IOC Report
Xmz1XDgtah.exe

loading gif

Files

File Path
Type
Category
Malicious
Xmz1XDgtah.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\uPlspWkqijAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Portable Devices\SystemSettings.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\uPlspWkqijAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\uPlspWkqijAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\33d07815358cfe
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\uPlspWkqijAQ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Windows Mail\33d07815358cfe
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\33d07815358cfe
ASCII text, with very long lines (874), with no line terminators
dropped
C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Program Files\Windows Portable Devices\9e60a5f7a3bd80
ASCII text, with very long lines (442), with no line terminators
dropped
C:\Program Files\Windows Portable Devices\SystemSettings.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\9e8d7a4ca61bd9
ASCII text, with no line terminators
dropped
C:\ProgramData\RuntimeBroker.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\33d07815358cfe
ASCII text, with no line terminators
dropped
C:\Recovery\uPlspWkqijAQ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\33d07815358cfe
ASCII text, with very long lines (995), with no line terminators
dropped
C:\Users\Default\uPlspWkqijAQ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SystemSettings.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xmz1XDgtah.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\uPlspWkqijAQ.exe.log
CSV text
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Xmz1XDgtah.exe
"C:\Users\user\Desktop\Xmz1XDgtah.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\reference assemblies\Microsoft\Framework\uPlspWkqijAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\reference assemblies\Microsoft\Framework\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\reference assemblies\Microsoft\Framework\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 8 /tr "'C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 6 /tr "'C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\SystemSettings.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 7 /tr "'C:\Users\Default\uPlspWkqijAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Users\Default\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 13 /tr "'C:\Users\Default\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 7 /tr "'C:\Recovery\uPlspWkqijAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Recovery\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 14 /tr "'C:\Recovery\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe'" /rl HIGHEST /f
malicious
C:\ProgramData\RuntimeBroker.exe
"C:\Users\All Users\RuntimeBroker.exe"
malicious
C:\ProgramData\RuntimeBroker.exe
"C:\Users\All Users\RuntimeBroker.exe"
malicious
C:\ProgramData\RuntimeBroker.exe
"C:\Users\All Users\RuntimeBroker.exe"
malicious
C:\Program Files\Windows Portable Devices\SystemSettings.exe
"C:\Program Files\Windows Portable Devices\SystemSettings.exe"
malicious
C:\Program Files\Windows Portable Devices\SystemSettings.exe
"C:\Program Files\Windows Portable Devices\SystemSettings.exe"
malicious
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe
"C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe"
malicious
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe
"C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe"
malicious
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com
unknown
http://fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com/@zd3bk5Wa3RHb1FmZlR0X
http://fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
us-east-1.route-1.000webhost.awex.io
145.14.145.191
fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com
unknown

IPs

IP
Domain
Country
Malicious
145.14.145.191
us-east-1.route-1.000webhost.awex.io
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\2f2835e5d4876ac1404532ec76233e99ff61127a
dcbc3dbdb0abc40181298a0d36a05a10ec856e51

Memdumps

Base Address
Regiontype
Protect
Malicious
2801000
trusted library allocation
page read and write
malicious
12BEF000
trusted library allocation
page read and write
malicious
2BB1000
trusted library allocation
page read and write
malicious
31B1000
trusted library allocation
page read and write
malicious
2EE1000
trusted library allocation
page read and write
malicious
2AB1000
trusted library allocation
page read and write
malicious
2AEC000
trusted library allocation
page read and write
malicious
309B000
trusted library allocation
page read and write
malicious
283F000
trusted library allocation
page read and write
malicious
2BE1000
trusted library allocation
page read and write
malicious
34A1000
trusted library allocation
page read and write
malicious
3080000
trusted library allocation
page read and write
malicious
26BB000
trusted library allocation
page read and write
malicious
26A1000
trusted library allocation
page read and write
malicious
306D000
trusted library allocation
page read and write
11FB000
heap
page read and write
C00000
heap
page read and write
3274000
trusted library allocation
page read and write
1BBCB000
stack
page read and write
7FF848DF3000
trusted library allocation
page read and write
12EE1000
trusted library allocation
page read and write
1C816000
heap
page read and write
12ABD000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
8CA000
heap
page read and write
1080000
trusted library allocation
page read and write
131BD000
trusted library allocation
page read and write
15A0000
heap
page read and write
946000
stack
page read and write
1348000
heap
page read and write
306C000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
813000
heap
page read and write
1BB50000
heap
page read and write
A6F000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
3030000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1B8AF000
stack
page read and write
7FF848E3C000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
E70000
heap
page read and write
134A8000
trusted library allocation
page read and write
7FF848F4F000
trusted library allocation
page execute and read and write
13C69000
trusted library allocation
page read and write
7FF8490AD000
trusted library allocation
page read and write
2E95000
trusted library allocation
page read and write
7FF848F96000
trusted library allocation
page read and write
1D4FE000
stack
page read and write
C5A000
heap
page read and write
1BDCF000
stack
page read and write
3181000
trusted library allocation
page read and write
1BAEE000
heap
page read and write
1286D000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
1387000
heap
page read and write
1C775000
heap
page read and write
7FF848E33000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
7FF849008000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848FBB000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
846000
heap
page read and write
104D000
heap
page read and write
1C8FE000
stack
page read and write
3276000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
12BE8000
trusted library allocation
page read and write
1BCC3000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
790000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
1BB04000
heap
page read and write
7FF84915A000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
1CDFE000
stack
page read and write
710000
unkown
page readonly
7FF849050000
trusted library allocation
page read and write
7B0000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
16AC000
heap
page read and write
2AAF000
stack
page read and write
2F62000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
712000
unkown
page readonly
16E5000
heap
page read and write
1C706000
heap
page read and write
8FD000
heap
page read and write
34FE000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
7FF848FE7000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
3A58000
trusted library allocation
page read and write
1AF10000
trusted library allocation
page read and write
E20000
heap
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
A30000
heap
page read and write
1BC5E000
stack
page read and write
7FF848F4B000
trusted library allocation
page execute and read and write
12CAC000
trusted library allocation
page read and write
7FF848E37000
trusted library allocation
page read and write
2EEC000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
19FF000
stack
page read and write
2EE6000
trusted library allocation
page read and write
7FF848FB3000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
7C0000
heap
page read and write
341C000
trusted library allocation
page read and write
1510000
heap
page read and write
AD9000
heap
page read and write
1611000
heap
page read and write
640000
heap
page read and write
3551000
trusted library allocation
page read and write
34FC000
trusted library allocation
page read and write
1AF6C000
heap
page read and write
13D46000
trusted library allocation
page read and write
13927000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
2D60000
heap
page execute and read and write
7FF848EDC000
trusted library allocation
page execute and read and write
7FF848F4B000
trusted library allocation
page execute and read and write
2FFF000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848FE3000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
126B1000
trusted library allocation
page read and write
ED5000
heap
page read and write
3078000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
1C712000
heap
page read and write
1BB1D000
heap
page read and write
BBF000
heap
page read and write
2FFE000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
2ED8000
trusted library allocation
page read and write
34F2000
trusted library allocation
page read and write
1C7CB000
heap
page read and write
7FF84906D000
trusted library allocation
page read and write
1BBB0000
trusted library section
page read and write
3716000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
1C9FE000
stack
page read and write
CAD000
heap
page read and write
3215000
trusted library allocation
page read and write
1C0CE000
stack
page read and write
FD0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
327E000
trusted library allocation
page read and write
1038000
heap
page read and write
A00000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
13AA7000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
7FF848F8C000
trusted library allocation
page read and write
7FF848DF7000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
7FF848E44000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
1660000
heap
page read and write
35D2000
trusted library allocation
page read and write
1648000
heap
page read and write
1C807000
heap
page read and write
7FF848FD6000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1BBA3000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
1BB3D000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
1B6BF000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
131C1000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848E96000
trusted library allocation
page read and write
DFF000
stack
page read and write
27F0000
heap
page execute and read and write
7FF848F00000
trusted library allocation
page execute and read and write
756000
stack
page read and write
2EE8000
trusted library allocation
page read and write
28BC000
trusted library allocation
page read and write
26FF000
stack
page read and write
3143000
trusted library allocation
page read and write
CFE000
stack
page read and write
7FF848FD6000
trusted library allocation
page read and write
119E000
stack
page read and write
1321A000
trusted library allocation
page read and write
A9C000
heap
page read and write
1BC70000
trusted library section
page read and write
1CE59000
heap
page read and write
126A3000
trusted library allocation
page read and write
12F6000
stack
page read and write
12AB3000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
13003000
trusted library allocation
page read and write
3418000
trusted library allocation
page read and write
7FF848F46000
trusted library allocation
page execute and read and write
2D6D000
trusted library allocation
page read and write
1BECE000
stack
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
2E8F000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
12F3A000
trusted library allocation
page read and write
1C10E000
stack
page read and write
1B46E000
stack
page read and write
1AF6E000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
1102000
heap
page read and write
1AE60000
trusted library allocation
page read and write
1BFC3000
stack
page read and write
7FF848F12000
trusted library allocation
page execute and read and write
1B5BE000
stack
page read and write
1C723000
heap
page read and write
2E62000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848E37000
trusted library allocation
page read and write
1BBA1000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
163C000
heap
page read and write
E6F000
stack
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
3112000
trusted library allocation
page read and write
1642000
heap
page read and write
1780000
trusted library allocation
page read and write
15EF000
stack
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
1B010000
heap
page read and write
1687000
heap
page read and write
2EFA000
trusted library allocation
page read and write
13044000
trusted library allocation
page read and write
12D5D000
trusted library allocation
page read and write
1CE71000
heap
page read and write
7FF848F0F000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
3775000
trusted library allocation
page read and write
1B7AF000
stack
page read and write
32E8000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page execute and read and write
7FF848E03000
trusted library allocation
page read and write
1BABE000
stack
page read and write
BC2000
heap
page read and write
2A40000
heap
page read and write
2E6C000
trusted library allocation
page read and write
1BB44000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
1DEFD000
stack
page read and write
370C000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
710000
unkown
page readonly
3004000
trusted library allocation
page read and write
3A56000
trusted library allocation
page read and write
BFE000
stack
page read and write
1CE0C000
heap
page read and write
1B4D0000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
7FF849142000
trusted library allocation
page read and write
2F34000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page read and write
1B9BE000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
11F5000
heap
page read and write
32E6000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
7FF848EE0000
trusted library allocation
page execute and read and write
7FF848FE3000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
3852000
trusted library allocation
page read and write
1BB5A000
heap
page read and write
FE0000
trusted library allocation
page read and write
B89000
heap
page read and write
34F0000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
1CE6D000
heap
page read and write
7FF848FAC000
trusted library allocation
page read and write
131B3000
trusted library allocation
page read and write
1AB1C000
stack
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
12811000
trusted library allocation
page read and write
38B8000
trusted library allocation
page read and write
26E4000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
313E000
stack
page read and write
307A000
trusted library allocation
page read and write
1C602000
heap
page read and write
15C0000
heap
page execute and read and write
2720000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
E10000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
2F01000
trusted library allocation
page read and write
CCB000
heap
page read and write
2A90000
trusted library section
page read and write
7FF848FED000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
1622000
heap
page read and write
9B0000
heap
page read and write
2BAE000
stack
page read and write
12AB1000
trusted library allocation
page read and write
1500000
heap
page read and write
7FF848FA3000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
B86000
heap
page read and write
1C846000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
2770000
heap
page execute and read and write
1CC9E000
stack
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
16C0000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
1CB9D000
stack
page read and write
1BDCF000
stack
page read and write
341E000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
850000
heap
page read and write
7FF848FA3000
trusted library allocation
page read and write
2A80000
heap
page execute and read and write
7FF848E4B000
trusted library allocation
page execute and read and write
3108000
trusted library allocation
page read and write
D02000
heap
page read and write
2DC4000
trusted library allocation
page read and write
131C1000
trusted library allocation
page read and write
1645000
heap
page read and write
7FF848FBB000
trusted library allocation
page read and write
E15000
heap
page read and write
7B0000
heap
page execute and read and write
83C000
heap
page read and write
7FF848DE2000
trusted library allocation
page read and write
1310F000
trusted library allocation
page read and write
E62000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
1329000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
39EE000
trusted library allocation
page read and write
3A5A000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
1B47E000
stack
page read and write
2DFA000
trusted library allocation
page read and write
1C57F000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
348A000
trusted library allocation
page read and write
1B9BE000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF4A6130000
trusted library allocation
page execute and read and write
3480000
trusted library allocation
page read and write
7FF849108000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
620000
heap
page read and write
7FF849170000
trusted library allocation
page execute and read and write
1C3FE000
stack
page read and write
D13000
heap
page read and write
18FF000
stack
page read and write
7FF848DFC000
trusted library allocation
page read and write
1C5FE000
stack
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
1C75A000
heap
page read and write
12AC1000
trusted library allocation
page read and write
1C102000
heap
page execute and read and write
822000
heap
page read and write
1BF02000
heap
page execute and read and write
12BBD000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
307E000
trusted library allocation
page read and write
1BB0B000
heap
page read and write
12EE3000
trusted library allocation
page read and write
1DDFE000
stack
page read and write
134AD000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
1C78B000
heap
page read and write
C1F000
heap
page read and write
1CBF1000
stack
page read and write
3850000
trusted library allocation
page read and write
D02000
heap
page read and write
327A000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
1B3CF000
stack
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848EE0000
trusted library allocation
page execute and read and write
1BED0000
trusted library section
page read and write
3714000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
7FF849001000
trusted library allocation
page read and write
1BC80000
trusted library section
page read and write
F60000
heap
page read and write
35D8000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
B07000
heap
page read and write
2EF6000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
2AB0000
trusted library section
page read and write
1C7E2000
heap
page read and write
C64000
heap
page read and write
FC5000
heap
page read and write
875000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF849160000
trusted library allocation
page read and write
990000
unkown
page readonly
1C002000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1C7F8000
heap
page read and write
306E000
trusted library allocation
page read and write
C51000
heap
page read and write
1D2F3000
stack
page read and write
7FF848F9B000
trusted library allocation
page read and write
800000
heap
page read and write
3071000
trusted library allocation
page read and write
2A70000
trusted library section
page read and write
A9F000
heap
page read and write
1C53E000
stack
page read and write
2F94000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1B5C4000
stack
page read and write
1C7C0000
heap
page read and write
CB9000
heap
page read and write
13354000
trusted library allocation
page read and write
34EC000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
3488000
trusted library allocation
page read and write
C4C000
heap
page read and write
306A000
trusted library allocation
page read and write
994000
unkown
page readonly
3006000
trusted library allocation
page read and write
1BAAD000
stack
page read and write
320F000
trusted library allocation
page read and write
1B5AE000
stack
page read and write
7FF848F91000
trusted library allocation
page read and write
1090000
heap
page read and write
1D5FF000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
131B1000
trusted library allocation
page read and write
1C4F3000
stack
page read and write
F70000
heap
page read and write
2DA9000
trusted library allocation
page read and write
7FF84912A000
trusted library allocation
page read and write
7FF848FEB000
trusted library allocation
page read and write
1BE8A000
stack
page read and write
3504000
trusted library allocation
page read and write
12D7D000
trusted library allocation
page read and write
1040000
heap
page read and write
31AB000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
16FB000
heap
page read and write
1B2CE000
stack
page read and write
890000
heap
page read and write
306B000
trusted library allocation
page read and write
843000
heap
page read and write
2EFF000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page read and write
1C825000
heap
page read and write
1570000
trusted library allocation
page read and write
126A1000
trusted library allocation
page read and write
B50000
heap
page read and write
7FF849001000
trusted library allocation
page read and write
102B000
heap
page read and write
17F5000
heap
page read and write
3486000
trusted library allocation
page read and write
1CD9B000
stack
page read and write
12FE000
stack
page read and write
1013000
heap
page read and write
2EF2000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
31F2000
trusted library allocation
page read and write
3A5C000
trusted library allocation
page read and write
902000
heap
page read and write
7FF848E37000
trusted library allocation
page read and write
2B5D000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
AFF000
stack
page read and write
1D3AA000
stack
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
12C7D000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page read and write
1D29A000
stack
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
2F30000
trusted library allocation
page read and write
1C2CE000
stack
page read and write
3A5E000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
ED0000
heap
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1590000
heap
page execute and read and write
DF0000
heap
page read and write
2EF9000
trusted library allocation
page read and write
FC0000
heap
page read and write
35DA000
trusted library allocation
page read and write
133B000
heap
page read and write
2E5A000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
7FF848FCE000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
30D2000
trusted library allocation
page read and write
126A8000
trusted library allocation
page read and write
D50000
heap
page read and write
7FF848F46000
trusted library allocation
page execute and read and write
C02000
heap
page read and write
2DBC000
trusted library allocation
page read and write
1BEA0000
trusted library section
page read and write
1B8B3000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
1C6D9000
heap
page read and write
B16000
stack
page read and write
2F66000
trusted library allocation
page read and write
12BB1000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1D0FE000
stack
page read and write
2E68000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848E02000
trusted library allocation
page read and write
12BE1000
trusted library allocation
page read and write
A72000
heap
page read and write
1D1FF000
stack
page read and write
310E000
trusted library allocation
page read and write
104B000
heap
page read and write
7FF849172000
trusted library allocation
page read and write
F90000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
A36000
heap
page read and write
83F000
heap
page read and write
1B4CF000
stack
page read and write
3554000
trusted library allocation
page read and write
1045000
heap
page read and write
82D000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
C13000
heap
page read and write
7FF848ED6000
trusted library allocation
page read and write
1079000
heap
page read and write
31F4000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
F36000
stack
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
841000
heap
page read and write
1BB00000
heap
page read and write
1AAE0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
1B1C0000
heap
page read and write
1B9A6000
stack
page read and write
11D6000
stack
page read and write
1675000
heap
page read and write
1BCC0000
heap
page execute and read and write
C46000
heap
page read and write
37E7000
trusted library allocation
page read and write
2A3E000
stack
page read and write
35D6000
trusted library allocation
page read and write
C41000
heap
page read and write
1C785000
heap
page read and write
12D05000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
1389000
heap
page read and write
FB0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
26E2000
trusted library allocation
page read and write
C26000
heap
page read and write
7FF848E3C000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
1D3FE000
stack
page read and write
134A3000
trusted library allocation
page read and write
1B8B0000
heap
page read and write
2E60000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
1AF50000
heap
page execute and read and write
25F0000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
7FF848DFC000
trusted library allocation
page read and write
275A000
trusted library allocation
page read and write
1CE48000
heap
page read and write
7FF848E07000
trusted library allocation
page read and write
1AF70000
trusted library allocation
page read and write
7FF849001000
trusted library allocation
page read and write
811000
heap
page read and write
1B73D000
stack
page read and write
7D0000
heap
page read and write
17F0000
heap
page read and write
7FF848FC3000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
3508000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
2EDE000
stack
page read and write
1430000
trusted library allocation
page read and write
C2A000
heap
page read and write
313A000
trusted library allocation
page read and write
2EEE000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
7FF849031000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
13DA1000
trusted library allocation
page read and write
38B6000
trusted library allocation
page read and write
1095000
heap
page read and write
130AD000
trusted library allocation
page read and write
2754000
trusted library allocation
page read and write
1C7DA000
heap
page read and write
1B6C3000
stack
page read and write
C3E000
heap
page read and write
391B000
trusted library allocation
page read and write
1600000
heap
page read and write
30D4000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
39EC000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
1AF30000
heap
page read and write
1326A000
trusted library allocation
page read and write
1B9C0000
heap
page execute and read and write
CC2000
heap
page read and write
12DE000
stack
page read and write
12801000
trusted library allocation
page read and write
1B7B4000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
1C700000
heap
page read and write
16C8000
heap
page read and write
7FF8490D8000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
12BBF000
trusted library allocation
page read and write
1AD8D000
stack
page read and write
1010000
heap
page read and write
FF0000
heap
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
2EFE000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
2F68000
trusted library allocation
page read and write
1B8CE000
stack
page read and write
1020000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1CA3F000
unkown
page read and write
1400000
heap
page read and write
12C53000
trusted library allocation
page read and write
13745000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
7FF848FCC000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
1C7D4000
heap
page read and write
129CD000
trusted library allocation
page read and write
12EED000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
130B6000
trusted library allocation
page read and write
1C74F000
heap
page read and write
13CEB000
trusted library allocation
page read and write
FE0000
heap
page read and write
7FF848FA3000
trusted library allocation
page read and write
7FF848F46000
trusted library allocation
page execute and read and write
C88000
heap
page read and write
12AB8000
trusted library allocation
page read and write
7FF848E96000
trusted library allocation
page read and write
1BB86000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
7FF848F93000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
1C843000
heap
page read and write
FCE000
stack
page read and write
1309D000
trusted library allocation
page read and write
135D000
heap
page read and write
1640000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
1C833000
heap
page read and write
1300000
heap
page read and write
7FF84901D000
trusted library allocation
page read and write
35D4000
trusted library allocation
page read and write
D10000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
13DF000
stack
page read and write
7E0000
heap
page execute and read and write
317F000
trusted library allocation
page read and write
2AA0000
heap
page execute and read and write
A3C000
heap
page read and write
1C6FE000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
1B000000
heap
page read and write
990000
heap
page read and write
1337D000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
1BECE000
stack
page read and write
7FF848FCC000
trusted library allocation
page read and write
1BD5F000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848F4F000
trusted library allocation
page execute and read and write
2F97000
trusted library allocation
page read and write
8AD000
heap
page read and write
310A000
trusted library allocation
page read and write
7FF848F52000
trusted library allocation
page execute and read and write
8B8000
heap
page read and write
2F61000
trusted library allocation
page read and write
34F8000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
A9A000
heap
page read and write
2EE0000
trusted library allocation
page read and write
1625000
heap
page read and write
38BA000
trusted library allocation
page read and write
2AD0000
heap
page read and write
1CE24000
heap
page read and write
13595000
trusted library allocation
page read and write
1040000
heap
page read and write
1B91D000
stack
page read and write
334F000
trusted library allocation
page read and write
1CED3000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1C7B5000
heap
page read and write
7FF848F9A000
trusted library allocation
page read and write
1AC10000
trusted library allocation
page read and write
1C0FD000
stack
page read and write
1D0FD000
stack
page read and write
1DCFD000
stack
page read and write
11D0000
heap
page execute and read and write
3213000
trusted library allocation
page read and write
B80000
heap
page read and write
1CEC3000
heap
page read and write
1B4B0000
heap
page read and write
2F35000
trusted library allocation
page read and write
12808000
trusted library allocation
page read and write
BAA000
heap
page read and write
1BEC0000
trusted library section
page read and write
7FF848ED0000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
1A02000
heap
page read and write
2FCC000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
C2D000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
147A1000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
730000
heap
page read and write
2EE2000
trusted library allocation
page read and write
8A0000
heap
page read and write
3069000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
101E000
stack
page read and write
720000
heap
page read and write
2DD0000
heap
page read and write
7FF848E37000
trusted library allocation
page read and write
FDF000
stack
page read and write
13C90000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
7FF848E17000
trusted library allocation
page read and write
13168000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1CCFD000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
E8B000
heap
page read and write
7FF848FCE000
trusted library allocation
page read and write
1BD8A000
stack
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
1C6FA000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
1C702000
heap
page execute and read and write
7FF848F52000
trusted library allocation
page execute and read and write
7FF848E44000
trusted library allocation
page read and write
E60000
heap
page read and write
7FF849070000
trusted library allocation
page execute and read and write
355A000
trusted library allocation
page read and write
11F0000
heap
page read and write
269E000
stack
page read and write
1345000
heap
page read and write
1B8A3000
stack
page read and write
7FF849190000
trusted library allocation
page execute and read and write
1320000
heap
page read and write
2DBE000
trusted library allocation
page read and write
1C71E000
heap
page read and write
2E93000
trusted library allocation
page read and write
1C82D000
heap
page read and write
2EDE000
trusted library allocation
page read and write
1C7D6000
heap
page read and write
131B8000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848DF7000
trusted library allocation
page read and write
CF2000
heap
page read and write
B60000
heap
page read and write
7FF848E26000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
970000
heap
page read and write
1BB6E000
heap
page read and write
349F000
stack
page read and write
2E91000
trusted library allocation
page read and write
12BFA000
trusted library allocation
page read and write
1C6DF000
heap
page read and write
138F7000
trusted library allocation
page read and write
12FEB000
trusted library allocation
page read and write
1D64F000
stack
page read and write
134B1000
trusted library allocation
page read and write
3F6000
stack
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
10BE000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
AE2000
heap
page read and write
1613000
heap
page read and write
2970000
heap
page execute and read and write
9A0000
heap
page read and write
12BED000
trusted library allocation
page read and write
1C749000
heap
page read and write
1280D000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
1BB8C000
heap
page read and write
7FF848F4B000
trusted library allocation
page execute and read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848E0C000
trusted library allocation
page read and write
370E000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
CF6000
stack
page read and write
7FF848ED6000
trusted library allocation
page read and write
1A830000
trusted library allocation
page read and write
34EA000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
1BFD5000
stack
page read and write
1BEB0000
trusted library section
page read and write
2D6F000
trusted library allocation
page read and write
8DD000
heap
page read and write
1CECB000
heap
page read and write
10B3000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B16D000
stack
page read and write
29A0000
heap
page execute and read and write
13C5C000
trusted library allocation
page read and write
1B02000
heap
page read and write
310C000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
1580000
heap
page read and write
126AD000
trusted library allocation
page read and write
BEA000
heap
page read and write
12EF1000
trusted library allocation
page read and write
1002000
heap
page read and write
7A5000
heap
page read and write
8E4000
heap
page read and write
398D000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
2BDE000
stack
page read and write
E8D000
heap
page read and write
7FF8491A0000
trusted library allocation
page execute and read and write
1B03C000
stack
page read and write
13C36000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
7FF848F4F000
trusted library allocation
page execute and read and write
2F9D000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF848E13000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
1BACF000
stack
page read and write
A5B000
heap
page read and write
7FF848F0B000
trusted library allocation
page execute and read and write
16E3000
heap
page read and write
162D000
heap
page read and write
1640000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
7FF848F9C000
trusted library allocation
page read and write
1CE93000
heap
page read and write
37E3000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
1665000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
135B000
heap
page read and write
28AA000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
1ABE0000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
7FF848F52000
trusted library allocation
page execute and read and write
770000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
3278000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
12D72000
trusted library allocation
page read and write
3482000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
1CE00000
heap
page read and write
1B1E0000
trusted library allocation
page read and write
FC0000
heap
page read and write
2FCA000
trusted library allocation
page read and write
7FF848F8C000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
1C7A3000
heap
page read and write
1B6AE000
stack
page read and write
12EE8000
trusted library allocation
page read and write
7A0000
heap
page read and write
8E2000
heap
page read and write
1420000
heap
page read and write
12803000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
1BE90000
trusted library section
page read and write
7FF849150000
trusted library allocation
page read and write
37E5000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
7FF848FE3000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848FE3000
trusted library allocation
page read and write
7FF84909B000
trusted library allocation
page read and write
1BAB5000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848EDC000
trusted library allocation
page execute and read and write
790000
trusted library allocation
page read and write
26B9000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
1702000
heap
page read and write
28A0000
heap
page read and write
275D000
trusted library allocation
page read and write
1650000
heap
page read and write
2EC3000
trusted library allocation
page read and write
1040000
heap
page read and write
1C7FE000
stack
page read and write
7FF848FAB000
trusted library allocation
page read and write
8C1000
heap
page read and write
14C5000
heap
page read and write
7FF848F8E000
trusted library allocation
page read and write
1366D000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
825000
heap
page read and write
1035000
heap
page read and write
1077000
heap
page read and write
33B3000
trusted library allocation
page read and write
7FF848FCE000
trusted library allocation
page read and write
176E000
stack
page read and write
3000000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
12FF6000
trusted library allocation
page read and write
1BAB0000
heap
page read and write
34EE000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FF848FD6000
trusted library allocation
page read and write
1019000
heap
page read and write
1C1CF000
stack
page read and write
11B0000
trusted library allocation
page read and write
E26000
heap
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7A0000
heap
page read and write
12F92000
trusted library allocation
page read and write
7FF848E4B000
trusted library allocation
page execute and read and write
134A1000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
31A0000
heap
page execute and read and write
1C2FE000
stack
page read and write
2DC0000
trusted library allocation
page read and write
1BE02000
heap
page read and write
1C6D0000
heap
page read and write
There are 1003 hidden memdumps, click here to show them.