IOC Report
KvS2rT08PQ.exe

loading gif

Files

File Path
Type
Category
Malicious
KvS2rT08PQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ANDYzz-protected.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Umbral.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\KvS2rT08PQ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Umbral.exe.log
CSV text
dropped
C:\Users\user\AppData\Roaming\app
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KvS2rT08PQ.exe
"C:\Users\user\Desktop\KvS2rT08PQ.exe"
malicious
C:\Users\user\AppData\Local\Temp\Umbral.exe
"C:\Users\user\AppData\Local\Temp\Umbral.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user\AppData\Local\Temp\svchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\ANDYzz-protected.exe
"C:\Users\user\AppData\Local\Temp\ANDYzz-protected.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall delete allowedprogram "C:\Users\user\AppData\Local\Temp\svchost.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE
malicious
C:\Windows\System32\wbem\WMIC.exe
"wmic.exe" csproduct get uuid
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://discord.com/api/webhooks/1225910337656590376/EwVP3wlMQgDXxoBxwLhaflFWF2WGja-17Tz3uwtoNirVyl9iU_nVCUsOrUJN46JTk-_-
malicious
https://discord.com/api/webhooks/1225910337656590376/EwVP3wlMQgDXxoBxwLhaflFWF2WGja-17Tz3uwtoNirVyl9
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://discord.com/api/v10/users/
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://keyauth.win
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://microsoft.co
unknown
http://www.fontbureau.com/designers?
unknown
https://discordapp.com/api/v9/users/
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://schemas.datacontract.org/2004/07/tWQFFgygASaEccWKmNiVdEXnTMYHruQoFGGxlHMVsnlabuZvwozniMWOZDMT
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://github.com/Blank-c/Umbral-Stealer
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://gunaframework.com/api/licensing.php
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://ip-api.com
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://gunaui.com/api/licensing.php
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://gunaui.com/
unknown
https://gunaui.com/pricing
unknown
http://ip-api.com/json/?fields=225545
unknown
https://keyauth.win/api/1.0/
104.26.0.5
http://ip-api.com/line/?fields=hostingI7AB5C494-39F5-4941-9163-47F54D6D5016I032E02B4-0499-05C3-0806-
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
0.tcp.eu.ngrok.io
18.158.249.75
malicious
keyauth.win
104.26.0.5
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
3.125.223.134
unknown
United States
malicious
3.125.209.94
unknown
United States
malicious
3.124.142.205
unknown
United States
malicious
18.158.249.75
0.tcp.eu.ngrok.io
United States
malicious
208.95.112.1
ip-api.com
United States
104.26.0.5
keyauth.win
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ANDYzz-protected_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
253F8F32000
unkown
page readonly
malicious
191C3C81000
trusted library allocation
page read and write
malicious
2791000
trusted library allocation
page read and write
malicious
E02000
unkown
page readonly
malicious
191C1C92000
unkown
page readonly
malicious
191DC700000
trusted library section
page read and write
malicious
3A91000
trusted library allocation
page read and write
malicious
7FFD9B79D000
trusted library allocation
page execute and read and write
A3B000
heap
page read and write
14D3000
heap
page read and write
37B7000
heap
page read and write
253F90D0000
heap
page read and write
2282AF7E000
heap
page read and write
37AB000
heap
page read and write
191C44D6000
trusted library allocation
page read and write
379D000
heap
page read and write
B67000
heap
page read and write
A3F000
heap
page read and write
B9E000
heap
page read and write
191C41BB000
trusted library allocation
page read and write
191C4106000
trusted library allocation
page read and write
191C4411000
trusted library allocation
page read and write
A4C000
heap
page read and write
2282AF91000
heap
page read and write
191C1BE0000
unkown
page execute and read and write
381E000
heap
page read and write
5450000
heap
page read and write
E14E6FE000
stack
page read and write
14A5000
heap
page read and write
A61000
heap
page read and write
B44000
heap
page read and write
C0E000
stack
page read and write
191DF939000
trusted library allocation
page read and write
191C4414000
trusted library allocation
page read and write
37FF000
heap
page read and write
37B0000
heap
page read and write
191C3C70000
heap
page execute and read and write
2282AF91000
heap
page read and write
A61000
heap
page read and write
5160000
heap
page read and write
2282CF84000
heap
page read and write
191C20AD000
heap
page read and write
191DBCB0000
trusted library allocation
page read and write
A05000
heap
page read and write
783000
stack
page read and write
2282B1D5000
heap
page read and write
191C3AFB000
heap
page read and write
33C0000
trusted library allocation
page read and write
2282AF91000
heap
page read and write
AB1000
heap
page read and write
253FB552000
heap
page read and write
2282B1F2000
heap
page read and write
3BCB000
trusted library allocation
page read and write
2282AF82000
heap
page read and write
1050000
heap
page read and write
E14E73E000
stack
page read and write
191C4278000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
B42000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
59BE000
heap
page read and write
3785000
heap
page read and write
5CC0000
trusted library allocation
page execute and read and write
AB9000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
BE3000
heap
page read and write
373F000
stack
page read and write
191C444A000
trusted library allocation
page read and write
253800DC000
trusted library allocation
page read and write
37A7000
heap
page read and write
191C43C8000
trusted library allocation
page read and write
E14F27D000
stack
page read and write
E14F17E000
stack
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
A4B000
heap
page read and write
253F9161000
heap
page read and write
2282B1F3000
heap
page read and write
4E93000
heap
page read and write
2282B1E9000
heap
page read and write
140A000
heap
page read and write
B9F000
heap
page read and write
95E000
stack
page read and write
37AB000
heap
page read and write
A8543E000
stack
page read and write
191C2290000
heap
page read and write
37BA000
heap
page read and write
4E94000
heap
page read and write
9B5000
heap
page read and write
191C420B000
trusted library allocation
page read and write
B79000
heap
page read and write
191DFEC0000
heap
page read and write
3787000
heap
page read and write
37B4000
heap
page read and write
AB8000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
5990000
heap
page read and write
B3C000
heap
page read and write
B71000
heap
page read and write
EFF000
stack
page read and write
253F919B000
heap
page read and write
B64000
heap
page read and write
191C4103000
trusted library allocation
page read and write
7FFD9B95B000
trusted library allocation
page read and write
5D6C000
stack
page read and write
B71000
heap
page read and write
B5C000
heap
page read and write
2282B2CE000
heap
page read and write
191DC52A000
heap
page read and write
3774000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
A4B000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
191C3D35000
trusted library allocation
page read and write
59B8000
heap
page read and write
3BD7000
trusted library allocation
page read and write
93D000
unkown
page read and write
3AD2000
trusted library allocation
page read and write
2282AFAD000
heap
page read and write
191DFD74000
heap
page read and write
7FFD9B956000
trusted library allocation
page read and write
3730000
heap
page read and write
B4A000
heap
page read and write
A81FFE000
stack
page read and write
4E93000
heap
page read and write
B6E000
heap
page read and write
191DFD78000
heap
page read and write
FA6000
stack
page read and write
191C4206000
trusted library allocation
page read and write
B3C000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
12E0000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
37B8000
heap
page read and write
953000
heap
page read and write
980000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
191DDA20000
trusted library allocation
page read and write
AD0000
heap
page read and write
2282B1DF000
heap
page read and write
D00000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
191DFD5F000
heap
page read and write
A47000
heap
page read and write
37B7000
heap
page read and write
1040000
heap
page read and write
4A91000
trusted library allocation
page read and write
A2F000
heap
page read and write
2282B170000
trusted library allocation
page read and write
1412000
heap
page read and write
DB556E8000
stack
page read and write
B27000
heap
page read and write
A09000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
59B4000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page read and write
379D000
heap
page read and write
2282AFB8000
heap
page read and write
191E0636000
heap
page read and write
2282CF73000
heap
page read and write
3787000
heap
page read and write
B11000
heap
page read and write
3AFB000
trusted library allocation
page read and write
2282B754000
heap
page read and write
191DFD6E000
heap
page read and write
37E0000
heap
page read and write
191C3D8A000
trusted library allocation
page read and write
B4A000
heap
page read and write
A30000
heap
page read and write
3768000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
830000
heap
page read and write
2282B1D4000
heap
page read and write
382C000
heap
page read and write
6530000
trusted library allocation
page execute and read and write
191C3AE0000
heap
page read and write
191C2050000
trusted library allocation
page read and write
1A01000
heap
page read and write
B76000
heap
page read and write
B6F000
heap
page read and write
2282B75A000
heap
page read and write
191C1FE0000
heap
page read and write
191C40E2000
trusted library allocation
page read and write
191C3C20000
heap
page execute and read and write
1450000
heap
page read and write
A1A000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
3B01000
trusted library allocation
page read and write
143F000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
8D0000
heap
page read and write
A45000
heap
page read and write
A3D000
heap
page read and write
3751000
heap
page read and write
253800AE000
trusted library allocation
page read and write
916000
heap
page read and write
191DFE7E000
heap
page read and write
2282B1D2000
heap
page read and write
191DC93E000
heap
page read and write
2282B755000
heap
page read and write
37B2000
heap
page read and write
BE0000
heap
page read and write
33E2000
trusted library allocation
page execute and read and write
B4B000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
191C42E8000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
381F000
heap
page read and write
B36000
heap
page read and write
A38000
heap
page read and write
B48000
heap
page read and write
191C42A2000
trusted library allocation
page read and write
A48000
heap
page read and write
2282AF76000
heap
page read and write
2282AFA7000
heap
page read and write
363E000
stack
page read and write
835000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
2282AF52000
heap
page read and write
400C000
trusted library allocation
page read and write
191C3A40000
heap
page read and write
59B1000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
A0B000
heap
page read and write
59C5000
heap
page read and write
E0E000
stack
page read and write
191C4480000
trusted library allocation
page read and write
3824000
heap
page read and write
BE0000
heap
page read and write
191C443A000
trusted library allocation
page read and write
191DE279000
heap
page read and write
379F000
heap
page read and write
191C4275000
trusted library allocation
page read and write
253800A4000
trusted library allocation
page read and write
191DFD5A000
heap
page read and write
B7D000
heap
page read and write
191DFD68000
heap
page read and write
A4C000
heap
page read and write
191E0407000
heap
page read and write
FBB000
stack
page read and write
191C403A000
trusted library allocation
page read and write
50BA000
heap
page read and write
2282B1CF000
heap
page read and write
A47000
heap
page read and write
191C2086000
heap
page read and write
2282B75B000
heap
page read and write
B01000
heap
page read and write
E14E1FF000
stack
page read and write
191C3D01000
trusted library allocation
page read and write
377B000
heap
page read and write
B37000
heap
page read and write
B71000
heap
page read and write
191C4335000
trusted library allocation
page read and write
B68000
heap
page read and write
2282CF84000
heap
page read and write
143E000
unkown
page read and write
191C4177000
trusted library allocation
page read and write
59C2000
heap
page read and write
8B0000
trusted library allocation
page read and write
191DE220000
heap
page read and write
191C43E3000
trusted library allocation
page read and write
37A0000
heap
page read and write
37AB000
heap
page read and write
A13000
heap
page read and write
253800DE000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
77E000
stack
page read and write
B61000
heap
page read and write
96E000
stack
page read and write
6600000
heap
page read and write
A2F000
heap
page read and write
191C42A4000
trusted library allocation
page read and write
4E96000
heap
page read and write
A2F000
heap
page read and write
A3B000
heap
page read and write
3788000
heap
page read and write
37DD000
heap
page read and write
150000
unkown
page readonly
2282B1E9000
heap
page read and write
2282B1D4000
heap
page read and write
191C414B000
trusted library allocation
page read and write
191DC548000
heap
page read and write
37BA000
heap
page read and write
37A4000
heap
page read and write
3784000
heap
page read and write
1056000
heap
page read and write
B64000
heap
page read and write
191DFD00000
heap
page read and write
147D000
heap
page read and write
191C3FA8000
trusted library allocation
page read and write
191DFD4A000
heap
page read and write
2282AFA1000
heap
page read and write
191C1BE0000
unkown
page readonly
37A3000
heap
page read and write
2282B1F2000
heap
page read and write
59C5000
heap
page read and write
191C20EA000
heap
page read and write
191DFF84000
heap
page read and write
9DD000
heap
page read and write
253F9136000
heap
page read and write
B79000
heap
page read and write
37AD000
heap
page read and write
B3C000
heap
page read and write
2282AF83000
heap
page read and write
191C3CF2000
trusted library allocation
page read and write
37AE000
heap
page read and write
59CA000
heap
page read and write
E14EA3D000
stack
page read and write
2282B050000
heap
page read and write
78E000
stack
page read and write
191C1C92000
unkown
page execute and read and write
E14E4FD000
stack
page read and write
25380001000
trusted library allocation
page read and write
191C4497000
trusted library allocation
page read and write
37BC000
heap
page read and write
191DFE16000
heap
page read and write
191C2000000
heap
page read and write
1B7FB000
stack
page read and write
3788000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
508F000
stack
page read and write
2282B170000
trusted library allocation
page read and write
A2D000
heap
page read and write
3B0C000
trusted library allocation
page read and write
253F913C000
heap
page read and write
191C1E5C000
unkown
page readonly
5A90000
trusted library allocation
page read and write
191E02E6000
heap
page read and write
2282B1D1000
heap
page read and write
191C42CE000
trusted library allocation
page read and write
37B5000
heap
page read and write
191E0559000
heap
page read and write
1461000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
B61000
heap
page read and write
BA1000
heap
page read and write
A6F000
heap
page read and write
E14EB3E000
stack
page read and write
A4A000
heap
page read and write
3ADF000
trusted library allocation
page read and write
191C42B7000
trusted library allocation
page read and write
191DC520000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
2282CF84000
heap
page read and write
B9E000
heap
page read and write
37DD000
heap
page read and write
381F000
heap
page read and write
191C40DF000
trusted library allocation
page read and write
1501000
heap
page read and write
191DFDD6000
heap
page read and write
DB55A7E000
stack
page read and write
4E97000
heap
page read and write
A6D000
heap
page read and write
37A3000
heap
page read and write
191DFD6B000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
59BE000
heap
page read and write
A2B000
heap
page read and write
191C43A8000
trusted library allocation
page read and write
642C000
stack
page read and write
3751000
heap
page read and write
3C3B000
trusted library allocation
page read and write
37B0000
heap
page read and write
191DC609000
heap
page read and write
14C0000
heap
page read and write
191DC920000
heap
page read and write
A13000
heap
page read and write
B5D000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
A19000
heap
page read and write
191C3A90000
trusted library allocation
page read and write
33B2000
trusted library allocation
page execute and read and write
2282AFAC000
heap
page read and write
191C2205000
heap
page read and write
191C20AA000
heap
page read and write
A3C000
heap
page read and write
9E0000
heap
page read and write
3788000
heap
page read and write
5CB0000
trusted library allocation
page read and write
191C1C3A000
unkown
page readonly
3501000
heap
page read and write
1B01000
heap
page read and write
4E8A000
heap
page read and write
382D000
heap
page read and write
2282B1DF000
heap
page read and write
33F7000
trusted library allocation
page execute and read and write
E14EE7D000
stack
page read and write
B49000
heap
page read and write
B6E000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
A30000
heap
page read and write
59C6000
heap
page read and write
91C000
heap
page read and write
A42000
heap
page read and write
2282AF75000
heap
page read and write
A6D000
heap
page read and write
3822000
heap
page read and write
379E000
heap
page read and write
253F93F5000
heap
page read and write
5FEE000
stack
page read and write
37AC000
heap
page read and write
B45000
heap
page read and write
50B2000
heap
page read and write
144A000
heap
page read and write
A0A000
heap
page read and write
13B0000
heap
page read and write
12791000
trusted library allocation
page read and write
A1A000
heap
page read and write
A61000
heap
page read and write
2282AFB8000
heap
page read and write
191DC5C6000
heap
page read and write
C2E000
unkown
page read and write
191C4307000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
253F919D000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
A47000
heap
page read and write
7F0000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
4E93000
heap
page read and write
B7C000
heap
page read and write
4E81000
heap
page read and write
2282AF94000
heap
page read and write
1880000
heap
page read and write
191E0157000
heap
page read and write
FD0000
heap
page read and write
1850000
heap
page read and write
A14000
heap
page read and write
B5D000
heap
page read and write
A84FFE000
stack
page read and write
191DFD7D000
heap
page read and write
A48000
heap
page read and write
191DFD42000
heap
page read and write
59B3000
heap
page read and write
810000
heap
page read and write
191E0262000
heap
page read and write
D05000
heap
page read and write
A84BFE000
stack
page read and write
191C3CEB000
trusted library allocation
page read and write
2282AF40000
heap
page read and write
373A000
heap
page read and write
B6C000
heap
page read and write
12EE000
stack
page read and write
191C20BF000
heap
page read and write
A3B000
heap
page read and write
1B4FE000
stack
page read and write
191E0517000
heap
page read and write
950000
heap
page read and write
A05000
heap
page read and write
191DE1AA000
trusted library allocation
page read and write
BEE000
heap
page read and write
5C90000
trusted library allocation
page read and write
1860000
heap
page execute and read and write
3778000
heap
page read and write
381D000
heap
page read and write
B79000
heap
page read and write
9B0000
heap
page read and write
381D000
heap
page read and write
2282AF94000
heap
page read and write
4E60000
heap
page read and write
BEE000
heap
page read and write
14C6000
heap
page read and write
59BC000
heap
page read and write
2282B1D8000
heap
page read and write
59BE000
heap
page read and write
2282B75A000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
191DC6F0000
heap
page execute and read and write
7FFD9B960000
trusted library allocation
page execute and read and write
986000
heap
page read and write
37BC000
heap
page read and write
191C20EE000
heap
page read and write
191C3CF5000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
253FB550000
heap
page read and write
A32000
heap
page read and write
191C3CFD000
trusted library allocation
page read and write
1450000
heap
page read and write
37BB000
heap
page read and write
68B000
stack
page read and write
191C412A000
trusted library allocation
page read and write
5EAC000
stack
page read and write
2282B1DF000
heap
page read and write
2282B2CA000
heap
page read and write
5C6E000
stack
page read and write
E14EC3B000
stack
page read and write
191DC910000
heap
page read and write
2282CF7E000
heap
page read and write
B9F000
heap
page read and write
191C434D000
trusted library allocation
page read and write
253F92F5000
heap
page read and write
191C20C1000
heap
page read and write
191C3D88000
trusted library allocation
page read and write
A61000
heap
page read and write
59C9000
heap
page read and write
4E93000
heap
page read and write
191E059D000
heap
page read and write
A16000
heap
page read and write
B69000
heap
page read and write
2282AFAA000
heap
page read and write
2282AF57000
heap
page read and write
9F7000
heap
page read and write
3AE6000
trusted library allocation
page read and write
A43000
heap
page read and write
2282AF91000
heap
page read and write
2282AF85000
heap
page read and write
2282AF9F000
heap
page read and write
3786000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
191C20A2000
heap
page read and write
2282AFBF000
heap
page read and write
2282B1EA000
heap
page read and write
191DE2BB000
heap
page read and write
4E61000
heap
page read and write
A18000
heap
page read and write
191DC513000
heap
page read and write
9E0000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2282B1CC000
heap
page read and write
33DA000
trusted library allocation
page execute and read and write
191C2070000
trusted library allocation
page read and write
59B1000
heap
page read and write
A6D000
heap
page read and write
191C2183000
trusted library allocation
page read and write
191DC52E000
heap
page read and write
1202000
heap
page read and write
191C44DE000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
A0B000
heap
page read and write
253FB52E000
heap
page read and write
A8103E000
stack
page read and write
652B000
stack
page read and write
3AF0000
trusted library allocation
page read and write
4E98000
heap
page read and write
191C44D9000
trusted library allocation
page read and write
2282B750000
heap
page read and write
253FACE0000
heap
page read and write
2282AFB4000
heap
page read and write
59BF000
heap
page read and write
2282CF70000
heap
page read and write
37BA000
heap
page read and write
191C4019000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
37B2000
heap
page read and write
2282AFA3000
heap
page read and write
37B3000
heap
page read and write
8F0000
heap
page read and write
B7C000
heap
page read and write
A42000
heap
page read and write
3775000
heap
page read and write
50BA000
heap
page read and write
A44000
heap
page read and write
253800B8000
trusted library allocation
page read and write
B39000
heap
page read and write
2282AF57000
heap
page read and write
A82FFE000
stack
page read and write
191C41E2000
trusted library allocation
page read and write
2282D0B0000
heap
page read and write
253F90F0000
heap
page read and write
191C43DB000
trusted library allocation
page read and write
2282AF78000
heap
page read and write
1510000
heap
page read and write
A34000
heap
page read and write
191C2200000
heap
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
14A2000
heap
page read and write
9E1000
heap
page read and write
A18000
heap
page read and write
B75000
heap
page read and write
1B6FE000
stack
page read and write
2282CF7D000
heap
page read and write
1475000
heap
page read and write
191DE24E000
heap
page read and write
191C3FA5000
trusted library allocation
page read and write
7FFD9B935000
trusted library allocation
page read and write
2282CF76000
heap
page read and write
37B8000
heap
page read and write
3821000
heap
page read and write
1436000
heap
page read and write
B68000
heap
page read and write
253F8F30000
unkown
page readonly
2282B130000
heap
page read and write
2282AFB7000
heap
page read and write
25380088000
trusted library allocation
page read and write
253F92C0000
heap
page execute and read and write
840000
heap
page read and write
A17000
heap
page read and write
59B6000
heap
page read and write
598F000
stack
page read and write
191C1FC0000
heap
page read and write
3825000
heap
page read and write
5090000
heap
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
191DE195000
trusted library allocation
page read and write
B6E000
heap
page read and write
2282B75E000
heap
page read and write
2282B75A000
heap
page read and write
37A0000
heap
page read and write
BEE000
heap
page read and write
2282B1E9000
heap
page read and write
59BF000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
3751000
heap
page read and write
37A4000
heap
page read and write
E6F000
stack
page read and write
191C3F65000
trusted library allocation
page read and write
191C444D000
trusted library allocation
page read and write
37AD000
heap
page read and write
191C4250000
trusted library allocation
page read and write
191C4090000
trusted library allocation
page read and write
2282AFB1000
heap
page read and write
B45000
heap
page read and write
2282AFBA000
heap
page read and write
253F9130000
heap
page read and write
377E000
heap
page read and write
253F8F30000
unkown
page readonly
25390006000
trusted library allocation
page read and write
B47000
heap
page read and write
191C4016000
trusted library allocation
page read and write
59B1000
heap
page read and write
7FFD9B933000
trusted library allocation
page read and write
37A5000
heap
page read and write
253800D8000
trusted library allocation
page read and write
253800A0000
trusted library allocation
page read and write
2282B1C7000
heap
page read and write
E14E0F3000
stack
page read and write
2538008E000
trusted library allocation
page read and write
4E95000
heap
page read and write
253800F3000
trusted library allocation
page read and write
E00000
unkown
page readonly
ABB000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
E14E83F000
stack
page read and write
50BA000
heap
page read and write
B6C000
heap
page read and write
191C3FF7000
trusted library allocation
page read and write
E14EF7B000
stack
page read and write
191E061E000
heap
page read and write
3B42000
trusted library allocation
page read and write
4E82000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
9D6000
heap
page read and write
933000
heap
page read and write
2282AFA3000
heap
page read and write
DB557EF000
stack
page read and write
33CA000
trusted library allocation
page execute and read and write
37B4000
heap
page read and write
3782000
heap
page read and write
B64000
heap
page read and write
9D2000
heap
page read and write
A36000
heap
page read and write
2282AF8F000
heap
page read and write
B74000
heap
page read and write
382A000
heap
page read and write
A17000
heap
page read and write
B64000
heap
page read and write
4E93000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
191DC61E000
heap
page read and write
A2B000
heap
page read and write
2282B170000
trusted library allocation
page read and write
B69000
heap
page read and write
191C3D05000
trusted library allocation
page read and write
E14E5FE000
stack
page read and write
1B200000
heap
page read and write
191DC510000
heap
page read and write
37BC000
heap
page read and write
4E88000
heap
page read and write
12FB000
stack
page read and write
3824000
heap
page read and write
B45000
heap
page read and write
191DFD80000
heap
page read and write
2282B2CD000
heap
page read and write
730000
heap
page read and write
BEA000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
7FFD9B966000
trusted library allocation
page read and write
A6D000
heap
page read and write
25380108000
trusted library allocation
page read and write
191DFF42000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
A19000
heap
page read and write
A3B000
heap
page read and write
191C2080000
heap
page read and write
191C3F11000
trusted library allocation
page read and write
52BE000
stack
page read and write
2282AF9B000
heap
page read and write
37DE000
heap
page read and write
191E0007000
heap
page read and write
97F000
heap
page read and write
B77000
heap
page read and write
3FF3000
trusted library allocation
page read and write
BBF000
unkown
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
191E008D000
heap
page read and write
1620000
heap
page read and write
191C4209000
trusted library allocation
page read and write
6F4000
stack
page read and write
B3B000
heap
page read and write
191DFD71000
heap
page read and write
3829000
heap
page read and write
A43000
heap
page read and write
B4A000
heap
page read and write
14BE000
stack
page read and write
A08000
heap
page read and write
191E0622000
heap
page read and write
A2F000
heap
page read and write
2282AF94000
heap
page read and write
37AB000
heap
page read and write
37B8000
heap
page read and write
50B1000
heap
page read and write
B42000
heap
page read and write
1450000
heap
page read and write
26AE000
stack
page read and write
191E0300000
heap
page read and write
191C408D000
trusted library allocation
page read and write
B7C000
heap
page read and write
9E0000
heap
page read and write
B6C000
heap
page read and write
B7C000
heap
page read and write
33BA000
trusted library allocation
page execute and read and write
AFB000
heap
page read and write
2282AF7E000
heap
page read and write
25390001000
trusted library allocation
page read and write
A817FF000
stack
page read and write
B49000
heap
page read and write
9CA000
heap
page read and write
191C422E000
trusted library allocation
page read and write
5FAD000
stack
page read and write
BEA000
heap
page read and write
377F000
heap
page read and write
4E80000
heap
page read and write
191E03C6000
heap
page read and write
2282CF71000
heap
page read and write
191DDA42000
trusted library allocation
page read and write
7FF414010000
trusted library allocation
page execute and read and write
191DC5C8000
heap
page read and write
253F9170000
heap
page read and write
25380075000
trusted library allocation
page read and write
191C1C90000
unkown
page execute and read and write
191C4240000
trusted library allocation
page read and write
A82BFB000
stack
page read and write
2282B753000
heap
page read and write
37B7000
heap
page read and write
191C1EE0000
heap
page read and write
A38000
heap
page read and write
33EA000
trusted library allocation
page execute and read and write
A14000
heap
page read and write
A19000
heap
page read and write
D2F000
unkown
page read and write
253800CA000
trusted library allocation
page read and write
B76000
heap
page read and write
3AF5000
trusted library allocation
page read and write
86B000
stack
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
191E05DF000
heap
page read and write
7FFD9B958000
trusted library allocation
page read and write
2282AF48000
heap
page read and write
253F93F0000
heap
page read and write
B7C000
heap
page read and write
3773000
heap
page read and write
944000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
59C8000
heap
page read and write
B6C000
heap
page read and write
191C3D71000
trusted library allocation
page read and write
253F9280000
trusted library allocation
page read and write
2282B1F3000
heap
page read and write
191E04D1000
heap
page read and write
3784000
heap
page read and write
3784000
heap
page read and write
6580000
trusted library allocation
page execute and read and write
14B3000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
59CC000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
9F5000
heap
page read and write
A80FEF000
stack
page read and write
9A0000
heap
page read and write
2282AFB4000
heap
page read and write
A39000
heap
page read and write
2282B757000
heap
page read and write
1300000
heap
page read and write
A809CE000
stack
page read and write
33D7000
trusted library allocation
page execute and read and write
191C2295000
heap
page read and write
153E000
stack
page read and write
5491000
trusted library allocation
page read and write
59BE000
heap
page read and write
2282AFBF000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
A19000
heap
page read and write
A4A000
heap
page read and write
4D0E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
37B7000
heap
page read and write
12798000
trusted library allocation
page read and write
3B2F000
stack
page read and write
191C20E8000
heap
page read and write
2282AFAA000
heap
page read and write
3B03000
trusted library allocation
page read and write
2282AF94000
heap
page read and write
8D0000
trusted library allocation
page read and write
1AD1D000
stack
page read and write
150000
unkown
page readonly
37B8000
heap
page read and write
59B3000
heap
page read and write
253F920C000
heap
page read and write
253F9260000
trusted library allocation
page read and write
A09000
heap
page read and write
253F9110000
heap
page read and write
3829000
heap
page read and write
3BD2000
trusted library allocation
page read and write
2282CF7E000
heap
page read and write
B61000
heap
page read and write
191C4260000
trusted library allocation
page read and write
B7B000
heap
page read and write
A38000
heap
page read and write
37AC000
heap
page read and write
E14F37E000
stack
page read and write
1700000
heap
page read and write
2282AF83000
heap
page read and write
191DDF0F000
heap
page read and write
2282B1C0000
heap
page read and write
A36000
heap
page read and write
A61000
heap
page read and write
191C404A000
trusted library allocation
page read and write
A40000
heap
page read and write
940000
heap
page read and write
1400000
heap
page read and write
191C3A70000
heap
page read and write
DB5576F000
stack
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
A2F000
heap
page read and write
2282B757000
heap
page read and write
12F4000
stack
page read and write
3826000
heap
page read and write
BC0000
heap
page read and write
2282CF74000
heap
page read and write
382D000
heap
page read and write
253F9172000
heap
page read and write
2282AFBF000
heap
page read and write
37A3000
heap
page read and write
5096000
heap
page read and write
191DCA10000
heap
page read and write
2282AFA4000
heap
page read and write
3781000
heap
page read and write
191C403D000
trusted library allocation
page read and write
382B000
heap
page read and write
2282B150000
heap
page read and write
12793000
trusted library allocation
page read and write
B49000
heap
page read and write
B24000
heap
page read and write
2282AF84000
heap
page read and write
A81BFD000
stack
page read and write
2282AF94000
heap
page read and write
DB55B7E000
stack
page read and write
191C3F62000
trusted library allocation
page read and write
9C0000
heap
page read and write
191E0616000
heap
page read and write
2282B1F9000
heap
page read and write
3779000
heap
page read and write
191C20BD000
heap
page read and write
37DD000
heap
page read and write
B5C000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
191C3FFA000
trusted library allocation
page read and write
37AE000
heap
page read and write
6550000
unclassified section
page read and write
253F9220000
heap
page read and write
2282AFA9000
heap
page read and write
B04000
heap
page read and write
191DDE84000
heap
page read and write
1B212000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
A61000
heap
page read and write
37BA000
heap
page read and write
E14E93E000
stack
page read and write
E14F076000
stack
page read and write
382D000
heap
page read and write
377F000
heap
page read and write
A827FC000
stack
page read and write
191E04CD000
heap
page read and write
AB4000
heap
page read and write
60EE000
stack
page read and write
367F000
unkown
page read and write
191C3F81000
trusted library allocation
page read and write
191C40B6000
trusted library allocation
page read and write
A3D000
heap
page read and write
DFE000
stack
page read and write
3788000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
2282CF86000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
983000
heap
page read and write
B11000
heap
page read and write
B36000
heap
page read and write
A40000
heap
page read and write
191DDF42000
trusted library allocation
page read and write
E14E2FF000
stack
page read and write
A6D000
heap
page read and write
1320000
heap
page read and write
EAA000
stack
page read and write
191DFD65000
heap
page read and write
2282AF94000
heap
page read and write
2282B170000
trusted library allocation
page read and write
2282B1CE000
heap
page read and write
3EC4000
trusted library allocation
page read and write
191DFD7A000
heap
page read and write
191DC532000
heap
page read and write
191C3A60000
trusted library section
page readonly
191C414E000
trusted library allocation
page read and write
25380081000
trusted library allocation
page read and write
93A000
heap
page read and write
379F000
heap
page read and write
191C208C000
heap
page read and write
33F2000
trusted library allocation
page read and write
CA0000
heap
page execute and read and write
A34000
heap
page read and write
191C4174000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
59BF000
heap
page read and write
A43000
heap
page read and write
191C449A000
trusted library allocation
page read and write
B0E000
stack
page read and write
B64000
heap
page read and write
25380084000
trusted library allocation
page read and write
E14E3FE000
stack
page read and write
B66000
heap
page read and write
33FB000
trusted library allocation
page execute and read and write
A2D000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
2539000D000
trusted library allocation
page read and write
2282AF7E000
heap
page read and write
191C41E5000
trusted library allocation
page read and write
910000
heap
page read and write
191C436C000
trusted library allocation
page read and write
E14ED7E000
stack
page read and write
2282AF74000
heap
page read and write
78B000
stack
page read and write
50B0000
heap
page read and write
4B40000
heap
page read and write
191E069C000
heap
page read and write
A47000
heap
page read and write
2282AFB4000
heap
page read and write
1B1FE000
stack
page read and write
37B4000
heap
page read and write
2282CF72000
heap
page read and write
A4B000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
DB55AFE000
stack
page read and write
2282AFB8000
heap
page read and write
3765000
heap
page read and write
B3A000
heap
page read and write
A0D000
heap
page read and write
3775000
heap
page read and write
5340000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
191D3C81000
trusted library allocation
page read and write
964000
stack
page read and write
59B2000
heap
page read and write
253F8FF0000
heap
page read and write
191C4069000
trusted library allocation
page read and write
191DFFC9000
heap
page read and write
3775000
heap
page read and write
3828000
heap
page read and write
7FA90000
trusted library allocation
page execute and read and write
2282B1DF000
heap
page read and write
379E000
heap
page read and write
191DC6F3000
heap
page execute and read and write
191C2180000
trusted library allocation
page read and write
A4E000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
BA1000
heap
page read and write
2282AFA7000
heap
page read and write
1B20C000
heap
page read and write
2282B1C8000
heap
page read and write
253F9380000
heap
page execute and read and write
2282B1DF000
heap
page read and write
B36000
heap
page read and write
B77000
heap
page read and write
B4A000
heap
page read and write
381D000
heap
page read and write
AB0000
heap
page read and write
191C3F28000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2538007B000
trusted library allocation
page read and write
2282B1F5000
heap
page read and write
A40000
heap
page read and write
381D000
heap
page read and write
860000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
191C404D000
trusted library allocation
page read and write
253FB4F0000
heap
page read and write
A6D000
heap
page read and write
37B0000
heap
page read and write
2282AFA7000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
B39000
heap
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
2282B1E9000
heap
page read and write
191DC596000
heap
page read and write
1494000
heap
page read and write
253F92F0000
heap
page read and write
A40000
heap
page read and write
1440000
heap
page read and write
191E004F000
heap
page read and write
14D5000
heap
page read and write
ABA000
heap
page read and write
381E000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
2538007E000
trusted library allocation
page read and write
5E6B000
stack
page read and write
2780000
heap
page execute and read and write
D6E000
stack
page read and write
191DFF00000
heap
page read and write
191C40B9000
trusted library allocation
page read and write
A4C000
heap
page read and write
59BE000
heap
page read and write
5C70000
heap
page read and write
2282B2C0000
heap
page read and write
A6D000
heap
page read and write
59C9000
heap
page read and write
191C438E000
trusted library allocation
page read and write
B70000
heap
page read and write
A2B000
heap
page read and write
191C3F0E000
trusted library allocation
page read and write
3742000
heap
page read and write
B9E000
heap
page read and write
5B6C000
stack
page read and write
2282B1EC000
heap
page read and write
2282B75E000
heap
page read and write
B79000
heap
page read and write
2282B1A0000
heap
page read and write
A05000
heap
page read and write
4E0F000
stack
page read and write
96B000
stack
page read and write
1B3FE000
stack
page read and write
8F5000
heap
page read and write
253800AA000
trusted library allocation
page read and write
3401000
heap
page execute and read and write
379E000
heap
page read and write
2282B1E9000
heap
page read and write
3B05000
trusted library allocation
page read and write
A6E000
heap
page read and write
191C1BE2000
unkown
page readonly
C40000
heap
page read and write
AF0000
heap
page read and write
152000
unkown
page readonly
4E84000
heap
page read and write
A16000
heap
page read and write
3DEF000
trusted library allocation
page read and write
191C4193000
trusted library allocation
page read and write
4E93000
heap
page read and write
1B5FE000
stack
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
191E02A4000
heap
page read and write
191DFD5C000
heap
page read and write
191C406C000
trusted library allocation
page read and write
3777000
heap
page read and write
382C000
heap
page read and write
191E0195000
heap
page read and write
1B219000
heap
page read and write
CD0000
heap
page read and write
191DDE72000
heap
page read and write
14C0000
heap
page read and write
4B50000
heap
page read and write
253F92E0000
trusted library allocation
page read and write
A4C000
heap
page read and write
33C2000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
2282AFA0000
heap
page read and write
191E01DE000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
3788000
heap
page read and write
25380078000
trusted library allocation
page read and write
B9E000
heap
page read and write
B69000
heap
page read and write
191DDE20000
heap
page read and write
59C5000
heap
page read and write
3B39000
trusted library allocation
page read and write
A38000
heap
page read and write
6540000
trusted library allocation
page read and write
A19000
heap
page read and write
191DE30E000
heap
page read and write
2282B752000
heap
page read and write
33A0000
trusted library allocation
page read and write
12FE000
stack
page read and write
92F000
heap
page read and write
59C9000
heap
page read and write
3AC6000
trusted library allocation
page read and write
191DFE3C000
heap
page read and write
191C3AA0000
heap
page read and write
3745000
heap
page read and write
37BB000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
2282B2C5000
heap
page read and write
A09000
heap
page read and write
37B7000
heap
page read and write
191DFD62000
heap
page read and write
2282AF92000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
37B0000
heap
page read and write
191DDE4C000
heap
page read and write
2282AF91000
heap
page read and write
191DC5F1000
heap
page read and write
BE0000
heap
page read and write
2282CF7E000
heap
page read and write
B70000
heap
page read and write
A16000
heap
page read and write
B11000
heap
page read and write
BEC000
heap
page read and write
2282AFAA000
heap
page read and write
1B8FE000
stack
page read and write
BEE000
heap
page read and write
There are 1110 hidden memdumps, click here to show them.