IOC Report
W4tW72sfAD.exe

loading gif

Files

File Path
Type
Category
Malicious
W4tW72sfAD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Internet Explorer\en-GB\juptXkyeRvGsIZrQGeVEsrnWhD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Microsoft Office 15\ClientX64\juptXkyeRvGsIZrQGeVEsrnWhD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\juptXkyeRvGsIZrQGeVEsrnWhD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Downloads\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9x00cPKFqM.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\eqmixkc3\eqmixkc3.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\BazpdGXT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BuKwfPUT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DEgxfiAU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EkAnmMVM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GNRoGDmH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HScOGmcH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IhtNKAXm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JNNDResf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LionObPB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NEEtYbtY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NWsvAoLz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QwkEqgro.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UMwcyUfj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VRHDyDUj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WoNdSLwd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZpKsdnCB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cnkBPSdA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eSWSCFMK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ekLJkSsv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fAbTigaR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hSShNgSi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kdoiNyxj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ndjISZpy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nweImycr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\oQGhqvNX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\quERYeDq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rrfZteSl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wHsyCTFf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wexYWbhZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yzZxaXSF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Internet Explorer\en-GB\9da3c047e935b1
ASCII text, with very long lines (857), with no line terminators
dropped
C:\Program Files (x86)\Internet Explorer\en-GB\juptXkyeRvGsIZrQGeVEsrnWhD.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Microsoft Office 15\ClientX64\9da3c047e935b1
ASCII text, with very long lines (681), with no line terminators
dropped
C:\Program Files\Microsoft Office 15\ClientX64\juptXkyeRvGsIZrQGeVEsrnWhD.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x4bf9faa4, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Recovery\9da3c047e935b1
ASCII text, with no line terminators
dropped
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\9da3c047e935b1
ASCII text, with very long lines (704), with no line terminators
dropped
C:\Users\Default\juptXkyeRvGsIZrQGeVEsrnWhD.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Downloads\9e8d7a4ca61bd9
ASCII text, with very long lines (606), with no line terminators
dropped
C:\Users\Public\Downloads\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\W4tW72sfAD.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\juptXkyeRvGsIZrQGeVEsrnWhD.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\2057exvhHc
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\3zUipu98QK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\75DJw7GE1X
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Pb5xjMs33D
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\RESCC57.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6ec, 10 symbols, created Fri Apr 19 12:52:07 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\XrKvE5hfPM
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2g2o2osm.o0n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3bb51dkf.43m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_452rxwrt.slr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fb1b35gc.bgp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_glqq45wj.e3f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mlcv2gup.4ee.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mpxfhqb0.p1l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ndo2rr3d.4oj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odq1ty54.v1v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5bczs5f.cf2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_px3ssoqz.d2i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rxgfgttg.q14.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vox513b2.3am.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvcy4t00.g5s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wa5hpfyo.eyh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x32onlvs.5ls.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xeh2t2h1.cw2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ytp1ab2z.jkb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z2ctmi5o.nio.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5lyytdd.czd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bfKv5IzLwm
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\diMaNMPA1O
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\eqmixkc3\eqmixkc3.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\eqmixkc3\eqmixkc3.out
Unicode text, UTF-8 (with BOM) text, with very long lines (329), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\pxc2XMkTJC
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\qBblIcQZVX
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\r4ucDo0X0I
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\r7zZErtjMt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rqqtMN36Ye
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\sebuO9IfXr
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\uAV4mAvWp2
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\System32\CSCC6B1193CD9FE40B5844F837FF967B9E7.TMP
MSVC .res
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 84 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W4tW72sfAD.exe
"C:\Users\user\Desktop\W4tW72sfAD.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eqmixkc3\eqmixkc3.cmdline"
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
malicious
C:\Users\Public\Downloads\RuntimeBroker.exe
C:\Users\Public\Downloads\RuntimeBroker.exe
malicious
C:\Users\Public\Downloads\RuntimeBroker.exe
C:\Users\Public\Downloads\RuntimeBroker.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office 15\ClientX64\juptXkyeRvGsIZrQGeVEsrnWhD.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\juptXkyeRvGsIZrQGeVEsrnWhD.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads\RuntimeBroker.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\internet explorer\en-GB\juptXkyeRvGsIZrQGeVEsrnWhD.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\9x00cPKFqM.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
"C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe"
malicious
C:\Users\Default\juptXkyeRvGsIZrQGeVEsrnWhD.exe
"C:\Users\Default User\juptXkyeRvGsIZrQGeVEsrnWhD.exe"
malicious
C:\Users\Public\Downloads\RuntimeBroker.exe
"C:\Users\Public\Downloads\RuntimeBroker.exe"
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
"C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe"
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
malicious
C:\Users\Public\Downloads\RuntimeBroker.exe
"C:\Users\Public\Downloads\RuntimeBroker.exe"
malicious
C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe
"C:\Recovery\juptXkyeRvGsIZrQGeVEsrnWhD.exe"
malicious
C:\Users\Public\Downloads\RuntimeBroker.exe
"C:\Users\Public\Downloads\RuntimeBroker.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESCC57.tmp" "c:\Windows\System32\CSCC6B1193CD9FE40B5844F837FF967B9E7.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://minecrafthyipixel.xyz/voiddbProviderserver6/Auth/Uploads/CentralCentralLine/7Eternal/2_/Temp/ToUpdategameFlowerTemporary.php
104.21.57.61
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://ipinfo.io
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://ion=v4.5Consumers
unknown
https://github.com/Pester/Pester
unknown
https://ipinfo.io
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://ipinfo.io/country
34.117.186.192
https://ion=v4.5
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://ipinfo.io/ip
34.117.186.192
http://crl.micros
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
minecrafthyipixel.xyz
104.21.57.61
malicious
ipinfo.io
34.117.186.192
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
104.21.57.61
minecrafthyipixel.xyz
United States
malicious
34.117.186.192
ipinfo.io
United States
149.154.167.220
api.telegram.org
United Kingdom
172.67.189.92
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
juptXkyeRvGsIZrQGeVEsrnWhD
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RuntimeBroker
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
juptXkyeRvGsIZrQGeVEsrnWhD
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
juptXkyeRvGsIZrQGeVEsrnWhD
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
juptXkyeRvGsIZrQGeVEsrnWhD
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
juptXkyeRvGsIZrQGeVEsrnWhD
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
juptXkyeRvGsIZrQGeVEsrnWhD
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\72bb34011980fb7b06fc1715e8155c942778f338
45bdf242c898ad532b04b5b7eb30ecfbcc42ef87
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W4tW72sfAD_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\juptXkyeRvGsIZrQGeVEsrnWhD_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 36 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A12000
unkown
page readonly
malicious
1303D000
trusted library allocation
page read and write
malicious
1B9A2000
heap
page read and write
23E22BD0000
heap
page readonly
317F000
stack
page read and write
2DD0000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
13AC4821000
trusted library allocation
page read and write
149E78C0000
heap
page read and write
E40000
heap
page read and write
35FF000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
DB0000
heap
page execute and read and write
1A758864000
trusted library allocation
page read and write
1A757B31000
trusted library allocation
page read and write
13601000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7DF4A6750000
trusted library allocation
page execute and read and write
2B83F693000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
13ADBC94000
heap
page read and write
1C05F000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
7DF494B90000
trusted library allocation
page execute and read and write
1B51B000
stack
page read and write
1198000
heap
page read and write
14AE106F000
trusted library allocation
page read and write
1A7582EF000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
1585000
heap
page read and write
2CCE000
trusted library allocation
page read and write
14AE112C000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
1A75520D000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
1A75819D000
trusted library allocation
page read and write
23E3B240000
heap
page read and write
2DE4000
unkown
page readonly
2E1B000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1BD3F000
stack
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
23E24F32000
trusted library allocation
page read and write
13AC46F6000
trusted library allocation
page read and write
1340000
heap
page read and write
F4A587D000
stack
page read and write
14ACEDD4000
heap
page read and write
16B5000
heap
page read and write
13AC447F000
trusted library allocation
page read and write
1BA35000
heap
page read and write
7FFD9B9AE000
trusted library allocation
page read and write
14AD251E000
trusted library allocation
page read and write
14ACED8E000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B959000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
13AC338A000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B8C1000
trusted library allocation
page execute and read and write
2D70000
unkown
page readonly
A80000
heap
page read and write
2B83117C000
trusted library allocation
page read and write
1A767560000
trusted library allocation
page read and write
23E2428F000
trusted library allocation
page read and write
14AD0B67000
heap
page execute and read and write
2F8D000
trusted library allocation
page read and write
2214079000
stack
page read and write
23E331A6000
trusted library allocation
page read and write
2C14000
trusted library allocation
page read and write
A9B000
heap
page read and write
820253E000
stack
page read and write
7FFD9BD90000
trusted library allocation
page read and write
13AD3A83000
trusted library allocation
page read and write
1BF62000
heap
page read and write
134B1000
trusted library allocation
page read and write
23E241C1000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
62D000
heap
page read and write
2F3F000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
1BC3D000
stack
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
14ACED8C000
heap
page read and write
3332000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
2B82D4EF000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1A767577000
trusted library allocation
page read and write
13AD3A7E000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
14AE1130000
trusted library allocation
page read and write
1A76F5B6000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
23E3B5F2000
heap
page read and write
1BA1E000
heap
page read and write
1A755238000
heap
page read and write
14AE1035000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1A76F44E000
heap
page read and write
7FFD9B959000
trusted library allocation
page read and write
14AD1BF8000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1BF14000
heap
page read and write
136FA000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
2B830C07000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
13AC19C2000
heap
page read and write
2DB0000
trusted library allocation
page read and write
14AD2A6C000
trusted library allocation
page read and write
14AE105D000
trusted library allocation
page read and write
319933C000
stack
page read and write
149E78AC000
heap
page read and write
296D000
trusted library allocation
page read and write
2B8477DC000
heap
page read and write
1375000
heap
page read and write
7FFD9B8BF000
trusted library allocation
page execute and read and write
14AE108C000
trusted library allocation
page read and write
23E22FC0000
trusted library allocation
page read and write
7FFD9B939000
trusted library allocation
page read and write
1740000
heap
page read and write
1BFFE000
heap
page read and write
2C25000
trusted library allocation
page read and write
1354B000
trusted library allocation
page read and write
8202438000
stack
page read and write
23E241ED000
trusted library allocation
page read and write
1C016000
heap
page read and write
12E11000
trusted library allocation
page read and write
14AE8E55000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
C40000
heap
page read and write
3246000
trusted library allocation
page read and write
1C67D000
stack
page read and write
23E21278000
heap
page read and write
1C4C0000
heap
page execute and read and write
1A76F5B2000
heap
page read and write
13ADBDE8000
heap
page read and write
23E3B470000
trusted library allocation
page read and write
1B5E9000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B8B6000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
26BE000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
30BE000
trusted library allocation
page read and write
13017000
trusted library allocation
page read and write
13AC3385000
heap
page read and write
3790000
trusted library allocation
page read and write
13ADB9F0000
heap
page execute and read and write
23E22BC0000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1A767586000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
1BF8D000
heap
page read and write
7FFD9B8D7000
trusted library allocation
page execute and read and write
1043000
heap
page read and write
1BE75000
heap
page read and write
2B830C2E000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
1A76755B000
trusted library allocation
page read and write
7FFD9B8D1000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
2B83F695000
trusted library allocation
page read and write
14AE8FA0000
heap
page execute and read and write
149E7903000
heap
page read and write
14AD1D21000
trusted library allocation
page read and write
B50000
heap
page read and write
1629000
heap
page read and write
7FFD9B959000
trusted library allocation
page read and write
2B83F5CA000
trusted library allocation
page read and write
22142F7000
stack
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
132EC000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B8DF000
trusted library allocation
page execute and read and write
12E31000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
D6F000
stack
page read and write
12F16000
trusted library allocation
page read and write
1A758200000
trusted library allocation
page read and write
13ADBB1E000
heap
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1024000
heap
page read and write
7FFD9B8A4000
trusted library allocation
page execute and read and write
1A756C20000
heap
page read and write
7FFD9B958000
trusted library allocation
page read and write
14AD189F000
trusted library allocation
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
11D0000
heap
page read and write
2FA4000
trusted library allocation
page read and write
3092000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
23E212B3000
heap
page read and write
14AD2A91000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
326B000
trusted library allocation
page read and write
1BECD000
heap
page read and write
1A767156000
trusted library allocation
page read and write
1696000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
7FFD9B9BE000
trusted library allocation
page read and write
1B91D000
stack
page read and write
14ACED96000
heap
page read and write
C51000
heap
page read and write
1A7580E2000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
14AE1142000
trusted library allocation
page read and write
7FFD9B8B3000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1308B000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
2D30000
heap
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
13AC556C000
trusted library allocation
page read and write
1A7674D3000
trusted library allocation
page read and write
23E212F6000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1F0A8E1E000
trusted library allocation
page read and write
149E78CB000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
645000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
14AE1082000
trusted library allocation
page read and write
DAB5FE000
stack
page read and write
1144000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
14AE9290000
heap
page read and write
22141FE000
stack
page read and write
2213FFF000
stack
page read and write
2791000
trusted library allocation
page read and write
7DF4C4EE0000
trusted library allocation
page execute and read and write
130A4000
trusted library allocation
page read and write
2FFB000
trusted library allocation
page read and write
2B847945000
heap
page read and write
149E78B9000
heap
page read and write
110C000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
C13000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B836000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
1A7582B6000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
14AE0D06000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1A76F2D4000
heap
page read and write
13AC484D000
trusted library allocation
page read and write
3199F09000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B923000
trusted library allocation
page read and write
2213E73000
stack
page read and write
7FFD9B8CA000
trusted library allocation
page execute and read and write
7FFD9B886000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
1B3C0000
trusted library allocation
page read and write
2214277000
stack
page read and write
7FFD9B937000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
2D14000
trusted library allocation
page read and write
31991B9000
stack
page read and write
7FFD9B8AA000
trusted library allocation
page execute and read and write
A47000
unkown
page readonly
23E243D2000
trusted library allocation
page read and write
7FFD9B917000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B9C6000
trusted library allocation
page read and write
1A7674F9000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
2784000
trusted library allocation
page read and write
13ADB7C0000
trusted library allocation
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
2DD0000
unkown
page readonly
8D0000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2628000
trusted library allocation
page read and write
1740000
heap
page read and write
1640000
heap
page read and write
14ACECF0000
heap
page read and write
1A7551B8000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2B830576000
trusted library allocation
page read and write
275C000
trusted library allocation
page read and write
14AD1A0B000
trusted library allocation
page read and write
1B930000
heap
page execute and read and write
12BA1000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
14AE0CC1000
trusted library allocation
page read and write
14AE10D8000
trusted library allocation
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
1077000
heap
page read and write
2762000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
128E000
heap
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
3198EF7000
stack
page read and write
28BE000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B792000
trusted library allocation
page read and write
149E78EE000
heap
page read and write
1A76747E000
trusted library allocation
page read and write
14AE114A000
trusted library allocation
page read and write
F4A5BBF000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
69A000
heap
page read and write
7FFD9B8C3000
trusted library allocation
page execute and read and write
2215147000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
14AE911A000
heap
page read and write
1A7674DB000
trusted library allocation
page read and write
1A758382000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
23E24F56000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
149E78C6000
heap
page read and write
33B5000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
14AE110E000
trusted library allocation
page read and write
14AE10B5000
trusted library allocation
page read and write
1A755195000
heap
page read and write
7FFD9B96C000
trusted library allocation
page read and write
1C0D5000
heap
page read and write
3199F8C000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1180000
heap
page read and write
2B82D670000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1A758A44000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
31EB000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1C700000
heap
page read and write
7FFD9B894000
trusted library allocation
page execute and read and write
149E78F7000
heap
page read and write
14AD1F3D000
trusted library allocation
page read and write
1A7674C0000
trusted library allocation
page read and write
23E3B688000
heap
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
14AD1BF0000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
14AE8DD7000
heap
page read and write
149E78EE000
heap
page read and write
2C0A000
trusted library allocation
page read and write
13ADBA37000
heap
page execute and read and write
149E78F5000
heap
page read and write
2C4E000
trusted library allocation
page read and write
23E3B692000
heap
page read and write
D30000
heap
page read and write
2B82D4F1000
heap
page read and write
35FD000
trusted library allocation
page read and write
1132000
heap
page read and write
1BF65000
heap
page read and write
149E7870000
heap
page read and write
2B82D6A0000
trusted library allocation
page read and write
702000
heap
page read and write
154C000
heap
page read and write
3198FF8000
stack
page read and write
14AD1D7F000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
1A767397000
trusted library allocation
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
7FFD9B9BF000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
1B77D000
stack
page read and write
23E21250000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
D739FF000
stack
page read and write
1A767579000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
23E212AD000
heap
page read and write
1350A000
trusted library allocation
page read and write
14AE9024000
heap
page read and write
F4A534E000
unkown
page read and write
133C9000
trusted library allocation
page read and write
23E23D2C000
trusted library allocation
page read and write
37DD000
trusted library allocation
page read and write
17B0000
heap
page read and write
2828000
trusted library allocation
page read and write
7FFD9B766000
trusted library allocation
page read and write
2800000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9BC1B000
trusted library allocation
page read and write
F4A5C3D000
stack
page read and write
13CF000
stack
page read and write
1B4C0000
heap
page execute and read and write
900000
heap
page read and write
149E7A10000
direct allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
1799000
heap
page read and write
1A758970000
trusted library allocation
page read and write
1A75810D000
trusted library allocation
page read and write
1C0FD000
stack
page read and write
14AE8EC4000
heap
page read and write
2775000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
622000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
7FFD9B9B7000
trusted library allocation
page read and write
10148E000
stack
page read and write
13AD3A8B000
trusted library allocation
page read and write
33BB000
trusted library allocation
page read and write
2D2E000
stack
page read and write
1A76752F000
trusted library allocation
page read and write
820233E000
stack
page read and write
1A75804B000
trusted library allocation
page read and write
22140FF000
stack
page read and write
23E23131000
trusted library allocation
page read and write
1170000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2625000
trusted library allocation
page read and write
23E3B26F000
heap
page read and write
23E3343D000
trusted library allocation
page read and write
14AD1CC4000
trusted library allocation
page read and write
100737000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2AAE000
stack
page read and write
14AD0AA0000
heap
page readonly
14AE9014000
heap
page read and write
D3B000
stack
page read and write
2DB2000
unkown
page readonly
13116000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
7FFD9B91D000
trusted library allocation
page read and write
14AD1DB8000
trusted library allocation
page read and write
1A7551F9000
heap
page read and write
31D9000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
18EAA650000
heap
page read and write
7FFD9B917000
trusted library allocation
page read and write
1A7674B0000
trusted library allocation
page read and write
1A76F4ED000
heap
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
7FFD9B8B7000
trusted library allocation
page execute and read and write
6DE000
heap
page read and write
3601000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
149E790B000
heap
page read and write
1A7674BA000
trusted library allocation
page read and write
14AD0710000
heap
page read and write
2DC4000
trusted library allocation
page read and write
3182000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
149E78B7000
heap
page read and write
2F5E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
1A76754E000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
3605000
trusted library allocation
page read and write
14AE90DE000
heap
page read and write
2B82F350000
heap
page execute and read and write
23E22C70000
heap
page read and write
CCE000
heap
page read and write
2B82F426000
trusted library allocation
page read and write
2500000
heap
page execute and read and write
103C000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
8201D6F000
unkown
page read and write
1A7674D5000
trusted library allocation
page read and write
1A7674CE000
trusted library allocation
page read and write
7FFD9B966000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2B82D5F0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
23E23DBC000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
22151CC000
stack
page read and write
10CC000
heap
page read and write
14AE90B7000
heap
page read and write
1C57E000
stack
page read and write
295C000
trusted library allocation
page read and write
1007BB000
stack
page read and write
221447E000
stack
page read and write
159C000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
23E244EE000
trusted library allocation
page read and write
14AE0FD2000
trusted library allocation
page read and write
7FFD9B95C000
trusted library allocation
page read and write
7FFD9BCEF000
trusted library allocation
page read and write
7FFD9B915000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
820310E000
stack
page read and write
7FFD9B935000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
2B8477F9000
heap
page read and write
336F000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
2B83075E000
trusted library allocation
page read and write
3020000
heap
page execute and read and write
7FFD9BAB2000
trusted library allocation
page read and write
13ADBCB8000
heap
page read and write
2B847934000
heap
page read and write
7FFD9B96F000
trusted library allocation
page read and write
2DE0000
heap
page read and write
1B6D0000
heap
page read and write
1A758949000
trusted library allocation
page read and write
1C100000
heap
page read and write
3086000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
1A76712C000
trusted library allocation
page read and write
14AF000
stack
page read and write
7FFD9B9BA000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9BCE7000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
2B82D4FD000
heap
page read and write
3464000
trusted library allocation
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
13041000
trusted library allocation
page read and write
1C702000
heap
page read and write
2D60000
unkown
page readonly
7FFD9BD60000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B8DF000
trusted library allocation
page execute and read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
2B83F3D1000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
12EAC000
trusted library allocation
page read and write
221457C000
stack
page read and write
149E7973000
direct allocation
page read and write
1365B000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
23E3B58B000
heap
page read and write
14AE1108000
trusted library allocation
page read and write
1458000
heap
page read and write
1166000
heap
page read and write
14AE8EC7000
heap
page read and write
D738FC000
stack
page read and write
13D0000
heap
page read and write
14AE1084000
trusted library allocation
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
14AE104B000
trusted library allocation
page read and write
1A756FF0000
heap
page execute and read and write
1BA3E000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9B94F000
trusted library allocation
page read and write
1A767565000
trusted library allocation
page read and write
14AE1144000
trusted library allocation
page read and write
23E23358000
trusted library allocation
page read and write
23E3342D000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
13539000
trusted library allocation
page read and write
149E790B000
heap
page read and write
317E000
trusted library allocation
page read and write
DAB3F5000
stack
page read and write
1A7551CD000
heap
page read and write
13686000
trusted library allocation
page read and write
13AC55B1000
trusted library allocation
page read and write
2884000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
7FFD9B961000
trusted library allocation
page read and write
1BA24000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1A767525000
trusted library allocation
page read and write
7FFD9B966000
trusted library allocation
page read and write
1008BE000
stack
page read and write
33C5000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1A76752C000
trusted library allocation
page read and write
1A7551FB000
heap
page read and write
380A000
trusted library allocation
page read and write
1C5FE000
stack
page read and write
7FFD9B8CF000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
B60000
heap
page read and write
1BEC8000
heap
page read and write
14AD1BF4000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
1A7674DD000
trusted library allocation
page read and write
2795000
trusted library allocation
page read and write
1C714000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
1C4FE000
stack
page read and write
1A758EE2000
trusted library allocation
page read and write
1A757CDC000
trusted library allocation
page read and write
7FFD9BB63000
trusted library allocation
page read and write
12621000
trusted library allocation
page read and write
1B3BD000
stack
page read and write
14B8000
heap
page read and write
23E33423000
trusted library allocation
page read and write
2CEE000
trusted library allocation
page read and write
3205000
trusted library allocation
page read and write
13AC4B53000
trusted library allocation
page read and write
1BEED000
heap
page read and write
3896000
trusted library allocation
page read and write
7FFD9B88F000
trusted library allocation
page execute and read and write
7FFD9B94F000
trusted library allocation
page read and write
14AE113A000
trusted library allocation
page read and write
1A757308000
trusted library allocation
page read and write
A02000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
14AD0AE0000
trusted library allocation
page read and write
2B82F1D4000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1BEBD000
heap
page read and write
37C6000
trusted library allocation
page read and write
C2D000
heap
page read and write
1A76F286000
heap
page read and write
1BF3E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
13ADBAC5000
heap
page read and write
2B847438000
heap
page read and write
2B830110000
trusted library allocation
page read and write
16B0000
heap
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
3224000
trusted library allocation
page read and write
1C039000
heap
page read and write
1BFE8000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2DCF000
trusted library allocation
page read and write
1A755380000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
3184000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
F4A58F8000
stack
page read and write
23E24F0C000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
13ADBDEA000
heap
page read and write
1A767544000
trusted library allocation
page read and write
7FFD9B899000
trusted library allocation
page execute and read and write
1D9BC000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B866000
trusted library allocation
page execute and read and write
149E78BE000
heap
page read and write
13AC3720000
heap
page read and write
E00000
heap
page read and write
14AE90B0000
heap
page read and write
11FE000
stack
page read and write
E76000
heap
page read and write
1B988000
heap
page read and write
1CBB0000
heap
page read and write
D70000
trusted library allocation
page read and write
F02000
heap
page read and write
2CFD000
trusted library allocation
page read and write
3066000
trusted library allocation
page read and write
2B830431000
trusted library allocation
page read and write
10160E000
stack
page read and write
2F7E000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
7FFD9B939000
trusted library allocation
page read and write
2B8478F9000
heap
page read and write
7FFD9B894000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page read and write
13AC197B000
heap
page read and write
23E3B36C000
heap
page read and write
DF0000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
1BE20000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
332A000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
14AD0EB8000
trusted library allocation
page read and write
7FFD9B93D000
trusted library allocation
page read and write
12FEB000
trusted library allocation
page read and write
319923F000
stack
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
12C5B000
trusted library allocation
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
DC0000
heap
page read and write
1A767502000
trusted library allocation
page read and write
13ADBA79000
heap
page read and write
164B000
heap
page read and write
18EAA68A000
heap
page read and write
18EAA675000
heap
page read and write
1440000
trusted library allocation
page read and write
1B956000
heap
page read and write
149E78AD000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
10A0000
heap
page read and write
7FFD9B899000
trusted library allocation
page execute and read and write
2B8311C1000
trusted library allocation
page read and write
1A76758B000
trusted library allocation
page read and write
13AC3700000
heap
page readonly
1159000
heap
page read and write
23E3B5EE000
heap
page read and write
12C61000
trusted library allocation
page read and write
2973000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
100839000
stack
page read and write
23E212AB000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
F4A593E000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B937000
trusted library allocation
page read and write
18D0000
heap
page read and write
13ADBDD9000
heap
page read and write
7FFD9B8BF000
trusted library allocation
page execute and read and write
14AE10DB000
trusted library allocation
page read and write
14AE0CB1000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
12D11000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page execute and read and write
7FFD9B8C3000
trusted library allocation
page execute and read and write
1C138000
heap
page read and write
1A7552A9000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
13AC3C5D000
trusted library allocation
page read and write
1320000
heap
page read and write
23E212AF000
heap
page read and write
10CF000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1A7673CF000
trusted library allocation
page read and write
14AD0A70000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
13ADBDDB000
heap
page read and write
1110000
heap
page read and write
31B1000
trusted library allocation
page read and write
2B82D4B8000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
14AE1086000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
12C57000
trusted library allocation
page read and write
2B8477C0000
heap
page read and write
149E78AA000
heap
page read and write
1B02000
heap
page read and write
149E78A9000
heap
page read and write
2C23000
trusted library allocation
page read and write
1A767496000
trusted library allocation
page read and write
1C0C3000
heap
page read and write
29EB000
trusted library allocation
page read and write
13AC1948000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1C330000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
ECD000
heap
page read and write
1A76F35D000
heap
page read and write
24E0000
trusted library allocation
page read and write
1B860000
unkown
page readonly
1C602000
heap
page execute and read and write
29CB000
trusted library allocation
page read and write
2B84744D000
heap
page read and write
7FFD9BD4B000
trusted library allocation
page read and write
7FFD9B8B3000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
DAB7FE000
stack
page read and write
7FFD9B935000
trusted library allocation
page read and write
2952000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
13AC4707000
trusted library allocation
page read and write
23E3B2B1000
heap
page read and write
3926000
trusted library allocation
page read and write
12881000
trusted library allocation
page read and write
117C000
heap
page read and write
7FFD9B94A000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
1A7670E1000
trusted library allocation
page read and write
315E000
trusted library allocation
page read and write
2B830642000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
13ADBDE6000
heap
page read and write
1D8BB000
stack
page read and write
27EB000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
333C000
trusted library allocation
page read and write
1A76F470000
heap
page read and write
C20000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
15C3000
heap
page read and write
1B31B000
heap
page read and write
14AE102B000
trusted library allocation
page read and write
3857000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
13586000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
149E7810000
direct allocation
page read and write
7FFD9B966000
trusted library allocation
page read and write
7FFD9B8B7000
trusted library allocation
page execute and read and write
E6F000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
134F1000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
7FFD9B8BF000
trusted library allocation
page execute and read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
23E21370000
heap
page read and write
7FFD9B94C000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
23E23120000
heap
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
820207E000
stack
page read and write
14AE0FE7000
trusted library allocation
page read and write
A10000
unkown
page readonly
7FFD9B900000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
1F0A8F70000
trusted library allocation
page read and write
12B6000
heap
page read and write
10FF000
stack
page read and write
130A1000
trusted library allocation
page read and write
FD0000
heap
page read and write
3162000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
2F7C000
trusted library allocation
page read and write
1BEE3000
heap
page read and write
3360000
trusted library allocation
page read and write
14ACED00000
heap
page read and write
13083000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
33A9000
trusted library allocation
page read and write
14AD2413000
trusted library allocation
page read and write
23E3B694000
heap
page read and write
AF3000
stack
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
9DF000
stack
page read and write
128C000
heap
page read and write
7FFD9B933000
trusted library allocation
page read and write
14AE910B000
heap
page read and write
23E23070000
heap
page execute and read and write
CD9000
heap
page read and write
7FFD9BAE8000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
149E78C0000
heap
page read and write
23E33161000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9B96C000
trusted library allocation
page read and write
1A767509000
trusted library allocation
page read and write
149E7AB0000
heap
page read and write
14AE1029000
trusted library allocation
page read and write
23E24434000
trusted library allocation
page read and write
14AE112A000
trusted library allocation
page read and write
307A000
trusted library allocation
page read and write
15AF000
stack
page read and write
14AD0D17000
trusted library allocation
page read and write
149E78BD000
heap
page read and write
10B4000
heap
page read and write
1B5BD000
stack
page read and write
A10000
unkown
page readonly
2B830B22000
trusted library allocation
page read and write
E7B000
heap
page read and write
1A76F225000
heap
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
ABB000
heap
page read and write
14ACED6D000
heap
page read and write
23E3B569000
heap
page read and write
2DBE000
trusted library allocation
page read and write
13ADBA20000
heap
page read and write
149E78AD000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
2B82FFA2000
trusted library allocation
page read and write
7FFD9B8D7000
trusted library allocation
page execute and read and write
316A000
trusted library allocation
page read and write
13AC50E0000
trusted library allocation
page read and write
2F8E000
stack
page read and write
37C9000
trusted library allocation
page read and write
1BAB0000
heap
page execute and read and write
2CDA000
trusted library allocation
page read and write
37A2000
trusted library allocation
page read and write
1B100000
heap
page read and write
22150CE000
stack
page read and write
7FFD9B966000
trusted library allocation
page read and write
AEC000
heap
page read and write
7FFD9B925000
trusted library allocation
page read and write
F4A57F9000
stack
page read and write
309A000
trusted library allocation
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
149E78EA000
heap
page read and write
14AE10DD000
trusted library allocation
page read and write
1C102000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
C24000
heap
page read and write
23E235FC000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
13461000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
14ACED58000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B94F000
trusted library allocation
page read and write
112F000
heap
page read and write
13037000
trusted library allocation
page read and write
29D9000
trusted library allocation
page read and write
1F0A8FB0000
remote allocation
page read and write
1A767457000
trusted library allocation
page read and write
7FFD9B943000
trusted library allocation
page read and write
13ADBABD000
heap
page read and write
1B9FE000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
F4A52C3000
stack
page read and write
12EA7000
trusted library allocation
page read and write
1220000
heap
page read and write
7FFD9B773000
trusted library allocation
page read and write
13ADBCBC000
heap
page read and write
820330C000
stack
page read and write
31990B7000
stack
page read and write
1B13000
heap
page read and write
14AE1071000
trusted library allocation
page read and write
14AE1045000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
16DD000
heap
page read and write
31CB000
trusted library allocation
page read and write
14EE000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
2797000
trusted library allocation
page read and write
1BF53000
heap
page read and write
E7D000
heap
page read and write
14AE905E000
heap
page read and write
1BB44000
heap
page read and write
2D92000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
1140000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
3623000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
14AE10C7000
trusted library allocation
page read and write
100073000
stack
page read and write
7FFD9BB8A000
trusted library allocation
page read and write
2B82D6E5000
heap
page read and write
2E10000
unkown
page readonly
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B961000
trusted library allocation
page read and write
149E7839000
direct allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
111A000
heap
page read and write
1B92E000
stack
page read and write
82022F9000
stack
page read and write
DC0000
heap
page read and write
14AE108A000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
7FFD9B8C1000
trusted library allocation
page execute and read and write
1DEBB000
stack
page read and write
1A767527000
trusted library allocation
page read and write
14AE1132000
trusted library allocation
page read and write
13AC4703000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1046000
heap
page read and write
13AC36D0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
1A7575AC000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1A758F07000
trusted library allocation
page read and write
2B83F3D4000
trusted library allocation
page read and write
134A1000
trusted library allocation
page read and write
7FFD9B8AF000
trusted library allocation
page execute and read and write
7FFD9B93D000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1A755235000
heap
page read and write
1B808000
heap
page read and write
1660000
heap
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
31C9000
trusted library allocation
page read and write
1A76F223000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
1A7570E1000
trusted library allocation
page read and write
129F000
stack
page read and write
14AE10EF000
trusted library allocation
page read and write
2DC7000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
14AE910F000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
D02000
heap
page read and write
1010000
heap
page read and write
23E3B373000
heap
page read and write
2BB5000
trusted library allocation
page read and write
1C6FE000
stack
page read and write
130F6000
trusted library allocation
page read and write
7FFD9B951000
trusted library allocation
page read and write
10CD000
heap
page read and write
2B82D4F3000
heap
page read and write
2E4B000
trusted library allocation
page read and write
2B83F851000
trusted library allocation
page read and write
F4A5A3A000
stack
page read and write
2B0A000
trusted library allocation
page read and write
3A8E000
trusted library allocation
page read and write
7FFD9B8AA000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
13ADBDF8000
heap
page read and write
13AD3791000
trusted library allocation
page read and write
1A7674B8000
trusted library allocation
page read and write
149E7907000
heap
page read and write
1C702000
heap
page read and write
2B83F6AD000
trusted library allocation
page read and write
14AD244E000
trusted library allocation
page read and write
274A000
trusted library allocation
page read and write
1A7551ED000
heap
page read and write
171F000
stack
page read and write
12E0B000
trusted library allocation
page read and write
1A76750F000
trusted library allocation
page read and write
E24000
heap
page read and write
1A7674D1000
trusted library allocation
page read and write
14AD0C80000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B8AF000
trusted library allocation
page execute and read and write
7FFD9B9A4000
trusted library allocation
page read and write
13AC48B0000
trusted library allocation
page read and write
13ADBA30000
heap
page execute and read and write
7FFD9BDA0000
trusted library allocation
page execute and read and write
2D9E000
trusted library allocation
page read and write
7FFD9B886000
trusted library allocation
page execute and read and write
7FFD9B826000
trusted library allocation
page read and write
1C5C0000
heap
page execute and read and write
E9B000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
300F000
stack
page read and write
1C735000
heap
page read and write
13AC39B8000
trusted library allocation
page read and write
12811000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
13520000
trusted library allocation
page read and write
10158C000
stack
page read and write
315E000
trusted library allocation
page read and write
1146000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B8E1000
trusted library allocation
page execute and read and write
1C155000
heap
page read and write
10EC000
heap
page read and write
2C69000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
12AA1000
trusted library allocation
page read and write
7FFD9B91D000
trusted library allocation
page read and write
1BEBB000
heap
page read and write
110A000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
13AC1987000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B919000
trusted library allocation
page read and write
149E78D5000
heap
page read and write
14AE8DA0000
heap
page read and write
7FFD9B939000
trusted library allocation
page read and write
2B82D5E0000
heap
page readonly
7FFD9BB90000
trusted library allocation
page read and write
23E23097000
heap
page execute and read and write
1A767507000
trusted library allocation
page read and write
23E23B81000
trusted library allocation
page read and write
14AD0B60000
heap
page execute and read and write
1B872000
unkown
page readonly
7FFD9B9C3000
trusted library allocation
page read and write
7FFD9B8D7000
trusted library allocation
page execute and read and write
16B4000
heap
page read and write
3362000
trusted library allocation
page read and write
14AE10D4000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
7FFD9B95F000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
23E212CB000
heap
page read and write
149E7A3B000
direct allocation
page read and write
643000
heap
page read and write
7FFD9B972000
trusted library allocation
page read and write
1B5CF000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
316F000
trusted library allocation
page read and write
2AD9000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
23E3B500000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
12AA7000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
7FFD9B8B9000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2DB5000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
10DF000
heap
page read and write
23E3B53A000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
29C2000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
14AE0CDC000
trusted library allocation
page read and write
2B8303CD000
trusted library allocation
page read and write
14AD19A1000
trusted library allocation
page read and write
14AE8E19000
heap
page read and write
AA5000
heap
page read and write
7FFD9B91D000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
2B8304C0000
trusted library allocation
page read and write
149E7A4F000
direct allocation
page read and write
13AC439D000
trusted library allocation
page read and write
E2D000
heap
page read and write
13ADBA92000
heap
page read and write
23E22C10000
heap
page read and write
1BB56000
heap
page read and write
F4A5D3B000
stack
page read and write
31992BF000
stack
page read and write
F4A567E000
stack
page read and write
7FFD9BD40000
trusted library allocation
page read and write
11F0000
heap
page read and write
13AC1B50000
heap
page read and write
7FFD9B917000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
1B5E6000
heap
page read and write
101507000
stack
page read and write
2DC0000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
1A02000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
3522000
trusted library allocation
page read and write
131EB000
trusted library allocation
page read and write
1A76F430000
heap
page read and write
14AE9109000
heap
page read and write
7FFD9B915000
trusted library allocation
page read and write
3198DFA000
stack
page read and write
E65000
heap
page read and write
2B82D50D000
heap
page read and write
14AD1C01000
trusted library allocation
page read and write
1A76F650000
trusted library allocation
page read and write
2B8477D0000
heap
page read and write
7FFD9B939000
trusted library allocation
page read and write
14AE91F0000
trusted library allocation
page read and write
E13000
heap
page read and write
F4A678E000
stack
page read and write
D73AFF000
stack
page read and write
7FFD9B8B4000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
1A76F327000
heap
page execute and read and write
1BDE0000
heap
page execute and read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
3197000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
13A0000
heap
page read and write
7FFD9B8AA000
trusted library allocation
page execute and read and write
2D14000
trusted library allocation
page read and write
1A767520000
trusted library allocation
page read and write
7DF4D7020000
trusted library allocation
page execute and read and write
E99000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1000FE000
unkown
page read and write
133E2000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1A76F45E000
heap
page read and write
1C7FE000
stack
page read and write
3180000
trusted library allocation
page read and write
14ACED92000
heap
page read and write
1A76F50F000
heap
page read and write
1A7673DD000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
2742000
trusted library allocation
page read and write
149E789E000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9B94C000
trusted library allocation
page read and write
1473000
heap
page read and write
1A758A31000
trusted library allocation
page read and write
2B82D330000
heap
page read and write
A55000
unkown
page readonly
10F6000
heap
page read and write
30DE000
trusted library allocation
page read and write
13AC499F000
trusted library allocation
page read and write
820273B000
stack
page read and write
260E000
stack
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
2B82D660000
heap
page read and write
14AD25DC000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
15C5000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
100479000
stack
page read and write
2B830119000
trusted library allocation
page read and write
1AF1D000
stack
page read and write
1502000
heap
page read and write
14AD24F8000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
149E790B000
heap
page read and write
1A758074000
trusted library allocation
page read and write
1A76F2A7000
heap
page read and write
2B82D4B0000
heap
page read and write
1A76F506000
heap
page read and write
14AE0E91000
trusted library allocation
page read and write
C60000
heap
page read and write
CFF000
stack
page read and write
13ADBB2D000
heap
page read and write
14AE1128000
trusted library allocation
page read and write
2E29000
heap
page read and write
331E000
trusted library allocation
page read and write
2B847871000
heap
page read and write
23E21170000
heap
page read and write
14AE10E4000
trusted library allocation
page read and write
13AC55B6000
trusted library allocation
page read and write
31E0000
heap
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
1C711000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1A767498000
trusted library allocation
page read and write
7FFD9B89F000
trusted library allocation
page execute and read and write
1B5D0000
heap
page read and write
23E3B606000
heap
page read and write
14AE0F85000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
14AE0C91000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
1A767518000
trusted library allocation
page read and write
7FFD9B8B3000
trusted library allocation
page execute and read and write
9F3000
stack
page read and write
149E78D5000
heap
page read and write
1A767575000
trusted library allocation
page read and write
7FFD9B8CA000
trusted library allocation
page execute and read and write
7FFD9B92D000
trusted library allocation
page read and write
149E789E000
heap
page read and write
1F0A8E18000
trusted library allocation
page read and write
1BFA6000
heap
page read and write
15B0000
trusted library allocation
page read and write
1A758417000
trusted library allocation
page read and write
7FFD9B919000
trusted library allocation
page read and write
100ABB000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
14B6000
heap
page read and write
DE0000
heap
page read and write
7FFD9B98C000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2DF0000
heap
page execute and read and write
189E000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
16CF74F0000
heap
page read and write
14AE1111000
trusted library allocation
page read and write
149E76A0000
heap
page read and write
23E3B369000
heap
page read and write
13AD3805000
trusted library allocation
page read and write
149EA1E0000
direct allocation
page read and write
287A000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
13ADB790000
trusted library allocation
page read and write
1F0A8E54000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
1450000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
14AE8FE2000
heap
page read and write
14AE10F5000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
14AE1106000
trusted library allocation
page read and write
7FFD9BD70000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
14AE10BC000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
1051000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B917000
trusted library allocation
page read and write
149E78E6000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1560000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
37AC000
trusted library allocation
page read and write
2B847510000
heap
page read and write
7DF4A6740000
trusted library allocation
page execute and read and write
13AC501F000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
100579000
stack
page read and write
2BF4000
trusted library allocation
page read and write
E11000
heap
page read and write
13AC1A33000
heap
page read and write
7FFD9BD3B000
trusted library allocation
page read and write
14AE912C000
heap
page read and write
2DAF000
trusted library allocation
page read and write
7FFD9B961000
trusted library allocation
page read and write
2B847926000
heap
page read and write
7DF4D7010000
trusted library allocation
page execute and read and write
1A7673D3000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1F0A8E50000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1A767111000
trusted library allocation
page read and write
149E7990000
direct allocation
page read and write
1A767599000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
1B960000
heap
page execute and read and write
2DC2000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
23E22C75000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
18FF000
stack
page read and write
13AC1981000
heap
page read and write
2B847907000
heap
page read and write
2B847530000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1C37E000
stack
page read and write
7FFD9B992000
trusted library allocation
page read and write
319943C000
stack
page read and write
1C091000
heap
page read and write
13ADBC60000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B992000
trusted library allocation
page read and write
7FFD9BD70000
trusted library allocation
page read and write
149E7AC0000
heap
page read and write
23E231B5000
trusted library allocation
page read and write
110A000
heap
page read and write
7FFD9B939000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
23E22BE0000
trusted library allocation
page read and write
29C9000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
7FFD9B937000
trusted library allocation
page read and write
14AD1888000
trusted library allocation
page read and write
2C63000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B886000
trusted library allocation
page execute and read and write
7FFD9B959000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
1B92B000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
12611000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1626000
heap
page read and write
3342000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
7FFD9B933000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2BEE000
trusted library allocation
page read and write
1A755150000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
13201000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
1A758EBD000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
2B847830000
heap
page read and write
1004FE000
stack
page read and write
7FFD9B8C3000
trusted library allocation
page execute and read and write
B0A000
heap
page read and write
E44000
heap
page read and write
369B000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
1C01D000
heap
page read and write
14ACED94000
heap
page read and write
1A76756F000
trusted library allocation
page read and write
1C0A2000
heap
page read and write
2B847852000
heap
page read and write
7FFD9B96F000
trusted library allocation
page read and write
C76000
heap
page read and write
7FFD9B8B4000
trusted library allocation
page execute and read and write
276F000
trusted library allocation
page read and write
126F6000
trusted library allocation
page read and write
14ACED9A000
heap
page read and write
3353000
trusted library allocation
page read and write
F4A5AB9000
stack
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9BAF2000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
12F41000
trusted library allocation
page read and write
14AE1088000
trusted library allocation
page read and write
14AD115D000
trusted library allocation
page read and write
1A76F5B8000
heap
page read and write
7DF4C4EF0000
trusted library allocation
page execute and read and write
F4A577E000
stack
page read and write
1A767557000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
14AE1120000
trusted library allocation
page read and write
13AD3A9C000
trusted library allocation
page read and write
366B000
trusted library allocation
page read and write
13AC3710000
trusted library allocation
page read and write
14AE0F7A000
trusted library allocation
page read and write
1BFD7000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
13ADBB09000
heap
page read and write
7FFD9B91D000
trusted library allocation
page read and write
1A755190000
heap
page read and write
EB2000
heap
page read and write
2B8306D7000
trusted library allocation
page read and write
1B9CD000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
DA0000
heap
page read and write
9E0000
heap
page read and write
1C11D000
stack
page read and write
FCF000
stack
page read and write
2C12000
trusted library allocation
page read and write
82025BE000
stack
page read and write
23E22B70000
heap
page read and write
1A767559000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
14AD0A90000
trusted library allocation
page read and write
14AE9126000
heap
page read and write
13AC1D45000
heap
page read and write
2BF6000
trusted library allocation
page read and write
23E3B340000
heap
page read and write
2B4E000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B939000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
380E000
trusted library allocation
page read and write
14AE10B8000
trusted library allocation
page read and write
13AC4A69000
trusted library allocation
page read and write
7FFD9B8A9000
trusted library allocation
page execute and read and write
1A76747A000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
23E24A80000
trusted library allocation
page read and write
221437A000
stack
page read and write
1B8E0000
heap
page read and write
14AE10CF000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
14AD0715000
heap
page read and write
E48000
heap
page read and write
7FFD9B8E1000
trusted library allocation
page execute and read and write
2B83F3C1000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
149E79F0000
direct allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
1475000
heap
page read and write
1A7674A6000
trusted library allocation
page read and write
13ADBA40000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1A767581000
trusted library allocation
page read and write
1A75849E000
trusted library allocation
page read and write
12817000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
319903E000
stack
page read and write
149E78B0000
heap
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
3351000
trusted library allocation
page read and write
1545000
heap
page read and write
13AC46EE000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
12EC1000
trusted library allocation
page read and write
12B86000
trusted library allocation
page read and write
2C59000
trusted library allocation
page read and write
136E6000
trusted library allocation
page read and write
14AE8FD0000
heap
page read and write
3096000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page read and write
149E7905000
heap
page read and write
14AD25E0000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
14AE0F8D000
trusted library allocation
page read and write
23E2415D000
trusted library allocation
page read and write
1A7674A8000
trusted library allocation
page read and write
1A7674AE000
trusted library allocation
page read and write
2B82D610000
heap
page read and write
7FFD9B773000
trusted library allocation
page read and write
1A767515000
trusted library allocation
page read and write
1A76F320000
heap
page execute and read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
1C602000
heap
page execute and read and write
C40000
heap
page read and write
13008000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
2D72000
unkown
page readonly
2213EFE000
unkown
page read and write
2B82D537000
heap
page read and write
2B8304FF000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
2B8303A1000
trusted library allocation
page read and write
7FFD9B8E3000
trusted library allocation
page execute and read and write
149E7780000
heap
page read and write
137FB000
trusted library allocation
page read and write
1160000
heap
page read and write
1B7E0000
heap
page read and write
2E80000
heap
page read and write
1A76750B000
trusted library allocation
page read and write
16EFC7F000
stack
page read and write
2B82FFD0000
trusted library allocation
page read and write
3344000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
23E212F2000
heap
page read and write
2E12000
unkown
page readonly
14AD06F0000
heap
page read and write
2E55000
trusted library allocation
page read and write
1613000
heap
page read and write
29AF000
trusted library allocation
page read and write
13AC470B000
trusted library allocation
page read and write
2D69000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
295E000
trusted library allocation
page read and write
B02000
heap
page read and write
14AD2057000
trusted library allocation
page read and write
1702000
heap
page read and write
14AE8E85000
heap
page read and write
23E240C6000
trusted library allocation
page read and write
1113000
heap
page read and write
13021000
trusted library allocation
page read and write
1A7674D9000
trusted library allocation
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
16CF7569000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1011000
heap
page read and write
8F4000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B9AA000
trusted library allocation
page read and write
7DF45C390000
trusted library allocation
page execute and read and write
31B3000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
13ADBD02000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
E51000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
1A767529000
trusted library allocation
page read and write
1A76F750000
heap
page read and write
338B000
trusted library allocation
page read and write
10C0000
heap
page read and write
3367000
trusted library allocation
page read and write
7FFD9B9E4000
trusted library allocation
page read and write
7DF494B80000
trusted library allocation
page execute and read and write
1002000
heap
page read and write
1A767547000
trusted library allocation
page read and write
23E21555000
heap
page read and write
12BB1000
trusted library allocation
page read and write
7FFD9B88F000
trusted library allocation
page execute and read and write
384D000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
14AE8ED2000
heap
page read and write
14AE8DD5000
heap
page read and write
1568000
heap
page read and write
23E22FF0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
14AE110A000
trusted library allocation
page read and write
82021FB000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page read and write
1BB00000
heap
page read and write
2D80000
heap
page execute and read and write
13391000
trusted library allocation
page read and write
F4A688D000
stack
page read and write
13AC199B000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9BCF7000
trusted library allocation
page read and write
149E78A7000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
18D5000
heap
page read and write
13AC1940000
heap
page read and write
31989C3000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B953000
trusted library allocation
page read and write
1A7674BE000
trusted library allocation
page read and write
14AE8EC0000
heap
page read and write
7FFD9B8C3000
trusted library allocation
page execute and read and write
13AC197F000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
3815000
trusted library allocation
page read and write
1A25000
heap
page read and write
14AD2AB6000
trusted library allocation
page read and write
82024B9000
stack
page read and write
C99000
heap
page read and write
14AE8E23000
heap
page read and write
13AC1A50000
heap
page read and write
3AC1000
trusted library allocation
page read and write
27CB000
trusted library allocation
page read and write
1A76757B000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
1C8BF000
stack
page read and write
7FFD9B8E1000
trusted library allocation
page execute and read and write
1A767101000
trusted library allocation
page read and write
23E24F51000
trusted library allocation
page read and write
1001FF000
stack
page read and write
7FFD9BCC2000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
1347E000
trusted library allocation
page read and write
1540000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
135F0000
trusted library allocation
page read and write
1B0CD000
stack
page read and write
1770000
heap
page read and write
3182000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
2DC8000
unkown
page readonly
13AC3791000
trusted library allocation
page read and write
3164000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
678000
heap
page read and write
E40000
heap
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
14AE1069000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
14AE1126000
trusted library allocation
page read and write
1370000
heap
page read and write
14AE1094000
trusted library allocation
page read and write
3199E0E000
stack
page read and write
2E20000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
12E41000
trusted library allocation
page read and write
2AB8000
trusted library allocation
page read and write
1A76F478000
heap
page read and write
2F55000
trusted library allocation
page read and write
1A76F251000
heap
page read and write
36D4000
trusted library allocation
page read and write
1CBBC000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1F0A8E28000
trusted library allocation
page read and write
14AE10C2000
trusted library allocation
page read and write
3612000
trusted library allocation
page read and write
14AE10F8000
trusted library allocation
page read and write
EA6000
heap
page read and write
22143F9000
stack
page read and write
1B7D0000
heap
page execute and read and write
1F0A8FB0000
remote allocation
page read and write
1A7673ED000
trusted library allocation
page read and write
149E77A0000
heap
page read and write
27F0000
trusted library allocation
page read and write
14AE1080000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
12BA7000
trusted library allocation
page read and write
1A756F70000
trusted library allocation
page read and write
13814000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
CB4000
heap
page read and write
13ADBD50000
heap
page read and write
149E789E000
heap
page read and write
3198D7E000
stack
page read and write
14AD1878000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1A767591000
trusted library allocation
page read and write
149EA1C5000
direct allocation
page read and write
2A84000
trusted library allocation
page read and write
820338E000
stack
page read and write
31F1000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
1C05D000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
F4A5CBE000
stack
page read and write
2B82F390000
heap
page execute and read and write
1C167000
heap
page read and write
3624000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
23E23DBA000
trusted library allocation
page read and write
D90000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
7FFD9B95E000
trusted library allocation
page read and write
143E000
stack
page read and write
1376D000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
1013000
heap
page read and write
221417B000
stack
page read and write
1BAC0000
heap
page read and write
F4A698E000
stack
page read and write
18EAA688000
heap
page read and write
7FFD9BC50000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
14AE9017000
heap
page read and write
7FFD9BD50000
trusted library allocation
page read and write
102D000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
350A000
trusted library allocation
page read and write
148C000
heap
page read and write
7FFD9B8E3000
trusted library allocation
page execute and read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
3AA4000
trusted library allocation
page read and write
1BA02000
heap
page execute and read and write
13ADBAE2000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
3198E7E000
stack
page read and write
14AD1BFC000
trusted library allocation
page read and write
14AE105F000
trusted library allocation
page read and write
23E3B656000
heap
page read and write
313E000
trusted library allocation
page read and write
1A76757D000
trusted library allocation
page read and write
14AE110C000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1335000
heap
page read and write
B20000
heap
page read and write
3171000
trusted library allocation
page read and write
1A76759C000
trusted library allocation
page read and write
14AE10D6000
trusted library allocation
page read and write
2D05000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B915000
trusted library allocation
page read and write
149E7A90000
direct allocation
page read and write
2B83F7EF000
trusted library allocation
page read and write
179D000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
23E3B2CF000
heap
page read and write
149E78DB000
heap
page read and write
111F000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
14AE0E79000
trusted library allocation
page read and write
63C000
heap
page read and write
2B83F416000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
1651000
heap
page read and write
1678000
heap
page read and write
1F0A8EE0000
trusted library allocation
page read and write
2B82F5C9000
trusted library allocation
page read and write
132A1000
trusted library allocation
page read and write
13ADBDC5000
heap
page read and write
7FFD9B899000
trusted library allocation
page execute and read and write
1A76F268000
heap
page read and write
1C43F000
stack
page read and write
2B8305AF000
trusted library allocation
page read and write
3198C7E000
unkown
page read and write
7FFD9BC40000
trusted library allocation
page read and write
9C0000
heap
page read and write
14AD1D87000
trusted library allocation
page read and write
1A76F1F0000
heap
page read and write
2B8306A4000
trusted library allocation
page read and write
1BBC0000
heap
page read and write
16CF74E0000
heap
page read and write
1A767571000
trusted library allocation
page read and write
14AE1057000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
131F1000
trusted library allocation
page read and write
7FFD9B939000
trusted library allocation
page read and write
14AD1D4D000
trusted library allocation
page read and write
1A76F525000
heap
page read and write
2C06000
trusted library allocation
page read and write
14AD0B70000
heap
page read and write
C3C000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
2B82D430000
heap
page read and write
1A758171000
trusted library allocation
page read and write
F4A6807000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B939000
trusted library allocation
page read and write
23E212B5000
heap
page read and write
1A76755D000
trusted library allocation
page read and write
13AC4A32000
trusted library allocation
page read and write
22145FE000
stack
page read and write
1000000
heap
page read and write
2CF2000
trusted library allocation
page read and write
2B82D647000
heap
page execute and read and write
2B8B000
trusted library allocation
page read and write
23E24250000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
1B933000
heap
page execute and read and write
8201CE3000
stack
page read and write
1B862000
unkown
page readonly
7FFD9B946000
trusted library allocation
page read and write
3199E8E000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
2B82D4ED000
heap
page read and write
7FFD9BAA2000
trusted library allocation
page read and write
393C000
trusted library allocation
page read and write
14AE107D000
trusted library allocation
page read and write
23E21353000
heap
page read and write
2B82F86D000
trusted library allocation
page read and write
1041000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B953000
trusted library allocation
page read and write
3ABF000
trusted library allocation
page read and write
12E37000
trusted library allocation
page read and write
1A7674C8000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
2B82D665000
heap
page read and write
2E3F000
trusted library allocation
page read and write
820263C000
stack
page read and write
7FFD9B899000
trusted library allocation
page execute and read and write
2E19000
trusted library allocation
page read and write
7FFD9B8B9000
trusted library allocation
page execute and read and write
1BE02000
heap
page execute and read and write
1380000
trusted library allocation
page read and write
14AD1D81000
trusted library allocation
page read and write
2B8473CD000
heap
page read and write
1102000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1C8E0000
trusted library allocation
page read and write
7FFD9B8AF000
trusted library allocation
page execute and read and write
1C0EC000
heap
page read and write
2CF0000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
2DA2000
unkown
page readonly
7FFD9BA30000
trusted library allocation
page read and write
9E0000
heap
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
B13000
heap
page read and write
ABE000
heap
page read and write
27C9000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
317E000
trusted library allocation
page read and write
13AC4A65000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
14AE112E000
trusted library allocation
page read and write
133A1000
trusted library allocation
page read and write
23E3B5D7000
heap
page read and write
13AC1B30000
heap
page read and write
7FFD9B96F000
trusted library allocation
page read and write
14AE0F83000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
2B82D640000
heap
page execute and read and write
1A7551EF000
heap
page read and write
7FFD9B8C1000
trusted library allocation
page execute and read and write
14AE8C9D000
heap
page read and write
1180000
heap
page read and write
1A758F02000
trusted library allocation
page read and write
2D03000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
7FFD9B915000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1A76750D000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
23E33151000
trusted library allocation
page read and write
2809000
heap
page read and write
24F0000
heap
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
BE0000
heap
page execute and read and write
1B9C0000
heap
page read and write
2B82D6E0000
heap
page read and write
14ACED90000
heap
page read and write
14AE105A000
trusted library allocation
page read and write
2666000
trusted library allocation
page read and write
1C8FB000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1A7570D0000
heap
page read and write
C11000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
2ADD000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B8B7000
trusted library allocation
page execute and read and write
3028000
trusted library allocation
page read and write
2B83F3EC000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2BEC000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
82023B6000
stack
page read and write
3172000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
14AE10FF000
trusted library allocation
page read and write
1A76757F000
trusted library allocation
page read and write
3B77000
trusted library allocation
page read and write
2975000
trusted library allocation
page read and write
132D6000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
1BA06000
heap
page read and write
7FFD9B974000
trusted library allocation
page read and write
14AE10CD000
trusted library allocation
page read and write
12617000
trusted library allocation
page read and write
1A76F46A000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
2991000
trusted library allocation
page read and write
134A7000
trusted library allocation
page read and write
7FFD9B88F000
trusted library allocation
page execute and read and write
2825000
trusted library allocation
page read and write
319A00D000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9B8E3000
trusted library allocation
page execute and read and write
1A756C25000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
349E000
stack
page read and write
1A76F21E000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
125F000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
23E24959000
trusted library allocation
page read and write
319A08E000
stack
page read and write
2C5B000
trusted library allocation
page read and write
1205000
heap
page read and write
2C27000
trusted library allocation
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
130A000
heap
page read and write
7FFD9BD40000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
8203207000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
23E3B62C000
heap
page read and write
100A3F000
stack
page read and write
275E000
trusted library allocation
page read and write
1A767593000
trusted library allocation
page read and write
1C31D000
stack
page read and write
1A76F355000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1291000
heap
page read and write
12AB1000
trusted library allocation
page read and write
1A76F0E0000
heap
page read and write
3151000
trusted library allocation
page read and write
7FFD9B927000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
149E7905000
heap
page read and write
149E7894000
heap
page read and write
3198CFE000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
613000
heap
page read and write
23E24306000
trusted library allocation
page read and write
11F0000
heap
page read and write
23E23090000
heap
page execute and read and write
7FFD9B836000
trusted library allocation
page read and write
ED7000
heap
page read and write
7FFD9B946000
trusted library allocation
page read and write
13AC3380000
heap
page read and write
12A81000
trusted library allocation
page read and write
1313000
heap
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
1BF6E000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1A756B80000
trusted library allocation
page read and write
1A76F2A3000
heap
page read and write
1DBC0000
heap
page read and write
149E78C0000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
7FFD9B8C3000
trusted library allocation
page execute and read and write
2D12000
trusted library allocation
page read and write
14AE1067000
trusted library allocation
page read and write
13AC36F0000
trusted library allocation
page read and write
6D4000
heap
page read and write
1619000
heap
page read and write
131CB000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
315C000
trusted library allocation
page read and write
1A756FA0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
23E3B676000
heap
page read and write
13AC5591000
trusted library allocation
page read and write
149E79D0000
direct allocation
page read and write
1A7674C3000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
2AD0000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1A767523000
trusted library allocation
page read and write
820328C000
stack
page read and write
14AE10AD000
trusted library allocation
page read and write
2A9E000
stack
page read and write
1647000
heap
page read and write
1BFB9000
heap
page read and write
1A76748C000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1A76F362000
heap
page read and write
7FFD9BAE4000
trusted library allocation
page read and write
F4A59B7000
stack
page read and write
1BE3E000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
7FFD9B8B4000
trusted library allocation
page execute and read and write
7FFD9B8AA000
trusted library allocation
page execute and read and write
1AFC0000
trusted library allocation
page read and write
A59000
unkown
page readonly
A88000
heap
page read and write
1C700000
heap
page read and write
12EE000
stack
page read and write
600000
heap
page read and write
2B8311A1000
trusted library allocation
page read and write
1600000
heap
page read and write
7FFD9B894000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
14ACEDD8000
heap
page read and write
1A76F350000
heap
page read and write
150A000
heap
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
148A000
heap
page read and write
10F0000
heap
page read and write
1760000
heap
page read and write
1A76F2F0000
heap
page execute and read and write
E3C000
heap
page read and write
14ACF0D5000
heap
page read and write
13ADBC90000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
14AE0E2F000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
13AC3816000
trusted library allocation
page read and write
1B48D000
stack
page read and write
AE8000
heap
page read and write
2B82FDF0000
trusted library allocation
page read and write
11B0000
heap
page read and write
14AD16E1000
trusted library allocation
page read and write
23E3317C000
trusted library allocation
page read and write
7FFD9B93F000
trusted library allocation
page read and write
1BF40000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
9E0000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
82026BF000
stack
page read and write
1970000
heap
page read and write
221504E000
stack
page read and write
318F000
trusted library allocation
page read and write
6B0000
heap
page read and write
7FFD9BD50000
trusted library allocation
page read and write
2B847818000
heap
page read and write
1BF02000
heap
page read and write
293E000
trusted library allocation
page read and write
149E7879000
heap
page read and write
1A767535000
trusted library allocation
page read and write
1F0A8E40000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
FF0000
heap
page read and write
329E000
trusted library allocation
page read and write
1A76F4FC000
heap
page read and write
3F0000
heap
page read and write
14AD0B20000
trusted library allocation
page read and write
12C0000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
23E24998000
trusted library allocation
page read and write
127CB000
trusted library allocation
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
100679000
stack
page read and write
1A767533000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
2D17000
trusted library allocation
page read and write
14AE0F9D000
trusted library allocation
page read and write
3603000
trusted library allocation
page read and write
6B8000
heap
page read and write
1A7674B6000
trusted library allocation
page read and write
1A76747C000
trusted library allocation
page read and write
131F7000
trusted library allocation
page read and write
294A000
trusted library allocation
page read and write
D20000
heap
page read and write
356B000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
1190000
heap
page read and write
1A767550000
trusted library allocation
page read and write
DD0000
heap
page read and write
161D000
heap
page read and write
7FFD9B8D7000
trusted library allocation
page execute and read and write
2CFB000
trusted library allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
13AC46F2000
trusted library allocation
page read and write
14AD0C91000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
151B000
stack
page read and write
7FFD9B946000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
1A76F4A6000
heap
page read and write
3175000
trusted library allocation
page read and write
1C77E000
stack
page read and write
31A6000
trusted library allocation
page read and write
276D000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
14AE1135000
trusted library allocation
page read and write
10160C000
stack
page read and write
23E33131000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
7FFD9B7B0000
trusted library allocation
page read and write
2B82D4F9000
heap
page read and write
8201DEF000
stack
page read and write
7FFD9B953000
trusted library allocation
page read and write
2B8478E7000
heap
page read and write
7FFD9B8E3000
trusted library allocation
page execute and read and write
625000
heap
page read and write
23E3B510000
heap
page read and write
7FFD9B8B9000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
12FE0000
trusted library allocation
page read and write
149E7A50000
direct allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
153E000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
1F0A411A000
heap
page read and write
13ADBCE0000
heap
page read and write
1A756BC0000
trusted library allocation
page read and write
27D9000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B941000
trusted library allocation
page read and write
13AC46FE000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1513000
heap
page read and write
34DC000
trusted library allocation
page read and write
1B200000
heap
page read and write
10D7000
heap
page read and write
3162000
trusted library allocation
page read and write
7FFD9B9C7000
trusted library allocation
page read and write
1B71F000
heap
page read and write
103E000
heap
page read and write
13AC1A24000
heap
page read and write
7FFD9B93D000
trusted library allocation
page read and write
10F3000
stack
page read and write
DA0000
heap
page read and write
7FFD9B894000
trusted library allocation
page execute and read and write
23E21550000
heap
page read and write
1F0A411A000
heap
page read and write
14AD2AB1000
trusted library allocation
page read and write
1C0A0000
heap
page read and write
1A76F530000
heap
page read and write
325A000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
13ADBD9B000
heap
page read and write
1009BC000
stack
page read and write
1A767589000
trusted library allocation
page read and write
149E7906000
heap
page read and write
2B847630000
trusted library allocation
page read and write
BF0000
heap
page read and write
149E78FD000
heap
page read and write
13711000
trusted library allocation
page read and write
149E790B000
heap
page read and write
1C0E5000
heap
page read and write
1350000
heap
page execute and read and write
7FFD9B7A4000
trusted library allocation
page read and write
820217E000
stack
page read and write
7FFD9BADC000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
27C0000
heap
page execute and read and write
2213BFF000
stack
page read and write
2D62000
unkown
page readonly
23E3B132000
heap
page read and write
149E78C0000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
14AD1C09000
trusted library allocation
page read and write
7FFD9B986000
trusted library allocation
page read and write
BE0000
heap
page read and write
1A76F2EE000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
23E24132000
trusted library allocation
page read and write
1DBD1000
heap
page read and write
132F8000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
149E79B0000
direct allocation
page read and write
149E7850000
heap
page read and write
14AD1D83000
trusted library allocation
page read and write
B40000
heap
page read and write
1F0A8E11000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B8BF000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1BD13000
heap
page execute and read and write
1B916000
heap
page read and write
2F91000
trusted library allocation
page read and write
1BAE8000
heap
page read and write
7FFD9B937000
trusted library allocation
page read and write
7FFD9B956000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
1C9B0000
heap
page read and write
2B83045D000
trusted library allocation
page read and write
23E22BA0000
trusted library allocation
page read and write
2DA0000
unkown
page readonly
2C2F000
stack
page read and write
128F6000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
149E7970000
direct allocation
page read and write
7FFD9B90D000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1AA8D000
stack
page read and write
314A000
trusted library allocation
page read and write
7FFD9B8DF000
trusted library allocation
page execute and read and write
29C5000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
2B82FFD4000
trusted library allocation
page read and write
149EA1C3000
direct allocation
page read and write
7FF4543F0000
trusted library allocation
page execute and read and write
F4A670E000
stack
page read and write
7FFD9B8C7000
trusted library allocation
page execute and read and write
1262000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
115B000
heap
page read and write
1A767595000
trusted library allocation
page read and write
EF4000
stack
page read and write
2892000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
2D90000
unkown
page readonly
7FFD9B9A8000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
1302000
heap
page read and write
1A767583000
trusted library allocation
page read and write
13ADBD21000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
2213F7E000
stack
page read and write
7FFD9B836000
trusted library allocation
page read and write
2B83F3A1000
trusted library allocation
page read and write
1CCBD000
stack
page read and write
10AC000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
2876000
trusted library allocation
page read and write
1A7674AC000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
16EFCFF000
stack
page read and write
2BF0000
trusted library allocation
page read and write
23E249BF000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
30DC000
trusted library allocation
page read and write
1099000
heap
page read and write
277E000
trusted library allocation
page read and write
15D0000
heap
page execute and read and write
129CB000
trusted library allocation
page read and write
13AD37C1000
trusted library allocation
page read and write
1A7673D5000
trusted library allocation
page read and write
14AE113C000
trusted library allocation
page read and write
1610000
heap
page read and write
3193000
trusted library allocation
page read and write
1A00000
heap
page execute and read and write
1102000
heap
page read and write
3702000
trusted library allocation
page read and write
2B8477DE000
heap
page read and write
2BB8000
trusted library allocation
page read and write
1005FD000
stack
page read and write
2E70000
unkown
page readonly
7FFD9B96C000
trusted library allocation
page read and write
29B5000
trusted library allocation
page read and write
23E3B644000
heap
page read and write
163E000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1A76F4CB000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
14AD2581000
trusted library allocation
page read and write
14AE1124000
trusted library allocation
page read and write
2B830CEF000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
14AE102D000
trusted library allocation
page read and write
7FFD9B8CA000
trusted library allocation
page execute and read and write
13AC1D40000
heap
page read and write
13AC4FF8000
trusted library allocation
page read and write
16CF7560000
heap
page read and write
17B5000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1A76F2AB000
heap
page read and write
23E3B306000
heap
page read and write
280D000
heap
page read and write
2987000
trusted library allocation
page read and write
13AC3780000
heap
page execute and read and write
2982000
trusted library allocation
page read and write
2B82D53A000
heap
page read and write
1A755160000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
13AC19C7000
heap
page read and write
1BE1F000
stack
page read and write
18EAA670000
heap
page read and write
63E000
heap
page read and write
3D0000
heap
page read and write
1308D000
trusted library allocation
page read and write
7FFD9B8BA000
trusted library allocation
page execute and read and write
14AE106B000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
2B82F3A1000
trusted library allocation
page read and write
13AC41E1000
trusted library allocation
page read and write
159A000
heap
page read and write
3025000
trusted library allocation
page read and write
31993BE000
stack
page read and write
BA0000
trusted library allocation
page read and write
1A76F359000
heap
page read and write
2B84789E000
heap
page read and write
7FFD9B8B9000
trusted library allocation
page execute and read and write
13445000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
1BFD0000
heap
page read and write
12F39000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
13AD3A85000
trusted library allocation
page read and write
2B82D5B0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
149E789A000
heap
page read and write
3590000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
32CE000
stack
page read and write
7FFD9B8A6000
trusted library allocation
page execute and read and write
1BAC0000
heap
page read and write
1BF7E000
heap
page read and write
12821000
trusted library allocation
page read and write
2962000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1C1FF000
stack
page read and write
3506000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
16CF74B0000
heap
page read and write
14AE10F3000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1C47E000
stack
page read and write
14AE90CE000
heap
page read and write
1A76F57D000
heap
page read and write
7FFD9B96C000
trusted library allocation
page read and write
1BD50000
heap
page execute and read and write
7FFD9B9A6000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1AD9D000
stack
page read and write
2B8311C6000
trusted library allocation
page read and write
13ADBCC8000
heap
page read and write
7FFD9B961000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
149EA1C0000
direct allocation
page read and write
2B82D470000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
2C40000
heap
page execute and read and write
7FFD9B96F000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
CF4000
stack
page read and write
7DF45C3A0000
trusted library allocation
page execute and read and write
7FFD9B8CA000
trusted library allocation
page execute and read and write
1A767540000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
3284000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
1BE63000
heap
page read and write
16EF9FC000
stack
page read and write
3364000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
14F4000
stack
page read and write
2B8478DD000
heap
page read and write
7FFD9B915000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
9B0000
heap
page read and write
10E1000
heap
page read and write
3A4000
stack
page read and write
2CF7000
trusted library allocation
page read and write
13AC1D20000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
14AE10BA000
trusted library allocation
page read and write
1D7BA000
stack
page read and write
C44000
heap
page read and write
14ACF0D0000
heap
page read and write
14AE0F45000
trusted library allocation
page read and write
1BFB0000
heap
page read and write
14ACED50000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
1A76F297000
heap
page read and write
1960000
heap
page read and write
3198F7D000
stack
page read and write
EA8000
heap
page read and write
2B83F645000
trusted library allocation
page read and write
2D92000
unkown
page readonly
7FFD9B93D000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
7FFD9B968000
trusted library allocation
page read and write
7FFD9B8C1000
trusted library allocation
page execute and read and write
1F0A8D0F000
heap
page read and write
13AC4F13000
trusted library allocation
page read and write
3A78000
trusted library allocation
page read and write
2B82FF9A000
trusted library allocation
page read and write
13AC4966000
trusted library allocation
page read and write
1C0DA000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2B82D410000
heap
page read and write
F4A690C000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
18EAA620000
heap
page read and write
23E3B360000
heap
page read and write
1B0F0000
heap
page execute and read and write
1A757167000
trusted library allocation
page read and write
13AC4A9A000
trusted library allocation
page read and write
1C03B000
heap
page read and write
1BA40000
heap
page read and write
3195000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
12C86000
trusted library allocation
page read and write
12C51000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
1226000
heap
page read and write
23E24467000
trusted library allocation
page read and write
1202000
heap
page read and write
7FFD9B92D000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
7FFD9B949000
trusted library allocation
page read and write
1BF4D000
heap
page read and write
820227E000
stack
page read and write
2D9C000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
1A76F45A000
heap
page read and write
2CE1000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
23E3341F000
trusted library allocation
page read and write
13ADB805000
heap
page read and write
149E798B000
direct allocation
page read and write
18BF000
stack
page read and write
7FFD9B8E1000
trusted library allocation
page execute and read and write
2C10000
trusted library allocation
page read and write
1A756BB0000
heap
page readonly
1A767494000
trusted library allocation
page read and write
1A76F2D1000
heap
page read and write
335E000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B783000
trusted library allocation
page read and write
1A756BA0000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1F0A8E25000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
1B870000
unkown
page readonly
14AE8FE5000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1F0A8E10000
trusted library allocation
page read and write
16CF73D0000
heap
page read and write
1A756B40000
heap
page read and write
1620000
heap
page read and write
7FFD9B8C6000
trusted library allocation
page execute and read and write
1A7674D7000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
1A76F591000
heap
page read and write
2E2D000
heap
page read and write
23E3B5F4000
heap
page read and write
196D000
heap
page read and write
14AE1047000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
12D5B000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
7FFD9B95C000
trusted library allocation
page read and write
14AD0AB0000
trusted library allocation
page read and write
149E789B000
heap
page read and write
1F0A8FB0000
remote allocation
page read and write
23E2128D000
heap
page read and write
1C87A000
stack
page read and write
14AD1E71000
trusted library allocation
page read and write
2EFF000
stack
page read and write
1BE9D000
heap
page read and write
F4A5B3E000
stack
page read and write
1A7551B0000
heap
page read and write
14ACED20000
heap
page read and write
7FFD9B8DF000
trusted library allocation
page execute and read and write
3616000
trusted library allocation
page read and write
1AF70000
heap
page execute and read and write
133AB000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
23E2433F000
trusted library allocation
page read and write
14AE10AF000
trusted library allocation
page read and write
18EAA630000
heap
page read and write
12EB0000
trusted library allocation
page read and write
10093E000
stack
page read and write
1A76F29F000
heap
page read and write
3373000
trusted library allocation
page read and write
14AE1137000
trusted library allocation
page read and write
7FFD9B94F000
trusted library allocation
page read and write
1200000
heap
page read and write
14AE0F7F000
trusted library allocation
page read and write
14AE10BE000
trusted library allocation
page read and write
1C002000
heap
page execute and read and write
23E248B3000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
F90000
heap
page read and write
2BFD000
trusted library allocation
page read and write
122C000
heap
page read and write
137E2000
trusted library allocation
page read and write
1A76758D000
trusted library allocation
page read and write
13281000
trusted library allocation
page read and write
2B83F69D000
trusted library allocation
page read and write
1A7583E4000
trusted library allocation
page read and write
2E72000
unkown
page readonly
149E7A3D000
direct allocation
page read and write
1969000
heap
page read and write
31F0000
trusted library allocation
page read and write
124A000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2F52000
trusted library allocation
page read and write
1A757D0E000
trusted library allocation
page read and write
A15000
heap
page read and write
1790000
heap
page read and write
14AD1C05000
trusted library allocation
page read and write
149E7A70000
direct allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
A20000
heap
page read and write
3881000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
12F91000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
14AE10D1000
trusted library allocation
page read and write
7FFD9B8B7000
trusted library allocation
page execute and read and write
22144FF000
stack
page read and write
10017F000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
13AC46FA000
trusted library allocation
page read and write
14AE1122000
trusted library allocation
page read and write
19FF000
stack
page read and write
7FFD9B94F000
trusted library allocation
page read and write
13031000
trusted library allocation
page read and write
319913B000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
1F0A8E10000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1010000
heap
page read and write
7FFD9B992000
trusted library allocation
page read and write
1652000
heap
page read and write
2FA2000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
14ACEDAC000
heap
page read and write
2CFF000
trusted library allocation
page read and write
13011000
trusted library allocation
page read and write
13ADBD75000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
318D000
trusted library allocation
page read and write
2B847949000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
2B82D5D0000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2B8473A0000
heap
page read and write
1780000
heap
page read and write
1BF20000
heap
page read and write
149E790B000
heap
page read and write
1050000
trusted library allocation
page read and write
7DF4A6730000
trusted library allocation
page execute and read and write
149E78DD000
heap
page read and write
2764000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B8B4000
trusted library allocation
page execute and read and write
1C00D000
heap
page read and write
14AE1065000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
2942000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1BEEA000
heap
page read and write
7FFD9B88F000
trusted library allocation
page execute and read and write
1A767573000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
1BF45000
heap
page read and write
C00000
heap
page read and write
1B940000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
2DF0000
heap
page execute and read and write
2B06000
trusted library allocation
page read and write
13ADBDE4000
heap
page read and write
221467B000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1BFFB000
heap
page read and write
1C900000
heap
page read and write
1C723000
heap
page read and write
23E21270000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
18EAA680000
heap
page read and write
14ACEE4A000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2E8D000
heap
page read and write
1B900000
heap
page read and write
1DBD3000
heap
page read and write
F4A53CF000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1BD10000
heap
page execute and read and write
1583000
heap
page read and write
2611000
trusted library allocation
page read and write
13AC1983000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
82020F9000
stack
page read and write
14AE90B3000
heap
page read and write
2DB0000
unkown
page readonly
35EE000
trusted library allocation
page read and write
14AE113E000
trusted library allocation
page read and write
2B84793B000
heap
page read and write
2DB1000
trusted library allocation
page read and write
7FFD9B8B3000
trusted library allocation
page execute and read and write
1A76751E000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
1402000
heap
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
23E3B271000
heap
page read and write
14AD1E62000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
1C029000
heap
page read and write
270E000
stack
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
2B847408000
heap
page read and write
1006BE000
stack
page read and write
1A7551F3000
heap
page read and write
3265000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1F0A8F60000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
3380000
heap
page execute and read and write
3045000
trusted library allocation
page read and write
149E78EC000
heap
page read and write
1A7674FE000
trusted library allocation
page read and write
7FFD9B935000
trusted library allocation
page read and write
13AC437A000
trusted library allocation
page read and write
14AE903C000
heap
page read and write
652000
heap
page read and write
3A61000
trusted library allocation
page read and write
F4A56F9000
stack
page read and write
2DD2000
unkown
page readonly
7FFD9B8C6000
trusted library allocation
page execute and read and write
221524E000
stack
page read and write
14AD1F9E000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
297E000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
13AD37B1000
trusted library allocation
page read and write
2B847476000
heap
page read and write
3614000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
7FFD9B935000
trusted library allocation
page read and write
1A20000
heap
page read and write
1A767477000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
149E7977000
direct allocation
page read and write
14AE0F1E000
trusted library allocation
page read and write
27D3000
trusted library allocation
page read and write
1BF00000
heap
page read and write
23E3B2A4000
heap
page read and write
1DDBE000
stack
page read and write
7FFD9B94C000
trusted library allocation
page read and write
2995000
trusted library allocation
page read and write
820318E000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B8AF000
trusted library allocation
page execute and read and write
3627000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1330000
heap
page read and write
13ADBB60000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1A76F5C7000
heap
page read and write
2782000
trusted library allocation
page read and write
A12000
unkown
page readonly
7FFD9B886000
trusted library allocation
page execute and read and write
2B8473CF000
heap
page read and write
2B83F68F000
trusted library allocation
page read and write
149E7A30000
direct allocation
page read and write
3621000
trusted library allocation
page read and write
E89000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
14AE1148000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B93E000
trusted library allocation
page read and write
D94000
stack
page read and write
648000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
162E000
heap
page read and write
7FFD9B96C000
trusted library allocation
page read and write
There are 2702 hidden memdumps, click here to show them.