IOC Report
vRp56pf5a9.exe

loading gif

Files

File Path
Type
Category
Malicious
vRp56pf5a9.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\cvchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\responsibilitylead.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cvchost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\responsiibilitylead.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3vl5rssp.bxl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5df3vzno.4no.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vRp56pf5a9.exe
"C:\Users\user\Desktop\vRp56pf5a9.exe"
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe' -Force
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Local\cvchost.exe
"C:\Users\user\AppData\Local\cvchost.exe"
malicious
C:\Users\user\AppData\Local\cvchost.exe
"C:\Users\user\AppData\Local\cvchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
172.67.74.152
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://api.ipify.org2
unknown
http://159.253.120.145/beer/Zdthsqoc.wav
159.253.120.145
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://github.com/Pester/Pester
unknown
https://api.ipify.org
unknown
https://api.ipify.orgJ
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://159.253.120.145/beer/Vxttheubu.mp41EGP4CCIIOMuIUm3
unknown
http://159.253.120.145
unknown
https://aka.ms/pscore68
unknown
http://159.253.120.145/beer/Vxttheubu.mp4
159.253.120.145
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://159.253.120.145/beer/Zdthsqoc.wav1ac8RgXhHQGMLHirw3jKOBg==
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
api.ipify.org
172.67.74.152
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
212.224.86.54
unknown
Germany
159.253.120.145
unknown
Russian Federation
109.107.181.83
unknown
Russian Federation
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
cvchost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
FileDirectory
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
4146000
trusted library allocation
page read and write
malicious
3E7B000
trusted library allocation
page read and write
malicious
2D89F560000
trusted library section
page read and write
malicious
5080000
trusted library section
page read and write
malicious
2C91000
trusted library allocation
page read and write
malicious
32AF000
trusted library allocation
page read and write
malicious
2D89F270000
trusted library section
page read and write
malicious
29EB000
trusted library allocation
page read and write
malicious
2BBF000
trusted library allocation
page read and write
malicious
25D1000
trusted library allocation
page read and write
malicious
5250000
trusted library section
page read and write
malicious
295F000
trusted library allocation
page read and write
malicious
2D896BE1000
trusted library allocation
page read and write
malicious
5F80000
trusted library section
page read and write
malicious
3448000
trusted library allocation
page read and write
malicious
2D897329000
trusted library allocation
page read and write
malicious
2D886831000
trusted library allocation
page read and write
malicious
47AB000
trusted library allocation
page read and write
malicious
71F0000
trusted library section
page read and write
malicious
3E06000
trusted library allocation
page read and write
malicious
3C2A000
trusted library allocation
page read and write
malicious
FE3000
trusted library allocation
page execute and read and write
54EE000
stack
page read and write
5310000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
2920000
heap
page execute and read and write
1D4E3F36000
heap
page read and write
1D430B78000
heap
page read and write
57D0000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
C20000
trusted library allocation
page read and write
123F000
stack
page read and write
3518000
trusted library allocation
page read and write
7FF849048000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
12D0000
heap
page read and write
5950000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
1D638630000
heap
page read and write
2D884CC0000
heap
page read and write
7FF849310000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
6CF8000
heap
page read and write
28E0000
heap
page execute and read and write
6FFF000
heap
page read and write
7FF848E34000
trusted library allocation
page read and write
1680000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
350C000
trusted library allocation
page read and write
ECE000
stack
page read and write
57FB000
trusted library allocation
page read and write
74E5000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
5EB000
stack
page read and write
7FF849270000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
C14000
trusted library allocation
page read and write
722C000
trusted library allocation
page read and write
168B000
heap
page read and write
6D5C000
heap
page read and write
147814E000
stack
page read and write
7C40000
trusted library allocation
page execute and read and write
935000
heap
page read and write
E44000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
2C2C000
trusted library allocation
page read and write
C7E000
heap
page read and write
C00000
trusted library allocation
page read and write
533E000
stack
page read and write
3B91000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
5E7E000
stack
page read and write
19413150000
heap
page read and write
770000
trusted library allocation
page read and write
2874000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1D638750000
heap
page read and write
12BC000
stack
page read and write
2C20000
trusted library allocation
page read and write
6F7A000
heap
page read and write
AC6000
trusted library allocation
page execute and read and write
1D42857B000
trusted library allocation
page read and write
761EBFF000
stack
page read and write
19413198000
heap
page read and write
1566000
trusted library allocation
page execute and read and write
5340000
trusted library allocation
page execute and read and write
5A5E000
stack
page read and write
F0B000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
7FF70F151000
unkown
page execute read
56A0000
heap
page read and write
3070000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
AC2000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
1D4309E7000
heap
page execute and read and write
172F000
heap
page read and write
6E11000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
3120000
trusted library allocation
page read and write
19413190000
heap
page read and write
6E04000
trusted library allocation
page read and write
2582000
trusted library allocation
page read and write
CB21BDE000
stack
page read and write
F2390FD000
stack
page read and write
3170000
heap
page read and write
650000
heap
page read and write
3D7B000
trusted library allocation
page read and write
2D886B40000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
4701000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
50A9000
trusted library allocation
page read and write
777F000
trusted library allocation
page read and write
57C0000
trusted library allocation
page execute and read and write
AA3000
trusted library allocation
page execute and read and write
382A000
trusted library allocation
page read and write
56BA000
heap
page read and write
1D638638000
heap
page read and write
628E000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
2D884D2C000
heap
page read and write
7FF849317000
trusted library allocation
page read and write
1D419ECC000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
526E000
stack
page read and write
7FF8492D0000
trusted library allocation
page read and write
5220000
trusted library allocation
page execute and read and write
3A79000
trusted library allocation
page read and write
FC0000
heap
page read and write
5A9E000
stack
page read and write
2D89F160000
heap
page execute and read and write
AC0000
trusted library allocation
page read and write
1477477000
stack
page read and write
1544000
trusted library allocation
page read and write
7622000
heap
page read and write
1400D1000
remote allocation
page execute and read and write
7FF848E30000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
4F70000
heap
page execute and read and write
550E000
stack
page read and write
3527000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
E4E000
stack
page read and write
60C0000
trusted library allocation
page execute and read and write
3090000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
578E000
stack
page read and write
2CDE000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
147757E000
stack
page read and write
785000
heap
page read and write
6BD1000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page read and write
B3E000
stack
page read and write
1D418333000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
350A000
trusted library allocation
page read and write
D20000
heap
page read and write
F00000
trusted library allocation
page read and write
4AB9000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
4066000
trusted library allocation
page read and write
2D886B2E000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
56C0000
heap
page read and write
2D884D97000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7FF70F15E000
unkown
page readonly
2EAB000
trusted library allocation
page read and write
2C28000
trusted library allocation
page read and write
D8B000
trusted library allocation
page read and write
C42000
trusted library allocation
page read and write
72F000
heap
page read and write
1D4E5CAE000
heap
page read and write
70C0000
trusted library allocation
page read and write
5F7F000
stack
page read and write
357A000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
2C37000
trusted library allocation
page read and write
96A000
heap
page read and write
2E84000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
6FD8000
heap
page read and write
79D4000
trusted library allocation
page read and write
B7C000
stack
page read and write
3E86000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
2870000
heap
page read and write
1D430A80000
heap
page read and write
FE0000
trusted library allocation
page read and write
250E000
stack
page read and write
1D4E4030000
heap
page read and write
5180000
trusted library allocation
page read and write
E8F000
stack
page read and write
2970000
trusted library allocation
page read and write
70E0000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
4E2E000
stack
page read and write
5BFE000
stack
page read and write
1D638550000
heap
page read and write
194131AE000
heap
page read and write
1560000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
127E000
stack
page read and write
6DF0000
trusted library allocation
page read and write
16A7000
heap
page read and write
3DF4000
trusted library allocation
page read and write
761F2FE000
stack
page read and write
1D4E6591000
heap
page read and write
1570000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
1D4E3F3C000
heap
page read and write
7FF84919E000
trusted library allocation
page read and write
E80000
unkown
page readonly
5CFE000
stack
page read and write
C20000
heap
page read and write
1D4183B1000
heap
page read and write
35D1000
trusted library allocation
page read and write
1D430894000
heap
page read and write
3B94000
trusted library allocation
page read and write
7FF70F150000
unkown
page readonly
2D884D64000
heap
page read and write
1D4E40E5000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1012000
trusted library allocation
page read and write
2B80000
heap
page execute and read and write
2C1B000
trusted library allocation
page read and write
2D886B7D000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
1D416B55000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1D4E3E68000
heap
page read and write
6E50000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
14774F9000
stack
page read and write
60E0000
trusted library allocation
page read and write
FB0000
trusted library allocation
page execute and read and write
19415094000
heap
page read and write
1763000
heap
page read and write
1577000
trusted library allocation
page execute and read and write
7FF849130000
trusted library allocation
page read and write
6BA1000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
14771FE000
stack
page read and write
3060000
trusted library allocation
page read and write
6CE0000
heap
page read and write
2BF0000
heap
page execute and read and write
2B36000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
564E000
stack
page read and write
7FF70F15C000
unkown
page write copy
7FF848FC0000
trusted library allocation
page execute and read and write
29EC000
stack
page read and write
355D000
trusted library allocation
page read and write
537D000
stack
page read and write
F2391FF000
stack
page read and write
512F000
stack
page read and write
574F000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
2BE9000
trusted library allocation
page read and write
1D4E3F14000
heap
page read and write
5463000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
25C0000
heap
page execute and read and write
7FF8491D0000
trusted library allocation
page read and write
1D430E50000
heap
page read and write
C33000
heap
page read and write
D73000
trusted library allocation
page execute and read and write
3886000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
6CE5000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
B60000
heap
page read and write
57CE000
stack
page read and write
53BF000
stack
page read and write
AA4000
trusted library allocation
page read and write
1D4168FE000
heap
page read and write
2C3F000
trusted library allocation
page read and write
1D4E5CD0000
heap
page read and write
6DFB000
trusted library allocation
page read and write
6E6F000
trusted library allocation
page read and write
54CF000
stack
page read and write
2BE1000
trusted library allocation
page read and write
7228000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
286E000
stack
page read and write
1D430B60000
heap
page read and write
7700000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
1D41A126000
trusted library allocation
page read and write
7FF84900B000
trusted library allocation
page read and write
4B6D000
stack
page read and write
4753000
trusted library allocation
page read and write
502E000
stack
page read and write
6120000
heap
page read and write
4751000
trusted library allocation
page read and write
306B000
trusted library allocation
page read and write
6F69000
heap
page read and write
4C4C000
trusted library allocation
page read and write
618E000
stack
page read and write
7FF8492C0000
trusted library allocation
page read and write
761E7FF000
stack
page read and write
6E00000
trusted library allocation
page read and write
7FF849002000
trusted library allocation
page read and write
16C4000
heap
page read and write
27B0000
trusted library allocation
page read and write
4F6E000
stack
page read and write
1D41A12A000
trusted library allocation
page read and write
1111000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
47D9000
trusted library allocation
page read and write
194133A5000
heap
page read and write
70B0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1D4E6878000
heap
page read and write
352D000
trusted library allocation
page read and write
583E000
stack
page read and write
46CE000
stack
page read and write
DD0000
trusted library allocation
page execute and read and write
1D4286B1000
trusted library allocation
page read and write
2D886B92000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
761ECFE000
stack
page read and write
5461000
trusted library allocation
page read and write
2D884C30000
unkown
page readonly
C76000
heap
page read and write
2B91000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
1D4E6580000
heap
page read and write
2CC7000
trusted library allocation
page read and write
53CD000
stack
page read and write
2E73000
trusted library allocation
page read and write
658000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
28B2000
trusted library allocation
page read and write
7FF84931C000
trusted library allocation
page read and write
1D416895000
heap
page read and write
6D4E000
heap
page read and write
4C00000
trusted library allocation
page read and write
71EE000
stack
page read and write
2860000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
297F000
stack
page read and write
15F0000
trusted library allocation
page execute and read and write
27C3000
trusted library allocation
page execute and read and write
3747000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
1D416AF0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
516D000
stack
page read and write
2E3F000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
1D4E659C000
heap
page read and write
6E40000
trusted library allocation
page read and write
1D4E3EF9000
heap
page read and write
2C22000
trusted library allocation
page read and write
EFE000
stack
page read and write
4281000
trusted library allocation
page read and write
194131BF000
heap
page read and write
C4D000
heap
page read and write
630000
heap
page read and write
3512000
trusted library allocation
page read and write
586E000
heap
page read and write
C32000
trusted library allocation
page read and write
1D4E3F51000
heap
page read and write
4C20000
trusted library allocation
page execute and read and write
5780000
trusted library allocation
page read and write
1D419853000
trusted library allocation
page read and write
4EED000
stack
page read and write
B88000
heap
page read and write
6140000
trusted library allocation
page read and write
4FCE000
stack
page read and write
EC0000
heap
page read and write
3542000
trusted library allocation
page read and write
561E000
stack
page read and write
719000
heap
page read and write
1D638940000
heap
page read and write
2AED000
stack
page read and write
54F0000
trusted library allocation
page execute and read and write
194131BF000
heap
page read and write
6640000
trusted library allocation
page read and write
1D4184C0000
heap
page execute and read and write
1D4E5C7B000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
95E000
heap
page read and write
F1B000
stack
page read and write
74B0000
trusted library allocation
page read and write
2B7F000
stack
page read and write
49B3000
trusted library allocation
page read and write
100A000
trusted library allocation
page execute and read and write
1180000
heap
page read and write
578F000
trusted library allocation
page read and write
761F1FF000
stack
page read and write
6FA2000
heap
page read and write
E30000
heap
page read and write
54E0000
trusted library allocation
page execute and read and write
3E90000
trusted library allocation
page read and write
7F980000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page execute and read and write
2E31000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
2D885040000
heap
page read and write
5160000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
6CFC000
heap
page read and write
583D000
stack
page read and write
6E10000
trusted library allocation
page read and write
50E0000
trusted library allocation
page execute and read and write
689E000
stack
page read and write
FED000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
578E000
stack
page read and write
1D430BCF000
heap
page read and write
27EA000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
B80000
heap
page read and write
58C3000
heap
page read and write
400000
remote allocation
page execute and read and write
3D1B000
trusted library allocation
page read and write
2D884D20000
heap
page read and write
2C45000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
FF9000
trusted library allocation
page read and write
514D000
stack
page read and write
C2D000
trusted library allocation
page execute and read and write
7FF70F15E000
unkown
page readonly
C13000
trusted library allocation
page execute and read and write
7FF849040000
trusted library allocation
page read and write
FF000000
trusted library allocation
page execute and read and write
2BEB000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
1D4E7965000
heap
page read and write
4F8000
stack
page read and write
7050000
trusted library allocation
page read and write
74C4000
trusted library allocation
page read and write
50F9000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
15A0000
heap
page read and write
1D418330000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
5A5B000
trusted library allocation
page read and write
1D416925000
heap
page read and write
19413170000
heap
page read and write
5ABD000
stack
page read and write
70D0000
trusted library allocation
page read and write
7658000
heap
page read and write
E40000
trusted library allocation
page read and write
14F0000
heap
page read and write
1D4168B2000
heap
page read and write
27C0000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
1002000
trusted library allocation
page read and write
E0E000
stack
page read and write
C69000
heap
page read and write
7FF848FDA000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
5868000
heap
page read and write
2D884F10000
heap
page read and write
2931000
trusted library allocation
page read and write
F2392FE000
stack
page read and write
27E6000
trusted library allocation
page execute and read and write
7870000
trusted library allocation
page read and write
49D8000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF70F150000
unkown
page readonly
5A55000
trusted library allocation
page read and write
F23853D000
stack
page read and write
2E8F000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
1D430930000
heap
page read and write
51A0000
trusted library allocation
page read and write
C50000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
1D41A061000
trusted library allocation
page read and write
2C4C000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
8320000
trusted library allocation
page read and write
8F7000
stack
page read and write
1D4E3E60000
heap
page read and write
F2393FE000
stack
page read and write
1125000
heap
page read and write
4F2E000
stack
page read and write
2B50000
heap
page execute and read and write
7750000
trusted library allocation
page read and write
1D4E5C95000
heap
page read and write
D8E000
stack
page read and write
1D418589000
trusted library allocation
page read and write
14CE000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
D8D000
trusted library allocation
page execute and read and write
3514000
trusted library allocation
page read and write
E2E000
heap
page read and write
15A7000
heap
page read and write
9F0000
heap
page read and write
2EA7000
trusted library allocation
page read and write
6E70000
trusted library allocation
page execute and read and write
3CD1000
trusted library allocation
page read and write
2D89F1E2000
heap
page read and write
539E000
stack
page read and write
D96000
trusted library allocation
page execute and read and write
53E0000
heap
page read and write
761E5F5000
stack
page read and write
1030000
trusted library allocation
page read and write
F238FFE000
stack
page read and write
762A000
heap
page read and write
1107000
heap
page read and write
27F0000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
2D8967FE000
trusted library allocation
page read and write
5330000
trusted library allocation
page execute and read and write
7FF70F15C000
unkown
page read and write
5770000
trusted library allocation
page execute and read and write
4FEE000
stack
page read and write
F238CFC000
stack
page read and write
6F40000
trusted library allocation
page execute and read and write
2EA1000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
528E000
stack
page read and write
1D4E5CAA000
heap
page read and write
2D886B48000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
2D89F100000
trusted library section
page read and write
5850000
heap
page read and write
C7A000
heap
page read and write
28AC000
stack
page read and write
15EE000
stack
page read and write
7686000
heap
page read and write
B50000
heap
page read and write
5A7E000
stack
page read and write
C5F000
heap
page read and write
2C00000
trusted library allocation
page read and write
76E0000
trusted library allocation
page execute and read and write
3EE6000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
10AA000
heap
page read and write
6110000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
69FE000
stack
page read and write
7760000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
688000
heap
page read and write
2C15000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
101B000
trusted library allocation
page execute and read and write
2E49000
trusted library allocation
page read and write
D74000
trusted library allocation
page read and write
FE4000
trusted library allocation
page read and write
2C02000
trusted library allocation
page read and write
2D884D8B000
heap
page read and write
4EE0000
trusted library allocation
page read and write
BE0000
heap
page read and write
DFE000
heap
page read and write
29A0000
heap
page read and write
570F000
heap
page read and write
3159000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
1D4E3F53000
heap
page read and write
6E17000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
257E000
stack
page read and write
6D3A000
heap
page read and write
4759000
trusted library allocation
page read and write
2D89F170000
heap
page read and write
5E3F000
stack
page read and write
2D89F1F1000
heap
page read and write
30B0000
trusted library allocation
page execute and read and write
2C2A000
heap
page read and write
2D884D05000
heap
page read and write
ADB000
trusted library allocation
page execute and read and write
E82000
unkown
page readonly
2C2A000
trusted library allocation
page read and write
44A1000
trusted library allocation
page read and write
EBE000
stack
page read and write
1006000
trusted library allocation
page execute and read and write
5AAE000
stack
page read and write
5170000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
5230000
heap
page execute and read and write
187F000
stack
page read and write
948000
heap
page read and write
59EF000
trusted library allocation
page read and write
7FF8492B0000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
2D897733000
trusted library allocation
page read and write
5240000
trusted library section
page read and write
3CC7000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
562E000
stack
page read and write
57F3000
trusted library allocation
page read and write
F2394FF000
stack
page read and write
2400000
heap
page read and write
6FB8000
trusted library allocation
page read and write
1D4E3E40000
heap
page read and write
E80000
heap
page read and write
53AE000
stack
page read and write
BB8000
heap
page read and write
4DCD000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
6DFE000
trusted library allocation
page read and write
1D4184F0000
heap
page read and write
5A30000
heap
page read and write
50A3000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
2D89E820000
trusted library allocation
page read and write
AF7000
stack
page read and write
1620000
heap
page read and write
D70000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
6B8B000
trusted library allocation
page read and write
3F7B000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
53FE000
stack
page read and write
1D4E3EB8000
heap
page read and write
2E64000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1D4308CE000
heap
page read and write
1D42856F000
trusted library allocation
page read and write
FC7000
heap
page read and write
49B1000
trusted library allocation
page read and write
7764000
trusted library allocation
page read and write
524F000
stack
page read and write
140000000
remote allocation
page execute and read and write
1D416820000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
4D41000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
D92000
trusted library allocation
page read and write
679E000
stack
page read and write
507F000
stack
page read and write
1D4308D0000
heap
page read and write
1D430890000
heap
page read and write
2D8867F1000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
56BE000
stack
page read and write
F80000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
7FF84903C000
trusted library allocation
page read and write
1D4E3EEA000
heap
page read and write
49B9000
trusted library allocation
page read and write
4BFE000
stack
page read and write
2BFC000
trusted library allocation
page read and write
588F000
stack
page read and write
3510000
trusted library allocation
page read and write
BE9000
heap
page read and write
2D884EF0000
heap
page read and write
1D4E3E30000
heap
page read and write
1D4E5CA1000
heap
page read and write
5650000
trusted library allocation
page execute and read and write
6DE0000
trusted library allocation
page read and write
27E2000
trusted library allocation
page read and write
1D4E6710000
heap
page read and write
2C13000
trusted library allocation
page read and write
3FC9000
trusted library allocation
page read and write
6B8E000
trusted library allocation
page read and write
5230000
heap
page read and write
7FF70F159000
unkown
page readonly
2D89F1B6000
heap
page read and write
5130000
heap
page read and write
FD0000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
56D5000
heap
page read and write
D90000
trusted library allocation
page read and write
2D886B37000
trusted library allocation
page read and write
977000
heap
page read and write
AD2000
trusted library allocation
page read and write
E24000
heap
page read and write
BC0000
heap
page read and write
1D4E3F03000
heap
page read and write
2E27000
trusted library allocation
page read and write
74BB000
trusted library allocation
page read and write
54DE000
stack
page read and write
7A10000
trusted library allocation
page read and write
5190000
trusted library allocation
page execute and read and write
79D0000
trusted library allocation
page read and write
1D4168A0000
heap
page read and write
7FF8491E0000
trusted library allocation
page execute and read and write
14772FE000
stack
page read and write
552E000
stack
page read and write
FCF000
stack
page read and write
2D884C34000
unkown
page readonly
CB21B5F000
stack
page read and write
74D1000
trusted library allocation
page read and write
41BE000
trusted library allocation
page read and write
F2388FE000
stack
page read and write
54C0000
trusted library allocation
page read and write
7FF70F151000
unkown
page execute read
194131AE000
heap
page read and write
156A000
trusted library allocation
page execute and read and write
1D4308FD000
heap
page read and write
2A7E000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
240A000
heap
page read and write
2C00000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
58AF000
stack
page read and write
568E000
stack
page read and write
23D0000
trusted library allocation
page execute and read and write
2B90000
trusted library allocation
page read and write
1D419131000
trusted library allocation
page read and write
2D884D8D000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
BC0000
heap
page read and write
5A50000
trusted library allocation
page read and write
3EDB000
trusted library allocation
page read and write
1D430B8F000
heap
page read and write
1D4168E8000
heap
page read and write
194133A0000
heap
page read and write
761F3FF000
stack
page read and write
A60000
heap
page read and write
F238EFE000
stack
page read and write
6C4000
heap
page read and write
B57000
stack
page read and write
5C80000
heap
page read and write
B40000
heap
page read and write
3F66000
trusted library allocation
page read and write
57F5000
trusted library allocation
page read and write
2BFE000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
3ADF000
trusted library allocation
page read and write
166C000
stack
page read and write
50AE000
stack
page read and write
BAA000
heap
page read and write
D9A000
trusted library allocation
page execute and read and write
14E0000
trusted library allocation
page read and write
2B9C000
trusted library allocation
page read and write
3AC9000
trusted library allocation
page read and write
4196000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
FAE000
stack
page read and write
AB0000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
7FB20000
trusted library allocation
page execute and read and write
3CD9000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
7850000
trusted library allocation
page execute and read and write
355B000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
780000
heap
page read and write
1D428501000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
E50000
heap
page read and write
B65000
heap
page read and write
7A40000
trusted library allocation
page execute and read and write
3FDB000
trusted library allocation
page read and write
2D886D72000
trusted library allocation
page read and write
1D418501000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
3EDF000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
2D89EB74000
heap
page read and write
39FD000
trusted library allocation
page read and write
2D8967F1000
trusted library allocation
page read and write
4A8000
remote allocation
page execute and read and write
3E8A000
trusted library allocation
page read and write
6FA6000
heap
page read and write
2D886B5B000
trusted library allocation
page read and write
1BC000
stack
page read and write
E70000
trusted library allocation
page read and write
168E000
heap
page read and write
C36000
trusted library allocation
page execute and read and write
FF990000
trusted library allocation
page execute and read and write
14775FE000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1017000
trusted library allocation
page execute and read and write
2E9D000
trusted library allocation
page read and write
8070000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
2338000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1476D9F000
unkown
page read and write
620000
heap
page read and write
2C20000
heap
page read and write
2E60000
trusted library allocation
page read and write
1D4E68B1000
heap
page read and write
2C2D000
heap
page read and write
2E7A000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
1D430B8D000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
355F000
trusted library allocation
page read and write
7FF8492DA000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
930000
heap
page read and write
7220000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
5878000
heap
page read and write
761E5EB000
stack
page read and write
327E000
stack
page read and write
940000
heap
page read and write
2D884C32000
unkown
page readonly
7FF8490B0000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
638E000
stack
page read and write
2990000
trusted library allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
75F0000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
98C000
stack
page read and write
3525000
trusted library allocation
page read and write
7780000
trusted library allocation
page execute and read and write
74C0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
106A000
heap
page read and write
6E20000
trusted library allocation
page read and write
2D886B71000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
4080000
trusted library allocation
page read and write
2BEE000
stack
page read and write
4124000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
C40000
heap
page read and write
D80000
trusted library allocation
page read and write
7950000
trusted library allocation
page execute and read and write
2EB2000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
FCF000
stack
page read and write
58BA000
heap
page read and write
1D416AE0000
heap
page readonly
7FF849100000
trusted library allocation
page read and write
C45000
heap
page read and write
52AE000
stack
page read and write
A5B000
stack
page read and write
7730000
trusted library allocation
page read and write
2D886B3D000
trusted library allocation
page read and write
1543000
trusted library allocation
page execute and read and write
538E000
stack
page read and write
CF8000
stack
page read and write
5874000
heap
page read and write
520F000
stack
page read and write
7FF8491F0000
trusted library allocation
page execute and read and write
C2B000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
564E000
stack
page read and write
6E30000
trusted library allocation
page read and write
2D84CBC000
stack
page read and write
4AF0000
heap
page execute and read and write
5D3E000
stack
page read and write
4041000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
1D638945000
heap
page read and write
70EE000
stack
page read and write
194131C1000
heap
page read and write
147717D000
stack
page read and write
E84000
unkown
page readonly
2BEF000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
2E58000
trusted library allocation
page read and write
51A0000
heap
page read and write
FEE30000
trusted library allocation
page execute and read and write
2407000
heap
page read and write
7DC000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
11E0000
heap
page read and write
2C2F000
trusted library allocation
page read and write
2D8968D5000
trusted library allocation
page read and write
F238AFE000
stack
page read and write
1103000
heap
page read and write
1D4E40E0000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
5BBF000
stack
page read and write
1D416AD0000
trusted library allocation
page read and write
6F82000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
3130000
heap
page execute and read and write
29C0000
heap
page execute and read and write
1D430BCC000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
EAC000
heap
page read and write
194131BF000
heap
page read and write
5340000
trusted library allocation
page execute and read and write
3140000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
14770FE000
stack
page read and write
1D4E5C76000
heap
page read and write
E42000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
537D000
stack
page read and write
AA0000
trusted library allocation
page read and write
89E000
stack
page read and write
2D884F60000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
1D416999000
heap
page read and write
2330000
trusted library allocation
page read and write
6390000
heap
page read and write
1D4183A0000
heap
page execute and read and write
1D4E7870000
heap
page read and write
14773F6000
stack
page read and write
1076000
heap
page read and write
2C02000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
C4B000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
74D7000
trusted library allocation
page read and write
715000
heap
page read and write
F90000
heap
page read and write
2D89F890000
unkown
page read and write
742000
heap
page read and write
74CE000
trusted library allocation
page read and write
F238DFE000
stack
page read and write
EA8000
heap
page read and write
53EE000
stack
page read and write
30A0000
trusted library allocation
page read and write
2D884D00000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
2D884CD0000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
4341000
trusted library allocation
page read and write
357E000
trusted library allocation
page read and write
1D4E5BD0000
heap
page read and write
1D4168DD000
heap
page read and write
4C41000
trusted library allocation
page read and write
554E000
stack
page read and write
1D430BD2000
heap
page read and write
59A0000
heap
page read and write
593F000
stack
page read and write
1D430B7E000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849320000
trusted library allocation
page read and write
6DF6000
trusted library allocation
page read and write
4F3E000
stack
page read and write
1D63A280000
heap
page read and write
2D884FD0000
heap
page execute and read and write
1D4E3F25000
heap
page read and write
27C4000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
70DF000
trusted library allocation
page read and write
11E7000
heap
page read and write
7FF849300000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
2E2E000
trusted library allocation
page read and write
61E000
stack
page read and write
29BC000
stack
page read and write
59D0000
trusted library allocation
page execute and read and write
2D884D4C000
heap
page read and write
ACA000
trusted library allocation
page execute and read and write
1562000
trusted library allocation
page read and write
14781CE000
stack
page read and write
2D8975AA000
trusted library allocation
page read and write
F60000
trusted library allocation
page execute and read and write
536C000
trusted library allocation
page read and write
3D29000
trusted library allocation
page read and write
2C27000
heap
page read and write
F90000
heap
page read and write
2D886B51000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
28FE000
stack
page read and write
79D0000
trusted library allocation
page execute and read and write
2C52000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
4C4F000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
AD7000
trusted library allocation
page execute and read and write
39D1000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
761EDFB000
stack
page read and write
AAD000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
30F0000
heap
page execute and read and write
597D000
stack
page read and write
2D886B3B000
trusted library allocation
page read and write
3667000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
3533000
trusted library allocation
page read and write
1476D13000
stack
page read and write
2BE5000
trusted library allocation
page read and write
147777C000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
1D4E5CE2000
heap
page read and write
387B000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
55BE000
stack
page read and write
56CF000
heap
page read and write
1D4E5F70000
heap
page read and write
3C30000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
E70000
heap
page read and write
6E0E000
trusted library allocation
page read and write
1D4E5CA3000
heap
page read and write
1D416AB0000
trusted library allocation
page read and write
6BA3000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
DAB000
trusted library allocation
page execute and read and write
71B0000
trusted library allocation
page execute and read and write
B80000
heap
page read and write
DA2000
trusted library allocation
page read and write
549E000
stack
page read and write
506F000
stack
page read and write
6F50000
heap
page read and write
157B000
trusted library allocation
page execute and read and write
7FF8491A0000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1D418731000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
82E0000
trusted library allocation
page execute and read and write
6BB5000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
2D885045000
heap
page read and write
2E3B000
trusted library allocation
page read and write
2D886B7B000
trusted library allocation
page read and write
EC5000
heap
page read and write
4EB0000
heap
page read and write
1D419E1E000
trusted library allocation
page read and write
3C7F000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
55DE000
stack
page read and write
2C08000
trusted library allocation
page read and write
2D89759D000
trusted library allocation
page read and write
7880000
trusted library allocation
page execute and read and write
4A2D000
stack
page read and write
6CE8000
heap
page read and write
1D416929000
heap
page read and write
59E0000
trusted library allocation
page read and write
1D430982000
heap
page read and write
7FF70F159000
unkown
page readonly
6D08000
heap
page read and write
25B0000
trusted library allocation
page execute and read and write
1D428510000
trusted library allocation
page read and write
1D416B50000
heap
page read and write
2C3F000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
1477379000
stack
page read and write
14776FE000
stack
page read and write
147727E000
stack
page read and write
2D89E7F0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
2D886B7F000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
2D884F40000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
4CC0000
heap
page read and write
1D4168EC000
heap
page read and write
3150000
trusted library allocation
page read and write
287D000
heap
page read and write
1D4309E0000
heap
page execute and read and write
C2F000
heap
page read and write
285E000
stack
page read and write
761E6FF000
stack
page read and write
C47000
trusted library allocation
page execute and read and write
3826000
trusted library allocation
page read and write
2404000
heap
page read and write
5881000
heap
page read and write
3080000
trusted library allocation
page read and write
CB21ADC000
stack
page read and write
3281000
trusted library allocation
page read and write
DF0000
heap
page read and write
C00000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
1D430938000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
C3B000
heap
page read and write
54FE000
stack
page read and write
2CB2000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
5B9E000
stack
page read and write
3FAE000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
27CD000
trusted library allocation
page execute and read and write
7FF49C5E0000
trusted library allocation
page execute and read and write
F2389FE000
stack
page read and write
5A20000
trusted library allocation
page execute and read and write
1048000
heap
page read and write
5350000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
2D89F680000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
2E56000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF8492C9000
trusted library allocation
page read and write
1476DDE000
stack
page read and write
3559000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
194131B7000
heap
page read and write
F238BFE000
stack
page read and write
2D89F206000
heap
page read and write
6E25000
trusted library allocation
page read and write
74BE000
trusted library allocation
page read and write
1D4E3F2E000
heap
page read and write
12C0000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
4481000
trusted library allocation
page read and write
1D416A70000
heap
page read and write
7720000
trusted library allocation
page read and write
1D416890000
heap
page read and write
766B000
heap
page read and write
3568000
trusted library allocation
page read and write
148E000
stack
page read and write
350E000
trusted library allocation
page read and write
2D886B81000
trusted library allocation
page read and write
1572000
trusted library allocation
page read and write
12F7000
stack
page read and write
2D886B84000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
560E000
stack
page read and write
1040000
heap
page read and write
6FBC000
trusted library allocation
page read and write
27FB000
trusted library allocation
page execute and read and write
6E41000
trusted library allocation
page read and write
1D43094C000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
19413140000
heap
page read and write
6FB0000
trusted library allocation
page read and write
147707E000
stack
page read and write
2C41000
trusted library allocation
page read and write
1D4E5CB3000
heap
page read and write
11BE000
stack
page read and write
1D416830000
heap
page read and write
27D0000
trusted library allocation
page read and write
6BA7000
trusted library allocation
page read and write
593E000
stack
page read and write
6DC0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
2D886B6A000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
3DA7000
trusted library allocation
page read and write
C3A000
trusted library allocation
page execute and read and write
240D000
heap
page read and write
6AFE000
stack
page read and write
2C24000
heap
page read and write
420E000
trusted library allocation
page read and write
AB9000
trusted library allocation
page read and write
1D638730000
heap
page read and write
E99000
heap
page read and write
F50000
trusted library allocation
page execute and read and write
4D43000
trusted library allocation
page read and write
252C000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
3574000
trusted library allocation
page read and write
23E0000
heap
page read and write
5D0000
heap
page read and write
1D430944000
heap
page read and write
F30000
trusted library allocation
page read and write
16C6000
heap
page read and write
78C0000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
975000
heap
page read and write
74B6000
trusted library allocation
page read and write
2D89F610000
trusted library section
page read and write
3161000
trusted library allocation
page read and write
2D884D61000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
19414E94000
heap
page read and write
155D000
trusted library allocation
page execute and read and write
2D884FF0000
heap
page read and write
2D886C34000
trusted library allocation
page read and write
27F7000
trusted library allocation
page execute and read and write
2E3D000
trusted library allocation
page read and write
1D416850000
heap
page read and write
2BCE000
trusted library allocation
page read and write
There are 1211 hidden memdumps, click here to show them.