IOC Report
cybXkFC5nF.exe

loading gif

Files

File Path
Type
Category
Malicious
cybXkFC5nF.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cybXkFC5nF.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3t1o2d0.dog.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ud4foain.50z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yt0h1lbg.sfv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zq40omcq.fgk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Exception\TypeId.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\cybXkFC5nF.exe
"C:\Users\user\Desktop\cybXkFC5nF.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwARQB4AGMAZQBwAHQAaQBvAG4AXABUAHkAcABlAEkAZAAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAIAAtAEYAbwByAGMAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABNAGkAYwByAG8AcwBvAGYAdAAuAE4ARQBUAFwARgByAGEAbQBlAHcAbwByAGsANgA0AFwAdgA0AC4AMAAuADMAMAAzADEAOQBcAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUALABDADoAXABVAHMAZQByAHMAXABqAG8AbgBlAHMAXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAEUAeABjAGUAcAB0AGkAbwBuAFwAVAB5AHAAZQBJAGQALgBlAHgAZQA=
malicious
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 8Bk24tjeWqN6AqpNY25oCTh7a7WhLbFN3TUCo5DUiJn5bfLEr7diNi64q87hchj2t31ikW7jg7YjGNWQkhH9pf9uH7jTPTb.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
malicious
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
C:\Users\user\AppData\Roaming\Exception\TypeId.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://xmrig.com/wizard%s
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://xmrig.com/wizard
unknown
https://files.catbox.moe/kwfxr7.dll
unknown
https://github.com/Pester/Pester
unknown
https://filebin.net/Afamwaujr/Gupllwtbdl.Lsw
88.99.137.18
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://xmrig.com/docs/algorithms
unknown
https://files.catbox.moe/k541xr.dllJ
unknown
https://xmrig.com/benchmark/%s
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
https://files.catbox.moe/k541xr.dll
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.microsoft
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3.filebin.net
unknown
malicious
xmr.2miners.com
162.19.139.184
filebin.net
88.99.137.18
puredns.o7lab.me
91.92.255.15
pong.filebin.net
88.99.137.18

IPs

IP
Domain
Country
Malicious
162.19.139.184
xmr.2miners.com
United States
88.99.137.18
filebin.net
Germany
91.92.255.15
puredns.o7lab.me
Bulgaria

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\966004821d4bb3e582500fa9d001395d
e3309120fcec973ef8c79abef214d968
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\966004821d4bb3e582500fa9d001395d
F5FABE5F462CE379E2FAE5276F604EB4
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
176F10CE000
heap
page read and write
malicious
176902AA000
trusted library allocation
page read and write
malicious
17680001000
trusted library allocation
page read and write
malicious
2AE04DF7000
heap
page read and write
malicious
2B30FE91000
trusted library allocation
page read and write
malicious
2B3204AE000
trusted library allocation
page read and write
malicious
176F2B80000
trusted library section
page read and write
malicious
176F2C80000
trusted library section
page read and write
malicious
1A867E49000
trusted library allocation
page read and write
malicious
2AE04E2B000
heap
page read and write
malicious
20B0EEEA000
trusted library allocation
page read and write
malicious
1A878466000
trusted library allocation
page read and write
malicious
1FAE1AF1000
trusted library allocation
page read and write
malicious
2B3204D6000
trusted library allocation
page read and write
malicious
2B3205C6000
trusted library allocation
page read and write
malicious
17690482000
trusted library allocation
page read and write
malicious
17690736000
trusted library allocation
page read and write
malicious
1A878376000
trusted library allocation
page read and write
malicious
2B320526000
trusted library allocation
page read and write
malicious
1A8783C6000
trusted library allocation
page read and write
malicious
140465000
remote allocation
page execute and read and write
malicious
1A867E66000
trusted library allocation
page read and write
malicious
20B0EE21000
trusted library allocation
page read and write
malicious
1A867E23000
trusted library allocation
page read and write
malicious
140000000
remote allocation
page execute and read and write
malicious
1FAF2A3A000
trusted library allocation
page read and write
malicious
176F397D000
heap
page read and write
malicious
1A867DA8000
trusted library allocation
page read and write
malicious
140799000
remote allocation
page execute and read and write
malicious
1FAF2583000
trusted library allocation
page read and write
malicious
1A87834E000
trusted library allocation
page read and write
malicious
2AE04DEC000
heap
page read and write
malicious
7FFD9B7A0000
trusted library allocation
page read and write
1FADFE40000
heap
page read and write
245685E8000
heap
page read and write
176802E0000
trusted library allocation
page read and write
2AE04D30000
heap
page read and write
38FEDFD000
stack
page read and write
1A8781B2000
trusted library allocation
page read and write
2B328A7E000
heap
page read and write
1FAE1F6E000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
176F3963000
heap
page read and write
20B0D200000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2B328C34000
heap
page read and write
17680220000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
245102EC000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page read and write
24501E09000
trusted library allocation
page read and write
245102F0000
trusted library allocation
page read and write
2B30E2BD000
heap
page read and write
2B30E2FD000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1FAFA3A2000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
1FAE1DD5000
trusted library allocation
page read and write
1FAE1D8F000
trusted library allocation
page read and write
1768040E000
trusted library allocation
page read and write
1FAFA6D5000
heap
page read and write
24568DF0000
heap
page execute and read and write
7FFD9B957000
trusted library allocation
page read and write
2B328C07000
heap
page read and write
24568DE7000
heap
page execute and read and write
1FAE1E53000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
176F379D000
heap
page read and write
176F0FF6000
heap
page read and write
1FAE20C6000
trusted library allocation
page read and write
1FADFEAA000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
2B328C8A000
heap
page read and write
1FAF1B96000
trusted library allocation
page read and write
1768012E000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
20B0D7A0000
heap
page read and write
176F3599000
heap
page read and write
D371B3E000
stack
page read and write
176F0EF0000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
20B0D615000
heap
page read and write
D37268E000
stack
page read and write
24569679000
heap
page read and write
5664FFF000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B8A4000
trusted library allocation
page execute and read and write
24569385000
heap
page read and write
1FAE1F1E000
trusted library allocation
page read and write
1A8780B2000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1A8661E0000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1768015C000
trusted library allocation
page read and write
24568C10000
heap
page read and write
7FFD9B9EA000
trusted library allocation
page read and write
2B320152000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2B310110000
trusted library allocation
page read and write
245695DF000
heap
page read and write
7FFD9B9F3000
trusted library allocation
page read and write
24500C0D000
trusted library allocation
page read and write
2B30E2D1000
heap
page read and write
17680528000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2B31009D000
trusted library allocation
page read and write
2B328AED000
heap
page read and write
1FAF20FD000
trusted library allocation
page read and write
1FAE1CC0000
trusted library allocation
page read and write
1FAF9B20000
trusted library allocation
page read and write
2AE04DC8000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9BAE8000
trusted library allocation
page read and write
176F105D000
heap
page read and write
7FFD9B78A000
trusted library allocation
page read and write
2AE04D10000
direct allocation
page execute read
1A87852F000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
245685BF000
heap
page read and write
1FAF23D7000
trusted library allocation
page read and write
2B3288E9000
heap
page read and write
24501310000
trusted library allocation
page read and write
1FAE217C000
trusted library allocation
page read and write
7FFD9B9D6000
trusted library allocation
page read and write
1A867D3E000
trusted library allocation
page read and write
1FADFE60000
heap
page read and write
24500001000
trusted library allocation
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
7FFD9B92D000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
176F376F000
heap
page read and write
2B328B23000
heap
page read and write
176F3766000
heap
page read and write
2B328C6F000
heap
page read and write
1FAE0095000
heap
page read and write
176802E6000
trusted library allocation
page read and write
38833FA000
stack
page read and write
17690001000
trusted library allocation
page read and write
2B3206D5000
trusted library allocation
page read and write
1FAE20F8000
trusted library allocation
page read and write
245693B8000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
2B30FFFC000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
1A800030000
trusted library allocation
page read and write
176F352E000
heap
page read and write
176F34BB000
heap
page read and write
20B0D2C6000
heap
page read and write
2B30E6EB000
heap
page read and write
2B328CB4000
heap
page read and write
1FAE21C2000
trusted library allocation
page read and write
24501830000
trusted library allocation
page read and write
1FAE1E1B000
trusted library allocation
page read and write
1FAE1E4C000
trusted library allocation
page read and write
1FAE1DC7000
trusted library allocation
page read and write
24500EFE000
trusted library allocation
page read and write
2B328C4C000
heap
page read and write
24568C30000
trusted library section
page read and write
1FAF21FB000
trusted library allocation
page read and write
2B310435000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1A86625A000
heap
page read and write
1A8782B0000
trusted library allocation
page read and write
1A8662F3000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1FAE1E91000
trusted library allocation
page read and write
7FFD9B996000
trusted library allocation
page read and write
D371877000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B9BF000
trusted library allocation
page read and write
1A8784B7000
trusted library allocation
page read and write
2B328BCE000
heap
page read and write
176F394D000
heap
page read and write
1FAE00E0000
trusted library allocation
page read and write
2B328B5C000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
38FE9FF000
stack
page read and write
176F38C8000
heap
page read and write
176F0DC2000
unkown
page readonly
7FFD9B934000
trusted library allocation
page read and write
1A877D31000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
17680452000
trusted library allocation
page read and write
1A867EA3000
trusted library allocation
page read and write
1A87FD39000
heap
page read and write
176F3946000
heap
page read and write
1FAE2208000
trusted library allocation
page read and write
7FFD9BB73000
trusted library allocation
page read and write
24568CB0000
trusted library allocation
page read and write
1FAFA380000
heap
page execute and read and write
2B3287E1000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
38807FA000
stack
page read and write
176801D4000
trusted library allocation
page read and write
2B310103000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
20B0D260000
heap
page read and write
2B328AA7000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
DE0EB7C000
stack
page read and write
176F369B000
heap
page read and write
1FAE1DF0000
trusted library allocation
page read and write
1FAE2152000
trusted library allocation
page read and write
20B0D220000
heap
page read and write
DE0F1FD000
stack
page read and write
1FAFA3AE000
heap
page read and write
5665BFE000
stack
page read and write
1FAE1F17000
trusted library allocation
page read and write
1FAE1DEB000
trusted library allocation
page read and write
176F1030000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
2AE0AE55000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1FAE00E3000
trusted library allocation
page read and write
2B328861000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
24501DE3000
trusted library allocation
page read and write
2B328A25000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
24568626000
heap
page read and write
176F3580000
heap
page read and write
4EC7BFE000
stack
page read and write
176801C7000
trusted library allocation
page read and write
1FAE1F45000
trusted library allocation
page read and write
2B328828000
heap
page read and write
2450121B000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
2B328C0B000
heap
page read and write
17680615000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2B328B49000
heap
page read and write
1FAE1AC0000
heap
page execute and read and write
176801F6000
trusted library allocation
page read and write
1FAE1E37000
trusted library allocation
page read and write
176F1260000
heap
page execute and read and write
1FAF1F02000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
D37270D000
stack
page read and write
7FFD9B998000
trusted library allocation
page read and write
176F38FD000
heap
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
2AE06670000
direct allocation
page execute and read and write
245692E0000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9B93D000
trusted library allocation
page read and write
2B30E670000
heap
page execute and read and write
3882FFA000
stack
page read and write
176F3454000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page read and write
176F38B1000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2B3289E2000
heap
page read and write
24501E2E000
trusted library allocation
page read and write
2AE06750000
heap
page read and write
2B320132000
trusted library allocation
page read and write
2AE07C55000
heap
page read and write
7FFD9B968000
trusted library allocation
page read and write
2AE06660000
direct allocation
page execute and read and write
176F35DD000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
2AE06855000
heap
page read and write
1FAE1E7D000
trusted library allocation
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
1768029D000
trusted library allocation
page read and write
176F1155000
heap
page read and write
1FAF20A9000
trusted library allocation
page read and write
DE0F4FE000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
2B328AF6000
heap
page read and write
2B3287BB000
heap
page read and write
24568550000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1768051C000
trusted library allocation
page read and write
D3714FE000
stack
page read and write
176F109D000
heap
page read and write
2B328AC5000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B94E000
trusted library allocation
page read and write
2B30E6E0000
heap
page read and write
1FAE1D5F000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1FAE1FA1000
trusted library allocation
page read and write
7FFD9B8AB000
trusted library allocation
page execute and read and write
176F3584000
heap
page read and write
24510021000
trusted library allocation
page read and write
1FAE1DB9000
trusted library allocation
page read and write
1FAE2048000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
24568CF0000
trusted library allocation
page read and write
176F37C4000
heap
page read and write
176F1033000
heap
page read and write
1FAE2160000
trusted library allocation
page read and write
17680107000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
2B328780000
heap
page read and write
176803EE000
trusted library allocation
page read and write
245012AE000
trusted library allocation
page read and write
2B31038C000
trusted library allocation
page read and write
38FFA3E000
stack
page read and write
1FADFE30000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
1A878575000
trusted library allocation
page read and write
1FAE1E61000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
176F2DA0000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
2AE04E90000
heap
page read and write
1FAE1D49000
trusted library allocation
page read and write
A7E99FF000
stack
page read and write
7FFD9B8AB000
trusted library allocation
page execute and read and write
24568730000
heap
page read and write
2B310034000
trusted library allocation
page read and write
1FAE2284000
trusted library allocation
page read and write
1FAE21D8000
trusted library allocation
page read and write
24568870000
heap
page read and write
17680270000
trusted library allocation
page read and write
2B328C44000
heap
page read and write
7FFD9B77A000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2B328CA9000
heap
page read and write
2B328944000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B772000
trusted library allocation
page read and write
1FAE1FD9000
trusted library allocation
page read and write
2B3104AD000
trusted library allocation
page read and write
24569479000
heap
page read and write
176802BE000
trusted library allocation
page read and write
1FAF1F56000
trusted library allocation
page read and write
1FAE1E68000
trusted library allocation
page read and write
2B31037E000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
2B328B1E000
heap
page read and write
1FAFA688000
heap
page read and write
2B3103D7000
trusted library allocation
page read and write
245696D4000
heap
page read and write
7FFD9B937000
trusted library allocation
page read and write
2B328C81000
heap
page read and write
176F38F8000
heap
page read and write
24501099000
trusted library allocation
page read and write
1FADFE9C000
heap
page read and write
1FAFA680000
heap
page read and write
176F3882000
heap
page read and write
176F3481000
heap
page read and write
1A866248000
heap
page read and write
176F37CE000
heap
page read and write
2B3100E2000
trusted library allocation
page read and write
176F1285000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7DF426DA0000
trusted library allocation
page execute and read and write
1FAF1CA3000
trusted library allocation
page read and write
176F343A000
heap
page read and write
7FFD9BAB2000
trusted library allocation
page read and write
176F10F0000
heap
page read and write
1A8782FF000
trusted library allocation
page read and write
1FAF24D8000
trusted library allocation
page read and write
1FAE01E0000
heap
page read and write
176F1170000
trusted library allocation
page read and write
17680534000
trusted library allocation
page read and write
2B32079B000
trusted library allocation
page read and write
20B0D240000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
17680263000
trusted library allocation
page read and write
20B0EEE8000
trusted library allocation
page read and write
176F35BF000
heap
page read and write
176804A9000
trusted library allocation
page read and write
1FAE1990000
heap
page read and write
1FAE1ED1000
trusted library allocation
page read and write
1FAF2152000
trusted library allocation
page read and write
7FFD9B8A4000
trusted library allocation
page execute and read and write
1FAE21EC000
trusted library allocation
page read and write
7FFD9B9E1000
trusted library allocation
page read and write
20B0D5F0000
trusted library allocation
page read and write
176F35C3000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2B310257000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
5664BFF000
stack
page read and write
245011E2000
trusted library allocation
page read and write
1A8008A0000
heap
page execute and read and write
17680331000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
2451028B000
trusted library allocation
page read and write
2B3104B3000
trusted library allocation
page read and write
2451030A000
trusted library allocation
page read and write
1FAE2072000
trusted library allocation
page read and write
1FAE226C000
trusted library allocation
page read and write
245696CD000
heap
page read and write
176F3813000
heap
page read and write
245102F2000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
38FDDE1000
stack
page read and write
7FFD9BA19000
trusted library allocation
page read and write
20B1F0E2000
trusted library allocation
page read and write
1A866350000
trusted library allocation
page read and write
2B3287B1000
heap
page read and write
17680142000
trusted library allocation
page read and write
2B310399000
trusted library allocation
page read and write
2B30FFE9000
trusted library allocation
page read and write
2B3101BE000
trusted library allocation
page read and write
1A867C40000
heap
page execute and read and write
DDF1DFF000
stack
page read and write
2AE04EB0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
2B3288FB000
heap
page read and write
7FF40A820000
trusted library allocation
page execute and read and write
1FAE1DFF000
trusted library allocation
page read and write
2AE067A0000
heap
page read and write
38827FE000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1FADFEA6000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
176F3704000
heap
page read and write
2B3289D0000
heap
page read and write
1FAE1E45000
trusted library allocation
page read and write
1A878032000
trusted library allocation
page read and write
176F3530000
trusted library section
page read and write
D3719B7000
stack
page read and write
176F0DC0000
unkown
page readonly
20B0D750000
heap
page execute and read and write
176F369F000
heap
page read and write
2B328A11000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
176F38A2000
heap
page read and write
1FAE2269000
trusted library allocation
page read and write
7FFD9B9C1000
trusted library allocation
page read and write
176804D2000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
2B32890F000
heap
page read and write
1768011A000
trusted library allocation
page read and write
1FAF1D4C000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
17680359000
trusted library allocation
page read and write
176F3907000
heap
page read and write
1FAF242C000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
1FADFEBC000
heap
page read and write
2B328BD0000
heap
page read and write
17680597000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2B328900000
heap
page read and write
20B0D63D000
heap
page read and write
2B310047000
trusted library allocation
page read and write
2B328BB0000
heap
page read and write
176801FD000
trusted library allocation
page read and write
176F3725000
heap
page read and write
DDF2DFF000
stack
page read and write
1A866228000
heap
page read and write
176F3519000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
176F397A000
heap
page read and write
1768059D000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
24569550000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
A7E89FF000
stack
page read and write
17680402000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
2B30E290000
heap
page read and write
2B3287AF000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1FAE1F85000
trusted library allocation
page read and write
2AE06790000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
17680488000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
D37290B000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
56647E1000
stack
page read and write
2B31016C000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
DDF29FC000
stack
page read and write
1FAE20E2000
trusted library allocation
page read and write
1FAF1AF1000
trusted library allocation
page read and write
7FFD9B94E000
trusted library allocation
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
2B328CAB000
heap
page read and write
D371BBD000
stack
page read and write
2AE04D35000
heap
page read and write
176F2CE0000
trusted library section
page read and write
245695ED000
heap
page read and write
7FFD9B9C6000
trusted library allocation
page read and write
7FFD9B9EA000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
3881FFB000
stack
page read and write
2456859F000
heap
page read and write
1FAE01E5000
heap
page read and write
2B310180000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
176F10EA000
heap
page read and write
17680460000
trusted library allocation
page read and write
2AE04BE0000
heap
page read and write
388143E000
unkown
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
7FFD9B9BF000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1FAE1F93000
trusted library allocation
page read and write
7DF426D90000
trusted library allocation
page execute and read and write
1FAFA383000
heap
page execute and read and write
2B328800000
heap
page read and write
4EC6FFC000
stack
page read and write
2B3287ED000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
2B30FF99000
trusted library allocation
page read and write
176F36C3000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
176F3853000
heap
page read and write
2B31025E000
trusted library allocation
page read and write
2AE07255000
heap
page read and write
1A867DFA000
trusted library allocation
page read and write
1FAE1FCB000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1A867E47000
trusted library allocation
page read and write
17680194000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1A867E74000
trusted library allocation
page read and write
176F3857000
heap
page read and write
2B310074000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
176F3750000
heap
page read and write
2B310096000
trusted library allocation
page read and write
2B30E4A0000
heap
page read and write
24568E91000
heap
page read and write
2B32063F000
trusted library allocation
page read and write
1768050F000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2AE04CF0000
heap
page read and write
DDF19E1000
stack
page read and write
24568D20000
heap
page read and write
1FAE2240000
trusted library allocation
page read and write
24568D25000
heap
page read and write
176805E1000
trusted library allocation
page read and write
176F3757000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA0B000
trusted library allocation
page read and write
38813FF000
stack
page read and write
176F1067000
heap
page read and write
1FAF1E03000
trusted library allocation
page read and write
D3715FE000
stack
page read and write
1FAE1EED000
trusted library allocation
page read and write
1FADFEE9000
heap
page read and write
1FAF1BFA000
trusted library allocation
page read and write
DE0F3FF000
stack
page read and write
7FFD9B9D6000
trusted library allocation
page read and write
388183E000
stack
page read and write
20B26E50000
trusted library allocation
page read and write
2B3103AD000
trusted library allocation
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
1FAE1EA7000
trusted library allocation
page read and write
2B3288D0000
heap
page read and write
245696F5000
heap
page read and write
176F3923000
heap
page read and write
176F10A3000
heap
page read and write
2B3288D4000
heap
page read and write
7FFD9B79A000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2450186F000
trusted library allocation
page read and write
1FAE1FEB000
trusted library allocation
page read and write
1768053A000
trusted library allocation
page read and write
1FAF1D99000
trusted library allocation
page read and write
2B3102C7000
trusted library allocation
page read and write
7FFD9B978000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
1A867D40000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1A867E33000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1FAF1E3B000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
1FAE2198000
trusted library allocation
page read and write
1FADFE68000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
1FAE2128000
trusted library allocation
page read and write
1FADFEE4000
heap
page read and write
1FAE222C000
trusted library allocation
page read and write
245693DE000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
176F34A4000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1FAE00B0000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
2B30E296000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B9C6000
trusted library allocation
page read and write
2B328A89000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1FAE0110000
heap
page read and write
1FAE203A000
trusted library allocation
page read and write
1FAE225C000
trusted library allocation
page read and write
DDF31FE000
stack
page read and write
1768054D000
trusted library allocation
page read and write
2B30E680000
heap
page read and write
D37280E000
stack
page read and write
1FAF252D000
trusted library allocation
page read and write
176F3476000
heap
page read and write
176907FF000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1A86625C000
heap
page read and write
1FAE20B8000
trusted library allocation
page read and write
24500D85000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1FAF22A4000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
1FAE1D4F000
trusted library allocation
page read and write
176F3717000
heap
page read and write
1FAE221C000
trusted library allocation
page read and write
1FAFA390000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1FAE1EB5000
trusted library allocation
page read and write
2B328809000
heap
page read and write
1A867E88000
trusted library allocation
page read and write
2B320312000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
1FAE20D4000
trusted library allocation
page read and write
24569322000
heap
page read and write
2B31027F000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2B31013D000
trusted library allocation
page read and write
176F3779000
heap
page read and write
1FAFA670000
heap
page read and write
245010C5000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page read and write
1A8661A0000
heap
page read and write
1A8663A5000
heap
page read and write
176F37E1000
heap
page read and write
2AE04CC0000
heap
page read and write
7FFD9B79A000
trusted library allocation
page read and write
1FAF1DCF000
trusted library allocation
page read and write
2450022A000
trusted library allocation
page read and write
7FFD9B937000
trusted library allocation
page read and write
2B3102B9000
trusted library allocation
page read and write
2B328B98000
heap
page read and write
176F35AF000
heap
page read and write
4EC5FE1000
stack
page read and write
1FAE1D1F000
trusted library allocation
page read and write
2B31014A000
trusted library allocation
page read and write
1FAE216E000
trusted library allocation
page read and write
2B328770000
heap
page execute and read and write
20B0D1F0000
heap
page read and write
2450138E000
trusted library allocation
page read and write
176F3894000
heap
page read and write
2B3102E3000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2B310414000
trusted library allocation
page read and write
1FAE224E000
trusted library allocation
page read and write
7DF426D80000
trusted library allocation
page execute and read and write
20B0D287000
heap
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
2AE04EA9000
heap
page read and write
1A867D20000
heap
page read and write
4EC73FE000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
38FF1FE000
stack
page read and write
2B328BA0000
heap
page read and write
1FAE1FBD000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1FAFA3EE000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1FADFEAC000
heap
page read and write
1A8661C0000
heap
page read and write
17680522000
trusted library allocation
page read and write
A7E95FE000
stack
page read and write
24568DE0000
heap
page execute and read and write
DE0F5FE000
stack
page read and write
A7E8DFE000
stack
page read and write
1FAE210C000
trusted library allocation
page read and write
176F36CE000
heap
page read and write
7FFD9BA24000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1FAE20FD000
trusted library allocation
page read and write
2B31FF36000
trusted library allocation
page read and write
2B320192000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
DDF21FE000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
2B32884A000
heap
page read and write
DDF35FE000
stack
page read and write
7FFD9B99D000
trusted library allocation
page read and write
2B320617000
trusted library allocation
page read and write
1FAFA3F0000
heap
page read and write
176F101C000
heap
page read and write
DE0F6FE000
stack
page read and write
2B31034E000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
245696D1000
heap
page read and write
1A8663C5000
heap
page read and write
1FAE0090000
heap
page read and write
7FFD9B988000
trusted library allocation
page read and write
1FAE1EFB000
trusted library allocation
page read and write
176F37BB000
heap
page read and write
2AE06740000
heap
page read and write
2B328C79000
heap
page read and write
D3718BF000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
2AE04E14000
heap
page read and write
1FAE1C50000
trusted library allocation
page read and write
176F38AD000
heap
page read and write
176802AA000
trusted library allocation
page read and write
176801B4000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
245696C4000
heap
page read and write
2B32887D000
heap
page read and write
1FAE1EDF000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B93E000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
2B3287A0000
heap
page read and write
176803CB000
trusted library allocation
page read and write
2B30E595000
heap
page read and write
1768022E000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
2B30E2FB000
heap
page read and write
2456969D000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
24568E40000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
245685A7000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
24568860000
trusted library section
page read and write
245685A9000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
D371C3F000
stack
page read and write
24501044000
trusted library allocation
page read and write
2B328A82000
heap
page read and write
20B27620000
heap
page execute and read and write
1FAE1C48000
trusted library allocation
page read and write
24568875000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1FAF2000000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
D37288C000
stack
page read and write
2450178A000
trusted library allocation
page read and write
245695D6000
heap
page read and write
2B30E2CF000
heap
page read and write
176F107A000
heap
page read and write
2B30E4E0000
trusted library allocation
page read and write
1FAFA6AB000
heap
page read and write
24510031000
trusted library allocation
page read and write
3882BF7000
stack
page read and write
24501957000
trusted library allocation
page read and write
24568750000
heap
page read and write
2B30E6E5000
heap
page read and write
1FAF2334000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2B32880D000
heap
page read and write
7FFD9B9C8000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
245013CC000
trusted library allocation
page read and write
2B328C91000
heap
page read and write
17680408000
trusted library allocation
page read and write
2B328A18000
heap
page read and write
17680204000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
1FAE1F5B000
trusted library allocation
page read and write
17680156000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
176F2D60000
heap
page execute and read and write
1FAF2381000
trusted library allocation
page read and write
1A8784DF000
trusted library allocation
page read and write
1FAE1CE9000
trusted library allocation
page read and write
2B328CAF000
heap
page read and write
17680466000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
1FAE1FE7000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2B328773000
heap
page execute and read and write
1768049C000
trusted library allocation
page read and write
1FADFE7B000
heap
page read and write
24569482000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
1FAF1CF8000
trusted library allocation
page read and write
176F396B000
heap
page read and write
176F343C000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1FAE1D6B000
trusted library allocation
page read and write
176F371F000
heap
page read and write
17680481000
trusted library allocation
page read and write
2B30FFCE000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
24500A54000
trusted library allocation
page read and write
176F3494000
heap
page read and write
2B3289FE000
heap
page read and write
2B3206FD000
trusted library allocation
page read and write
176F345E000
heap
page read and write
A7E91FD000
stack
page read and write
1FAE1F25000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
D371679000
stack
page read and write
1A8663A0000
heap
page read and write
176F359D000
heap
page read and write
3880BFE000
stack
page read and write
2B3104A0000
trusted library allocation
page read and write
176F386D000
heap
page read and write
1FAE0050000
heap
page read and write
1FADFF57000
heap
page read and write
7FFD9B781000
trusted library allocation
page read and write
1FAE1FF5000
trusted library allocation
page read and write
176F1190000
trusted library allocation
page read and write
2B31FE91000
trusted library allocation
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
17680602000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
24569654000
heap
page read and write
2AE04D70000
direct allocation
page execute and read and write
7FFD9B9BD000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
2AE06798000
heap
page read and write
2B320034000
trusted library allocation
page read and write
2B328FF0000
heap
page execute and read and write
176F1280000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page read and write
20B0D800000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1FAE2251000
trusted library allocation
page read and write
56657FD000
stack
page read and write
7FFD9BA12000
trusted library allocation
page read and write
17680284000
trusted library allocation
page read and write
2B30FFBA000
trusted library allocation
page read and write
7FFD9B935000
trusted library allocation
page read and write
4EC67FE000
stack
page read and write
24501129000
trusted library allocation
page read and write
176F3748000
heap
page read and write
176F3930000
heap
page read and write
1FAE1E99000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1FAF1BA6000
trusted library allocation
page read and write
2B32074D000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
1FAE208E000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
1A877FDA000
trusted library allocation
page read and write
2B3102D6000
trusted library allocation
page read and write
2B328B0B000
heap
page read and write
17680186000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
20B1F0C2000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
1FAE1E6F000
trusted library allocation
page read and write
2B3287F9000
heap
page read and write
2B30E460000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2B30E2BA000
heap
page read and write
38FFE37000
stack
page read and write
2B328BFB000
heap
page read and write
176F34AF000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
2B328BE2000
heap
page read and write
1FAE21A6000
trusted library allocation
page read and write
D372789000
stack
page read and write
176805DA000
trusted library allocation
page read and write
2B30E2B2000
heap
page read and write
2B310124000
trusted library allocation
page read and write
1FAE1F09000
trusted library allocation
page read and write
1FAE1F37000
trusted library allocation
page read and write
1A8663C0000
heap
page read and write
2456862A000
heap
page read and write
1FAE1DF8000
trusted library allocation
page read and write
2AE0A455000
heap
page read and write
176F0FD0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
176801A7000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1FAE21B3000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page execute and read and write
7FFD9B957000
trusted library allocation
page read and write
7FFD9B9C8000
trusted library allocation
page read and write
1A866285000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
24568E10000
heap
page execute and read and write
1768031E000
trusted library allocation
page read and write
2B3102AC000
trusted library allocation
page read and write
1A877ED4000
trusted library allocation
page read and write
140784000
remote allocation
page execute and read and write
D3716FE000
stack
page read and write
1FAE21DD000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page read and write
7FFD9B93B000
trusted library allocation
page read and write
176F3880000
heap
page read and write
1A867DF8000
trusted library allocation
page read and write
1FAF22F8000
trusted library allocation
page read and write
1A86623F000
heap
page read and write
2B310478000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
D3717FD000
stack
page read and write
24501E28000
trusted library allocation
page read and write
176F383C000
heap
page read and write
38803FC000
stack
page read and write
1A867D49000
trusted library allocation
page read and write
176802CC000
trusted library allocation
page read and write
2B3101EC000
trusted library allocation
page read and write
1FAE2144000
trusted library allocation
page read and write
1FAE209C000
trusted library allocation
page read and write
24569470000
heap
page read and write
1FAE1D9D000
trusted library allocation
page read and write
2B328878000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2B328B2E000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
2B31032D000
trusted library allocation
page read and write
176F35F8000
heap
page read and write
2B32878A000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
176F3935000
heap
page read and write
1FAE222A000
trusted library allocation
page read and write
1A867E62000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
1FAE2216000
trusted library allocation
page read and write
1FAE211A000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1A867E31000
trusted library allocation
page read and write
176F3680000
heap
page read and write
2B3104B9000
trusted library allocation
page read and write
2B310493000
trusted library allocation
page read and write
176800F7000
trusted library allocation
page read and write
1FAE1EBC000
trusted library allocation
page read and write
1FAE2136000
trusted library allocation
page read and write
2B328C24000
heap
page read and write
1A867D42000
trusted library allocation
page read and write
1A867D4C000
trusted library allocation
page read and write
176F358A000
heap
page read and write
20B1EE21000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
176F387E000
heap
page read and write
24500089000
trusted library allocation
page read and write
2B30E270000
heap
page read and write
1FAE2020000
trusted library allocation
page read and write
2B3100A4000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
2B30E480000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
D371777000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
2B310312000
trusted library allocation
page read and write
1FAE1D96000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
245011AF000
trusted library allocation
page read and write
7FFD9B9C1000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
2B3287AC000
heap
page read and write
2B3288D8000
heap
page read and write
1FAE0030000
heap
page read and write
D371938000
stack
page read and write
1FAF224F000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2B310442000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2B32886F000
heap
page read and write
2B3288DE000
heap
page read and write
1FAE1D18000
trusted library allocation
page read and write
4EC63FE000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1FAF21A6000
trusted library allocation
page read and write
1768052E000
trusted library allocation
page read and write
1FAF1E58000
trusted library allocation
page read and write
1FAE218A000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
20B0D610000
heap
page read and write
1A867EA1000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
20B0D268000
heap
page read and write
1A867E72000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
2B328934000
heap
page read and write
1FAF1EAD000
trusted library allocation
page read and write
2B32045F000
trusted library allocation
page read and write
2B30FF8D000
trusted library allocation
page read and write
1FAE1D42000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2B3102DD000
trusted library allocation
page read and write
2B32881C000
heap
page read and write
2B328A66000
heap
page read and write
20B0D299000
heap
page read and write
A7E81E1000
stack
page read and write
24568C60000
trusted library allocation
page read and write
2B320410000
trusted library allocation
page read and write
2B3100CE000
trusted library allocation
page read and write
D371CBB000
stack
page read and write
2B31047F000
trusted library allocation
page read and write
1FAE1D10000
trusted library allocation
page read and write
2B32893E000
heap
page read and write
176F3430000
heap
page read and write
A7E85FE000
stack
page read and write
17680256000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
24568568000
heap
page read and write
176F1110000
heap
page read and write
176F2A30000
heap
page read and write
2B310067000
trusted library allocation
page read and write
20B1EFC4000
trusted library allocation
page read and write
1768061B000
trusted library allocation
page read and write
1FAFA320000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1A86623B000
heap
page read and write
176F3797000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1FAF2076000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2B310293000
trusted library allocation
page read and write
1FADFEA2000
heap
page read and write
2B328A8B000
heap
page read and write
2B327EC0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
176805E8000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
20B0D620000
trusted library allocation
page read and write
176F36DB000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
176F3462000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
24568560000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
DE0F2FC000
stack
page read and write
1A877FF2000
trusted library allocation
page read and write
1FAE21FA000
trusted library allocation
page read and write
5665FFF000
stack
page read and write
24569643000
heap
page read and write
176F3701000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
176F3859000
heap
page read and write
1FAE1E0D000
trusted library allocation
page read and write
2B328A76000
heap
page read and write
1A866220000
heap
page read and write
2B30E300000
heap
page read and write
2B3100F6000
trusted library allocation
page read and write
1A8660C0000
heap
page read and write
1FAF1C4F000
trusted library allocation
page read and write
D371A39000
stack
page read and write
176F385B000
heap
page read and write
56653FF000
stack
page read and write
2B328A34000
heap
page read and write
1FAE1FAF000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
2B3103EB000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
24568C70000
heap
page readonly
176908BD000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1FAFA3CB000
heap
page read and write
1A877DD6000
trusted library allocation
page read and write
2AE09055000
heap
page read and write
1FAFA47D000
heap
page read and write
20B0D335000
heap
page read and write
D371473000
stack
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
1FAF2482000
trusted library allocation
page read and write
2B31049A000
trusted library allocation
page read and write
24501896000
trusted library allocation
page read and write
176F374D000
heap
page read and write
7FFD9BA22000
trusted library allocation
page read and write
2B3288F1000
heap
page read and write
2B30FF87000
trusted library allocation
page read and write
1FAE2254000
trusted library allocation
page read and write
1FAE1AE0000
heap
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
DDF25FE000
stack
page read and write
176F378E000
heap
page read and write
1FAE1D3B000
trusted library allocation
page read and write
1FAE1F77000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
245685A5000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2B320212000
trusted library allocation
page read and write
1FAFA686000
heap
page read and write
2B30FFA7000
trusted library allocation
page read and write
1FAE00D0000
trusted library allocation
page read and write
1FAE2063000
trusted library allocation
page read and write
2B30E500000
trusted library allocation
page read and write
2B328846000
heap
page read and write
17680242000
trusted library allocation
page read and write
1FAE1D81000
trusted library allocation
page read and write
2B310347000
trusted library allocation
page read and write
176F38BC000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
4EC6BFE000
stack
page read and write
D37157E000
stack
page read and write
20B1F0CA000
trusted library allocation
page read and write
24568E80000
heap
page read and write
1FAE1EC3000
trusted library allocation
page read and write
176F348F000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
176F38E6000
heap
page read and write
2B328217000
heap
page read and write
7FFD9B934000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1A867D52000
trusted library allocation
page read and write
24569474000
heap
page read and write
D371ABE000
stack
page read and write
245004D0000
trusted library allocation
page read and write
1FAF1FAB000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
3880FFB000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
245696E7000
heap
page read and write
1FAFA6B6000
heap
page read and write
24568C40000
trusted library allocation
page read and write
1A867D31000
trusted library allocation
page read and write
2AE08655000
heap
page read and write
176F115E000
heap
page read and write
176F36B8000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2B3287C5000
heap
page read and write
176F0FF0000
heap
page read and write
245685A3000
heap
page read and write
20B0D29C000
heap
page read and write
2456962B000
heap
page read and write
245692E8000
heap
page read and write
2B30E590000
heap
page read and write
245102FA000
trusted library allocation
page read and write
1FAE1F60000
trusted library allocation
page read and write
2B32068F000
trusted library allocation
page read and write
2B3288D6000
heap
page read and write
176F34CA000
heap
page read and write
176F3941000
heap
page read and write
1A866245000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1A877FD2000
trusted library allocation
page read and write
1FAFA42C000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
1A866330000
trusted library allocation
page read and write
176F35FA000
heap
page read and write
2AE09A55000
heap
page read and write
2AE04DC0000
heap
page read and write
20B1EEC6000
trusted library allocation
page read and write
24510001000
trusted library allocation
page read and write
7FFD9B9C6000
trusted library allocation
page read and write
176F2B70000
heap
page read and write
2B32013A000
trusted library allocation
page read and write
4EC77FF000
stack
page read and write
24510073000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1FAE1DAB000
trusted library allocation
page read and write
1FAE1E8B000
trusted library allocation
page read and write
1FAF2054000
trusted library allocation
page read and write
176F35E5000
heap
page read and write
20B0D805000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
176F38C1000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
DE0EEFF000
stack
page read and write
2B30FFF6000
trusted library allocation
page read and write
176F350F000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1404FC000
remote allocation
page execute and read and write
1FAE1E29000
trusted library allocation
page read and write
176F3917000
heap
page read and write
2B328C58000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
176F1150000
heap
page read and write
176F38E0000
heap
page read and write
There are 1198 hidden memdumps, click here to show them.