation
page read and write
malicious
183579D1000
trusted library allocation
page read and write
malicious
1A3456F0000
trusted library section
page read and write
malicious
1A33D91A000
trusted library allocation
page read and write
malicious
140002000
remote allocation
page execute and read and write
malicious
1A32CB00000
trusted library section
page read and write
malicious
1D2987F1000
trusted library allocation
page read and write
malicious
1A32CF85000
trusted library allocation
page read and write
malicious
20A80078000
trusted library allocation
page read and write
malicious
7FF848FF0000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
140000000
remote allocation
page execute and read and write
18357AC4000
trusted library allocation
page read and write
67074FE000
stack
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
161F9AD3000
trusted library allocation
page read and write
20AF7670000
heap
page execute and read and write
1A3454A0000
heap
page execute and read and write
7FF848E4B000
trusted library allocation
page execute and read and write
7FF8492B6000
trusted library allocation
page read and write
1837026B000
heap
page read and write
12D90B00000
heap
page read and write
12D90DE0000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
7FF8492B9000
trusted library allocation
page read and write
20A806A1000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
2592BE20000
heap
page execute and read and write
328133F000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
161F9AD0000
trusted library allocation
page read and write
161FBD44000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF8492AE000
trusted library allocation
page read and write
25944820000
heap
page read and write
1D296CB1000
heap
page read and write
692A3FE000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
1A32B2A0000
trusted library allocation
page read and write
18356020000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF849130000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849038000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
18357B66000
trusted library allocation
page read and write
9187DFE000
stack
page read and write
7FF848F95000
trusted library allocation
page read and write
1A32B090000
heap
page read and write
1D296E95000
heap
page read and write
24205DF0000
heap
page read and write
1D2A87F1000
trusted library allocation
page read and write
3281DFE000
stack
page read and write
1A32B030000
heap
page read and write
12D90DD0000
heap
page read and write
20A90AEA000
trusted library allocation
page read and write
161F9890000
trusted library allocation
page read and write
20AF54C0000
heap
page execute and read and write
6707CFE000
stack
page read and write
7FF849330000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
20AF52A0000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
1A32AF40000
unkown
page readonly
20AF5200000
heap
page read and write
161F98C0000
heap
page read and write
7FF8492C0000
trusted library allocation
page read and write
20A90D1A000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
18355E1D000
heap
page read and write
1A33CC0C000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
161F9B75000
heap
page read and write
1D2A89E1000
trusted library allocation
page read and write
161F9720000
heap
page read and write
18357B6E000
trusted library allocation
page read and write
20A80066000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
91871FE000
stack
page read and write
67077FD000
stack
page read and write
7FF848E33000
trusted library allocation
page read and write
2592A32D000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF8491D0000
trusted library allocation
page execute and read and write
7FF8492B0000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848E4B000
trusted library allocation
page execute and read and write
161F9840000
heap
page read and write
16180150000
trusted library allocation
page read and write
1A32B050000
heap
page read and write
1D298E85000
trusted library allocation
page read and write
20A903F1000
trusted library allocation
page read and write
6929FF2000
stack
page read and write
7FF848FAE000
trusted library allocation
page read and write
20AF52CC000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
3282DFF000
stack
page read and write
7FF849041000
trusted library allocation
page read and write
7FF849294000
trusted library allocation
page read and write
24205DE0000
heap
page read and write
2592A570000
heap
page read and write
692CFFF000
stack
page read and write
7FF8492F5000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
18355DB5000
heap
page read and write
C3999FE000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
1619000D000
trusted library allocation
page read and write
1A345625000
heap
page read and write
18355D50000
heap
page read and write
2592A3CB000
heap
page read and write
C39A3FF000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
1D296E90000
heap
page read and write
18357B2A000
trusted library allocation
page read and write
7FF848F9E000
trusted library allocation
page read and write
F2B730C000
stack
page read and write
7FF849310000
trusted library allocation
page read and write
1A32B010000
heap
page read and write
15B23FF000
unkown
page read and write
7FF8490A0000
trusted library allocation
page read and write
1A33CC0F000
trusted library allocation
page read and write
1D298E71000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
20A90D0D000
trusted library allocation
page read and write
20AF5420000
heap
page read and write
7FF8492EF000
trusted library allocation
page read and write
18357B72000
trusted library allocation
page read and write
8064EED000
stack
page read and write
183679D1000
trusted library allocation
page read and write
1D2A8E29000
trusted library allocation
page read and write
20A90EC0000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page execute and read and write
692AFFD000
stack
page read and write
1D298E7C000
trusted library allocation
page read and write
1A32AF70000
unkown
page readonly
18355E4B000
heap
page read and write
24205DB0000
heap
page read and write
20A90639000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
8065AFE000
stack
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
161FB3A0000
heap
page execute and read and write
20A8068C000
trusted library allocation
page read and write
7FF849048000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
20AF770B000
heap
page read and write
20A9072A000
trusted library allocation
page read and write
15B24FF000
stack
page read and write
161FBD85000
heap
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
91865FE000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
2592BFB0000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1837024F000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
20AF5269000
heap
page read and write
161F9AE0000
heap
page read and write
2592A395000
heap
page read and write
18355F10000
trusted library allocation
page read and write
1A32B0FD000
heap
page read and write
692A7FE000
stack
page read and write
1A345627000
heap
page read and write
32829FD000
stack
page read and write
7FF8492EA000
trusted library allocation
page read and write
2593BEB1000
trusted library allocation
page read and write
32839FF000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
80659FE000
stack
page read and write
7FF848FC3000
trusted library allocation
page read and write
24205E58000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
18355E0D000
heap
page read and write
1A32D296000
trusted library allocation
page read and write
12D90DD5000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
20AF5288000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF849040000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
1D296CD9000
heap
page read and write
1D2A8E01000
trusted library allocation
page read and write
7FF848FA5000
trusted library allocation
page read and write
16190001000
trusted library allocation
page read and write
20AF5352000
heap
page read and write
67075FE000
stack
page read and write
7FF8492C0000
trusted library allocation
page read and write
7FF849319000
trusted library allocation
page read and write
20AF5370000
trusted library allocation
page read and write
7FF8491AA000
trusted library allocation
page read and write
20AF7035000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
20AF5100000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
18355EF0000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page read and write
18357B76000
trusted library allocation
page read and write
2592A318000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848E3D000
trusted library allocation
page execute and read and write
1D298E8F000
trusted library allocation
page read and write
18357930000
heap
page execute and read and write
18357B95000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
2592BF97000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
18357AFC000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1D298A61000
trusted library allocation
page read and write
12D90C00000
heap
page read and write
2592BFB3000
trusted library allocation
page read and write
67079FE000
stack
page read and write
1D2B1126000
heap
page read and write
161F9820000
heap
page read and write
7FF8492AE000
trusted library allocation
page read and write
1A32D285000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
161F9800000
heap
page read and write
20AF5425000
heap
page read and write
16180142000
trusted library allocation
page read and write
1D2A94FD000
trusted library allocation
page read and write
91885FD000
stack
page read and write
7FF848E19000
trusted library allocation
page read and write
161FB5F0000
heap
page read and write
161F98FC000
heap
page read and write
161801AC000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF8491C0000
trusted library allocation
page read and write
20A80695000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1D2A905A000
trusted library allocation
page read and write
692D7FE000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
161F9996000
heap
page read and write
18355C70000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
692BFFE000
stack
page read and write
18355D70000
heap
page read and write
2593BEAD000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
1618010A000
trusted library allocation
page read and write
18355FC0000
heap
page execute and read and write
20A8067F000
trusted library allocation
page read and write
7FF848FCE000
trusted library allocation
page read and write
6706EED000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
692CBFE000
stack
page read and write
2592A2D0000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF849300000
trusted library allocation
page read and write
1D296D90000
trusted library allocation
page read and write
1A32B13C000
heap
page read and write
C39A0FD000
stack
page read and write
7FF8492C0000
trusted library allocation
page read and write
1A32B0B0000
trusted library allocation
page read and write
1D2A88E1000
trusted library allocation
page read and write
20A9086A000
trusted library allocation
page read and write
161FBD46000
heap
page read and write
1D298E6F000
trusted library allocation
page read and write
80654FE000
stack
page read and write
12D90C38000
heap
page read and write
2592A575000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
20A80074000
trusted library allocation
page read and write
1D296C7C000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848E39000
trusted library allocation
page read and write
20AF5220000
heap
page read and write
1D296C70000
heap
page read and write
1D2A8861000
trusted library allocation
page read and write
6707AFF000
stack
page read and write
1D29884E000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page execute and read and write
1D2B1143000
heap
page read and write
7FF849305000
trusted library allocation
page read and write
24205DC0000
heap
page read and write
1D2B0820000
trusted library allocation
page read and write
161FB480000
heap
page read and write
7FF849068000
trusted library allocation
page read and write
20A90031000
trusted library allocation
page read and write
1A345430000
trusted library section
page read and write
9185DF2000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
1D2A9986000
trusted library allocation
page read and write
7FF849340000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
16180108000
trusted library allocation
page read and write
1A32D281000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
20A90D42000
trusted library allocation
page read and write
7FF849296000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
1D2A8BE1000
trusted library allocation
page read and write
1D298E73000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1D296C9B000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
C399DFE000
stack
page read and write
8064FFE000
stack
page read and write
C39A1FE000
stack
page read and write
1A32B10F000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1D2B10B0000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF8491B0000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF8492A6000
trusted library allocation
page read and write
1A32B300000
trusted library section
page read and write
7FF849071000
trusted library allocation
page read and write
1A32D2A1000
trusted library allocation
page read and write
67076FE000
stack
page read and write
692BBFE000
stack
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF848FA2000
trusted library allocation
page read and write
18357ACC000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
20AF534F000
heap
page read and write
20A8051C000
trusted library allocation
page read and write
161801B0000
trusted library allocation
page read and write
2592A260000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
20AF771A000
heap
page read and write
1A3453E0000
trusted library section
page read and write
1D2A96B0000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
6706FFE000
stack
page read and write
1A32CBF0000
heap
page read and write
2592A2F9000
heap
page read and write
7FF8492CA000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1837024C000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
7FF8492FF000
trusted library allocation
page read and write
161F98FE000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
1D298B9D000
trusted library allocation
page read and write
18357B7A000
trusted library allocation
page read and write
18357B6A000
trusted library allocation
page read and write
18355E08000
heap
page read and write
12D90C55000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
32821FF000
stack
page read and write
1D2B10DC000
heap
page read and write
1D296CDB000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
1D298D0C000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
692B7FE000
stack
page read and write
7FF8492DF000
trusted library allocation
page read and write
1A32B13E000
heap
page read and write
1A32D283000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2592A30A000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
1D2A950A000
trusted library allocation
page read and write
692992E000
stack
page read and write
80653FE000
stack
page read and write
18357B7E000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
20A80068000
trusted library allocation
page read and write
1D296CE1000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1D29886A000
trusted library allocation
page read and write
1A32CC5C000
trusted library allocation
page read and write
161801C4000
trusted library allocation
page read and write
2592A31A000
heap
page read and write
1D2B10E0000
heap
page read and write
7FF8491E0000
trusted library allocation
page execute and read and write
7FF849170000
trusted library allocation
page read and write
1D2A8F1A000
trusted library allocation
page read and write
7FF8492A0000
trusted library allocation
page read and write
7FF4E6EC0000
trusted library allocation
page execute and read and write
1D2A87FF000
trusted library allocation
page read and write
692D3FB000
stack
page read and write
12D90C30000
heap
page read and write
F2B738E000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
2592A31D000
heap
page read and write
2592A490000
heap
page read and write
1A344C30000
trusted library allocation
page read and write
7FF8491F8000
trusted library allocation
page execute and read and write
80656FD000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF848E44000
trusted library allocation
page read and write
7FF8491B3000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
16190011000
trusted library allocation
page read and write
C399CFD000
stack
page read and write
1D296B20000
heap
page read and write
692ABFF000
stack
page read and write
7FF8492B0000
trusted library allocation
page read and write
20A901F1000
trusted library allocation
page read and write
6707BFE000
stack
page read and write
16180158000
trusted library allocation
page read and write
18357BCF000
trusted library allocation
page read and write
1D2B1162000
heap
page read and write
7FF8491E8000
trusted library allocation
page execute and read and write
18356025000
heap
page read and write
2592A240000
heap
page read and write
80651FE000
stack
page read and write
1618012D000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
161801D7000
trusted library allocation
page read and write
1D298866000
trusted library allocation
page read and write
1A32CC68000
trusted library allocation
page read and write
1D2A9922000
trusted library allocation
page read and write
692C3FE000
stack
page read and write
7FF849200000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page read and write
7FF8491C4000
trusted library allocation
page read and write
7FF8492A4000
trusted library allocation
page read and write
18357B26000
trusted library allocation
page read and write
32831FE000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
3283DFD000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
80655FD000
stack
page read and write
91861FF000
stack
page read and write
2593BEA1000
trusted library allocation
page read and write
20AF53E0000
heap
page read and write
32825FE000
stack
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
2592BE90000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1A32B330000
heap
page read and write
67072FE000
stack
page read and write
69298EF000
stack
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849060000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
C3998ED000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF8492CF000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
12D90C3D000
heap
page read and write
1A32CFB1000
trusted library allocation
page read and write
20A8005C000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
1A344F8F000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
20AF5505000
heap
page read and write
18355E22000
heap
page read and write
80658FE000
stack
page read and write
67078FE000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
20A9000F000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
24205E50000
heap
page read and write
1A3455F0000
heap
page read and write
18357BF0000
trusted library allocation
page read and write
7FF8492EB000
trusted library allocation
page read and write
2593BEA8000
trusted library allocation
page read and write
91869FE000
stack
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
32812FF000
stack
page read and write
7FF8492E0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
1A32B112000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
20A80681000
trusted library allocation
page read and write
91879FE000
stack
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
80650FE000
stack
page read and write
7FF84900B000
trusted library allocation
page read and write
2592A160000
heap
page read and write
1D296DE0000
heap
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
183701D0000
heap
page read and write
7FF8492D9000
trusted library allocation
page read and write
32845FE000
stack
page read and write
18357C20000
trusted library allocation
page read and write
20AF51E0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
C399AFE000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
161F9AE5000
heap
page read and write
1D298651000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page read and write
9186DFD000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
1D2987E0000
heap
page read and write
C39A2FF000
stack
page read and write
1D2A8821000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
161F98FA000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
7FF8491B4000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
183679D8000
trusted library allocation
page read and write
18357BA8000
trusted library allocation
page read and write
18357B14000
trusted library allocation
page read and write
20A90071000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8492A6000
trusted library allocation
page read and write
7FF848FFB000
trusted library allocation
page read and write
20A9000C000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1D296DB0000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
1D2A92DA000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
20AF535E000
heap
page read and write
80652FD000
stack
page read and write
18357B1E000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1D296C20000
heap
page read and write
1A32CC66000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
692B3FE000
stack
page read and write
2592A39B000
heap
page read and write
16190008000
trusted library allocation
page read and write
C39A4FE000
stack
page read and write
7FF8491E4000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
20AF7753000
heap
page read and write
7FF849320000
trusted library allocation
page read and write
32849FE000
stack
page read and write
20AF76B2000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
2592A359000
heap
page read and write
7FF84929E000
trusted library allocation
page read and write
18357B22000
trusted library allocation
page read and write
80657FE000
stack
page read and write
161FB630000
heap
page execute and read and write
1A32B335000
heap
page read and write
1D296C9D000
heap
page read and write
2592A3F0000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848EB0000
trusted library allocation
page read and write
7FF849009000
trusted library allocation
page read and write
1D2A94FA000
trusted library allocation
page read and write
20A900F1000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page execute and read and write
7FF8491C0000
trusted library allocation
page execute and read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
18370213000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849051000
trusted library allocation
page read and write
2592BF9A000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
20AF5354000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1A32AF42000
unkown
page readonly
1D298E91000
trusted library allocation
page read and write
161F98C9000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
C399EFE000
stack
page read and write
1D296C40000
heap
page read and write
1D2B1176000
heap
page read and write
1A32CC74000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
67073FC000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
7FF8491BA000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
692C7FF000
stack
page read and write
20AF6CE0000
trusted library allocation
page read and write
7FF8492FB000
trusted library allocation
page read and write
67071FE000
stack
page read and write
18370292000
heap
page read and write
1D298859000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
20A8069F000
trusted library allocation
page read and write
18355D90000
heap
page read and write
18357BBB000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
161800F2000
trusted library allocation
page read and write
1A32CB60000
heap
page execute and read and write
7FF8490A0000
trusted library allocation
page read and write
1A32D11C000
trusted library allocation
page read and write
15B22FC000
stack
page read and write
18355E05000
heap
page read and write
1A33CC01000
trusted library allocation
page read and write
161F98B0000
trusted library allocation
page read and write
1D296EA5000
heap
page read and write
2592A32F000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
18355E4D000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
67070FF000
stack
page read and write
7FF8491A0000
trusted library allocation
page read and write
18357ADC000
trusted library allocation
page read and write
1D2A87FC000
trusted library allocation
page read and write
18355DB0000
heap
page read and write
91875FE000
stack
page read and write
7FF8492BE000
trusted library allocation
page read and write
161F9993000
heap
page read and write
7FF84931F000
trusted library allocation
page read and write
1D296CAF000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
2592A280000
heap
page read and write
161FBD00000
heap
page read and write
7FF849300000
trusted library allocation
page read and write
32819F2000
stack
page read and write
32835FE000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8491A3000
trusted library allocation
page read and write
183679DD000
trusted library allocation
page read and write
1A32B0D0000
heap
page read and write
7FF848FE4000
trusted library allocation
page read and write
161F98E8000
heap
page read and write
32841FF000
stack
page read and write
2592BD20000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
7FF848EB0000
trusted library allocation
page execute and read and write
7FF849190000
trusted library allocation
page read and write
7FF848FC4000
trusted library allocation
page read and write
7FF848FF9000
trusted library allocation
page read and write
2592A320000
heap
page read and write
1A32B0D6000
heap
page read and write
161F99B2000
heap
page read and write
C39A5FF000
stack
page read and write
C399BFF000
stack
page read and write
1D2B0F60000
heap
page execute and read and write
7FF848EE0000
trusted library allocation
page execute and read and write
7FF848E7C000
trusted library allocation
page execute and read and write
20AF529D000
heap
page read and write
1618014C000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
2592A400000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848EBC000
trusted library allocation
page execute and read and write
7FF8492A9000
trusted library allocation
page read and write
7FF8492BA000
trusted library allocation
page read and write
1A32D28E000
trusted library allocation
page read and write
7FF848E4B000
trusted library allocation
page execute and read and write
18355F50000
heap
page read and write
183679E1000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
7FF8491B0000
trusted library allocation
page read and write
1A33D90D000
trusted library allocation
page read and write
20A90611000
trusted library allocation
page read and write
1D2A8E7A000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
18357B82000
trusted library allocation
page read and write
7FF84902B000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page read and write
24205DE5000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
20A90001000
trusted library allocation
page read and write
91881FF000
stack
page read and write
12D90BE0000
heap
page read and write
7FF849014000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
20AF5390000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
1A32B095000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
183579C0000
heap
page read and write
161F9B70000
heap
page read and write
2592A495000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
2592A2F0000
heap
page read and write
20A90D92000
trusted library allocation
page read and write
7FF849300000
trusted library allocation
page read and write
20A90D0A000
trusted library allocation
page read and write
2592A403000
trusted library allocation
page read and write
1D296C00000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1D296EA0000
heap
page read and write
161801A4000
trusted library allocation
page read and write
161FBD9E000
heap
page read and write
25944A10000
heap
page execute and read and write
16180154000
trusted library allocation
page read and write
18355DE0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
20AF5260000
heap
page read and write
1A32B000000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF8491E0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
161800FA000
trusted library allocation
page read and write
1D298A7F000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
161F98EA000
heap
page read and write
1D2B1172000
heap
page read and write
7FF849310000
trusted library allocation
page read and write
161801A8000
trusted library allocation
page read and write
161F9928000
heap
page read and write
C399FFE000
stack
page read and write
1A32B0FB000
heap
page read and write
1D298BD0000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
20AF5500000
heap
page read and write
18357BEC000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
18357AC1000
trusted library allocation
page read and write
20A80683000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
1D29888F000
trusted library allocation
page read and write
1D2B119C000
heap
page read and write
7FF848E39000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
F2B767E000
stack
page read and write
18355E10000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
20A9068A000
trusted library allocation
page read and write
20AF7680000
heap
page read and write
There are 759 hidden memdumps, click here to show them.