IOC Report
explorer.exe

loading gif

Files

File Path
Type
Category
Malicious
explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\X1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\X2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\build.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0etbs4ny.2sw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mgpigev.le0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1u1dk5wv.nrf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1zn2mcc4.if5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_45gflrr3.rbh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qwazyri.cmg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arzrmjml.uy1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjl22atd.sdy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gnk1hskm.zzl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gyvupfxw.s44.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jqxe401p.olf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_krct0j0r.l2d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ok5yp2et.4bw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pvduleag.dfn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qtgdckcr.adz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r5hxaigb.wtg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rcbyo4ho.ksv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rxjrmuox.l1p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sujtbzik.ujd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v22bwd1e.ugv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xfqvoj5l.buq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2fqxkds.bb5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydpb1sb0.plx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5qc5ial.ykc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp1886.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2420.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2431.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2451.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp2471.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4EAA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4EBB.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4EBC.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4EBD.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4ECD.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4ECE.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4EDF.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5854.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5855.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5875.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5876.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5886.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp58B6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp58B7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp84C5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp84D6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8505.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8516.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8536.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8C2C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp8C3D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp8C6D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp8C7D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBA61.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpBA81.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBA92.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBAB2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBAC2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBF66.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBF76.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBF87.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBFA7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBFB8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpBFC8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpEF7F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEF90.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEFB0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEFC1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF243.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmpF254.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF274.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
There are 67 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\explorer.exe
"C:\Users\user\Desktop\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\X1.exe
"C:\Users\user\AppData\Roaming\X1.exe"
malicious
C:\Users\user\AppData\Roaming\X2.exe
"C:\Users\user\AppData\Roaming\X2.exe"
malicious
C:\Users\user\AppData\Roaming\build.exe
"C:\Users\user\AppData\Roaming\build.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\X1.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\X2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X1.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X2.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\X1.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\explorer.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
91.92.252.220
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
91.92.252.220:1337
malicious
http://91.92.252.220:1337/
91.92.252.220
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://contoso.com/License
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
http://crl.microso4%b
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://www.microsoft.co3
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://91.92.252.220:1337
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
unknown
https://ipinfo.io/ip%appdata%
unknown
http://nuget.org/NuGet.exe
unknown
https://go.mic
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://91.92.252.220:1337t-jq
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.m
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
https://aka.ms/pscore68
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 47 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
91.92.252.220
unknown
Bulgaria
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X1_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileDirectory
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12F88000
trusted library allocation
page read and write
malicious
2E2C000
trusted library allocation
page read and write
malicious
275C000
trusted library allocation
page read and write
malicious
5A2000
unkown
page readonly
malicious
2520000
trusted library allocation
page read and write
malicious
112000
unkown
page readonly
malicious
2F81000
trusted library allocation
page read and write
malicious
B62000
unkown
page readonly
malicious
7FF848EAC000
trusted library allocation
page execute and read and write
7FF849150000
trusted library allocation
page read and write
240C30CA000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
240B43C7000
trusted library allocation
page read and write
53B987E000
stack
page read and write
202E96F7000
trusted library allocation
page read and write
5D8E000
stack
page read and write
7FF84916C000
trusted library allocation
page read and write
1EC49170000
trusted library allocation
page read and write
1CF712B0000
trusted library allocation
page read and write
66CC000
trusted library allocation
page read and write
235436B5000
trusted library allocation
page read and write
202E9977000
trusted library allocation
page read and write
1FA20DF4000
heap
page read and write
1EC48EAF000
heap
page read and write
1CF799D5000
heap
page read and write
9BF000
stack
page read and write
240C2F00000
trusted library allocation
page read and write
1FA20E6D000
heap
page read and write
202E9902000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1FA06CC9000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
1FA20C37000
heap
page execute and read and write
26A0000
trusted library allocation
page read and write
5FF0000
heap
page read and write
240C2E08000
trusted library allocation
page read and write
202E96A8000
trusted library allocation
page read and write
240C3047000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
1FA20F1C000
heap
page read and write
7FF848E96000
trusted library allocation
page read and write
240C2FA8000
trusted library allocation
page read and write
202E9965000
trusted library allocation
page read and write
23543416000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
23552300000
trusted library allocation
page read and write
7FF849113000
trusted library allocation
page read and write
12E28000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
1FA086B1000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1FA189A3000
trusted library allocation
page read and write
2355A7FE000
heap
page read and write
22C0000
trusted library allocation
page read and write
5F5D000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
21E6000
trusted library allocation
page execute and read and write
240C2DFB000
trusted library allocation
page read and write
7FF848F91000
trusted library allocation
page read and write
83D8FF9000
stack
page read and write
202E9932000
trusted library allocation
page read and write
240C2F24000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
2740000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
240B2A30000
heap
page execute and read and write
1CF5F6A8000
heap
page read and write
202E96EC000
trusted library allocation
page read and write
2355AC10000
heap
page read and write
240C2DEB000
trusted library allocation
page read and write
1EC4AAD1000
trusted library allocation
page read and write
4F62A3E000
stack
page read and write
1FA188BF000
trusted library allocation
page read and write
240C30C1000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
202DB359000
trusted library allocation
page read and write
240C30B3000
trusted library allocation
page read and write
1020000
heap
page read and write
23543C3F000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
202E9767000
trusted library allocation
page read and write
202E9742000
trusted library allocation
page read and write
202E967F000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1EC491B5000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
240C2E55000
trusted library allocation
page read and write
1CF71241000
trusted library allocation
page read and write
240C2FC2000
trusted library allocation
page read and write
5CFA000
heap
page read and write
902A00E000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
202E9888000
trusted library allocation
page read and write
5CF7000
heap
page read and write
6FD0000
trusted library allocation
page execute and read and write
202D7A16000
heap
page read and write
4F629FE000
stack
page read and write
1CF799CC000
heap
page read and write
1BE9F000
stack
page read and write
202D7940000
heap
page read and write
1EC48EF7000
heap
page read and write
202E99B0000
trusted library allocation
page read and write
1FA06C60000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
240C304B000
trusted library allocation
page read and write
240C2DA7000
trusted library allocation
page read and write
1EC4BB8F000
trusted library allocation
page read and write
202E9696000
trusted library allocation
page read and write
240C2DCF000
trusted library allocation
page read and write
202E9938000
trusted library allocation
page read and write
530000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
1CF629C5000
trusted library allocation
page read and write
202E9746000
trusted library allocation
page read and write
240C2FAD000
trusted library allocation
page read and write
23543B57000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
53B96FE000
stack
page read and write
1CF5F8C0000
trusted library allocation
page read and write
240C2EBD000
trusted library allocation
page read and write
83D8DF7000
stack
page read and write
240C30A0000
trusted library allocation
page read and write
1EC63130000
trusted library allocation
page read and write
83D90FE000
stack
page read and write
200B7CE000
stack
page read and write
202E9995000
trusted library allocation
page read and write
4F6380E000
stack
page read and write
1FA06C30000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
53BA84E000
stack
page read and write
7FF849250000
trusted library allocation
page execute and read and write
253B000
trusted library allocation
page read and write
1CF63063000
trusted library allocation
page read and write
7FF8492A0000
trusted library allocation
page read and write
22D0000
heap
page read and write
240C309E000
trusted library allocation
page read and write
7FF849266000
trusted library allocation
page read and write
7FF848FC8000
trusted library allocation
page read and write
240C30B5000
trusted library allocation
page read and write
1CF61F1E000
trusted library allocation
page read and write
604E000
stack
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF84927D000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
2D6F000
stack
page read and write
8B7000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
3674000
trusted library allocation
page read and write
53B97FF000
stack
page read and write
240B3C70000
trusted library allocation
page read and write
13E0000
heap
page read and write
26D1000
trusted library allocation
page read and write
23542EFD000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848E1B000
trusted library allocation
page read and write
7FF849182000
trusted library allocation
page read and write
6C682FE000
stack
page read and write
363E000
trusted library allocation
page read and write
7FF849272000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
4F62D3C000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF84918A000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
1CF5F6E2000
heap
page read and write
1FA096DE000
trusted library allocation
page read and write
240C2C41000
trusted library allocation
page read and write
23543B7E000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1CF624E3000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
240C2E78000
trusted library allocation
page read and write
23540750000
heap
page read and write
240C3033000
trusted library allocation
page read and write
1FA09956000
trusted library allocation
page read and write
1BBA0000
heap
page read and write
240C3035000
trusted library allocation
page read and write
269E000
stack
page read and write
24D1000
trusted library allocation
page read and write
2355A785000
heap
page read and write
1FA06C05000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
202E97EF000
trusted library allocation
page read and write
1EC62F60000
heap
page execute and read and write
202E9531000
trusted library allocation
page read and write
2355AD6C000
heap
page read and write
240C2DE9000
trusted library allocation
page read and write
49C1000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
2355AC1D000
heap
page read and write
235440CC000
trusted library allocation
page read and write
202F1A60000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
A20000
heap
page read and write
240C2D90000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
202E98FE000
trusted library allocation
page read and write
5D40000
trusted library allocation
page execute and read and write
240C2DD2000
trusted library allocation
page read and write
5CBE000
heap
page read and write
1CF61C93000
trusted library allocation
page read and write
83D9D4D000
stack
page read and write
1CF62B33000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
1BA1E000
stack
page read and write
1EC5ADBB000
trusted library allocation
page read and write
240CB090000
heap
page execute and read and write
202E992A000
trusted library allocation
page read and write
22A0000
trusted library allocation
page execute and read and write
66E6000
trusted library allocation
page read and write
2355AD63000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
1EC4C8D3000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
6C685FE000
stack
page read and write
235422F1000
trusted library allocation
page read and write
202E989B000
trusted library allocation
page read and write
1FA06AA0000
heap
page read and write
1FA20FB0000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
2355AC17000
heap
page read and write
49B2000
trusted library allocation
page read and write
26A3000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
240B1195000
heap
page read and write
1FA08560000
trusted library allocation
page read and write
23C0000
heap
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1FA20BC2000
heap
page read and write
4E50000
trusted library allocation
page execute and read and write
240C30B7000
trusted library allocation
page read and write
240B44AD000
trusted library allocation
page read and write
200BCFE000
stack
page read and write
240C2E9E000
trusted library allocation
page read and write
202DA534000
trusted library allocation
page read and write
1EC48E78000
heap
page read and write
7FF84917C000
trusted library allocation
page read and write
240C300F000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
1CF61111000
heap
page read and write
202E96EA000
trusted library allocation
page read and write
F00000
heap
page read and write
202E9899000
trusted library allocation
page read and write
1BD9E000
stack
page read and write
66E8000
trusted library allocation
page read and write
1EC4C422000
trusted library allocation
page read and write
2355AD31000
heap
page read and write
202F18AC000
heap
page read and write
202F1E46000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
23540990000
heap
page read and write
1EC632A0000
heap
page read and write
4F62B39000
stack
page read and write
7FF849004000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
202E999E000
trusted library allocation
page read and write
240B2CC6000
trusted library allocation
page read and write
23540830000
heap
page read and write
1CF5F910000
trusted library allocation
page read and write
23542210000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
202E998D000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
235408D4000
heap
page read and write
1FA20D80000
heap
page read and write
1B5E0000
heap
page read and write
A14000
trusted library allocation
page read and write
202E95A1000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
202E96B9000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
202E9944000
trusted library allocation
page read and write
240C2DCA000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
53BA8C9000
stack
page read and write
A2B000
heap
page read and write
6350000
heap
page read and write
1CF5F880000
heap
page readonly
2355A7AB000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
202DA7D5000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
990000
heap
page read and write
1FA06C70000
heap
page execute and read and write
7FF848F06000
trusted library allocation
page execute and read and write
6C6847A000
stack
page read and write
202E974F000
trusted library allocation
page read and write
202D7B50000
trusted library allocation
page read and write
240C2F49000
trusted library allocation
page read and write
240B2E69000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
240C304D000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
202F1E2A000
heap
page read and write
83D9DC9000
stack
page read and write
1EC63265000
heap
page read and write
240C30A2000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
2355A8E0000
heap
page execute and read and write
7FF849070000
trusted library allocation
page read and write
200BFFA000
stack
page read and write
202D7B20000
trusted library allocation
page read and write
1170000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
240C2DBF000
trusted library allocation
page read and write
202D7960000
heap
page read and write
7FF848FE2000
trusted library allocation
page read and write
5E9E000
stack
page read and write
1CF5F6E0000
heap
page read and write
1EC6332C000
heap
page read and write
29D1000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
1FA06CDB000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
950000
heap
page read and write
200BC79000
stack
page read and write
202F18AA000
heap
page read and write
235422E5000
heap
page read and write
240C30A4000
trusted library allocation
page read and write
2548000
trusted library allocation
page read and write
240B10F0000
trusted library section
page read and write
202E9997000
trusted library allocation
page read and write
202F1E7E000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
202E993C000
trusted library allocation
page read and write
365B000
trusted library allocation
page read and write
202E96AE000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page execute and read and write
5D0E000
heap
page read and write
202D7A14000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
200BB7F000
stack
page read and write
1EC63323000
heap
page read and write
10DD000
heap
page read and write
66F5000
trusted library allocation
page read and write
202E96F3000
trusted library allocation
page read and write
4AEE000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
202D7BA0000
trusted library allocation
page read and write
1CF5F6A0000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
200CDCC000
stack
page read and write
240C30CC000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1FA20F1F000
heap
page read and write
202E9907000
trusted library allocation
page read and write
1FA06CC5000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
3668000
trusted library allocation
page read and write
4F626FE000
stack
page read and write
70F0000
trusted library allocation
page read and write
6520000
heap
page read and write
1FA0A000000
trusted library allocation
page read and write
1EC490B0000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
240C2E8B000
trusted library allocation
page read and write
235440F1000
trusted library allocation
page read and write
1BA90000
heap
page execute and read and write
1B4DE000
stack
page read and write
1EC4BDD6000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
202E991F000
trusted library allocation
page read and write
1FA206BC000
heap
page read and write
1EC4BAD4000
trusted library allocation
page read and write
1FA20C60000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
4E00000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
11A5000
heap
page read and write
38C7000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
23543251000
trusted library allocation
page read and write
202F1D5D000
heap
page read and write
202DA68D000
trusted library allocation
page read and write
7DF429AE0000
trusted library allocation
page execute and read and write
7FF849182000
trusted library allocation
page read and write
240CB2C6000
heap
page read and write
724000
heap
page read and write
5B2F000
stack
page read and write
1CF7999B000
heap
page read and write
202D7A55000
heap
page read and write
1CF7998B000
heap
page read and write
83D8D7E000
stack
page read and write
1CF5F77F000
heap
page read and write
1FA06C88000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
DE5000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
1CF5F900000
heap
page execute and read and write
7FF849250000
trusted library allocation
page execute and read and write
7FF849230000
trusted library allocation
page read and write
202E98A0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
871A000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
240B4595000
trusted library allocation
page read and write
1FA06B80000
heap
page read and write
240C3076000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
1EC491B0000
heap
page read and write
37D7000
trusted library allocation
page read and write
240B3D00000
trusted library allocation
page read and write
202E96E7000
trusted library allocation
page read and write
9C0000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
200C07E000
stack
page read and write
7DF49DD30000
trusted library allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
202E99C7000
trusted library allocation
page read and write
202D9759000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
202D9525000
heap
page read and write
2355A2F7000
heap
page read and write
902943F000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
6C6887E000
stack
page read and write
240C30BD000
trusted library allocation
page read and write
23540890000
heap
page read and write
261F000
trusted library allocation
page read and write
86F000
stack
page read and write
7FF84912F000
trusted library allocation
page read and write
2355AC00000
heap
page read and write
71F0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
DF0000
heap
page read and write
1FA20D90000
heap
page read and write
240C3070000
trusted library allocation
page read and write
1CF79940000
heap
page read and write
4DB0000
trusted library allocation
page execute and read and write
1FA085A0000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
1CF79700000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
202F1D10000
heap
page read and write
21FB000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
202DA560000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
202D7A18000
heap
page read and write
53B98F7000
stack
page read and write
1FA09A75000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
5EA2000
trusted library allocation
page read and write
1BC60000
heap
page read and write
1EC4C8F3000
trusted library allocation
page read and write
240B0F60000
heap
page read and write
6FA0000
trusted library allocation
page execute and read and write
36BF000
trusted library allocation
page read and write
1CF62B92000
trusted library allocation
page read and write
66E1000
trusted library allocation
page read and write
5EBF000
trusted library allocation
page read and write
240B39BD000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
240C30F7000
trusted library allocation
page read and write
49E0000
heap
page execute and read and write
240C2F7E000
trusted library allocation
page read and write
27F8000
trusted library allocation
page read and write
9028EFE000
stack
page read and write
36AD000
trusted library allocation
page read and write
1FA06C00000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
202F1D20000
heap
page read and write
2EB9000
trusted library allocation
page read and write
1CF79987000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1EC490E0000
heap
page readonly
1FA20C30000
heap
page execute and read and write
202E9860000
trusted library allocation
page read and write
2355A77B000
heap
page read and write
225E000
stack
page read and write
7FF849180000
trusted library allocation
page read and write
240B2A60000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
202D7860000
heap
page read and write
65E000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
6512000
heap
page read and write
12E21000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
1FA09E33000
trusted library allocation
page read and write
240B0FD6000
heap
page read and write
202F1A06000
heap
page execute and read and write
7FF84903E000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
123E000
heap
page read and write
202E998F000
trusted library allocation
page read and write
1FA0980C000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1FA0964D000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF848FF0000
trusted library allocation
page execute and read and write
202DADC1000
trusted library allocation
page read and write
9029179000
stack
page read and write
14F0000
heap
page execute and read and write
200BF78000
stack
page read and write
1CF7152E000
trusted library allocation
page read and write
240C30C4000
trusted library allocation
page read and write
202E9940000
trusted library allocation
page read and write
A7D000
heap
page read and write
1CF79AF5000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
1EC49135000
heap
page read and write
6545000
heap
page read and write
5EF0000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
49BE000
trusted library allocation
page read and write
202DACB6000
trusted library allocation
page read and write
240C2EDA000
trusted library allocation
page read and write
1EC4BE91000
trusted library allocation
page read and write
240C2E51000
trusted library allocation
page read and write
202F195C000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
202D7B10000
heap
page readonly
1EC4C3C3000
trusted library allocation
page read and write
6F60000
trusted library allocation
page execute and read and write
6C6837F000
stack
page read and write
5D32000
trusted library allocation
page read and write
202F1A00000
heap
page execute and read and write
240CAFCE000
heap
page read and write
202DA29F000
trusted library allocation
page read and write
1CF7144A000
trusted library allocation
page read and write
83D91FC000
stack
page read and write
6C6897E000
stack
page read and write
23543598000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF84918A000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
235409F0000
heap
page read and write
240C2F31000
trusted library allocation
page read and write
2355AA50000
trusted library allocation
page read and write
202E99A0000
trusted library allocation
page read and write
1CF796C7000
heap
page execute and read and write
1CF62AAA000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
202E96A6000
trusted library allocation
page read and write
727000
heap
page read and write
1B2DE000
stack
page read and write
235409B0000
trusted library section
page read and write
202E9973000
trusted library allocation
page read and write
1EC48EB1000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
240C30BF000
trusted library allocation
page read and write
299A000
trusted library allocation
page read and write
202E9839000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
202E97A2000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
240C2FAA000
trusted library allocation
page read and write
2792000
trusted library allocation
page read and write
1FA088D8000
trusted library allocation
page read and write
202D79A0000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
202D7B90000
heap
page read and write
5C77000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
202E96A0000
trusted library allocation
page read and write
240B0F90000
heap
page read and write
202E99A2000
trusted library allocation
page read and write
23552311000
trusted library allocation
page read and write
202E989E000
trusted library allocation
page read and write
240C2FB3000
trusted library allocation
page read and write
9EE000
heap
page read and write
66DE000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1BBA8000
heap
page read and write
C30000
unkown
page readonly
108D000
heap
page read and write
202E96A2000
trusted library allocation
page read and write
240C303B000
trusted library allocation
page read and write
240C2FC0000
trusted library allocation
page read and write
202E9975000
trusted library allocation
page read and write
1B850000
heap
page execute and read and write
202DA8F2000
trusted library allocation
page read and write
240CB3E0000
heap
page read and write
6C6964E000
stack
page read and write
7FF849008000
trusted library allocation
page read and write
4F6388E000
stack
page read and write
240B1130000
heap
page readonly
1FA0976F000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1CF5F5C0000
heap
page read and write
1EC631F0000
heap
page read and write
53B9CFE000
stack
page read and write
A2C000
heap
page read and write
5C2E000
stack
page read and write
9028F79000
stack
page read and write
7FF848E2B000
trusted library allocation
page read and write
53B9A77000
stack
page read and write
235408D6000
heap
page read and write
167E000
stack
page read and write
1CF625FF000
trusted library allocation
page read and write
202F1DBD000
heap
page read and write
202E9829000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1FA0A4D7000
trusted library allocation
page read and write
1EC5AAF1000
trusted library allocation
page read and write
202DAD9B000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1CF5F6E8000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
6750000
trusted library allocation
page read and write
1FA20EBC000
heap
page read and write
28F7000
trusted library allocation
page read and write
5CF2000
heap
page read and write
240C2E8D000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
202E97DF000
trusted library allocation
page read and write
202E96B2000
trusted library allocation
page read and write
240B3C44000
trusted library allocation
page read and write
1FA06CC3000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
2EE4000
trusted library allocation
page read and write
5CE7000
heap
page read and write
240B2940000
trusted library allocation
page read and write
1EC4ACF9000
trusted library allocation
page read and write
240C2E06000
trusted library allocation
page read and write
240C2E53000
trusted library allocation
page read and write
202E971E000
trusted library allocation
page read and write
240CAF80000
heap
page read and write
202E99BD000
trusted library allocation
page read and write
7FF84920C000
trusted library allocation
page read and write
1CF5F728000
heap
page read and write
240C2DC5000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
1FA18A0C000
trusted library allocation
page read and write
6340000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1CF6226E000
trusted library allocation
page read and write
240CB1A0000
heap
page read and write
202DA4CE000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1EC48E30000
heap
page read and write
1FA06C80000
heap
page read and write
7FF849153000
trusted library allocation
page read and write
1FA06CC1000
heap
page read and write
1B5F0000
heap
page read and write
240C2E20000
trusted library allocation
page read and write
1FA09655000
trusted library allocation
page read and write
202E96E5000
trusted library allocation
page read and write
7FF8492AF000
trusted library allocation
page read and write
1CF62544000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
6C694CE000
stack
page read and write
902A10C000
stack
page read and write
202E98B1000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1EC4BB63000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
240B4A66000
trusted library allocation
page read and write
1FA20B10000
heap
page read and write
202E9709000
trusted library allocation
page read and write
1CF5F830000
heap
page read and write
111A000
heap
page read and write
202E99AA000
trusted library allocation
page read and write
240C2F6F000
trusted library allocation
page read and write
53BA7CC000
stack
page read and write
202E995C000
trusted library allocation
page read and write
240C2F2F000
trusted library allocation
page read and write
1BB9E000
stack
page read and write
7FF849004000
trusted library allocation
page read and write
6C693CE000
stack
page read and write
202E9757000
trusted library allocation
page read and write
53B93B3000
stack
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
7FF848DF0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
23552699000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848E20000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
202E997B000
trusted library allocation
page read and write
21F5000
trusted library allocation
page execute and read and write
7FF8490E0000
trusted library allocation
page read and write
202E9681000
trusted library allocation
page read and write
1CF62AD0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
90291BE000
stack
page read and write
11B3000
heap
page read and write
2355A748000
heap
page read and write
1CF62242000
trusted library allocation
page read and write
EF1000
stack
page read and write
7FF84914C000
trusted library allocation
page read and write
7DF489E50000
trusted library allocation
page execute and read and write
1CF5F870000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
4F628F7000
stack
page read and write
240C30AA000
trusted library allocation
page read and write
240B4A6B000
trusted library allocation
page read and write
1EC4C41A000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
202E96F1000
trusted library allocation
page read and write
1FA099B9000
trusted library allocation
page read and write
4F62DBE000
stack
page read and write
83D92FB000
stack
page read and write
A13000
trusted library allocation
page execute and read and write
1CF62547000
trusted library allocation
page read and write
C30000
unkown
page readonly
7FF848ED6000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
1EC4B6D4000
trusted library allocation
page read and write
202DA652000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
240C2EF0000
trusted library allocation
page read and write
240CB0CE000
heap
page read and write
7DF4DF710000
trusted library allocation
page execute and read and write
1EC4AB49000
trusted library allocation
page read and write
36C9000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
83D8F76000
stack
page read and write
202E974D000
trusted library allocation
page read and write
4F629F8000
stack
page read and write
235522F1000
trusted library allocation
page read and write
1B940000
heap
page read and write
202E9759000
trusted library allocation
page read and write
45CD000
stack
page read and write
902933B000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
6DF000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
23540916000
heap
page read and write
4F63A0C000
stack
page read and write
7FF848E02000
trusted library allocation
page read and write
202F1A10000
heap
page execute and read and write
1ACDD000
stack
page read and write
202E97C9000
trusted library allocation
page read and write
1EC5ADC3000
trusted library allocation
page read and write
1CF79786000
heap
page read and write
202F1870000
heap
page read and write
83D899F000
stack
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
2EBF000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
A9F000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
DA4000
stack
page read and write
1B1D0000
heap
page read and write
7FF849008000
trusted library allocation
page read and write
7FF84920A000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
53B9B7E000
stack
page read and write
277A000
trusted library allocation
page read and write
240C2F02000
trusted library allocation
page read and write
202E993A000
trusted library allocation
page read and write
117C000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
202D79D0000
heap
page read and write
2210000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
1CF6170D000
trusted library allocation
page read and write
7FF848DE2000
trusted library allocation
page read and write
1FA086A0000
heap
page read and write
235408DA000
heap
page read and write
202E9917000
trusted library allocation
page read and write
1CF796B0000
trusted library allocation
page read and write
64D0000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
7FF849002000
trusted library allocation
page read and write
7FF849276000
trusted library allocation
page read and write
200BDFE000
stack
page read and write
8716000
heap
page read and write
1EC4BA71000
trusted library allocation
page read and write
202E971A000
trusted library allocation
page read and write
240C30A8000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
1FA20B3A000
heap
page read and write
4CEE000
stack
page read and write
235408D2000
heap
page read and write
2355A787000
heap
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
36BC000
trusted library allocation
page read and write
1EC5ADB5000
trusted library allocation
page read and write
7FF84922C000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
240C2C71000
trusted library allocation
page read and write
5D05000
heap
page read and write
202E9979000
trusted library allocation
page read and write
66C6000
trusted library allocation
page read and write
240C2E74000
trusted library allocation
page read and write
2E4C000
trusted library allocation
page read and write
1CF612C1000
trusted library allocation
page read and write
240C2DCC000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
202E9802000
trusted library allocation
page read and write
235422E0000
heap
page read and write
240C3051000
trusted library allocation
page read and write
1EC63278000
heap
page read and write
66D4000
trusted library allocation
page read and write
2355A770000
heap
page read and write
6C69549000
stack
page read and write
2655000
trusted library allocation
page read and write
202E96B0000
trusted library allocation
page read and write
4F62AB7000
stack
page read and write
202E96B6000
trusted library allocation
page read and write
FE0000
heap
page read and write
202F1E25000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
1EC48EB5000
heap
page read and write
25EA000
trusted library allocation
page read and write
1EC4AAC0000
heap
page execute and read and write
200C0FE000
stack
page read and write
7FF849154000
trusted library allocation
page read and write
5CD0000
heap
page read and write
202E9713000
trusted library allocation
page read and write
240B101A000
heap
page read and write
7FF848E3B000
trusted library allocation
page read and write
1BA7D000
stack
page read and write
7FF848ED6000
trusted library allocation
page read and write
240CB0E6000
heap
page read and write
9029F0F000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page execute and read and write
1CF63068000
trusted library allocation
page read and write
202E9909000
trusted library allocation
page read and write
240C2E2B000
trusted library allocation
page read and write
240C3096000
trusted library allocation
page read and write
66C4000
trusted library allocation
page read and write
202E9930000
trusted library allocation
page read and write
240C30D6000
trusted library allocation
page read and write
240B4536000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
5D2D000
heap
page read and write
23543259000
trusted library allocation
page read and write
240CB311000
heap
page read and write
240C3043000
trusted library allocation
page read and write
1EC632A2000
heap
page read and write
202E977C000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
4FFB000
trusted library allocation
page read and write
66D8000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1EC4BCA8000
trusted library allocation
page read and write
53BA74E000
stack
page read and write
240C2F13000
trusted library allocation
page read and write
1BB000
stack
page read and write
83D8C7E000
stack
page read and write
1FA20EEC000
heap
page read and write
21F2000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
240C3039000
trusted library allocation
page read and write
9C6000
heap
page read and write
240C2E72000
trusted library allocation
page read and write
A27000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
2355A910000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
1C53E000
stack
page read and write
235408D0000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
202E98B9000
trusted library allocation
page read and write
1FA20D50000
heap
page execute and read and write
1B95E000
stack
page read and write
202E9926000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
23543255000
trusted library allocation
page read and write
6C688FF000
stack
page read and write
39C7000
trusted library allocation
page read and write
1EC632F9000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
6C67FDE000
stack
page read and write
240CB040000
heap
page read and write
1CF5F7C0000
heap
page read and write
202E9744000
trusted library allocation
page read and write
1EC49070000
heap
page read and write
1CF62417000
trusted library allocation
page read and write
202E97CE000
trusted library allocation
page read and write
1EC4B521000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
240CB231000
heap
page read and write
240C2DDB000
trusted library allocation
page read and write
7FF848FD5000
trusted library allocation
page read and write
1EC62F90000
heap
page execute and read and write
1CF63043000
trusted library allocation
page read and write
202E969A000
trusted library allocation
page read and write
1EC490D0000
trusted library allocation
page read and write
202E9991000
trusted library allocation
page read and write
240C300D000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
202D7AC9000
heap
page read and write
2355A740000
heap
page read and write
1FA06D03000
heap
page read and write
202DB30F000
trusted library allocation
page read and write
1FA09F3F000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7170000
trusted library allocation
page execute and read and write
7FF849070000
trusted library allocation
page read and write
202D7A5A000
heap
page read and write
202E99C5000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
B60000
unkown
page readonly
7FF849002000
trusted library allocation
page read and write
240C3045000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
202E9999000
trusted library allocation
page read and write
240C2F8A000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
28B7000
trusted library allocation
page read and write
240C2D92000
trusted library allocation
page read and write
4F62C3E000
stack
page read and write
1BA5E000
stack
page read and write
235408EA000
heap
page read and write
240C2DC1000
trusted library allocation
page read and write
1B64F000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
23543387000
trusted library allocation
page read and write
23543505000
trusted library allocation
page read and write
64DC000
heap
page read and write
7FF849169000
trusted library allocation
page read and write
240C3026000
trusted library allocation
page read and write
1EC4B887000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1CF79AFB000
heap
page read and write
1EC5AD3F000
trusted library allocation
page read and write
240C2CB1000
trusted library allocation
page read and write
240C2DE7000
trusted library allocation
page read and write
7DF406420000
trusted library allocation
page execute and read and write
1FA20F2D000
heap
page read and write
1FA06CBB000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1CF5F6BE000
heap
page read and write
240C2E29000
trusted library allocation
page read and write
36FC000
trusted library allocation
page read and write
202F18D1000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
1CF5F793000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1FA09653000
trusted library allocation
page read and write
200CC4C000
stack
page read and write
240C3094000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
78FF000
stack
page read and write
6D2000
heap
page read and write
23544116000
trusted library allocation
page read and write
240C2DFD000
trusted library allocation
page read and write
A02000
heap
page read and write
240C2DA9000
trusted library allocation
page read and write
202E99BB000
trusted library allocation
page read and write
1EC49120000
heap
page read and write
5A0000
unkown
page readonly
1FA06C35000
heap
page read and write
83D8893000
stack
page read and write
240B0FEE000
heap
page read and write
240C308F000
trusted library allocation
page read and write
240C2E68000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
202E96C7000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1CF799FC000
heap
page read and write
652B000
heap
page read and write
202E9858000
trusted library allocation
page read and write
670000
heap
page read and write
1EC5ADD3000
trusted library allocation
page read and write
240C3018000
trusted library allocation
page read and write
7FF849185000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1EC632F6000
heap
page read and write
202E9936000
trusted library allocation
page read and write
7FF849133000
trusted library allocation
page read and write
1EC4A965000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
27F3000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
200CBCE000
stack
page read and write
7FF849172000
trusted library allocation
page read and write
5FCF000
trusted library allocation
page read and write
240C2E47000
trusted library allocation
page read and write
202D95AD000
trusted library allocation
page read and write
202DAE24000
trusted library allocation
page read and write
52CE000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1FA09ED9000
trusted library allocation
page read and write
83D89DE000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
4D11000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
240C3084000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
8F1000
stack
page read and write
1FA08B7D000
trusted library allocation
page read and write
202E99E5000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
202E97F1000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
202E985E000
trusted library allocation
page read and write
715E000
stack
page read and write
240C2E60000
trusted library allocation
page read and write
200BE79000
stack
page read and write
B60000
unkown
page readonly
6555000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
366B000
trusted library allocation
page read and write
200BEF6000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1FA0953B000
trusted library allocation
page read and write
3639000
trusted library allocation
page read and write
8AE000
stack
page read and write
240B39B3000
trusted library allocation
page read and write
7FF849148000
trusted library allocation
page read and write
202D9520000
heap
page read and write
1FA20DDC000
heap
page read and write
240C3028000
trusted library allocation
page read and write
1FA20DE8000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
202E9900000
trusted library allocation
page read and write
240C2DF8000
trusted library allocation
page read and write
4EDD000
stack
page read and write
7FF848FF2000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
240C2DB5000
trusted library allocation
page read and write
202D7A0E000
heap
page read and write
240C2EEE000
trusted library allocation
page read and write
6C68679000
stack
page read and write
240C30BB000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
202E993E000
trusted library allocation
page read and write
9028B73000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
202E99AC000
trusted library allocation
page read and write
1FA20E1A000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
240C2F69000
trusted library allocation
page read and write
202E972C000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
202E9736000
trusted library allocation
page read and write
7160000
heap
page read and write
10D0000
heap
page read and write
240B2C41000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
119B000
heap
page read and write
23543262000
trusted library allocation
page read and write
650A000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
202E998B000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
66CF000
trusted library allocation
page read and write
202E96A4000
trusted library allocation
page read and write
5D01000
heap
page read and write
1FA20DB8000
heap
page read and write
21E2000
trusted library allocation
page read and write
1EC63339000
heap
page read and write
79FE000
stack
page read and write
240C2FDE000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
4F6398D000
stack
page read and write
1FA20DF0000
heap
page read and write
240B3D9D000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
202E9541000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
53B967F000
stack
page read and write
7FF84927D000
trusted library allocation
page read and write
7FF84921C000
trusted library allocation
page read and write
200C17E000
stack
page read and write
23552360000
trusted library allocation
page read and write
202E995F000
trusted library allocation
page read and write
C32000
unkown
page readonly
7FF848E1D000
trusted library allocation
page execute and read and write
202F1D22000
heap
page read and write
202E97C7000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
235408CE000
heap
page read and write
7FF848FF8000
trusted library allocation
page read and write
1FA06C9E000
heap
page read and write
1CF622D2000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1FA0A4B2000
trusted library allocation
page read and write
1CF71536000
trusted library allocation
page read and write
136E000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
1CF79AEE000
heap
page read and write
6533000
heap
page read and write
1EC5AAE0000
trusted library allocation
page read and write
7FF84904D000
trusted library allocation
page read and write
1FA1899B000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
6C689FC000
stack
page read and write
240C2D94000
trusted library allocation
page read and write
235525D9000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
3502000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
200CCCE000
stack
page read and write
49D4000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
240C2ED8000
trusted library allocation
page read and write
4F62E3B000
stack
page read and write
240B0F98000
heap
page read and write
202E99B9000
trusted library allocation
page read and write
1CF7999F000
heap
page read and write
4D80000
trusted library allocation
page execute and read and write
240B2970000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
202E96B4000
trusted library allocation
page read and write
2E10000
heap
page read and write
7FF848F45000
trusted library allocation
page execute and read and write
7FF848DF4000
trusted library allocation
page read and write
202E9551000
trusted library allocation
page read and write
49A6000
trusted library allocation
page read and write
7FF849008000
trusted library allocation
page read and write
202DB334000
trusted library allocation
page read and write
5A0000
unkown
page readonly
12F81000
trusted library allocation
page read and write
1385000
heap
page read and write
1CF79660000
heap
page execute and read and write
21F7000
trusted library allocation
page execute and read and write
104B000
heap
page read and write
53B99F9000
stack
page read and write
240B0FD8000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
1EC631E0000
heap
page read and write
202D79E2000
heap
page read and write
83D927E000
stack
page read and write
235435FA000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
240C2EFE000
trusted library allocation
page read and write
240B0FCE000
heap
page read and write
202E9769000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
520000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
1FA08737000
trusted library allocation
page read and write
240C2E2D000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1CF796C0000
heap
page execute and read and write
202E985A000
trusted library allocation
page read and write
240C2EB3000
trusted library allocation
page read and write
1000000
heap
page read and write
240B10E0000
trusted library section
page read and write
240C2F6B000
trusted library allocation
page read and write
5F9F000
stack
page read and write
53B997E000
stack
page read and write
1CF5F725000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
1FA20B71000
heap
page read and write
1220000
heap
page read and write
202E9821000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
1176000
heap
page read and write
148E000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
240C30C6000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
202E9813000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
23540850000
heap
page read and write
3704000
trusted library allocation
page read and write
240CB0D8000
heap
page read and write
1CF5F965000
heap
page read and write
1EC632AC000
heap
page read and write
2355AC21000
heap
page read and write
1090000
heap
page read and write
1CF71529000
trusted library allocation
page read and write
6A4000
heap
page read and write
1FA20B2B000
heap
page read and write
1285000
heap
page read and write
6C68273000
stack
page read and write
202E96D8000
trusted library allocation
page read and write
235409F5000
heap
page read and write
5EA0000
trusted library allocation
page read and write
240C3013000
trusted library allocation
page read and write
53B977A000
stack
page read and write
7FF848FD1000
trusted library allocation
page read and write
240B1090000
heap
page read and write
240C2C61000
trusted library allocation
page read and write
202E9698000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
202E99C3000
trusted library allocation
page read and write
1B66F000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
1FA1871C000
trusted library allocation
page read and write
1CF61230000
heap
page read and write
53B93FE000
stack
page read and write
1450000
heap
page execute and read and write
5C30000
heap
page read and write
1CF61FBC000
trusted library allocation
page read and write
DE0000
heap
page read and write
1EC48EF2000
heap
page read and write
240C2E04000
trusted library allocation
page read and write
6B1000
heap
page read and write
7FF849143000
trusted library allocation
page read and write
9029237000
stack
page read and write
235427BD000
trusted library allocation
page read and write
240B3EE5000
trusted library allocation
page read and write
7FF8490E2000
trusted library allocation
page read and write
240C2F6D000
trusted library allocation
page read and write
240B1190000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
240B2C30000
heap
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
202E97AC000
trusted library allocation
page read and write
1EC63030000
heap
page read and write
1FA20DE0000
heap
page read and write
240B44D3000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
202E9765000
trusted library allocation
page read and write
240C2DB1000
trusted library allocation
page read and write
235408C9000
heap
page read and write
1CF79AB6000
heap
page read and write
240C2E02000
trusted library allocation
page read and write
240CB06F000
heap
page read and write
202F1D8A000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
2355AD70000
heap
page read and write
A00000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7DF406430000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
5ECA000
trusted library allocation
page read and write
1CF79AE8000
heap
page read and write
240B1100000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
902953C000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849179000
trusted library allocation
page read and write
53B9C7B000
stack
page read and write
1FA097D1000
trusted library allocation
page read and write
5C7D000
heap
page read and write
1FA06BE0000
heap
page read and write
4E2D000
trusted library allocation
page read and write
202E9993000
trusted library allocation
page read and write
1EC62E20000
heap
page read and write
1CF5F800000
heap
page read and write
240C30B1000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
240C3049000
trusted library allocation
page read and write
240C2DB7000
trusted library allocation
page read and write
7DF49DD40000
trusted library allocation
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1FA186D1000
trusted library allocation
page read and write
235433B3000
trusted library allocation
page read and write
49A1000
trusted library allocation
page read and write
23543379000
trusted library allocation
page read and write
90292B9000
stack
page read and write
240CB097000
heap
page execute and read and write
265F000
trusted library allocation
page read and write
202DAE83000
trusted library allocation
page read and write
240B1017000
heap
page read and write
202DA836000
trusted library allocation
page read and write
200BD77000
stack
page read and write
7FF848FC2000
trusted library allocation
page read and write
1CF79A32000
heap
page read and write
1EC4C254000
trusted library allocation
page read and write
202E9989000
trusted library allocation
page read and write
1FA20FA0000
trusted library allocation
page read and write
367F000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
240B4A21000
trusted library allocation
page read and write
21F0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
202E99A6000
trusted library allocation
page read and write
34DE000
trusted library allocation
page read and write
240C2EBB000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
64C0000
heap
page read and write
53BA94C000
stack
page read and write
12758000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
240C3030000
trusted library allocation
page read and write
240C2F88000
trusted library allocation
page read and write
240B1120000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page execute and read and write
240C3041000
trusted library allocation
page read and write
14C5000
heap
page read and write
4D40000
trusted library allocation
page read and write
1FA20B7E000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
A1D000
trusted library allocation
page execute and read and write
23542D43000
trusted library allocation
page read and write
240C2DAF000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
5C72000
heap
page read and write
202E97A4000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
24CF000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
202DA5F0000
trusted library allocation
page read and write
202E9942000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
53B9AF8000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
1BF9E000
stack
page read and write
1CF79993000
heap
page read and write
83D8EF8000
stack
page read and write
202F1904000
heap
page read and write
240C2DB3000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
1FA08520000
heap
page readonly
7FF8490C0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
202E968F000
trusted library allocation
page read and write
1EC62EF3000
heap
page read and write
1B5EE000
heap
page read and write
1EC5AB3B000
trusted library allocation
page read and write
1061000
heap
page read and write
7FF849159000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849121000
trusted library allocation
page read and write
36BA000
trusted library allocation
page read and write
240C3088000
trusted library allocation
page read and write
83D8CFA000
stack
page read and write
1EC48EAB000
heap
page read and write
1CF5F835000
heap
page read and write
5A2E000
stack
page read and write
1FA20B29000
heap
page read and write
22E8000
trusted library allocation
page read and write
235525E6000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
23543632000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
240CB2F9000
heap
page read and write
202D99FE000
trusted library allocation
page read and write
7FF849178000
trusted library allocation
page read and write
1CF79AC6000
heap
page read and write
4FEE000
stack
page read and write
7FF8491A0000
trusted library allocation
page read and write
240C2DC3000
trusted library allocation
page read and write
240C30D8000
trusted library allocation
page read and write
240C30C8000
trusted library allocation
page read and write
240C2DA0000
trusted library allocation
page read and write
6CDC000
stack
page read and write
1FA20DEC000
heap
page read and write
1CF5F6C4000
heap
page read and write
5ECF000
trusted library allocation
page read and write
1CF61241000
trusted library allocation
page read and write
14C0000
heap
page read and write
83D9E4D000
stack
page read and write
202D93D6000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849130000
trusted library allocation
page read and write
240C30D4000
trusted library allocation
page read and write
202F193E000
heap
page read and write
240C304F000
trusted library allocation
page read and write
240B3691000
trusted library allocation
page read and write
1CF6301E000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
23552321000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
240C2EDD000
trusted library allocation
page read and write
7FF849182000
trusted library allocation
page read and write
4FFE000
trusted library allocation
page read and write
90290FD000
stack
page read and write
71E0000
trusted library allocation
page execute and read and write
229C000
stack
page read and write
4F6267E000
stack
page read and write
1EC62E6A000
heap
page read and write
23542519000
trusted library allocation
page read and write
6740000
heap
page read and write
1CF79715000
heap
page read and write
240C30AF000
trusted library allocation
page read and write
110000
unkown
page readonly
1CF5F6FC000
heap
page read and write
1FA09743000
trusted library allocation
page read and write
235431EA000
trusted library allocation
page read and write
7FF848FE4000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
1FA09F18000
trusted library allocation
page read and write
5C44000
heap
page read and write
23BE000
stack
page read and write
21DD000
trusted library allocation
page execute and read and write
7FF849230000
trusted library allocation
page read and write
202D7C20000
heap
page read and write
1CF71538000
trusted library allocation
page read and write
CA5000
heap
page read and write
202E973E000
trusted library allocation
page read and write
200CD4B000
stack
page read and write
1026000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
23540898000
heap
page read and write
9028FFE000
stack
page read and write
22B0000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
202E9961000
trusted library allocation
page read and write
240CB2ED000
heap
page read and write
202F1E86000
heap
page read and write
1FA0A108000
trusted library allocation
page read and write
202E985C000
trusted library allocation
page read and write
7FF84921A000
trusted library allocation
page read and write
200C1FB000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
1FA20EFE000
heap
page read and write
26C7000
trusted library allocation
page read and write
202E9928000
trusted library allocation
page read and write
240CB05E000
heap
page read and write
1FA186E1000
trusted library allocation
page read and write
202E99AE000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1EC4C8AE000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1B070000
heap
page execute and read and write
2F1E000
stack
page read and write
240C2DC7000
trusted library allocation
page read and write
498E000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
202E978F000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
240B2AE5000
heap
page read and write
202E9561000
trusted library allocation
page read and write
202DA4CC000
trusted library allocation
page read and write
240C2E4A000
trusted library allocation
page read and write
67E000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
1EC4AF9D000
trusted library allocation
page read and write
102C000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
83D9CCE000
stack
page read and write
7FF849174000
trusted library allocation
page read and write
235421B0000
heap
page readonly
202E9815000
trusted library allocation
page read and write
A00000
heap
page read and write
7FF849134000
trusted library allocation
page read and write
11B0000
heap
page read and write
2808000
trusted library allocation
page read and write
240C2F2A000
trusted library allocation
page read and write
240C2DB9000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
202D7C25000
heap
page read and write
202E9921000
trusted library allocation
page read and write
1CF6239B000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
1CF5F7A0000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
940000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1EC5AB01000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
202D7A57000
heap
page read and write
235525DE000
trusted library allocation
page read and write
1FA092B6000
trusted library allocation
page read and write
240C301A000
trusted library allocation
page read and write
7FF849139000
trusted library allocation
page read and write
240B0FD2000
heap
page read and write
240C2FAF000
trusted library allocation
page read and write
7FF849002000
trusted library allocation
page read and write
202E9707000
trusted library allocation
page read and write
1FA09857000
trusted library allocation
page read and write
1CF799C5000
heap
page read and write
9C0000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1EC632A4000
heap
page read and write
7FF848F9A000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
1BCF2000
heap
page read and write
1FA20B8B000
heap
page read and write
7DF429AF0000
trusted library allocation
page execute and read and write
11E6000
heap
page read and write
1FA06C40000
trusted library allocation
page read and write
202E98D8000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
1280000
heap
page read and write
9028BFF000
stack
page read and write
202E9924000
trusted library allocation
page read and write
240C2E76000
trusted library allocation
page read and write
202E9791000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
53B9D7C000
stack
page read and write
202E9980000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
1FA0942E000
trusted library allocation
page read and write
7FF848DFB000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
119D000
heap
page read and write
4FF0000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
202D9500000
heap
page execute and read and write
240C2F39000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
240C2EA0000
trusted library allocation
page read and write
26E0000
heap
page execute and read and write
2354326A000
trusted library allocation
page read and write
7FF849277000
trusted library allocation
page read and write
202E971C000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
1CF61FB3000
trusted library allocation
page read and write
23540913000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
4F63A8E000
stack
page read and write
240C30A6000
trusted library allocation
page read and write
9028E7F000
stack
page read and write
7FF849162000
trusted library allocation
page read and write
1FA096B2000
trusted library allocation
page read and write
1EC4BD75000
trusted library allocation
page read and write
1C19E000
stack
page read and write
202E999B000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
7FF4807E0000
trusted library allocation
page execute and read and write
7FF848FA2000
trusted library allocation
page read and write
240C2DAC000
trusted library allocation
page read and write
83D8E7D000
stack
page read and write
240C2E18000
trusted library allocation
page read and write
1CF71271000
trusted library allocation
page read and write
610000
heap
page read and write
4E9D000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
83D891F000
stack
page read and write
1FA189B3000
trusted library allocation
page read and write
1EC4C8F8000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
13B3000
trusted library allocation
page read and write
202E96C0000
trusted library allocation
page read and write
1BCAD000
heap
page read and write
2355A831000
heap
page read and write
8B0000
heap
page read and write
202E96BB000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
240C3098000
trusted library allocation
page read and write
23542220000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
6C687FA000
stack
page read and write
6738000
trusted library allocation
page read and write
202D9531000
trusted library allocation
page read and write
11DE000
heap
page read and write
7FF849004000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
5D1C000
heap
page read and write
240B3E19000
trusted library allocation
page read and write
3671000
trusted library allocation
page read and write
202DA86A000
trusted library allocation
page read and write
1B91E000
stack
page read and write
53BA9CE000
stack
page read and write
202E9915000
trusted library allocation
page read and write
4BEE000
stack
page read and write
240B0FDA000
heap
page read and write
633E000
stack
page read and write
3661000
trusted library allocation
page read and write
2355A8E6000
heap
page execute and read and write
23542200000
heap
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
64FA000
heap
page read and write
90294BE000
stack
page read and write
3722000
trusted library allocation
page read and write
240CB26A000
heap
page read and write
7FF849213000
trusted library allocation
page read and write
1FA06BA0000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
202D7A12000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
525000
heap
page read and write
71DE000
stack
page read and write
10F0000
heap
page read and write
83D917F000
stack
page read and write
1CF71530000
trusted library allocation
page read and write
1CF79997000
heap
page read and write
104D000
heap
page read and write
CA0000
heap
page read and write
5EE2000
trusted library allocation
page read and write
1CF71548000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
202E99A4000
trusted library allocation
page read and write
240C3086000
trusted library allocation
page read and write
1EC490F0000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
202D7AE0000
trusted library allocation
page read and write
66ED000
trusted library allocation
page read and write
83D907A000
stack
page read and write
1FA0A48D000
trusted library allocation
page read and write
202DB354000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
240C3082000
trusted library allocation
page read and write
240B4A46000
trusted library allocation
page read and write
1575000
heap
page read and write
1CF5F850000
trusted library allocation
page read and write
1FA20D82000
heap
page read and write
5FCD000
trusted library allocation
page read and write
1FA0A4D2000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
25DC000
trusted library allocation
page read and write
240C3053000
trusted library allocation
page read and write
2355A7D8000
heap
page read and write
2EDA000
trusted library allocation
page read and write
240C2E5E000
trusted library allocation
page read and write
240B3BE1000
trusted library allocation
page read and write
202E9967000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
200CECE000
stack
page read and write
240CB0C0000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
108B000
heap
page read and write
36C4000
trusted library allocation
page read and write
494E000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
240B310D000
trusted library allocation
page read and write
1FA06CBF000
heap
page read and write
4DA0000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
1570000
heap
page read and write
4D50000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
202E9934000
trusted library allocation
page read and write
202D7A2E000
heap
page read and write
1CF79950000
heap
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
202DA709000
trusted library allocation
page read and write
2355A835000
heap
page read and write
647E000
stack
page read and write
1CF62360000
trusted library allocation
page read and write
1FA092A6000
trusted library allocation
page read and write
202E96F5000
trusted library allocation
page read and write
3702000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
83D9ECE000
stack
page read and write
202E9763000
trusted library allocation
page read and write
36B6000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
240C3037000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1B50D000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
902A18E000
stack
page read and write
2790000
trusted library allocation
page read and write
1EC4C4E0000
trusted library allocation
page read and write
235525F7000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
240B2AFC000
heap
page read and write
36EC000
trusted library allocation
page read and write
202D79D8000
heap
page read and write
202E981F000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
1B7EB000
stack
page read and write
240C30D1000
trusted library allocation
page read and write
240C2E24000
trusted library allocation
page read and write
8700000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
4F62CBE000
stack
page read and write
4F8000
stack
page read and write
240B4001000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
4F6297E000
stack
page read and write
1C09B000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
6C684FE000
stack
page read and write
9029079000
stack
page read and write
1EC4BB00000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
6C686F7000
stack
page read and write
64BE000
stack
page read and write
202F1E8F000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
1CF79768000
heap
page read and write
240B0FA2000
heap
page read and write
2969000
trusted library allocation
page read and write
202E97B9000
trusted library allocation
page read and write
202F1E38000
heap
page read and write
202E96DA000
trusted library allocation
page read and write
200BBFF000
stack
page read and write
1EC4AF7D000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
970000
heap
page read and write
202D7A1A000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
6760000
trusted library allocation
page read and write
1CF5F6DC000
heap
page read and write
1EC4C33A000
trusted library allocation
page read and write
202D7B00000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
240B10C0000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
240B3D62000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
1CF62578000
trusted library allocation
page read and write
255D000
trusted library allocation
page read and write
1FA18995000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1EC4C360000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
A31000
heap
page read and write
1C09E000
stack
page read and write
240CB30D000
heap
page read and write
902A087000
stack
page read and write
2355AA00000
heap
page execute and read and write
6C68577000
stack
page read and write
499B000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
36A7000
trusted library allocation
page read and write
2355AD4E000
heap
page read and write
53B9BFF000
stack
page read and write
6C68778000
stack
page read and write
202E99B5000
trusted library allocation
page read and write
240C2EA2000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
4F6277E000
stack
page read and write
4F62BBA000
stack
page read and write
3684000
trusted library allocation
page read and write
202E9683000
trusted library allocation
page read and write
1EC4BB91000
trusted library allocation
page read and write
5EC5000
trusted library allocation
page read and write
202D9F82000
trusted library allocation
page read and write
7DF448080000
trusted library allocation
page execute and read and write
202E997E000
trusted library allocation
page read and write
240B3CD4000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
64C4000
heap
page read and write
6FE0000
heap
page read and write
4F6287E000
stack
page read and write
7FF849246000
trusted library allocation
page read and write
1CF7998F000
heap
page read and write
7FF849185000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
240CB058000
heap
page read and write
202E981A000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
240B2C20000
trusted library allocation
page read and write
1CF622FE000
trusted library allocation
page read and write
235409D0000
trusted library allocation
page read and write
23543B18000
trusted library allocation
page read and write
4F627FA000
stack
page read and write
66F2000
trusted library allocation
page read and write
7F620000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
235421A0000
trusted library allocation
page read and write
1CF5F960000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
6505000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
1EC48E70000
heap
page read and write
2561000
trusted library allocation
page read and write
202E98FC000
trusted library allocation
page read and write
12F83000
trusted library allocation
page read and write
202E9987000
trusted library allocation
page read and write
23543277000
trusted library allocation
page read and write
7FF84921C000
trusted library allocation
page read and write
202E969D000
trusted library allocation
page read and write
240C2E22000
trusted library allocation
page read and write
6E4000
heap
page read and write
2929000
trusted library allocation
page read and write
1EC48ECB000
heap
page read and write
7FF848FC4000
trusted library allocation
page read and write
202F1B60000
trusted library allocation
page read and write
23543A72000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
240C2E7A000
trusted library allocation
page read and write
1CF79A1E000
heap
page read and write
202DA5C4000
trusted library allocation
page read and write
1EC48E40000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
202E990E000
trusted library allocation
page read and write
240C306D000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
9F0000
heap
page read and write
235409C0000
trusted library section
page read and write
1FA06CB9000
heap
page read and write
23542250000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
240C309C000
trusted library allocation
page read and write
2354325D000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
7FF848FE8000
trusted library allocation
page read and write
1EC5ADB9000
trusted library allocation
page read and write
202E97CC000
trusted library allocation
page read and write
1EC49130000
heap
page read and write
1EC63209000
heap
page read and write
5EE5000
trusted library allocation
page read and write
6502000
heap
page read and write
7FF849168000
trusted library allocation
page read and write
1FA18999000
trusted library allocation
page read and write
240CB1A9000
heap
page read and write
240C309A000
trusted library allocation
page read and write
240CB02D000
heap
page read and write
105F000
heap
page read and write
37E7000
trusted library allocation
page read and write
7DF4DF6F0000
trusted library allocation
page execute and read and write
240C2DD6000
trusted library allocation
page read and write
1EC62EBA000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
200BAFF000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
240C30AC000
trusted library allocation
page read and write
200BA73000
stack
page read and write
240B3F7A000
trusted library allocation
page read and write
1CF716B1000
trusted library allocation
page read and write
202F1960000
heap
page read and write
7FF84926D000
trusted library allocation
page read and write
202E9711000
trusted library allocation
page read and write
7FF848FB1000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
1EC49040000
heap
page read and write
2886000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
2355AD18000
heap
page read and write
202E976B000
trusted library allocation
page read and write
23540910000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
4CF0000
trusted library allocation
page read and write
240B3F46000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
240CB034000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
653D000
heap
page read and write
3634000
trusted library allocation
page read and write
1FA0988A000
trusted library allocation
page read and write
240C2E5C000
trusted library allocation
page read and write
6C695CC000
stack
page read and write
27D0000
trusted library allocation
page read and write
240C3073000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
7DF4DF700000
trusted library allocation
page execute and read and write
6C6944C000
stack
page read and write
202E96BE000
trusted library allocation
page read and write
240CB2F5000
heap
page read and write
202F1DAC000
heap
page read and write
9029F8C000
stack
page read and write
202F18DE000
heap
page read and write
240C308A000
trusted library allocation
page read and write
1B17B000
stack
page read and write
202E9985000
trusted library allocation
page read and write
240C3011000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
1CF796D0000
heap
page read and write
240B1140000
trusted library allocation
page read and write
7DF448090000
trusted library allocation
page execute and read and write
23542364000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
1EC48E7F000
heap
page read and write
64E5000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
1EC4BBF2000
trusted library allocation
page read and write
697000
heap
page read and write
A81000
heap
page read and write
202E99B7000
trusted library allocation
page read and write
23544111000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7DF489E40000
trusted library allocation
page execute and read and write
36FF000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1FA20DE4000
heap
page read and write
1EC62F96000
heap
page execute and read and write
1CF797F0000
heap
page read and write
240B0E80000
heap
page read and write
7FF849276000
trusted library allocation
page read and write
1CF7977D000
heap
page read and write
6F5E000
stack
page read and write
7FF849220000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
2355AD79000
heap
page read and write
4F623D3000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
1FA08530000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page execute and read and write
6C683FE000
stack
page read and write
202E977E000
trusted library allocation
page read and write
1110000
heap
page read and write
2F70000
heap
page read and write
235421C0000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
240B2AE0000
heap
page read and write
240C2E2F000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
1FA186B1000
trusted library allocation
page read and write
10E0000
heap
page read and write
200CE4C000
stack
page read and write
202E9879000
trusted library allocation
page read and write
9CC000
heap
page read and write
12751000
trusted library allocation
page read and write
1CF61469000
trusted library allocation
page read and write
1FA09102000
trusted library allocation
page read and write
1CF79719000
heap
page read and write
1EC5AAD1000
trusted library allocation
page read and write
281D000
trusted library allocation
page read and write
2846000
trusted library allocation
page read and write
528D000
stack
page read and write
AAD000
heap
page read and write
1CF79A3D000
heap
page read and write
1B3AD000
stack
page read and write
202E96C3000
trusted library allocation
page read and write
4F6390C000
stack
page read and write
AA1000
heap
page read and write
240C2DF6000
trusted library allocation
page read and write
90293BE000
stack
page read and write
7FF849067000
trusted library allocation
page read and write
21E0000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
235434CC000
trusted library allocation
page read and write
202DA4C6000
trusted library allocation
page read and write
1CF79955000
heap
page read and write
7FF849253000
trusted library allocation
page read and write
1CF71261000
trusted library allocation
page read and write
202E9739000
trusted library allocation
page read and write
There are 1959 hidden memdumps, click here to show them.