IOC Report
Mt6QkZnVbc.exe

loading gif

Files

File Path
Type
Category
Malicious
Mt6QkZnVbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\RCX75E9.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Mail\RCX69BF.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\RCX7115.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RCX67AA.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RCX6C11.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RCX786B.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\dwm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\services.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\sihost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Mt6QkZnVbc.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RCX6567.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\SKB\LanguageModels\RCX6E93.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\ServiceProfiles\LocalService\Desktop\RCX73C5.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\5d095569012eb4
ASCII text, with very long lines (357), with no line terminators
dropped
C:\Program Files (x86)\Google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Mail\5d095569012eb4
ASCII text, with very long lines (594), with no line terminators
dropped
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Portable Devices\5d095569012eb4
ASCII text, with no line terminators
dropped
C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\66fc9ff0ee96c2
ASCII text, with very long lines (672), with no line terminators
dropped
C:\Recovery\6cb0b6c459d5d3
ASCII text, with very long lines (717), with no line terminators
dropped
C:\Recovery\c5b4cb5e9653cc
ASCII text, with very long lines (312), with no line terminators
dropped
C:\Recovery\dwm.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\services.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\sihost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Mt6QkZnVbc.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UserOOBEBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dwm.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sihost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\59a07570a8a8386aa1a299e6ab573f686e7e81544.5.321e942f7529053d3bf5a939edfacdca5e36682859
ASCII text, with very long lines (644), with no line terminators
dropped
C:\Windows\SKB\LanguageModels\5d095569012eb4
ASCII text, with very long lines (735), with no line terminators
dropped
C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\Desktop\7ccfebd9e92364
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Mt6QkZnVbc.exe
"C:\Users\user\Desktop\Mt6QkZnVbc.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Recovery\services.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\services.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Recovery\services.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Recovery\dwm.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\dwm.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Recovery\dwm.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
"C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 10 /tr "'C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /f
malicious
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
"C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 6 /tr "'C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Recovery\dwm.exe
C:\Recovery\dwm.exe
malicious
C:\Recovery\dwm.exe
C:\Recovery\dwm.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Recovery\services.exe
C:\Recovery\services.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Recovery\services.exe
C:\Recovery\services.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 12 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "UserOOBEBroker" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 14 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\sihost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\sihost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\sihost.exe'" /rl HIGHEST /f
malicious
C:\Recovery\sihost.exe
C:\Recovery\sihost.exe
malicious
C:\Recovery\sihost.exe
C:\Recovery\sihost.exe
malicious
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
malicious
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
malicious
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
"C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe"
malicious
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://aka.ms/Vh5j3kta
unknown
https://aka.ms/odirmogram
unknown
http://a0941979.xsph.ru/@zd3bk5Wa3RHb1FmZlR0X
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting

Memdumps

Base Address
Regiontype
Protect
Malicious
3081000
trusted library allocation
page read and write
malicious
2501000
trusted library allocation
page read and write
malicious
235C000
trusted library allocation
page read and write
malicious
254C000
trusted library allocation
page read and write
malicious
2321000
trusted library allocation
page read and write
malicious
2511000
trusted library allocation
page read and write
malicious
336C000
trusted library allocation
page read and write
malicious
29B1000
trusted library allocation
page read and write
malicious
29B1000
trusted library allocation
page read and write
malicious
29EC000
trusted library allocation
page read and write
malicious
343F000
trusted library allocation
page read and write
malicious
2C0C000
trusted library allocation
page read and write
malicious
EC2000
unkown
page readonly
malicious
2AA1000
trusted library allocation
page read and write
malicious
32D1000
trusted library allocation
page read and write
malicious
3331000
trusted library allocation
page read and write
malicious
3401000
trusted library allocation
page read and write
malicious
2BD1000
trusted library allocation
page read and write
malicious
25A1000
trusted library allocation
page read and write
malicious
3860000
trusted library allocation
page read and write
1B0B0000
trusted library allocation
page read and write
1B60E000
stack
page read and write
1BD4E000
stack
page read and write
7FFD9B786000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1190000
heap
page read and write
B10000
heap
page read and write
7FFD9B8F7000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
AAD000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1A9E0000
trusted library allocation
page read and write
1BF3E000
stack
page read and write
7FFD9B96B000
trusted library allocation
page read and write
137F000
heap
page read and write
14270000
trusted library allocation
page read and write
12508000
trusted library allocation
page read and write
1AE30000
heap
page read and write
3B71000
trusted library allocation
page read and write
37DC000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
18E0000
heap
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
1C814000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
B20000
trusted library allocation
page read and write
1C1A0000
heap
page read and write
125A3000
trusted library allocation
page read and write
B60000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B929000
trusted library allocation
page read and write
710000
heap
page read and write
1C5F0000
trusted library section
page read and write
A0E000
heap
page read and write
1155000
heap
page read and write
2A6B000
trusted library allocation
page read and write
1C3A3000
stack
page read and write
1C5E0000
trusted library section
page read and write
7FFD9B932000
trusted library allocation
page read and write
1BB4F000
stack
page read and write
1450000
heap
page read and write
39D3000
trusted library allocation
page read and write
1BBE0000
trusted library section
page read and write
29AF000
stack
page read and write
353E000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
1B85C000
stack
page read and write
1A9E0000
trusted library allocation
page read and write
CCA000
heap
page read and write
3A5B000
trusted library allocation
page read and write
3946000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
1B13E000
stack
page read and write
7FFD9B952000
trusted library allocation
page read and write
A50000
heap
page read and write
9D8000
heap
page read and write
3948000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
7FFD9B91E000
trusted library allocation
page read and write
C49000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
530000
heap
page read and write
13454000
trusted library allocation
page read and write
1C502000
heap
page execute and read and write
12BDD000
trusted library allocation
page read and write
23D0000
heap
page execute and read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7C5000
heap
page read and write
590000
heap
page read and write
1350000
heap
page read and write
2C86000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
BA0000
heap
page execute and read and write
13088000
trusted library allocation
page read and write
138F000
heap
page read and write
17F0000
trusted library allocation
page read and write
1BB6E000
stack
page read and write
7FF45A4A0000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
319E000
stack
page read and write
1C7BD000
heap
page read and write
1AE60000
heap
page execute and read and write
DF0000
heap
page read and write
2C83000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
5D0000
heap
page read and write
1985000
heap
page read and write
760000
heap
page read and write
1460000
heap
page read and write
617000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
580000
heap
page read and write
38E5000
trusted library allocation
page read and write
19AD000
stack
page read and write
1B460000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
1493000
heap
page read and write
38E1000
trusted library allocation
page read and write
A30000
heap
page read and write
3473000
trusted library allocation
page read and write
BE0000
heap
page execute and read and write
7FFD9B924000
trusted library allocation
page read and write
EC0000
unkown
page readonly
2450000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
3B6F000
trusted library allocation
page read and write
381C000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
37DA000
trusted library allocation
page read and write
1C8BB000
heap
page read and write
1C316000
heap
page read and write
1C402000
heap
page read and write
132D1000
trusted library allocation
page read and write
7E6000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
F25000
heap
page read and write
17F5000
heap
page read and write
C1F000
heap
page read and write
1C7DC000
heap
page read and write
1C610000
trusted library section
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
A76000
heap
page read and write
1C133000
stack
page read and write
33F0000
heap
page execute and read and write
15B2000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
7C1000
heap
page read and write
9F5000
heap
page read and write
C94000
heap
page read and write
342A000
trusted library allocation
page read and write
1B2FE000
stack
page read and write
7FFD9B919000
trusted library allocation
page read and write
1379000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1B66E000
stack
page read and write
1C32E000
heap
page read and write
14FC000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B92E000
trusted library allocation
page read and write
7FFD9B798000
trusted library allocation
page read and write
1C7CC000
heap
page read and write
7E0000
heap
page read and write
171F000
stack
page read and write
23F0000
heap
page read and write
EFF000
stack
page read and write
142E000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
35FF000
trusted library allocation
page read and write
790000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
12323000
trusted library allocation
page read and write
15B0000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
12AA1000
trusted library allocation
page read and write
1250D000
trusted library allocation
page read and write
1490000
heap
page read and write
2367000
trusted library allocation
page read and write
1C2D0000
heap
page read and write
23A0000
heap
page execute and read and write
15DE000
heap
page read and write
1232D000
trusted library allocation
page read and write
AA5000
heap
page read and write
1BA63000
stack
page read and write
37E0000
trusted library allocation
page read and write
7FFD9B92E000
trusted library allocation
page read and write
1BF9E000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
CC5000
heap
page read and write
7A0000
heap
page read and write
1B53F000
stack
page read and write
D5E000
heap
page read and write
3822000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
11D0000
heap
page read and write
865000
heap
page read and write
546000
stack
page read and write
381A000
trusted library allocation
page read and write
750000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1A5D0000
trusted library allocation
page read and write
1A350000
trusted library allocation
page read and write
A35000
heap
page read and write
3C8D000
trusted library allocation
page read and write
2410000
trusted library allocation
page read and write
A3C000
heap
page read and write
3A64000
trusted library allocation
page read and write
1980000
heap
page read and write
7FFD9B952000
trusted library allocation
page read and write
2645000
trusted library allocation
page read and write
1B45F000
stack
page read and write
38EB000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
C50000
heap
page read and write
B6E000
heap
page read and write
B30000
heap
page read and write
E50000
heap
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1C035000
stack
page read and write
7FFD9B927000
trusted library allocation
page read and write
1AF1D000
stack
page read and write
159F000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
3126000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
14D8000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
7DA000
heap
page read and write
14F0000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
189F000
stack
page read and write
33E2000
trusted library allocation
page read and write
7FFD9B798000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
848000
heap
page read and write
15D0000
trusted library allocation
page read and write
1CC03000
heap
page read and write
7FFD9B798000
trusted library allocation
page read and write
346F000
trusted library allocation
page read and write
1C00E000
stack
page read and write
379C000
trusted library allocation
page read and write
7FFD9B7A8000
trusted library allocation
page read and write
132DF000
trusted library allocation
page read and write
1B433000
stack
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
36C7000
trusted library allocation
page read and write
1C842000
heap
page read and write
2C81000
trusted library allocation
page read and write
129B3000
trusted library allocation
page read and write
14D0000
heap
page read and write
1BC4E000
stack
page read and write
15F0000
trusted library allocation
page read and write
B9C000
heap
page read and write
9F9000
heap
page read and write
3467000
trusted library allocation
page read and write
13674000
trusted library allocation
page read and write
3C85000
trusted library allocation
page read and write
1505000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B79B000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1B37E000
stack
page read and write
24F0000
heap
page read and write
34F3000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
12328000
trusted library allocation
page read and write
CAD000
heap
page read and write
1CAFE000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
9D0000
heap
page read and write
132D8000
trusted library allocation
page read and write
1BFAE000
stack
page read and write
C3D000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
A0C000
heap
page read and write
85F000
heap
page read and write
3864000
trusted library allocation
page read and write
1B63E000
stack
page read and write
29F6000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
2A9F000
stack
page read and write
1A530000
trusted library allocation
page read and write
2210000
heap
page read and write
EB5000
heap
page read and write
C78000
heap
page read and write
7FFD9B763000
trusted library allocation
page read and write
AE1000
heap
page read and write
A10000
heap
page read and write
B20000
heap
page read and write
746000
stack
page read and write
3790000
trusted library allocation
page read and write
1BA50000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
AE7000
heap
page read and write
790000
trusted library allocation
page read and write
1419E000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
3B79000
trusted library allocation
page read and write
DFF000
stack
page read and write
7FFD9B8A5000
trusted library allocation
page execute and read and write
7FFD9B922000
trusted library allocation
page read and write
1BCFE000
stack
page read and write
C60000
heap
page read and write
1570000
heap
page read and write
AF6000
stack
page read and write
B80000
trusted library allocation
page read and write
1359000
heap
page read and write
2A53000
trusted library allocation
page read and write
13BA000
heap
page read and write
B4E000
heap
page read and write
1B04F000
stack
page read and write
7FFD9B939000
trusted library allocation
page read and write
2642000
trusted library allocation
page read and write
C20000
heap
page read and write
3950000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
3B73000
trusted library allocation
page read and write
1146000
stack
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
7FFD9B927000
trusted library allocation
page read and write
18D0000
heap
page execute and read and write
129B8000
trusted library allocation
page read and write
33E9000
trusted library allocation
page read and write
C00000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1BE00000
heap
page execute and read and write
1CBBB000
stack
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
33DF000
trusted library allocation
page read and write
C3F000
heap
page read and write
5D0000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1B14F000
stack
page read and write
C70000
heap
page read and write
25BA000
trusted library allocation
page read and write
1B87D000
stack
page read and write
1450000
heap
page read and write
1C7C0000
heap
page read and write
33DC000
trusted library allocation
page read and write
1B3FE000
stack
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
C50000
heap
page read and write
17F5000
heap
page read and write
1AA9D000
stack
page read and write
DCF000
stack
page read and write
CED000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
1BEAE000
stack
page read and write
7FFD9B846000
trusted library allocation
page read and write
1CAFE000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
38E9000
trusted library allocation
page read and write
7FFD9B788000
trusted library allocation
page read and write
1C7F0000
heap
page read and write
1583000
heap
page read and write
34B7000
trusted library allocation
page read and write
157C000
heap
page read and write
C65000
heap
page read and write
1AC00000
trusted library allocation
page read and write
1B080000
heap
page read and write
A3A000
heap
page read and write
1910000
heap
page read and write
35FD000
trusted library allocation
page read and write
1D0000
heap
page read and write
1B300000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1576000
heap
page read and write
C13000
heap
page read and write
7FFD9B796000
trusted library allocation
page read and write
1C8A2000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1AEF0000
heap
page execute and read and write
7FFD9B92E000
trusted library allocation
page read and write
1AB9F000
stack
page read and write
B5C000
heap
page read and write
A22000
heap
page read and write
1C325000
heap
page read and write
3690000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
1B28F000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
3820000
trusted library allocation
page read and write
1B430000
trusted library allocation
page read and write
770000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
173F000
stack
page read and write
CDB000
heap
page read and write
1C9F3000
stack
page read and write
1BCA0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B937000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
B72000
heap
page read and write
3757000
trusted library allocation
page read and write
1630000
heap
page read and write
3138000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
1C600000
trusted library section
page read and write
B00000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
3B75000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
A43000
heap
page read and write
30C9000
trusted library allocation
page read and write
AF0000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
3538000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
3532000
trusted library allocation
page read and write
7FFD9B8B5000
trusted library allocation
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
D02000
heap
page read and write
38E3000
trusted library allocation
page read and write
1C9FA000
stack
page read and write
A2D000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
57F000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
17C0000
heap
page read and write
CE0000
heap
page read and write
2B46000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1C74D000
stack
page read and write
1915000
heap
page read and write
C46000
heap
page read and write
1AD10000
heap
page read and write
1B384000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B836000
trusted library allocation
page read and write
14BC000
heap
page read and write
1654000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1B400000
heap
page read and write
332E000
stack
page read and write
1102000
heap
page read and write
7FFD9B8F4000
trusted library allocation
page read and write
1C0000
heap
page read and write
1C640000
trusted library section
page read and write
A76000
heap
page read and write
1A8F000
stack
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1C19E000
stack
page read and write
1C803000
heap
page read and write
57A000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
1B1FB000
stack
page read and write
CC1000
heap
page read and write
379A000
trusted library allocation
page read and write
7FFD9B93E000
trusted library allocation
page read and write
8EF000
heap
page read and write
DE0000
trusted library allocation
page read and write
3C83000
trusted library allocation
page read and write
3AE6000
trusted library allocation
page read and write
1AF7F000
stack
page read and write
1AFDF000
stack
page read and write
1850000
heap
page execute and read and write
39DD000
trusted library allocation
page read and write
1BD2E000
stack
page read and write
1B640000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1BC20000
heap
page execute and read and write
12AA8000
trusted library allocation
page read and write
12501000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
23CD000
trusted library allocation
page read and write
2590000
heap
page read and write
13401000
trusted library allocation
page read and write
12BD3000
trusted library allocation
page read and write
381E000
trusted library allocation
page read and write
39DB000
trusted library allocation
page read and write
7A0000
heap
page read and write
1336000
stack
page read and write
1550000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
72E000
heap
page read and write
A41000
heap
page read and write
3792000
trusted library allocation
page read and write
1370000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
3BFF000
trusted library allocation
page read and write
1B0F3000
stack
page read and write
3AEC000
trusted library allocation
page read and write
631000
heap
page read and write
39D9000
trusted library allocation
page read and write
2BC0000
heap
page execute and read and write
7FFD9B754000
trusted library allocation
page read and write
C30000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
1540000
heap
page read and write
1D26B000
stack
page read and write
7FFD9B895000
trusted library allocation
page execute and read and write
1C876000
heap
page read and write
12AAD000
trusted library allocation
page read and write
3B6D000
trusted library allocation
page read and write
1635000
heap
page read and write
14064000
trusted library allocation
page read and write
C32000
heap
page read and write
2A56000
trusted library allocation
page read and write
E02000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
231E000
stack
page read and write
5C0000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
CCD000
heap
page read and write
3868000
trusted library allocation
page read and write
CA6000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
C0F000
stack
page read and write
3862000
trusted library allocation
page read and write
17CE000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
A81000
heap
page read and write
1C3D0000
trusted library section
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
18A0000
heap
page read and write
7FFD9B9F4000
trusted library allocation
page read and write
24DF000
stack
page read and write
1C6FE000
stack
page read and write
1B744000
stack
page read and write
B70000
heap
page read and write
7FFD9B788000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1E83E000
stack
page read and write
12518000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1C402000
heap
page read and write
1611000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B917000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
385E000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
820000
heap
page read and write
33E7000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
14207000
trusted library allocation
page read and write
87D000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9B800000
trusted library allocation
page read and write
BD7000
heap
page read and write
1C8FE000
stack
page read and write
14135000
trusted library allocation
page read and write
CBB000
heap
page read and write
1BA4E000
stack
page read and write
1770000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1B18F000
stack
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
FFF000
stack
page read and write
13333000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
1B350000
heap
page execute and read and write
13338000
trusted library allocation
page read and write
1C780000
heap
page read and write
1622000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
38ED000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
129B3000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1B864000
stack
page read and write
14A0000
heap
page read and write
7FFD9B92E000
trusted library allocation
page read and write
1AAD0000
trusted library allocation
page read and write
A1F000
stack
page read and write
1B652000
heap
page read and write
3647000
trusted library allocation
page read and write
720000
heap
page read and write
2B4D000
stack
page read and write
7FFD9B942000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
346B000
trusted library allocation
page read and write
125A8000
trusted library allocation
page read and write
13F6000
heap
page read and write
1B76E000
stack
page read and write
1B440000
heap
page read and write
15E1000
heap
page read and write
38E7000
trusted library allocation
page read and write
1AFD0000
heap
page execute and read and write
7FFD9B856000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
2648000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
CA8000
heap
page read and write
1B84B000
stack
page read and write
BE2000
heap
page read and write
1B590000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
1C390000
trusted library section
page read and write
1C7E3000
heap
page read and write
7B8000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
9E6000
stack
page read and write
3471000
trusted library allocation
page read and write
7FFD9B925000
trusted library allocation
page read and write
161B000
heap
page read and write
C22000
heap
page read and write
12BD1000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
3645000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
7FFD9B8FE000
trusted library allocation
page read and write
582000
heap
page read and write
34B5000
trusted library allocation
page read and write
13403000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
AC9000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
29AF000
stack
page read and write
2A67000
trusted library allocation
page read and write
900000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B952000
trusted library allocation
page read and write
18FE000
stack
page read and write
36D3000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
BCF000
stack
page read and write
AD0000
heap
page read and write
17F0000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
535000
heap
page read and write
1C2AA000
stack
page read and write
324E000
stack
page read and write
13ABD000
trusted library allocation
page read and write
1AE2D000
stack
page read and write
7FFD9B752000
trusted library allocation
page read and write
9DF000
heap
page read and write
302E000
stack
page read and write
AA0000
heap
page read and write
7FFD9B768000
trusted library allocation
page read and write
3C8B000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1C0A4000
stack
page read and write
3818000
trusted library allocation
page read and write
2370000
trusted library allocation
page read and write
1A8AD000
stack
page read and write
3AEA000
trusted library allocation
page read and write
1C84F000
heap
page read and write
ABE000
heap
page read and write
A50000
heap
page read and write
34ED000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
1ACEE000
stack
page read and write
3B77000
trusted library allocation
page read and write
17F0000
heap
page read and write
1618000
heap
page read and write
153E000
heap
page read and write
7FFD9B929000
trusted library allocation
page read and write
18A5000
heap
page read and write
B80000
heap
page read and write
140CC000
trusted library allocation
page read and write
176F000
stack
page read and write
8A6000
heap
page read and write
3C03000
trusted library allocation
page read and write
1C8C7000
heap
page read and write
1002000
heap
page read and write
3759000
trusted library allocation
page read and write
A13000
heap
page read and write
1C33E000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
370D000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
1511000
heap
page read and write
36C9000
trusted library allocation
page read and write
1480000
heap
page read and write
23C7000
trusted library allocation
page read and write
29ED000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1C1AE000
stack
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1C7F7000
heap
page read and write
B5F000
heap
page read and write
1D270000
heap
page read and write
23CA000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
21D0000
heap
page execute and read and write
2A5C000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B8F7000
trusted library allocation
page read and write
1AB2D000
stack
page read and write
1C5DA000
stack
page read and write
129B1000
trusted library allocation
page read and write
8E4000
heap
page read and write
125A1000
trusted library allocation
page read and write
2657000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
38A9000
trusted library allocation
page read and write
1C7BB000
heap
page read and write
A30000
heap
page read and write
102F000
stack
page read and write
1600000
heap
page read and write
CDD000
heap
page read and write
7FFD9B8F9000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B9F8000
trusted library allocation
page read and write
1430000
heap
page read and write
18AB000
heap
page read and write
1C80D000
heap
page read and write
1BBA0000
trusted library section
page read and write
B90000
heap
page read and write
1AE70000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
4F6000
stack
page read and write
1C240000
heap
page read and write
3798000
trusted library allocation
page read and write
7A0000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
6F6000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1CBFE000
stack
page read and write
7FFD9B836000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
1C236000
stack
page read and write
AC0000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
3C07000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
1C82B000
heap
page read and write
139AD000
trusted library allocation
page read and write
385C000
trusted library allocation
page read and write
D08000
heap
page read and write
1AFFF000
stack
page read and write
264B000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
A55000
heap
page read and write
2A68000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
D06000
heap
page read and write
1251D000
trusted library allocation
page read and write
13083000
trusted library allocation
page read and write
13331000
trusted library allocation
page read and write
36CD000
trusted library allocation
page read and write
1AF4E000
stack
page read and write
2A64000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
32C0000
heap
page read and write
34B1000
trusted library allocation
page read and write
1475000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1B943000
stack
page read and write
24FE000
stack
page read and write
23DC000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9B93C000
trusted library allocation
page read and write
2B4C000
trusted library allocation
page read and write
7FFD9B776000
trusted library allocation
page read and write
7A5000
heap
page read and write
1B583000
stack
page read and write
1308D000
trusted library allocation
page read and write
3643000
trusted library allocation
page read and write
144A000
heap
page read and write
3AF0000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
12513000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
13408000
trusted library allocation
page read and write
1C2AE000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1BDA0000
heap
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
B3C000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
10FF000
stack
page read and write
A6C000
heap
page read and write
125AD000
trusted library allocation
page read and write
23B0000
trusted library allocation
page read and write
1340D000
trusted library allocation
page read and write
B59000
heap
page read and write
312C000
trusted library allocation
page read and write
500000
heap
page read and write
74E000
heap
page read and write
D0B000
heap
page read and write
7FFD9B798000
trusted library allocation
page read and write
3536000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
36CB000
trusted library allocation
page read and write
1C2F8000
heap
page read and write
1C2E1000
heap
page read and write
86D000
heap
page read and write
1C3B0000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B91E000
trusted library allocation
page read and write
142D9000
trusted library allocation
page read and write
3BFB000
trusted library allocation
page read and write
364B000
trusted library allocation
page read and write
1391000
heap
page read and write
15DC000
heap
page read and write
34AB000
trusted library allocation
page read and write
5BC000
heap
page read and write
2B58000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
132DD000
trusted library allocation
page read and write
39DF000
trusted library allocation
page read and write
1541000
heap
page read and write
1C40E000
stack
page read and write
1BDAE000
stack
page read and write
3AE4000
trusted library allocation
page read and write
1C620000
trusted library section
page read and write
7FFD9B8A5000
trusted library allocation
page execute and read and write
1C7B4000
heap
page read and write
30F8000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1526000
heap
page read and write
1BBC0000
trusted library section
page read and write
74C000
heap
page read and write
129BD000
trusted library allocation
page read and write
2750000
heap
page execute and read and write
12BD8000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
7FFD9B955000
trusted library allocation
page read and write
1516000
heap
page read and write
637000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
28A0000
heap
page execute and read and write
33EB000
trusted library allocation
page read and write
141D9000
trusted library allocation
page read and write
1180000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1580000
heap
page read and write
143E000
heap
page read and write
B9E000
heap
page read and write
11B0000
heap
page read and write
1459000
heap
page read and write
7FFD9B929000
trusted library allocation
page read and write
1356000
heap
page read and write
17E0000
heap
page read and write
CB3000
heap
page read and write
12511000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B922000
trusted library allocation
page read and write
606000
heap
page read and write
D4D000
heap
page read and write
1B48E000
stack
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
7FFD9B917000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
BA1000
heap
page read and write
3866000
trusted library allocation
page read and write
1C6FF000
stack
page read and write
11C6000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
F02000
heap
page read and write
A99000
heap
page read and write
2500000
heap
page execute and read and write
1B38E000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1441000
heap
page read and write
38AB000
trusted library allocation
page read and write
255E000
stack
page read and write
394C000
trusted library allocation
page read and write
1BA4E000
stack
page read and write
1B96E000
stack
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1410000
heap
page read and write
13BC000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1456000
heap
page read and write
1333D000
trusted library allocation
page read and write
AE4000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
27A0000
heap
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
129BD000
trusted library allocation
page read and write
7FFD9B752000
trusted library allocation
page read and write
12503000
trusted library allocation
page read and write
7B4000
heap
page read and write
A32000
heap
page read and write
1C103000
stack
page read and write
CBF000
heap
page read and write
394A000
trusted library allocation
page read and write
1B483000
stack
page read and write
13F9000
heap
page read and write
7FFD9B8A5000
trusted library allocation
page execute and read and write
364F000
trusted library allocation
page read and write
12321000
trusted library allocation
page read and write
3796000
trusted library allocation
page read and write
3944000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
5F5000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1540000
heap
page read and write
3534000
trusted library allocation
page read and write
28AF000
stack
page read and write
13E98000
trusted library allocation
page read and write
8AE000
stack
page read and write
1C3A0000
trusted library section
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B8A5000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1C7C6000
heap
page read and write
1C7FE000
stack
page read and write
1C831000
heap
page read and write
34EF000
trusted library allocation
page read and write
1AF6E000
stack
page read and write
34F1000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1C822000
heap
page read and write
14FE000
heap
page read and write
9AE000
stack
page read and write
2B52000
trusted library allocation
page read and write
147E000
heap
page read and write
1560000
heap
page read and write
840000
heap
page read and write
BF0000
trusted library allocation
page read and write
BB0000
heap
page read and write
1C7FF000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
13FFB000
trusted library allocation
page read and write
719000
heap
page read and write
1C20E000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
23A1000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1AF3D000
stack
page read and write
5F0000
heap
page read and write
3824000
trusted library allocation
page read and write
A8B000
heap
page read and write
1C30E000
stack
page read and write
1BE3E000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9B783000
trusted library allocation
page read and write
1B58B000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
A38000
heap
page read and write
264E000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
1B8BD000
stack
page read and write
1CCFE000
stack
page read and write
A46000
heap
page read and write
3C81000
trusted library allocation
page read and write
7FFD9B895000
trusted library allocation
page execute and read and write
3603000
trusted library allocation
page read and write
23D6000
trusted library allocation
page read and write
73B000
heap
page read and write
3A67000
trusted library allocation
page read and write
25A9000
trusted library allocation
page read and write
F20000
heap
page read and write
550000
heap
page read and write
1C3C0000
trusted library section
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
C07000
heap
page read and write
37D6000
trusted library allocation
page read and write
1B030000
heap
page read and write
35FB000
trusted library allocation
page read and write
1D13E000
stack
page read and write
87B000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
3C92000
trusted library allocation
page read and write
1AA8D000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
13081000
trusted library allocation
page read and write
586000
stack
page read and write
35F7000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
1BD30000
heap
page read and write
23D9000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1AE40000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1C867000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
1C83B000
heap
page read and write
1D03D000
stack
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
7FFD9B756000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
779000
heap
page read and write
1B54E000
stack
page read and write
3240000
heap
page read and write
1B244000
stack
page read and write
9CE000
stack
page read and write
1810000
trusted library allocation
page read and write
1B334000
stack
page read and write
1C8F3000
stack
page read and write
13EF000
heap
page read and write
25DD000
trusted library allocation
page read and write
2651000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
2A40000
heap
page read and write
1514000
heap
page read and write
38A1000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
55C000
heap
page read and write
129B8000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
1B56E000
stack
page read and write
1BC10000
trusted library section
page read and write
1C3B0000
trusted library section
page read and write
14F4000
heap
page read and write
1A540000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
EC0000
unkown
page readonly
1336000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B78B000
trusted library allocation
page read and write
147A000
heap
page read and write
1B23E000
stack
page read and write
7FFD9B92A000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
86A000
heap
page read and write
1AE1E000
stack
page read and write
592000
heap
page read and write
3712000
trusted library allocation
page read and write
B5E000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
3BFD000
trusted library allocation
page read and write
7FFD9B875000
trusted library allocation
page execute and read and write
7FFD9B929000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
590000
heap
page read and write
353C000
trusted library allocation
page read and write
1C4DA000
stack
page read and write
CF6000
heap
page read and write
35B5000
trusted library allocation
page read and write
3AE8000
trusted library allocation
page read and write
1547000
heap
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
2A56000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9B9D6000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
3070000
heap
page read and write
C2D000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BE93000
stack
page read and write
1C502000
heap
page execute and read and write
556000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
2654000
trusted library allocation
page read and write
1400000
heap
page read and write
1C78F000
heap
page read and write
37D4000
trusted library allocation
page read and write
AC7000
heap
page read and write
C26000
heap
page read and write
780000
heap
page read and write
343C000
trusted library allocation
page read and write
B53000
heap
page read and write
14D6000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
1B64F000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B753000
trusted library allocation
page execute and read and write
3794000
trusted library allocation
page read and write
357F000
trusted library allocation
page read and write
1C89D000
heap
page read and write
1C630000
trusted library section
page read and write
74A000
heap
page read and write
740000
trusted library allocation
page read and write
B02000
heap
page read and write
33E4000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
3C01000
trusted library allocation
page read and write
C44000
heap
page read and write
16CE000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
35F9000
trusted library allocation
page read and write
1B360000
trusted library allocation
page read and write
1BBD0000
trusted library section
page read and write
17D0000
trusted library allocation
page read and write
36CF000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
2440000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
394E000
trusted library allocation
page read and write
1CE02000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
AFE000
heap
page read and write
1720000
heap
page read and write
112E000
stack
page read and write
1470000
heap
page read and write
129B1000
trusted library allocation
page read and write
1900000
heap
page execute and read and write
17C5000
heap
page read and write
7FFD9B917000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
AC5000
heap
page read and write
13A56000
trusted library allocation
page read and write
B36000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1150000
heap
page read and write
7B0000
heap
page read and write
1B68E000
stack
page read and write
12AA3000
trusted library allocation
page read and write
7FFD9B937000
trusted library allocation
page read and write
3753000
trusted library allocation
page read and write
1BF0E000
stack
page read and write
7C0000
heap
page read and write
5BE000
heap
page read and write
1BC00000
trusted library section
page read and write
165C000
heap
page read and write
A90000
heap
page execute and read and write
139F1000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
1C09E000
stack
page read and write
1840000
trusted library allocation
page read and write
There are 1138 hidden memdumps, click here to show them.