IOC Report
yX8787W7de.exe

loading gif

Files

File Path
Type
Category
Malicious
yX8787W7de.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\conhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\SystemSettings.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\wNNbKC3aho.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\iJCvyQAH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wNZUMzpS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\fontrefcrt\JfSdr.vbe
data
dropped
malicious
C:\fontrefcrt\MsintoRefcommonsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\fontrefcrt\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\088424020bedd6
ASCII text, with very long lines (620), with no line terminators
dropped
C:\Program Files\Internet Explorer\en-US\31d454e2f3d20a
ASCII text, with very long lines (636), with no line terminators
dropped
C:\Recovery\31d454e2f3d20a
ASCII text, with very long lines (378), with no line terminators
dropped
C:\Recovery\9e60a5f7a3bd80
ASCII text, with very long lines (396), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MsintoRefcommonsvc.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SwjJGfgwqbpLdPqvPFcqLsY.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\0nIhZ6KLH4
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RES4FAE.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e0, 10 symbols, created Fri Apr 26 04:35:19 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.out
Unicode text, UTF-8 (with BOM) text, with very long lines (320), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\qtONc3XZ0o
ASCII text, with no line terminators
dropped
C:\Windows\System32\CSCE4B7E694399A43119EA8A93F1E7760F4.TMP
MSVC .res
dropped
C:\fontrefcrt\18c91701d3e601
ASCII text, with very long lines (996), with no line terminators
dropped
C:\fontrefcrt\24dbde2999530e
ASCII text, with no line terminators
dropped
C:\fontrefcrt\YPm3Ri0zuGSw0d5cA9MOsCVgRsbtCEjXWkwqUVDQU6Ex.bat
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yX8787W7de.exe
"C:\Users\user\Desktop\yX8787W7de.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\fontrefcrt\JfSdr.vbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\fontrefcrt\MsintoRefcommonsvc.exe
"C:\fontrefcrt/MsintoRefcommonsvc.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 6 /tr "'C:\Recovery\SystemSettings.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Recovery\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 14 /tr "'C:\Recovery\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\i0e0ny4g\i0e0ny4g.cmdline"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsY" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\en-US\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\fontrefcrt\WmiPrvSE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\fontrefcrt\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\fontrefcrt\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 10 /tr "'C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsY" /sc ONLOGON /tr "'C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwjJGfgwqbpLdPqvPFcqLsYS" /sc MINUTE /mo 8 /tr "'C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "MsintoRefcommonsvcM" /sc MINUTE /mo 11 /tr "'C:\fontrefcrt\MsintoRefcommonsvc.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "MsintoRefcommonsvc" /sc ONLOGON /tr "'C:\fontrefcrt\MsintoRefcommonsvc.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "MsintoRefcommonsvcM" /sc MINUTE /mo 14 /tr "'C:\fontrefcrt\MsintoRefcommonsvc.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\wNNbKC3aho.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\conhost.exe
"C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe"
malicious
C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\conhost.exe
"C:\Program Files (x86)\windowspowershell\Configuration\Schema\conhost.exe"
malicious
C:\fontrefcrt\MsintoRefcommonsvc.exe
C:\fontrefcrt\MsintoRefcommonsvc.exe
malicious
C:\fontrefcrt\MsintoRefcommonsvc.exe
C:\fontrefcrt\MsintoRefcommonsvc.exe
malicious
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
malicious
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
C:\Recovery\SwjJGfgwqbpLdPqvPFcqLsY.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\fontrefcrt\YPm3Ri0zuGSw0d5cA9MOsCVgRsbtCEjXWkwqUVDQU6Ex.bat" "
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4FAE.tmp" "c:\Windows\System32\CSCE4B7E694399A43119EA8A93F1E7760F4.TMP"
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://taketa.top/JavascriptPollMultigeneratordatalife.php
104.21.16.102
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://taketa.top
unknown
http://taketa.top/
unknown

Domains

Name
IP
Malicious
taketa.top
104.21.16.102
malicious

IPs

IP
Domain
Country
Malicious
104.21.16.102
taketa.top
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SystemSettings
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SwjJGfgwqbpLdPqvPFcqLsY
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
conhost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
conhost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WmiPrvSE
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MsintoRefcommonsvc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MsintoRefcommonsvc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SwjJGfgwqbpLdPqvPFcqLsY
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SwjJGfgwqbpLdPqvPFcqLsY
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\fb6bec7a7120fef0467f6866389df026abe6e7dd
1fbc9c409552d3f5ae4dc820fc90757381ee7130
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
FileDirectory
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6B27000
heap
page read and write
malicious
9B2000
unkown
page readonly
malicious
6213000
heap
page read and write
malicious
130A1000
trusted library allocation
page read and write
malicious
6B25000
heap
page read and write
malicious
161F000
stack
page read and write
1BC73000
heap
page execute and read and write
10DB000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BA36000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page execute and read and write
2750000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
1E1ABDA4000
heap
page read and write
1F7A7E98000
heap
page read and write
2E78000
trusted library allocation
page read and write
1C0AA000
heap
page read and write
1F7A7E50000
heap
page read and write
16A0000
heap
page read and write
2D7F000
trusted library allocation
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
31C0000
heap
page read and write
4A30000
heap
page read and write
9DBCEFB000
stack
page read and write
267E000
stack
page read and write
1B6AF000
stack
page read and write
5568000
heap
page read and write
7FFD9BBD4000
trusted library allocation
page read and write
38E3000
trusted library allocation
page read and write
15E000
unkown
page read and write
BD94DFE000
stack
page read and write
1C125000
heap
page read and write
1BA0E000
stack
page read and write
38D0000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page execute and read and write
1F7A97F0000
direct allocation
page read and write
2749000
heap
page read and write
27AE000
stack
page read and write
38E1000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
E3F000
stack
page read and write
3999000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
7FFD9BB53000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
12D11000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1B28D000
stack
page read and write
2E72000
trusted library allocation
page read and write
1C0DC000
heap
page read and write
27D3000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
1B8F6000
heap
page read and write
1F7A7EE9000
heap
page read and write
3181000
trusted library allocation
page read and write
393B000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
28C5EF82000
heap
page read and write
3965000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
16B0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
20FC00C5000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
1C48E000
stack
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
2476000
stack
page read and write
2DB2000
heap
page read and write
9DBD0FE000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
12EB1000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
1E1ABBE1000
heap
page read and write
1365000
heap
page read and write
134A1000
trusted library allocation
page read and write
554F000
stack
page read and write
2E4E000
trusted library allocation
page read and write
2BB35F60000
heap
page read and write
1E1ABBE2000
heap
page read and write
12EEE000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
1497000
heap
page read and write
2D5F000
heap
page read and write
31D0000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
12F31000
trusted library allocation
page read and write
1C142000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1F7A7E20000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2751000
heap
page read and write
1BD4F000
stack
page read and write
29F2A820000
heap
page read and write
145C000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
2955000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
183000
unkown
page write copy
2C66000
trusted library allocation
page read and write
1000000
heap
page read and write
2B45000
trusted library allocation
page read and write
135C8000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
1B620000
heap
page execute and read and write
2E74000
trusted library allocation
page read and write
1B8E7000
heap
page read and write
10F0000
heap
page read and write
9F6000
unkown
page readonly
3967000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
516F000
stack
page read and write
15E000
unkown
page write copy
2BB35F67000
heap
page read and write
2EE7000
trusted library allocation
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
2D40000
heap
page read and write
7FFD9BB39000
trusted library allocation
page read and write
38F0000
trusted library allocation
page read and write
530D000
stack
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
1BB5F000
stack
page read and write
1C52B000
stack
page read and write
7FFD9BCD4000
trusted library allocation
page read and write
2747000
heap
page read and write
1E1ABBE2000
heap
page read and write
7FFD9BB97000
trusted library allocation
page read and write
E3D000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
B99000
heap
page read and write
29F2A47B000
heap
page read and write
2D5F000
stack
page read and write
1F7A7DE0000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
D60000
heap
page read and write
2C2F000
trusted library allocation
page read and write
1C185000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
2D5E000
heap
page read and write
38E1000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
2D1A8B30000
heap
page read and write
1045000
heap
page read and write
28C5F150000
heap
page read and write
12AF7000
trusted library allocation
page read and write
150E000
stack
page read and write
312F000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
183000
unkown
page readonly
DFC000
heap
page read and write
57FE000
stack
page read and write
1415000
heap
page read and write
7FFD9BB48000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
28C5EF50000
heap
page read and write
16E0000
heap
page read and write
1BE2B000
stack
page read and write
1B650000
heap
page read and write
1C690000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1B772000
heap
page read and write
2E43000
trusted library allocation
page read and write
29E0000
heap
page read and write
4F90000
heap
page read and write
1F7A9810000
direct allocation
page read and write
1493000
heap
page read and write
151E000
stack
page read and write
27DB000
heap
page read and write
305B000
trusted library allocation
page read and write
1E1ABBE4000
heap
page read and write
1F7A97D0000
direct allocation
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
2D8F000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
2EFA000
trusted library allocation
page read and write
2D71000
heap
page read and write
3931000
trusted library allocation
page read and write
6E3C000
stack
page read and write
BD0000
heap
page read and write
12D07000
trusted library allocation
page read and write
2D63000
heap
page read and write
1B67B000
heap
page read and write
1C32E000
stack
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
395B000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
1B92D000
heap
page read and write
1B8B6000
heap
page read and write
6210000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
BD94CFE000
stack
page read and write
1550000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
274A000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
D41000
stack
page read and write
2B31000
trusted library allocation
page read and write
1B932000
heap
page read and write
1F7A7E9A000
heap
page read and write
30DC000
trusted library allocation
page read and write
1400000
heap
page read and write
1C05E000
heap
page read and write
2E68000
trusted library allocation
page read and write
133C1000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
48D1000
trusted library allocation
page read and write
1F7A7EDB000
heap
page read and write
C27000
heap
page read and write
B20000
trusted library allocation
page read and write
7FFD9BCD2000
trusted library allocation
page read and write
27D2000
heap
page read and write
1450000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
2B4F000
trusted library allocation
page read and write
13121000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1C68D000
stack
page read and write
3185000
trusted library allocation
page read and write
2D69000
heap
page read and write
1B850000
heap
page read and write
34C4000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2DAB000
heap
page read and write
2D90000
trusted library allocation
page read and write
1050000
heap
page read and write
3971000
trusted library allocation
page read and write
7FFD9BBA4000
trusted library allocation
page read and write
39C3000
trusted library allocation
page read and write
2AE0000
heap
page read and write
2778000
heap
page read and write
2777000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1F7A986F000
direct allocation
page read and write
2D54000
trusted library allocation
page read and write
1F7A9790000
direct allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
1C095000
heap
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
12AA000
heap
page read and write
2DAB000
heap
page read and write
7FFD9BB7D000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
7FFD9BBD2000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
2717000
heap
page read and write
38B3000
trusted library allocation
page read and write
2565000
stack
page read and write
D90000
heap
page read and write
28C5EF94000
heap
page read and write
2CFB000
stack
page read and write
D35000
heap
page read and write
2750000
heap
page read and write
1C0F3000
heap
page read and write
128B000
heap
page read and write
33EC000
trusted library allocation
page read and write
2D62000
heap
page read and write
1C07D000
heap
page read and write
1B919000
heap
page read and write
1F7A98D3000
direct allocation
page read and write
2BB35E50000
heap
page read and write
5A3C000
stack
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page read and write
25E0000
heap
page read and write
7FFD9BB56000
trusted library allocation
page read and write
7FFD9BAD1000
trusted library allocation
page execute and read and write
2B62000
trusted library allocation
page read and write
6A20000
heap
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
2737000
heap
page read and write
7FFD9BE3C000
trusted library allocation
page read and write
2D1A8730000
heap
page read and write
E70000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
39AD000
trusted library allocation
page read and write
28C5EF7F000
heap
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
9DBCFFF000
unkown
page read and write
3133000
trusted library allocation
page read and write
3041000
trusted library allocation
page read and write
2E90000
heap
page read and write
12B01000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1F7A7E9D000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
7FFD9BAE1000
trusted library allocation
page execute and read and write
7FFD9BBCD000
trusted library allocation
page read and write
E10000
heap
page read and write
7FFD9BBB4000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
2ED7000
trusted library allocation
page read and write
2D77000
heap
page read and write
148E000
heap
page read and write
398D000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
1F7A7EC8000
heap
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
2B33000
trusted library allocation
page read and write
38DB000
trusted library allocation
page read and write
7FFD9B9D4000
trusted library allocation
page read and write
BD949AC000
stack
page read and write
1515000
heap
page read and write
1B480000
heap
page execute and read and write
9E5000
unkown
page readonly
1404000
heap
page read and write
1F7A7EB9000
heap
page read and write
1F7A7E74000
heap
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
2EB0000
heap
page execute and read and write
1B80F000
stack
page read and write
2A00000
trusted library allocation
page read and write
2DB2000
heap
page read and write
28C5F154000
heap
page read and write
1322E000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
13571000
trusted library allocation
page read and write
90BD4B000
stack
page read and write
F00000
heap
page read and write
1F7A7EEA000
heap
page read and write
34C0BFE000
stack
page read and write
1B510000
heap
page read and write
1BD50000
heap
page read and write
2734000
heap
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
2D6C000
heap
page read and write
7FFD9BB67000
trusted library allocation
page read and write
58FF000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
1020000
heap
page read and write
27DB000
heap
page read and write
FD0000
heap
page read and write
2EF8000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
120000
unkown
page readonly
7FFD9BAC0000
trusted library allocation
page execute and read and write
7FFD9BB58000
trusted library allocation
page read and write
B97000
heap
page read and write
1E1ABBE2000
heap
page read and write
1C044000
heap
page read and write
4EDB000
stack
page read and write
28C5EF82000
heap
page read and write
1B750000
heap
page execute and read and write
2DAB000
heap
page read and write
2766000
heap
page read and write
28C5EF5B000
heap
page read and write
2D80000
heap
page read and write
2ED1000
trusted library allocation
page read and write
27D4000
heap
page read and write
2960000
heap
page read and write
1F7A7EE1000
heap
page read and write
7FFD9B998000
trusted library allocation
page read and write
1F7A7E7D000
heap
page read and write
1B912000
heap
page read and write
2EC1000
trusted library allocation
page read and write
7FFD9BB94000
trusted library allocation
page read and write
147A000
heap
page read and write
3190000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1B8A0000
heap
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
2E76000
trusted library allocation
page read and write
1C036000
heap
page read and write
129F7000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
3010000
heap
page execute and read and write
30BF000
trusted library allocation
page read and write
1F7A9777000
direct allocation
page read and write
1BB0F000
stack
page read and write
39A3000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2572000
stack
page read and write
121000
unkown
page execute read
2EC0000
trusted library allocation
page read and write
2C44000
trusted library allocation
page read and write
27AC000
heap
page read and write
32CB000
trusted library allocation
page read and write
2840000
heap
page read and write
27D1000
heap
page read and write
27DB000
heap
page read and write
1F7A985D000
direct allocation
page read and write
12E61000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1C88B000
stack
page read and write
391B000
trusted library allocation
page read and write
1250000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
1B500000
heap
page read and write
48EA000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1BD0F000
stack
page read and write
1E1ABD20000
heap
page read and write
F87E17F000
stack
page read and write
B39000
heap
page read and write
2D0B000
trusted library allocation
page read and write
3320000
heap
page execute and read and write
7FFD9B9DB000
trusted library allocation
page execute and read and write
1F7A98D5000
direct allocation
page read and write
2D72000
heap
page read and write
3099000
trusted library allocation
page read and write
621C000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
12A01000
trusted library allocation
page read and write
9D0000
heap
page read and write
395D000
trusted library allocation
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
2C42000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2D6B000
heap
page read and write
28C5EF94000
heap
page read and write
2BB36060000
heap
page read and write
1F7A7E8D000
heap
page read and write
1B670000
heap
page read and write
31CB000
trusted library allocation
page read and write
1F7A9950000
heap
page read and write
7FFD9BB63000
trusted library allocation
page read and write
2D1A88F7000
heap
page read and write
7FFD9BC30000
trusted library allocation
page execute and read and write
10D8000
heap
page read and write
274A000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
2B54000
heap
page read and write
6B20000
heap
page read and write
2EE3000
trusted library allocation
page read and write
3929000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2D1A8810000
heap
page read and write
1B94A000
heap
page read and write
2DA9000
trusted library allocation
page read and write
1555000
heap
page read and write
2C55000
trusted library allocation
page read and write
1E1ABD30000
heap
page read and write
1509000
heap
page read and write
2750000
heap
page read and write
2690000
heap
page read and write
1C051000
heap
page read and write
318E000
trusted library allocation
page read and write
98D0FF5000
stack
page read and write
7FFD9B992000
trusted library allocation
page read and write
7FFD9BB74000
trusted library allocation
page read and write
1BC70000
heap
page execute and read and write
7FFD9B984000
trusted library allocation
page read and write
1B660000
heap
page read and write
1C072000
heap
page read and write
1B788000
heap
page read and write
34C0B7F000
stack
page read and write
2EC3000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7B0000
heap
page read and write
28C5F050000
heap
page read and write
2BB36214000
heap
page read and write
1050000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
153000
unkown
page readonly
7FFD9BB60000
trusted library allocation
page execute and read and write
D70000
heap
page read and write
3050000
trusted library allocation
page read and write
1B942000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
3047000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
12D01000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
2D73000
heap
page read and write
1C38E000
stack
page read and write
118F000
stack
page read and write
7FFD9BB95000
trusted library allocation
page read and write
12D0000
heap
page read and write
38CD000
trusted library allocation
page read and write
30E6000
trusted library allocation
page read and write
1274000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
1F7A7E9F000
heap
page read and write
391F000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page execute and read and write
1F7A7ED2000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
7FFD9BB84000
trusted library allocation
page read and write
7FF4B4FB0000
trusted library allocation
page execute and read and write
7FFD9BE40000
trusted library allocation
page execute and read and write
2C68000
trusted library allocation
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
1E1ABBE1000
heap
page read and write
1BD2F000
stack
page read and write
1C057000
heap
page read and write
12CF1000
trusted library allocation
page read and write
FD0000
heap
page read and write
14BD000
heap
page read and write
1C122000
heap
page read and write
1B677000
heap
page read and write
28C5EF7F000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2D82000
heap
page read and write
1B3AE000
stack
page read and write
1BC0F000
stack
page read and write
20FBFD70000
heap
page read and write
1F7A7E89000
heap
page read and write
2BB1000
trusted library allocation
page read and write
146F000
stack
page read and write
1B531000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
1C02C000
stack
page read and write
7FFD9B994000
trusted library allocation
page read and write
1F7A7EE7000
heap
page read and write
1097000
heap
page read and write
1B8A4000
heap
page read and write
DF8B54C000
stack
page read and write
DF8B5CF000
stack
page read and write
1500000
heap
page read and write
1270000
heap
page read and write
2EC5000
trusted library allocation
page read and write
7FFD9BB94000
trusted library allocation
page read and write
BE0000
heap
page read and write
2E22000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
318E000
stack
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
7FFD9BB4A000
trusted library allocation
page read and write
273B000
heap
page read and write
9C0000
heap
page read and write
28C5F160000
heap
page read and write
146E000
stack
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BBBD000
trusted library allocation
page read and write
13F0000
unkown
page readonly
F05000
heap
page read and write
3987000
trusted library allocation
page read and write
18EE000
stack
page read and write
13F2000
unkown
page readonly
7FFD9BBA4000
trusted library allocation
page read and write
279E000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
1B0C0000
trusted library allocation
page read and write
1B94E000
heap
page read and write
3953000
trusted library allocation
page read and write
2540000
stack
page read and write
7FFD9BE10000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
2D51000
heap
page read and write
7FFD9BBB5000
trusted library allocation
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
1210000
heap
page read and write
1C14E000
stack
page read and write
1085000
heap
page read and write
2746000
heap
page read and write
397B000
trusted library allocation
page read and write
2DB2000
heap
page read and write
1F7A98B0000
direct allocation
page read and write
7C0000
heap
page read and write
2E99000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
1400000
heap
page read and write
1685000
heap
page read and write
7FFD9BBAC000
trusted library allocation
page read and write
1C089000
heap
page read and write
27D3000
heap
page read and write
6C1E000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page execute and read and write
7FFD9B983000
trusted library allocation
page execute and read and write
2E41000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
27DB000
heap
page read and write
1B70E000
stack
page read and write
39AF000
trusted library allocation
page read and write
9B0000
unkown
page readonly
3933000
trusted library allocation
page read and write
7FFD9B9C8000
trusted library allocation
page read and write
540E000
stack
page read and write
B6C000
heap
page read and write
2CB2000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
1F7A97B0000
heap
page read and write
1F7A7EE9000
heap
page read and write
12D5000
heap
page read and write
5170000
heap
page read and write
108E000
heap
page read and write
1B5CD000
stack
page read and write
D2F000
stack
page read and write
7FFD9BBC4000
trusted library allocation
page read and write
1F7A7E7D000
heap
page read and write
1F7A7EBA000
heap
page read and write
13047000
trusted library allocation
page read and write
13091000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2680000
heap
page read and write
7FFD9BAF1000
trusted library allocation
page execute and read and write
1409000
heap
page read and write
3049000
trusted library allocation
page read and write
29DE000
stack
page read and write
12BD1000
trusted library allocation
page read and write
31BA000
trusted library allocation
page read and write
1078000
heap
page read and write
2B6F000
trusted library allocation
page read and write
4A1E000
stack
page read and write
31DC000
heap
page read and write
DF8B87F000
stack
page read and write
7FFD9BB38000
trusted library allocation
page read and write
12AC000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
2C58000
trusted library allocation
page read and write
20FBFDE0000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
135AE000
trusted library allocation
page read and write
D30000
heap
page read and write
1094000
heap
page read and write
2B40000
trusted library allocation
page read and write
10D6000
heap
page read and write
1F7A9730000
direct allocation
page read and write
11D0000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
28C5EE40000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
2D8D000
heap
page read and write
26EE000
stack
page read and write
2FEE000
stack
page read and write
31F9000
trusted library allocation
page read and write
2558000
stack
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
6220000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
2D50000
heap
page read and write
273F000
heap
page read and write
16A5000
heap
page read and write
1070000
heap
page read and write
1B938000
heap
page read and write
2D81000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
10EB000
heap
page read and write
7FFD9B9BC000
trusted library allocation
page read and write
2D7B000
heap
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
F87E0FE000
stack
page read and write
273E000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
2B3C000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
17EE000
stack
page read and write
2B60000
heap
page read and write
1295000
heap
page read and write
2EAD000
heap
page read and write
7FFD9BB9E000
trusted library allocation
page read and write
13C0000
heap
page read and write
1BB6E000
stack
page read and write
7FFD9BCA2000
trusted library allocation
page read and write
1C164000
heap
page read and write
12CE000
stack
page read and write
FF5000
heap
page read and write
2EF6000
trusted library allocation
page read and write
29C0000
heap
page execute and read and write
1F7A7E24000
heap
page read and write
2E7A000
trusted library allocation
page read and write
28C5EF82000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
2D7E000
heap
page read and write
1B86E000
stack
page read and write
2D79000
heap
page read and write
3983000
trusted library allocation
page read and write
2ACF000
stack
page read and write
1F7A7E89000
heap
page read and write
2D70000
heap
page read and write
C2E000
heap
page read and write
29F2A477000
heap
page read and write
EDE000
stack
page read and write
DA0000
heap
page read and write
1B3F0000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
3943000
trusted library allocation
page read and write
12CA1000
trusted library allocation
page read and write
36FF000
trusted library allocation
page read and write
1F7A7E88000
heap
page read and write
4A4B000
heap
page read and write
1F7A9850000
direct allocation
page read and write
1BC2E000
stack
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
1B760000
heap
page read and write
12BA1000
trusted library allocation
page read and write
2DAE000
stack
page read and write
31B0000
heap
page read and write
1F7A9773000
direct allocation
page read and write
1F7A7EE0000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
302E000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
256B000
stack
page read and write
11C4000
heap
page read and write
2B2D000
trusted library allocation
page read and write
2D7C000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B901000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
7FFD9BB94000
trusted library allocation
page read and write
98D13FE000
stack
page read and write
29F2A824000
heap
page read and write
FF0000
heap
page read and write
14C2000
heap
page read and write
FF0000
heap
page read and write
1F7A7EDB000
heap
page read and write
397D000
trusted library allocation
page read and write
2D28000
heap
page read and write
2D87000
heap
page read and write
3927000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page execute and read and write
2C3E000
trusted library allocation
page read and write
6D3F000
stack
page read and write
3201000
trusted library allocation
page read and write
291B000
stack
page read and write
137E000
stack
page read and write
2EE5000
trusted library allocation
page read and write
1B90E000
stack
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
1B691000
heap
page read and write
7FFD9BBB4000
trusted library allocation
page read and write
D90000
heap
page read and write
182000
unkown
page read and write
1640000
heap
page read and write
28C5EF93000
heap
page read and write
110A000
heap
page read and write
27DB000
heap
page read and write
129F1000
trusted library allocation
page read and write
7FFD9BBB7000
trusted library allocation
page read and write
1F7A7E96000
heap
page read and write
1BD99000
heap
page read and write
B4B000
heap
page read and write
1F7A7E9F000
heap
page read and write
7FFD9BB36000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
10E1000
stack
page read and write
1135000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
29DE000
stack
page read and write
DB0000
heap
page read and write
28C5EF20000
heap
page read and write
98D11FE000
stack
page read and write
7FFD9BB47000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
1E1ABBE2000
heap
page read and write
90C0FF000
unkown
page read and write
399B000
trusted library allocation
page read and write
11DE000
stack
page read and write
184000
unkown
page readonly
2749000
heap
page read and write
7FFD9BEF0000
trusted library allocation
page execute and read and write
1E1ABBE2000
heap
page read and write
2BB36210000
heap
page read and write
2D62000
heap
page read and write
7FFD9BB67000
trusted library allocation
page read and write
2D87000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
1F7A7E8F000
heap
page read and write
1F7A978B000
direct allocation
page read and write
1F7A98D0000
direct allocation
page read and write
2D78000
heap
page read and write
7FFD9BEC0000
trusted library allocation
page read and write
131F1000
trusted library allocation
page read and write
1456000
heap
page read and write
2EBD000
trusted library allocation
page read and write
7FFD9BBA5000
trusted library allocation
page read and write
2C35000
trusted library allocation
page read and write
7FFD9BF01000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
7FFD9B9A3000
trusted library allocation
page read and write
12BDE000
trusted library allocation
page read and write
7FFD9BB43000
trusted library allocation
page read and write
393F000
trusted library allocation
page read and write
1C030000
heap
page read and write
34C0AFC000
stack
page read and write
2C4F000
trusted library allocation
page read and write
2BB35F6A000
heap
page read and write
1BE20000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
20FBFD90000
heap
page read and write
D51000
stack
page read and write
2B66000
trusted library allocation
page read and write
27D3000
heap
page read and write
3013000
heap
page execute and read and write
7FFD9BBA0000
trusted library allocation
page read and write
1E1ABBE2000
heap
page read and write
7FFD9B9BC000
trusted library allocation
page read and write
1B96E000
stack
page read and write
DE0000
heap
page read and write
1B8BE000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2D47000
heap
page read and write
7FFD9BB8D000
trusted library allocation
page read and write
544E000
stack
page read and write
2BB35F30000
heap
page read and write
B6E000
heap
page read and write
7FFD9BB57000
trusted library allocation
page read and write
20FC00C0000
heap
page read and write
2D82000
heap
page read and write
1E1ABB60000
heap
page read and write
2685000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
1E1ABBD2000
heap
page read and write
1040000
trusted library allocation
page read and write
1278000
heap
page read and write
2749000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
2D67000
heap
page read and write
3212000
trusted library allocation
page read and write
1BA5E000
stack
page read and write
165000
unkown
page read and write
131E000
heap
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
1E1ABA60000
heap
page read and write
2B00000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
135C0000
trusted library allocation
page read and write
2D74000
heap
page read and write
2D8E000
heap
page read and write
1080000
heap
page read and write
1F7A9954000
heap
page read and write
39B7000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1475000
heap
page read and write
1660000
heap
page read and write
1BA6E000
stack
page read and write
16E5000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
2D88000
heap
page read and write
7FFD9BA56000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
31B2000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
1620000
heap
page read and write
38CB000
trusted library allocation
page read and write
2D65000
heap
page read and write
2D6F000
heap
page read and write
39A5000
trusted library allocation
page read and write
1B1B0000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
1F7A9830000
direct allocation
page read and write
10F5000
heap
page read and write
1F7A985B000
direct allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
1430000
heap
page read and write
2990000
heap
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
3197000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
2E57000
trusted library allocation
page read and write
1CB8E000
stack
page read and write
CE1000
stack
page read and write
1B690000
heap
page read and write
1F7A7EB8000
heap
page read and write
321D000
trusted library allocation
page read and write
20FBFDE7000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
27D2000
heap
page read and write
29E0000
heap
page execute and read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1C132000
heap
page read and write
2EDF000
trusted library allocation
page read and write
4E1E000
stack
page read and write
7FFD9B9C3000
trusted library allocation
page read and write
28C5F1D0000
heap
page read and write
2D47000
heap
page read and write
2950000
heap
page read and write
1C1BC000
heap
page read and write
1C059000
heap
page read and write
2849000
heap
page read and write
31FB000
trusted library allocation
page read and write
153000
unkown
page readonly
110C000
heap
page read and write
20FBFC90000
heap
page read and write
13051000
trusted library allocation
page read and write
506F000
stack
page read and write
2B4D000
trusted library allocation
page read and write
2DD8000
heap
page read and write
1F7A7EA5000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1470000
heap
page read and write
10AB000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BB56000
trusted library allocation
page read and write
12D87000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
12DE1000
trusted library allocation
page read and write
2D6B000
heap
page read and write
1F7A98F0000
direct allocation
page read and write
12AD1000
trusted library allocation
page read and write
27AC000
heap
page read and write
3165000
trusted library allocation
page read and write
1B922000
heap
page read and write
1B8C6000
heap
page read and write
20FBFDEA000
heap
page read and write
1E1ABDA0000
heap
page read and write
1E1ABB40000
heap
page read and write
1360000
heap
page read and write
1B30D000
stack
page read and write
1C1B6000
heap
page read and write
2C50000
heap
page execute and read and write
257A000
stack
page read and write
4920000
heap
page read and write
B58000
heap
page read and write
2ADF000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1B07D000
stack
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
474F000
stack
page read and write
1491000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
10D0000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1C58E000
stack
page read and write
33C9000
trusted library allocation
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
1B83B000
stack
page read and write
1F7A7EBC000
heap
page read and write
7FFD9BB44000
trusted library allocation
page read and write
B30000
heap
page read and write
31EF000
trusted library allocation
page read and write
1B50B000
stack
page read and write
3192000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
2569000
stack
page read and write
4E9E000
stack
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9BB84000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
28C5EF93000
heap
page read and write
12F6E000
trusted library allocation
page read and write
29F2A470000
heap
page read and write
1060000
trusted library allocation
page read and write
1F7A7ED8000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
2D69000
heap
page read and write
B9C000
heap
page read and write
3949000
trusted library allocation
page read and write
1F7A9770000
direct allocation
page read and write
1F7A7EE9000
heap
page read and write
7FFD9BBAE000
trusted library allocation
page read and write
1060000
heap
page read and write
121E000
stack
page read and write
2B2B000
trusted library allocation
page read and write
DD0000
heap
page read and write
1090000
heap
page read and write
12CDE000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
E12000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1370000
heap
page read and write
593B000
stack
page read and write
2D62000
heap
page read and write
2749000
heap
page read and write
1310000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
133F000
stack
page read and write
3945000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
29F2A410000
heap
page read and write
394F000
trusted library allocation
page read and write
1C0B5000
heap
page read and write
1E1ABBAA000
heap
page read and write
1C62E000
stack
page read and write
2D01000
trusted library allocation
page read and write
10D8000
heap
page read and write
1C14A000
heap
page read and write
1C890000
heap
page read and write
1F7A7E00000
heap
page read and write
135BB000
trusted library allocation
page read and write
27D2000
heap
page read and write
7FFD9BBA7000
trusted library allocation
page read and write
104E000
heap
page read and write
28C5F1D4000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1BF2A000
stack
page read and write
1E1ABBD1000
heap
page read and write
1F7A7ED9000
heap
page read and write
7FFD9BE60000
trusted library allocation
page read and write
102C000
heap
page read and write
2E50000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1F7A9870000
direct allocation
page read and write
7FFD9BBBE000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
1BD40000
heap
page read and write
12AF1000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
10AD000
heap
page read and write
6B21000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1062000
heap
page read and write
1F7A7EAA000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7E0000
heap
page read and write
27D4000
heap
page read and write
2EF2000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
2D79000
heap
page read and write
38EE000
trusted library allocation
page read and write
2D89000
heap
page read and write
7FFD9B9AC000
trusted library allocation
page read and write
2777000
heap
page read and write
33B0000
heap
page execute and read and write
761000
stack
page read and write
F87E07C000
stack
page read and write
1F7A7D00000
heap
page read and write
2D20000
heap
page read and write
303E000
stack
page read and write
7FFD9BB46000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
121000
unkown
page execute read
7FFD9BC25000
trusted library allocation
page read and write
1510000
heap
page read and write
7FFD9BB28000
trusted library allocation
page read and write
1F7A7E9F000
heap
page read and write
2EC2000
trusted library allocation
page read and write
FCE000
stack
page read and write
2710000
heap
page read and write
2D1B000
trusted library allocation
page read and write
1F7A7EAA000
heap
page read and write
2F30000
heap
page execute and read and write
1F7A7EE9000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
12CEB000
trusted library allocation
page read and write
12D81000
trusted library allocation
page read and write
E3B000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
254E000
stack
page read and write
5550000
heap
page read and write
31F3000
trusted library allocation
page read and write
7FFD9BB77000
trusted library allocation
page read and write
32F0000
heap
page read and write
1390000
heap
page execute and read and write
1030000
trusted library allocation
page read and write
2D1A88E0000
heap
page read and write
2C53000
trusted library allocation
page read and write
31C9000
heap
page read and write
31B4000
trusted library allocation
page read and write
1F7A9890000
direct allocation
page read and write
1F7A7E9F000
heap
page read and write
1E1ABBE2000
heap
page read and write
7FFD9BB57000
trusted library allocation
page read and write
7FFD9B9CC000
trusted library allocation
page read and write
7FFD9BE30000
trusted library allocation
page read and write
1BDDF000
heap
page read and write
1680000
heap
page read and write
4E5E000
stack
page read and write
120000
unkown
page readonly
1F7A7EE7000
heap
page read and write
34FB000
trusted library allocation
page read and write
2549000
stack
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
7FFD9BE40000
trusted library allocation
page read and write
1BDD3000
heap
page read and write
1B4AF000
stack
page read and write
27DB000
heap
page read and write
1F7A9759000
direct allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1C0CC000
heap
page read and write
DC0000
heap
page read and write
2D1A8830000
heap
page read and write
1F7A7E7D000
heap
page read and write
1B910000
heap
page read and write
1C42E000
stack
page read and write
2DB2000
heap
page read and write
90C1FF000
stack
page read and write
1C06E000
heap
page read and write
29F2A400000
heap
page read and write
27D1000
heap
page read and write
2D41000
heap
page read and write
2E25000
trusted library allocation
page read and write
7FFD9BBB2000
trusted library allocation
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
2D75000
heap
page read and write
7FFD9BB65000
trusted library allocation
page read and write
2B50000
heap
page read and write
1BDE3000
heap
page read and write
1AE6D000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
2E3F000
trusted library allocation
page read and write
9B0000
unkown
page readonly
1BA20000
heap
page read and write
28C5EF7E000
heap
page read and write
2D6D000
heap
page read and write
9F2000
unkown
page readonly
DA0000
heap
page read and write
1B5AF000
stack
page read and write
2DCF000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
2B67000
heap
page read and write
1C09C000
heap
page read and write
2E45000
trusted library allocation
page read and write
1B515000
heap
page read and write
EB0000
heap
page read and write
1F7A7E89000
heap
page read and write
2AE9000
heap
page read and write
1F7A7ED0000
heap
page read and write
4A30000
heap
page read and write
1064000
heap
page read and write
2DAB000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2B6B000
heap
page read and write
29C0000
heap
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
1BD7F000
heap
page read and write
1E1ABBD1000
heap
page read and write
1B95E000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
1B1C6000
heap
page read and write
7FFD9BB84000
trusted library allocation
page read and write
49CE000
stack
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
2749000
heap
page read and write
12D91000
trusted library allocation
page read and write
2ECE000
trusted library allocation
page read and write
13041000
trusted library allocation
page read and write
1F7A7E7A000
heap
page read and write
DD6000
heap
page read and write
2DCC000
trusted library allocation
page read and write
1BE07000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
319F000
trusted library allocation
page read and write
7FFD9BBB2000
trusted library allocation
page read and write
27D3000
heap
page read and write
2D77000
heap
page read and write
1B906000
heap
page read and write
9B2000
unkown
page readonly
2D1A88E9000
heap
page read and write
4D1D000
stack
page read and write
25F0000
heap
page readonly
7FFD9BBD0000
trusted library allocation
page read and write
3080000
heap
page execute and read and write
1330000
trusted library allocation
page read and write
DB0000
heap
page read and write
31A7000
trusted library allocation
page read and write
263D000
stack
page read and write
DDC000
heap
page read and write
AD0000
heap
page read and write
1BF4E000
stack
page read and write
1B93D000
heap
page read and write
1E1ABBA0000
heap
page read and write
29F2A430000
heap
page read and write
1F7A7EC0000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
2B56000
trusted library allocation
page read and write
1C109000
heap
page read and write
31B8000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
1C04E000
stack
page read and write
2C33000
trusted library allocation
page read and write
12CF4000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1BB2E000
stack
page read and write
1410000
heap
page read and write
1F7A7E8B000
heap
page read and write
28C5EF94000
heap
page read and write
31D9000
heap
page read and write
There are 1206 hidden memdumps, click here to show them.