IOC Report
13ZNp2xvRU.exe

loading gif

Files

File Path
Type
Category
Malicious
13ZNp2xvRU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Google\Update\RRVGfHJzvQMYfWe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\smartscreen.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\RRVGfHJzvQMYfWe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Panther\setup.exe\fontdrvhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\twain_32\Registry.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\4ed18479ee5d61
ASCII text, with very long lines (949), with no line terminators
dropped
C:\Program Files (x86)\Google\Update\RRVGfHJzvQMYfWe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Java\4ed18479ee5d61
ASCII text, with very long lines (682), with no line terminators
dropped
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\2afe4ed40d5a86
ASCII text, with no line terminators
dropped
C:\ProgramData\smartscreen.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\4ed18479ee5d61
ASCII text, with very long lines (992), with no line terminators
dropped
C:\Recovery\RRVGfHJzvQMYfWe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\13ZNp2xvRU.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RRVGfHJzvQMYfWe.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Registry.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UserOOBEBroker.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smartscreen.exe.log
CSV text
dropped
C:\Windows\IME\IMETC\HELP\7ccfebd9e92364
ASCII text, with very long lines (810), with no line terminators
dropped
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\PLA\Templates\4ed18479ee5d61
ASCII text, with no line terminators
dropped
C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\Panther\setup.exe\5b884080fd4f94
ASCII text, with no line terminators
dropped
C:\Windows\Panther\setup.exe\fontdrvhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\twain_32\Registry.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\twain_32\ee2ad38f3d4382
ASCII text, with no line terminators
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\13ZNp2xvRU.exe
"C:\Users\user\Desktop\13ZNp2xvRU.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 6 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 7 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\Registry.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\twain_32\Registry.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Windows\twain_32\Registry.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\smartscreen.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smartscreen" /sc ONLOGON /tr "'C:\Users\All Users\smartscreen.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\smartscreen.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 12 /tr "'C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 10 /tr "'C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 6 /tr "'C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "UserOOBEBroker" /sc ONLOGON /tr "'C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 12 /tr "'C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 10 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 14 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Windows\Panther\setup.exe\fontdrvhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\fontdrvhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Windows\Panther\setup.exe\fontdrvhost.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\Google\Update\RRVGfHJzvQMYfWe.exe
"C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe"
malicious
C:\Windows\Panther\setup.exe\fontdrvhost.exe
C:\Windows\Panther\setup.exe\fontdrvhost.exe
malicious
C:\Windows\Panther\setup.exe\fontdrvhost.exe
C:\Windows\Panther\setup.exe\fontdrvhost.exe
malicious
C:\Windows\twain_32\Registry.exe
C:\Windows\twain_32\Registry.exe
malicious
C:\Windows\twain_32\Registry.exe
C:\Windows\twain_32\Registry.exe
malicious
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe
"C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe"
malicious
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe
"C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe"
malicious
C:\ProgramData\smartscreen.exe
"C:\Users\All Users\smartscreen.exe"
malicious
C:\ProgramData\smartscreen.exe
"C:\Users\All Users\smartscreen.exe"
malicious
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
malicious
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
malicious
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://45.130.42.16/6/api144/9Wp/
unknown
malicious
http://45.130.42.16
unknown
malicious
http://45.130.42.16/6/api144/9Wp/@0xWdhZWZkRWYvx2ZpJUdwNWb2V2Zh1WS
malicious
http://45.130.42.16/upload/resize_cache/bitlate_proshop/e2e/968_503_1/9w9p11chf5twz88a77wq28ajd28u8b
unknown
http://45.130.42.16/6/api144/9Wp/ImagevmcpuBigloaddefault.php?MCq8kxznRpE60jYE6i=lG5zicKtIWeAP&wK0sd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
45.130.42.16
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\a2308a5fb7cb542ba94f40ef8d7e7d23fb64f0d0
0d5c896f05c6dc460e3ebc77c5fa5625e2a6754e
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3251000
trusted library allocation
page read and write
malicious
2C41000
trusted library allocation
page read and write
malicious
2D91000
trusted library allocation
page read and write
malicious
2C0E000
trusted library allocation
page read and write
malicious
2CA7000
trusted library allocation
page read and write
malicious
2BC1000
trusted library allocation
page read and write
malicious
2DD8000
trusted library allocation
page read and write
malicious
2681000
trusted library allocation
page read and write
malicious
28A8000
trusted library allocation
page read and write
malicious
252D000
trusted library allocation
page read and write
malicious
2381000
trusted library allocation
page read and write
malicious
2C81000
trusted library allocation
page read and write
malicious
24E1000
trusted library allocation
page read and write
malicious
23D2000
trusted library allocation
page read and write
malicious
26C8000
trusted library allocation
page read and write
malicious
2E64000
trusted library allocation
page read and write
malicious
2481000
trusted library allocation
page read and write
malicious
28E0000
trusted library allocation
page read and write
malicious
2B51000
trusted library allocation
page read and write
malicious
23CB000
trusted library allocation
page read and write
malicious
2D41000
trusted library allocation
page read and write
malicious
7FFD9B953000
trusted library allocation
page read and write
1B66E000
stack
page read and write
13253000
trusted library allocation
page read and write
1B64E000
stack
page read and write
AF6000
stack
page read and write
7FFD9B787000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
3E0000
heap
page read and write
D70000
heap
page read and write
1250000
trusted library allocation
page read and write
1BAF0000
heap
page read and write
6D6000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
F93000
heap
page read and write
7FFD9B78C000
trusted library allocation
page read and write
970000
heap
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
10F6000
stack
page read and write
13251000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
FC5000
heap
page read and write
1AA6E000
stack
page read and write
1BB00000
heap
page read and write
2A70000
heap
page execute and read and write
ABB000
heap
page read and write
7FFD9B89F000
trusted library allocation
page execute and read and write
7FFD9B8FC000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
7FFD9B8FE000
trusted library allocation
page read and write
F5F000
heap
page read and write
1B77E000
stack
page read and write
FC2000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1BD56000
heap
page read and write
840000
heap
page read and write
1BD13000
stack
page read and write
1B14D000
stack
page read and write
3B0000
heap
page read and write
2543000
trusted library allocation
page read and write
3D5000
heap
page read and write
1BA73000
stack
page read and write
1120000
heap
page read and write
2CCB000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
12FD000
heap
page read and write
F8B000
heap
page read and write
2560000
heap
page read and write
B33000
heap
page read and write
1B6A0000
heap
page read and write
1BABC000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
22A0000
heap
page read and write
1B9DF000
stack
page read and write
12E0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
C57000
heap
page read and write
1ACB0000
trusted library allocation
page read and write
1BE00000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
12C0000
heap
page read and write
109C000
heap
page read and write
CC5000
heap
page read and write
7FFD9B913000
trusted library allocation
page read and write
12BC8000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BC0B000
heap
page read and write
12BCD000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
2546000
trusted library allocation
page read and write
17F5000
heap
page read and write
E35000
heap
page read and write
1B91F000
stack
page read and write
FB6000
heap
page read and write
2B0E000
stack
page read and write
B36000
heap
page read and write
1ADE0000
heap
page read and write
2E00000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B76C000
trusted library allocation
page read and write
1AC0D000
stack
page read and write
1AE70000
heap
page read and write
3D0000
heap
page read and write
2E50000
trusted library allocation
page read and write
7FFD9B94B000
trusted library allocation
page read and write
FDF000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
124F000
stack
page read and write
7FFD9B773000
trusted library allocation
page read and write
1018000
heap
page read and write
1A3B0000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
2C67000
trusted library allocation
page read and write
1B07F000
stack
page read and write
1B6D0000
heap
page execute and read and write
B95000
heap
page read and write
1BA9E000
stack
page read and write
7FFD9B87A000
trusted library allocation
page execute and read and write
1BB8E000
stack
page read and write
A50000
trusted library allocation
page read and write
13C5000
heap
page read and write
1B060000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1B01E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
1B87E000
stack
page read and write
ACB000
heap
page read and write
2CA6000
trusted library allocation
page read and write
56B000
heap
page read and write
1B570000
heap
page read and write
7FFD9B89F000
trusted library allocation
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
F10000
heap
page read and write
1425000
heap
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
1BC36000
heap
page read and write
15B0000
heap
page read and write
24D0000
heap
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
930000
heap
page read and write
762000
unkown
page readonly
7FFD9B8A1000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
F6D000
heap
page read and write
7FFD9B934000
trusted library allocation
page read and write
E10000
heap
page read and write
1BD17000
heap
page read and write
1AE1D000
stack
page read and write
6D0000
heap
page read and write
1BC81000
heap
page read and write
ACD000
heap
page read and write
1BBF7000
heap
page read and write
1B590000
heap
page read and write
2E53000
trusted library allocation
page read and write
7FFD9B93B000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page execute and read and write
28EB000
trusted library allocation
page read and write
1B184000
stack
page read and write
1BCE4000
heap
page read and write
1B97E000
stack
page read and write
700000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
380000
heap
page read and write
12898000
trusted library allocation
page read and write
BE6000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
D5F000
stack
page read and write
237E000
stack
page read and write
2C5F000
trusted library allocation
page read and write
EF6000
stack
page read and write
12D98000
trusted library allocation
page read and write
12E5000
heap
page read and write
1BB3D000
heap
page read and write
1BBA0000
heap
page read and write
1B48E000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B08E000
stack
page read and write
1B1BE000
stack
page read and write
7FFD9B787000
trusted library allocation
page read and write
2BB0000
heap
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
119F000
stack
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
7FFD9B806000
trusted library allocation
page read and write
7FFD9B777000
trusted library allocation
page read and write
7FFD9B913000
trusted library allocation
page read and write
1BD80000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
7FFD9B89A000
trusted library allocation
page execute and read and write
7FFD9B91A000
trusted library allocation
page read and write
1C09E000
stack
page read and write
2B9E000
trusted library allocation
page read and write
12D9D000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
DB3000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
70F000
heap
page read and write
124E3000
trusted library allocation
page read and write
7FFD9B916000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FFD9B8FC000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2D3F000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
2C70000
heap
page execute and read and write
2250000
heap
page read and write
7B0000
heap
page read and write
1B650000
heap
page execute and read and write
103C000
heap
page read and write
1BB12000
heap
page read and write
2880000
heap
page execute and read and write
12B51000
trusted library allocation
page read and write
7FFD9B89A000
trusted library allocation
page execute and read and write
7FFD9B89A000
trusted library allocation
page execute and read and write
12D48000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1C19E000
stack
page read and write
1BC1B000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
800000
trusted library allocation
page read and write
AB5000
heap
page read and write
2270000
heap
page execute and read and write
1B670000
heap
page execute and read and write
1BA84000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B957000
trusted library allocation
page read and write
12D91000
trusted library allocation
page read and write
24CF000
stack
page read and write
7FFD9B951000
trusted library allocation
page read and write
BE0000
heap
page read and write
F58000
heap
page read and write
1220000
heap
page read and write
1BBD4000
stack
page read and write
690000
unkown
page readonly
7FFD9B920000
trusted library allocation
page read and write
2470000
heap
page execute and read and write
7FFD9B787000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B926000
trusted library allocation
page read and write
12BC1000
trusted library allocation
page read and write
DDF000
heap
page read and write
F15000
heap
page read and write
986000
heap
page read and write
7FFD9B913000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
E50000
heap
page read and write
1B61E000
stack
page read and write
2D34000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1AD4E000
stack
page read and write
AAB000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
1BB42000
heap
page read and write
1AD70000
trusted library allocation
page read and write
6A5000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1065000
heap
page read and write
1B310000
heap
page read and write
1C29D000
stack
page read and write
7E0000
heap
page read and write
28ED000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
1238D000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1A90C000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1BCD3000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B91E000
trusted library allocation
page read and write
2480000
trusted library allocation
page read and write
1B9F0000
heap
page execute and read and write
10D8000
heap
page read and write
79B000
heap
page read and write
12688000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
281E000
stack
page read and write
2B40000
heap
page execute and read and write
C09000
heap
page read and write
A20000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
2B70000
trusted library allocation
page read and write
810000
heap
page read and write
1BB81000
heap
page read and write
E30000
heap
page read and write
2670000
heap
page execute and read and write
1270000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
1B213000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
1B283000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
16BF000
stack
page read and write
1392000
heap
page read and write
12D93000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
7FFD9B89A000
trusted library allocation
page execute and read and write
10DD000
heap
page read and write
DE2000
heap
page read and write
12D41000
trusted library allocation
page read and write
D9F000
heap
page read and write
2A10000
heap
page read and write
F75000
heap
page read and write
950000
heap
page read and write
BEC000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
610000
heap
page read and write
1A4B0000
trusted library allocation
page read and write
DA1000
heap
page read and write
24A0000
heap
page execute and read and write
7FFD9B937000
trusted library allocation
page read and write
1B894000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
849000
heap
page read and write
12B0000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
6FA000
heap
page read and write
F80000
trusted library allocation
page read and write
1B0DC000
stack
page read and write
1BB7E000
stack
page read and write
2C3F000
stack
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
580000
heap
page read and write
73F000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
124E8000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1270000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
1B38E000
stack
page read and write
7FFD9B958000
trusted library allocation
page read and write
7FFD9B77C000
trusted library allocation
page read and write
EF6000
stack
page read and write
B95000
heap
page read and write
7FFD9B79C000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B90E000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
1295000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
CC0000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B933000
trusted library allocation
page read and write
BFE000
heap
page read and write
114F000
stack
page read and write
F96000
heap
page read and write
1BBDE000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
1200000
heap
page read and write
F70000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
625000
heap
page read and write
2555000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
1BC61000
heap
page read and write
7FFD9B943000
trusted library allocation
page read and write
1B69E000
stack
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
101F000
heap
page read and write
A25000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
2DB8000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
1A510000
trusted library allocation
page read and write
1B17F000
stack
page read and write
13EE000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
1010000
heap
page read and write
28D9000
trusted library allocation
page read and write
A34000
heap
page read and write
1B79E000
stack
page read and write
628000
heap
page read and write
2A5E000
stack
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
FBF000
heap
page read and write
D36000
stack
page read and write
7FFD9B783000
trusted library allocation
page read and write
7FFD9B89F000
trusted library allocation
page execute and read and write
1BB5E000
stack
page read and write
1AF80000
heap
page execute and read and write
1BC5E000
stack
page read and write
1BC60000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
17F0000
heap
page read and write
2E03000
trusted library allocation
page read and write
980000
heap
page read and write
7FFD9B923000
trusted library allocation
page read and write
DB1000
heap
page read and write
5F6000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
1BC4F000
heap
page read and write
7FFD9B951000
trusted library allocation
page read and write
5AE000
heap
page read and write
C1F000
heap
page read and write
7FFD9B90B000
trusted library allocation
page read and write
F7B000
heap
page read and write
86B000
heap
page read and write
12C83000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
1B16F000
stack
page read and write
2D20000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
12E8000
heap
page read and write
1BC7E000
stack
page read and write
1C053000
stack
page read and write
13C0000
heap
page read and write
1300000
heap
page read and write
776000
stack
page read and write
1BCAD000
heap
page read and write
7FFD9B91E000
trusted library allocation
page read and write
73C000
heap
page read and write
136D000
heap
page read and write
12C41000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2D49000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
12FB000
heap
page read and write
9C2000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B764000
trusted library allocation
page read and write
1AA0D000
stack
page read and write
7FFD9B89F000
trusted library allocation
page execute and read and write
704000
heap
page read and write
98C000
heap
page read and write
31DC000
stack
page read and write
EA0000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
54C000
heap
page read and write
7FFD9B951000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B8A1000
trusted library allocation
page execute and read and write
12481000
trusted library allocation
page read and write
28FF000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1210000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1B91E000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
583000
heap
page read and write
9B4000
heap
page read and write
1265000
heap
page read and write
C8E000
heap
page read and write
1BB14000
heap
page read and write
695000
heap
page read and write
1BD22000
heap
page read and write
12681000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
12C8D000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
12E5000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
1BC8D000
heap
page read and write
DDD000
heap
page read and write
12B5D000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
2BC0000
heap
page read and write
9F0000
heap
page read and write
7FFD9B91E000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
12C88000
trusted library allocation
page read and write
12383000
trusted library allocation
page read and write
9ED000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2C86000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B773000
trusted library allocation
page execute and read and write
12C51000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
B61000
heap
page read and write
9CF000
stack
page read and write
500000
heap
page read and write
1BCC6000
heap
page read and write
7FFD9B913000
trusted library allocation
page read and write
7FF4D83A0000
trusted library allocation
page execute and read and write
7FFD9B951000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
87B000
heap
page read and write
EB0000
heap
page read and write
B2F000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
1BC84000
heap
page read and write
1BB2D000
heap
page read and write
1BDE0000
heap
page read and write
1B25F000
stack
page read and write
1BAA0000
heap
page read and write
2E65000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
2950000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
2190000
heap
page read and write
CF6000
stack
page read and write
1A6B0000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
7FFD9B77C000
trusted library allocation
page read and write
1420000
heap
page read and write
109E000
heap
page read and write
1BC02000
heap
page read and write
5FE000
heap
page read and write
510000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B913000
trusted library allocation
page read and write
F38000
heap
page read and write
7FFD9B767000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
692000
unkown
page readonly
CB8000
heap
page read and write
A25000
heap
page read and write
2C26000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page read and write
E25000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
1B1DD000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
1B11E000
stack
page read and write
7FFD9B91C000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
4F6000
stack
page read and write
7FFD9B93B000
trusted library allocation
page read and write
631000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
B90000
heap
page read and write
1BAD3000
stack
page read and write
1B7DE000
stack
page read and write
D76000
heap
page read and write
F20000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
C9C000
heap
page read and write
2E0E000
trusted library allocation
page read and write
11E0000
heap
page read and write
1B31D000
stack
page read and write
1BB1F000
stack
page read and write
1B51E000
stack
page read and write
1BCE9000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
E00000
heap
page read and write
1BCC0000
heap
page read and write
7FFD9B926000
trusted library allocation
page read and write
11FF000
stack
page read and write
865000
heap
page read and write
7FFD9B767000
trusted library allocation
page read and write
1B993000
stack
page read and write
12C8000
heap
page read and write
9A0000
heap
page read and write
1B51F000
stack
page read and write
1BCF2000
heap
page read and write
1BBFB000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
690000
unkown
page readonly
7FFD9B856000
trusted library allocation
page execute and read and write
266E000
stack
page read and write
7FFD9B750000
trusted library allocation
page read and write
1B41F000
stack
page read and write
1BF9E000
stack
page read and write
F5C000
heap
page read and write
12C81000
trusted library allocation
page read and write
2552000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
1C23B000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
1BB98000
heap
page read and write
1BAA8000
heap
page read and write
2D46000
trusted library allocation
page read and write
10A1000
heap
page read and write
1B363000
stack
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
FFB000
heap
page read and write
2D2C000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
12483000
trusted library allocation
page read and write
1A8C0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
14BE000
stack
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B896000
trusted library allocation
page execute and read and write
7FFD9B89F000
trusted library allocation
page execute and read and write
DA5000
heap
page read and write
1B75E000
stack
page read and write
8E3000
heap
page read and write
D7C000
heap
page read and write
1B5A0000
heap
page read and write
870000
heap
page read and write
FB0000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
12BC3000
trusted library allocation
page read and write
7FFD9B89A000
trusted library allocation
page execute and read and write
7FFD9B787000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
F30000
heap
page read and write
7FFD9B88A000
trusted library allocation
page execute and read and write
7FFD9B937000
trusted library allocation
page read and write
12B58000
trusted library allocation
page read and write
1BAC5000
heap
page read and write
2D64000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
7FFD9B76C000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
A42000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B8A1000
trusted library allocation
page execute and read and write
7FFD9B776000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
12C4D000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page read and write
E50000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
1BC78000
heap
page read and write
15B5000
heap
page read and write
2540000
trusted library allocation
page read and write
12D4D000
trusted library allocation
page read and write
1B8DF000
stack
page read and write
1BDEA000
heap
page read and write
F5E000
stack
page read and write
A70000
trusted library allocation
page read and write
1BB8D000
heap
page read and write
FD1000
heap
page read and write
2BB4000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BF5E000
stack
page read and write
F50000
heap
page read and write
B7F000
stack
page read and write
73A000
heap
page read and write
1B98E000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
830000
heap
page read and write
7FFD9B91E000
trusted library allocation
page read and write
1BC93000
heap
page read and write
7C0000
heap
page read and write
1329000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B933000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
1248D000
trusted library allocation
page read and write
1B57E000
stack
page read and write
5E7000
heap
page read and write
2BAE000
stack
page read and write
5F0000
heap
page read and write
122F000
stack
page read and write
F10000
heap
page read and write
1B810000
heap
page execute and read and write
8A6000
heap
page read and write
E15000
heap
page read and write
FF0000
heap
page read and write
14E0000
trusted library allocation
page read and write
1BD83000
stack
page read and write
571000
heap
page read and write
2C90000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page read and write
EA5000
heap
page read and write
D70000
heap
page read and write
7FFD9B933000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
2ABE000
stack
page read and write
7FFD9B830000
trusted library allocation
page read and write
274E000
trusted library allocation
page read and write
1B373000
stack
page read and write
D9B000
heap
page read and write
2D4C000
trusted library allocation
page read and write
AB9000
heap
page read and write
907000
heap
page read and write
FC0000
heap
page read and write
7FFD9B776000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
1B47E000
stack
page read and write
586000
heap
page read and write
1BA50000
heap
page read and write
12891000
trusted library allocation
page read and write
1B274000
stack
page read and write
7FFD9B881000
trusted library allocation
page execute and read and write
690000
heap
page read and write
114F000
stack
page read and write
2D30000
heap
page read and write
1BA51000
stack
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
1BBC6000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
6DC000
heap
page read and write
B90000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B926000
trusted library allocation
page read and write
1B85E000
stack
page read and write
80F000
stack
page read and write
1BBB4000
heap
page read and write
107F000
stack
page read and write
12683000
trusted library allocation
page read and write
1BD7E000
stack
page read and write
1BADB000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
AF6000
heap
page read and write
7FFD9B906000
trusted library allocation
page read and write
C4C000
heap
page read and write
1B75E000
stack
page read and write
7FFD9B92C000
trusted library allocation
page read and write
1268D000
trusted library allocation
page read and write
17BE000
stack
page read and write
2440000
trusted library allocation
page read and write
A00000
heap
page read and write
D36000
stack
page read and write
2455000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B91E000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
12EE000
stack
page read and write
CE0000
heap
page read and write
13A0000
heap
page execute and read and write
7FFD9B923000
trusted library allocation
page read and write
124ED000
trusted library allocation
page read and write
DB7000
heap
page read and write
7FFD9B91C000
trusted library allocation
page read and write
1220000
heap
page read and write
254C000
trusted library allocation
page read and write
7FFD9B91B000
trusted library allocation
page read and write
1BB91000
heap
page read and write
1C13E000
stack
page read and write
C22000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
F69000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
AF8000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
5F4000
heap
page read and write
1305000
heap
page read and write
1070000
heap
page read and write
1BBE1000
heap
page read and write
1ABF0000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
DA0000
heap
page read and write
1BCE2000
heap
page read and write
7FFD9B88F000
trusted library allocation
page execute and read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B797000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
910000
heap
page read and write
711000
heap
page read and write
FB8000
heap
page read and write
7FFD9B91C000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
868000
heap
page read and write
1E0000
heap
page read and write
8A8000
heap
page read and write
2DA4000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
12C43000
trusted library allocation
page read and write
10CE000
stack
page read and write
3240000
heap
page execute and read and write
D30000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1BACB000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2CA3000
trusted library allocation
page read and write
8CF000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2D47000
trusted library allocation
page read and write
12488000
trusted library allocation
page read and write
2CCE000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
1327000
heap
page read and write
1BB5F000
stack
page read and write
7FFD9B78C000
trusted library allocation
page read and write
139F000
stack
page read and write
25AF000
trusted library allocation
page read and write
A20000
heap
page read and write
1AB80000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B90C000
trusted library allocation
page read and write
1036000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
4F6000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B783000
trusted library allocation
page read and write
1325D000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page read and write
13258000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
1B2D0000
heap
page execute and read and write
1B613000
stack
page read and write
F91000
heap
page read and write
7FFD9B886000
trusted library allocation
page execute and read and write
2D1E000
trusted library allocation
page read and write
CDE000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B777000
trusted library allocation
page read and write
1B280000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
2443000
trusted library allocation
page read and write
F1F000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2E62000
trusted library allocation
page read and write
7FFD9B8A1000
trusted library allocation
page execute and read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
7FFD9B93C000
trusted library allocation
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B777000
trusted library allocation
page read and write
1B6AF000
stack
page read and write
8F5000
heap
page read and write
F8D000
heap
page read and write
1200000
heap
page read and write
1C03D000
stack
page read and write
6A0000
heap
page read and write
1B51E000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1B780000
heap
page read and write
13F0000
heap
page execute and read and write
1C15F000
stack
page read and write
1BD32000
heap
page read and write
1BCDE000
stack
page read and write
1AC70000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
2B30000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
F50000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
1BAC0000
heap
page read and write
124E1000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
7FFD9B926000
trusted library allocation
page read and write
F6B000
heap
page read and write
1019000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1BA14000
stack
page read and write
2D97000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
1B26E000
stack
page read and write
7FFD9B954000
trusted library allocation
page read and write
5B1000
heap
page read and write
2D80000
heap
page execute and read and write
D70000
heap
page read and write
7FFD9B8A1000
trusted library allocation
page execute and read and write
DFE000
stack
page read and write
E70000
heap
page read and write
C2F000
stack
page read and write
1BC8E000
stack
page read and write
C9F000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
650000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BAD4000
heap
page read and write
1B7AF000
stack
page read and write
7FFD9B762000
trusted library allocation
page read and write
1BC23000
heap
page read and write
6F6000
stack
page read and write
1240000
heap
page read and write
FD0000
heap
page read and write
F75000
heap
page read and write
546000
heap
page read and write
12B61000
trusted library allocation
page read and write
F75000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page read and write
1B41B000
stack
page read and write
540000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
7FFD9B787000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1B46E000
stack
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
9FE000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1B81E000
stack
page read and write
11E5000
heap
page read and write
5AC000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
390000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
F40000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
23AE000
stack
page read and write
12DB000
heap
page read and write
12381000
trusted library allocation
page read and write
7FFD9B787000
trusted library allocation
page read and write
FBD000
heap
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
7FFD9B78C000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1AEEE000
stack
page read and write
7FFD9B911000
trusted library allocation
page read and write
1BC5E000
stack
page read and write
1ADC0000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1AF7E000
stack
page read and write
8C0000
trusted library allocation
page read and write
1BDDF000
stack
page read and write
3313000
trusted library allocation
page read and write
1B31E000
stack
page read and write
12D43000
trusted library allocation
page read and write
1B04E000
stack
page read and write
1B954000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
FCA000
heap
page read and write
1B20E000
stack
page read and write
830000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2449000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
1AF1E000
stack
page read and write
1AE10000
heap
page execute and read and write
1B56F000
stack
page read and write
7FFD9B926000
trusted library allocation
page read and write
1B88E000
stack
page read and write
F00000
heap
page read and write
1BB6B000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
A98000
heap
page read and write
1B520000
heap
page read and write
D70000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1072000
heap
page read and write
1290000
heap
page read and write
1290000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
1BD5F000
stack
page read and write
7FFD9B90C000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
E70000
heap
page read and write
1BE54000
stack
page read and write
87D000
heap
page read and write
9EB000
heap
page read and write
7FFD9B901000
trusted library allocation
page read and write
12388000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
1C2DE000
stack
page read and write
2549000
trusted library allocation
page read and write
7FFD9B87F000
trusted library allocation
page execute and read and write
F6B000
heap
page read and write
1289D000
trusted library allocation
page read and write
7FFD9B78C000
trusted library allocation
page read and write
30D0000
heap
page read and write
8F0000
heap
page read and write
ABF000
heap
page read and write
7FFD9B93B000
trusted library allocation
page read and write
2446000
trusted library allocation
page read and write
12EB000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1B71E000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
1030000
heap
page read and write
2930000
heap
page execute and read and write
12893000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
There are 1017 hidden memdumps, click here to show them.