IOC Report
SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\sihost.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\svnchost.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\payload%20(3)[1].bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pxwixjb.1rt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agmmmj2u.r1r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brxfgbnl.2jx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eml0hcb4.new.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyrvlnkn.d0t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hak5ihvi.vml.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtxhcdgx.fav.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_saxl1loi.f3a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_te40lobw.o5x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tizxviga.xmx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpezu4ec.upl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voeazagn.ngh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfc5dkif.klc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wk4ftmw0.xp1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xapnh1wn.515.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y02vojvz.pk1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\sihost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svnchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Mar 31 10:36:31 2024, mtime=Sun Mar 31 10:36:31 2024, atime=Sun Mar 31 10:36:31 2024, length=5141208, window=hide
modified
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe"
malicious
C:\Windows\explorer.exe
"C:\\Windows\\explorer.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /tn Windows-Update-Manager /tr 'C:\Users\user\AppData\Local\Temp\sihost.exe' /sc minute /mo 1 /st 00:01 /f
malicious
C:\Users\user\AppData\Local\Temp\sihost.exe
C:\Users\user\AppData\Local\Temp\sihost.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\explorer.exe'
malicious
C:\Windows\explorer.exe
"C:\\Windows\\explorer.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\svnchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svnchost.exe'
malicious
C:\Users\user\AppData\Local\Temp\sihost.exe
C:\Users\user\AppData\Local\Temp\sihost.exe
malicious
C:\Windows\explorer.exe
"C:\\Windows\\explorer.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svnchost" /tr "C:\Users\user\AppData\Local\Temp\svnchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\svnchost.exe
C:\Users\user\AppData\Local\Temp\svnchost.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
malicious
C:\Users\user\AppData\Local\Temp\svnchost.exe
"C:\Users\user\AppData\Local\Temp\svnchost.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
malicious
C:\Users\user\AppData\Local\Temp\svnchost.exe
"C:\Users\user\AppData\Local\Temp\svnchost.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
malicious
C:\Users\user\AppData\Local\Temp\sihost.exe
C:\Users\user\AppData\Local\Temp\sihost.exe
malicious
C:\Windows\explorer.exe
"C:\\Windows\\explorer.exe"
malicious
C:\Users\user\AppData\Local\Temp\svnchost.exe
C:\Users\user\AppData\Local\Temp\svnchost.exe
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
94.156.10.234
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://aka.ms/Vh5j3kalSizeQf#
unknown
https://raw.githubusercontent.com/g
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binonicleaks/z/main/payload%20(3).
unknown
http://schemas.m
unknown
https://raw.githubuserconten
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin4
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin6
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).bindll
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin8
unknown
https://contoso.com/License
unknown
https://raw.githubusercontent.com/;eS
unknown
https://aka.ms/Vh5j3k(
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binA
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binA-rXv
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binioC:
unknown
https://raw.githubusercontent.com/1ei
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binJ
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binI
unknown
https://aka.ms/odirm
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binN
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).binal
unknown
https://github.com/
unknown
https://aka.ms/Vh5j3kZ
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.micft.cMicRosof
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bincoC:
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binthC:
unknown
http://nuget.org/NuGet.exe
unknown
https://go.microsoft.cor
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).binl
unknown
https://aka.ms/Vh5j3kDk
unknown
https://aka.ms/odirmReading
unknown
https://raw.githubusercontent.com/-
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).binsI;Q
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).bind
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binz
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin
185.199.111.133
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://github.com/Om;
unknown
https://raw.githubusercontent.com/2
unknown
https://raw.githubusercontent.com/7
unknown
http://schemas.m;
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).binl8d
unknown
https://aka.ms/odirmH
unknown
https://github.com/Pester/Pester
unknown
https://raw.githubusercontent.com/
unknown
http://crl.micro
unknown
https://raw.githubusercontent.com/Q
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).bin;=
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://github.com/bO&Q
unknown
http://schemas.microsoft.co_
unknown
https://github.com/&
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binLMEM
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).binllz
unknown
https://raw.githubusercontent.com/LMEMx
unknown
https://raw.githubusercontent.com/tj
unknown
https://aka.ms/pscore68
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).bin8
unknown
https://raw.githubusercontent.com/_
unknown
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binC5
unknown
https://github.com/zonicleaks/z/raw/main/payload%20(3).bin
140.82.113.3
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.113.3
raw.githubusercontent.com
185.199.111.133

IPs

IP
Domain
Country
Malicious
94.156.10.234
unknown
Bulgaria
malicious
140.82.113.3
github.com
United States
185.199.111.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svnchost
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate

Memdumps

Base Address
Regiontype
Protect
Malicious
1F70000
trusted library section
page read and write
malicious
2A80000
trusted library section
page read and write
malicious
2D20000
trusted library section
page read and write
malicious
2E11000
trusted library allocation
page read and write
malicious
1B4D0000
trusted library section
page read and write
malicious
2C01000
trusted library allocation
page read and write
malicious
2131000
trusted library allocation
page read and write
malicious
1EBAED71000
trusted library allocation
page read and write
7FF657B85000
unkown
page readonly
1A12B3C0000
heap
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
2175DE36000
heap
page read and write
6D707FB000
stack
page read and write
1EBC5C4F000
heap
page read and write
F068BFF000
stack
page read and write
1EBAD4D0000
heap
page read and write
217780B6000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
9E0000
heap
page read and write
2176FB41000
trusted library allocation
page read and write
7038000
heap
page read and write
F06907F000
stack
page read and write
6F1000
heap
page read and write
2175FA10000
heap
page execute and read and write
B58000
heap
page read and write
117F000
heap
page read and write
7FF657B87000
unkown
page readonly
2A00000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FF6576E0000
unkown
page readonly
1267000
heap
page read and write
1450000
heap
page read and write
29C0000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
32F5000
stack
page read and write
5A2000
heap
page read and write
7DF4996B0000
trusted library allocation
page execute and read and write
1139000
heap
page read and write
1EBAE790000
trusted library allocation
page read and write
BC0000
heap
page read and write
1DC1EDF7000
trusted library allocation
page read and write
5F8AA4E000
stack
page read and write
2D43000
trusted library allocation
page read and write
7FF657A5F000
unkown
page readonly
7FFD9B763000
trusted library allocation
page execute and read and write
68ED000
stack
page read and write
1FC0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
FB6000
heap
page read and write
21761936000
trusted library allocation
page read and write
1A114358000
trusted library allocation
page read and write
1DC1B7B9000
heap
page read and write
1EBAB962000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1A12B557000
heap
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
24399714000
heap
page read and write
1DC357E0000
heap
page read and write
1A113DFE000
trusted library allocation
page read and write
7FF657B56000
unkown
page readonly
1A12B876000
heap
page read and write
1B5E0000
trusted library allocation
page read and write
2E99000
stack
page read and write
2175DEA8000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
5F8ABCE000
stack
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
32A0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
21760A88000
trusted library allocation
page read and write
21760B46000
trusted library allocation
page read and write
1DC1E203000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
1A114E5F000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
7FFD9B8FD000
trusted library allocation
page execute and read and write
2B30000
trusted library allocation
page read and write
7FF699B11000
unkown
page write copy
AD0000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
12C0000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
2175FD39000
trusted library allocation
page read and write
7DF4996A0000
trusted library allocation
page execute and read and write
29E0000
trusted library allocation
page read and write
243996EB000
heap
page read and write
7128000
heap
page read and write
7FF657B66000
unkown
page readonly
7FFD9B79B000
trusted library allocation
page read and write
680F000
heap
page read and write
1090000
heap
page read and write
21760BA3000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7A47000
heap
page read and write
21760A99000
trusted library allocation
page read and write
B66000
heap
page read and write
74ED000
stack
page read and write
D22000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FF657A58000
unkown
page write copy
7FF657A7F000
unkown
page readonly
1B550000
trusted library allocation
page read and write
7FF6D4331000
unkown
page execute read
123B000
heap
page read and write
1EB0000
trusted library allocation
page read and write
7FF699B00000
unkown
page readonly
1B610000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
772E000
stack
page read and write
12D41000
trusted library allocation
page read and write
69D0000
heap
page read and write
1A114EA9000
trusted library allocation
page read and write
1EBAE7F2000
trusted library allocation
page read and write
F28000
heap
page read and write
2B30000
trusted library allocation
page read and write
A0BD3F7000
stack
page read and write
4D06000
heap
page read and write
E35000
heap
page read and write
1DC1E219000
trusted library allocation
page read and write
1A12B430000
heap
page read and write
1EBC5A80000
heap
page execute and read and write
36447FE000
stack
page read and write
DE2000
stack
page read and write
6363000
heap
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
1DC35B3D000
heap
page read and write
7C22000
heap
page read and write
1DC358C1000
heap
page read and write
7DF4E5E50000
trusted library allocation
page execute and read and write
F068723000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1BB9A000
stack
page read and write
23D3BE20000
heap
page read and write
131C8000
trusted library allocation
page read and write
1284000
heap
page read and write
1A8EE000
stack
page read and write
23D3BF3F000
heap
page read and write
2DF0000
trusted library allocation
page read and write
7FF657B9F000
unkown
page readonly
7FF6576E0000
unkown
page readonly
8EB000
stack
page read and write
1A12B407000
heap
page read and write
1F93000
trusted library allocation
page read and write
4C40000
heap
page read and write
1B570000
trusted library allocation
page read and write
1EBBD7E7000
trusted library allocation
page read and write
2176FB31000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
1330000
heap
page read and write
2C7E000
stack
page read and write
1A123081000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
1DC1E404000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
696D000
stack
page read and write
270F000
stack
page read and write
7FF699B00000
unkown
page readonly
1020000
trusted library allocation
page read and write
74AD000
stack
page read and write
1EBC5CDA000
heap
page read and write
7FFD9B94A000
trusted library allocation
page read and write
7FF6D4344000
unkown
page readonly
1DC35B82000
heap
page read and write
1B4E0000
trusted library allocation
page read and write
1B4F3000
trusted library allocation
page read and write
6623000
heap
page read and write
7FF657B66000
unkown
page readonly
7FFD9BBD0000
trusted library allocation
page read and write
7DF41A1B0000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
2F94000
stack
page read and write
74BF8FF000
stack
page read and write
29D0000
trusted library allocation
page read and write
1A941000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
5D8000
heap
page read and write
7FF657B9F000
unkown
page readonly
1B530000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
3C2E000
stack
page read and write
7FFD9B942000
trusted library allocation
page read and write
36445FE000
stack
page read and write
FC5000
heap
page read and write
2DD0000
heap
page read and write
6D701FE000
stack
page read and write
4EC0000
heap
page read and write
1EBAD4E1000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
5F8B3FE000
stack
page read and write
5F8A9CE000
stack
page read and write
2175DD70000
trusted library allocation
page read and write
153E000
stack
page read and write
1DC1E5CA000
trusted library allocation
page read and write
2175F980000
heap
page read and write
2D0D000
stack
page read and write
23D3DC29000
heap
page execute and read and write
21760E16000
trusted library allocation
page read and write
7DF418440000
trusted library allocation
page execute and read and write
1EBAB8F0000
heap
page read and write
24399722000
heap
page read and write
1110000
heap
page read and write
1DC1B864000
heap
page read and write
2B40000
trusted library allocation
page read and write
E13000
heap
page read and write
2B33000
trusted library allocation
page read and write
691B000
stack
page read and write
7FF6576E0000
unkown
page readonly
2B30000
trusted library allocation
page read and write
24399749000
heap
page read and write
7FF699B0E000
unkown
page readonly
1DC1F2CE000
trusted library allocation
page read and write
7FF657BB4000
unkown
page readonly
7FFD9B942000
trusted library allocation
page read and write
74C07CE000
stack
page read and write
1B4F3000
trusted library allocation
page read and write
1B513000
trusted library allocation
page read and write
7FF657B81000
unkown
page readonly
7FF657B96000
unkown
page readonly
2175DD40000
trusted library section
page read and write
53AA1FF000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
2D60000
heap
page execute and read and write
1EBAE2BF000
trusted library allocation
page read and write
7FF6576E0000
unkown
page readonly
2176FE09000
trusted library allocation
page read and write
F068DF7000
stack
page read and write
2439972D000
heap
page read and write
7FF657BB7000
unkown
page readonly
1B490000
trusted library allocation
page read and write
1DC359E0000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
7FF6D4341000
unkown
page write copy
1A1114E3000
heap
page read and write
12F2000
heap
page read and write
1E01EC99000
heap
page read and write
1B513000
trusted library allocation
page read and write
100000
remote allocation
page execute and read and write
1B4F3000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
19396CD0000
remote allocation
page read and write
6FD0000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2175FFDD000
trusted library allocation
page read and write
1A12B45E000
heap
page read and write
F068C77000
stack
page read and write
F44000
heap
page read and write
36BF000
stack
page read and write
660E000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9B922000
trusted library allocation
page read and write
5F8A8CF000
stack
page read and write
2175F778000
heap
page read and write
1670000
heap
page read and write
1DC2D513000
trusted library allocation
page read and write
21778078000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FF657B7A000
unkown
page readonly
7FF6D433B000
unkown
page readonly
7FF657BA6000
unkown
page readonly
5F89979000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
1EBAD2F0000
trusted library allocation
page read and write
1BD000
stack
page read and write
1A114447000
trusted library allocation
page read and write
1DC35A44000
heap
page read and write
7FF657B9F000
unkown
page readonly
7FFD9B77D000
trusted library allocation
page execute and read and write
7F2E000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1FC0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1A12B81B000
heap
page read and write
7FF657B66000
unkown
page readonly
2B40000
heap
page execute and read and write
7FFD9B918000
trusted library allocation
page execute and read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
7FF699B0A000
unkown
page read and write
1A111410000
heap
page read and write
E36000
heap
page read and write
1A1114A0000
heap
page read and write
7FF657B9F000
unkown
page readonly
2D40000
trusted library allocation
page read and write
1B7C0000
heap
page execute and read and write
26B0000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
66FB000
heap
page read and write
7FF657B66000
unkown
page readonly
29E0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FF657A58000
unkown
page read and write
7FF6579A6000
unkown
page readonly
7FFD9BA80000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
100D000
heap
page read and write
1DC1B794000
heap
page read and write
1EC0000
trusted library allocation
page read and write
5F89EFB000
stack
page read and write
1DC35A54000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FF699B01000
unkown
page execute read
1B740000
heap
page read and write
2B40000
trusted library allocation
page read and write
12F9000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
53A97FF000
stack
page read and write
243994F0000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
11E6000
heap
page read and write
4D0D000
heap
page read and write
1EBAE68D000
trusted library allocation
page read and write
F61000
heap
page read and write
2176071B000
trusted library allocation
page read and write
7FF657B89000
unkown
page readonly
1A114806000
trusted library allocation
page read and write
2176FE19000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
15BF000
stack
page read and write
23D3BE76000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
2175F9A9000
heap
page read and write
7FF657B6A000
unkown
page readonly
1B4E3000
trusted library allocation
page read and write
7FFD9BB7A000
trusted library allocation
page read and write
106F000
heap
page read and write
1DC1B990000
heap
page read and write
1A112E70000
heap
page read and write
1A920000
trusted library allocation
page read and write
6670000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1DC1E09E000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
1675000
heap
page read and write
1DC35900000
heap
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
12D9000
heap
page read and write
1153000
heap
page read and write
6E6000
heap
page read and write
5E5000
heap
page read and write
2DEE000
stack
page read and write
74BF7FE000
stack
page read and write
12D58000
trusted library allocation
page read and write
7FD4000
heap
page read and write
7A5A000
heap
page read and write
21760E4E000
trusted library allocation
page read and write
7FF699B00000
unkown
page readonly
7FFD9BAF0000
trusted library allocation
page read and write
1EBBD7CF000
trusted library allocation
page read and write
7FF657B85000
unkown
page readonly
7FFD9BB90000
trusted library allocation
page read and write
7FF657B87000
unkown
page readonly
1EBBD501000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
12AE000
stack
page read and write
21760A7F000
trusted library allocation
page read and write
1B4C0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FF657B27000
unkown
page readonly
1A12B7B1000
heap
page read and write
53A95F7000
stack
page read and write
7FF657A5F000
unkown
page readonly
7FFD9B954000
trusted library allocation
page read and write
7FF6D433A000
unkown
page read and write
2B30000
trusted library allocation
page read and write
6B68000
stack
page read and write
24399800000
remote allocation
page read and write
6EF0000
heap
page read and write
152E000
stack
page read and write
1A52D000
stack
page read and write
1B7A8000
heap
page read and write
7FF657BAA000
unkown
page readonly
7C1F000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
F78000
stack
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9BAC3000
trusted library allocation
page read and write
7FF6D433E000
unkown
page readonly
2B33000
trusted library allocation
page read and write
1B520000
trusted library allocation
page read and write
10F0000
heap
page read and write
53A99FF000
stack
page read and write
6213000
heap
page read and write
7FF657B5F000
unkown
page readonly
3644BFE000
stack
page read and write
12E11000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
1DC1E410000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
1DC1B7F6000
heap
page read and write
1DC2D78C000
trusted library allocation
page read and write
7FF657B66000
unkown
page readonly
7FFD9B912000
trusted library allocation
page read and write
1096000
heap
page read and write
1B510000
trusted library allocation
page read and write
23D3BE50000
heap
page read and write
2EC8000
stack
page read and write
5F89CF8000
stack
page read and write
1A12337B000
trusted library allocation
page read and write
2C50000
heap
page readonly
15AE000
stack
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
7FF699B0E000
unkown
page readonly
AE8000
stack
page read and write
74BF87A000
stack
page read and write
11E6000
heap
page read and write
7F30000
heap
page read and write
1A12B7BC000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
74BF3FE000
stack
page read and write
7FF699B11000
unkown
page write copy
2D7F000
stack
page read and write
1A123373000
trusted library allocation
page read and write
1A11425B000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FF657A5F000
unkown
page readonly
1EBAF304000
trusted library allocation
page read and write
E10000
remote allocation
page execute and read and write
E30000
heap
page read and write
15D0000
heap
page read and write
F60000
heap
page read and write
1EBC5CAB000
heap
page read and write
11A9000
heap
page read and write
F5C000
heap
page read and write
7FF6576E0000
unkown
page readonly
2175DD30000
trusted library section
page read and write
5F8B47E000
stack
page read and write
1A112DF0000
heap
page read and write
7FF657BAA000
unkown
page readonly
7FF657B7A000
unkown
page readonly
F0687EE000
stack
page read and write
1200000
heap
page read and write
1A111499000
heap
page read and write
3510000
heap
page read and write
2850000
heap
page read and write
1C0000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1B63E000
stack
page read and write
1EBAB99A000
heap
page read and write
1EBAD350000
trusted library allocation
page read and write
1182000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1DC1E400000
trusted library allocation
page read and write
74BFC7E000
stack
page read and write
4961000
heap
page read and write
1EBAB990000
heap
page read and write
528000
heap
page read and write
1A111551000
heap
page read and write
7FF657BB4000
unkown
page readonly
1DC35806000
heap
page read and write
1375000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
F0690FB000
stack
page read and write
1FE0000
trusted library allocation
page read and write
A0BE7FE000
stack
page read and write
1348000
heap
page read and write
67BD000
heap
page read and write
1A1116F5000
heap
page read and write
1B4F3000
trusted library allocation
page read and write
7FFD9B8F5000
trusted library allocation
page read and write
1DC1DEF3000
trusted library allocation
page read and write
FD6000
heap
page read and write
7FF6D4331000
unkown
page execute read
7FFD9BB70000
trusted library allocation
page read and write
21761460000
trusted library allocation
page read and write
7FF699B14000
unkown
page readonly
F068EF8000
stack
page read and write
31F9000
stack
page read and write
11F6000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1A12B550000
heap
page execute and read and write
7FF657BA6000
unkown
page readonly
7FFD9B830000
trusted library allocation
page read and write
67EA000
heap
page read and write
1A12B8DF000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1DC35A80000
heap
page read and write
1DC1D230000
heap
page execute and read and write
6F1000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FF657B6A000
unkown
page readonly
10C0000
heap
page read and write
2120000
heap
page execute and read and write
1DC1B7F4000
heap
page read and write
1B510000
trusted library allocation
page read and write
7FFD9BBE6000
trusted library allocation
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
36451FB000
stack
page read and write
1DC35B4B000
heap
page read and write
1EBC5987000
heap
page read and write
24399746000
heap
page read and write
1DC358CC000
heap
page read and write
1170000
heap
page read and write
1E01ED80000
heap
page read and write
2B10000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FF657A5F000
unkown
page readonly
7FFD9BB8A000
trusted library allocation
page read and write
1EBC5AB0000
heap
page read and write
1EBAEE3F000
trusted library allocation
page read and write
2175DD50000
trusted library allocation
page read and write
7FF699B01000
unkown
page execute read
F068CFD000
stack
page read and write
6733000
heap
page read and write
1DC1D267000
heap
page execute and read and write
1B4F0000
trusted library allocation
page read and write
1A114117000
trusted library allocation
page read and write
19396D29000
heap
page execute and read and write
7FFD9BAD2000
trusted library allocation
page read and write
7FF6576E0000
unkown
page readonly
7FF657B85000
unkown
page readonly
7FF6579A6000
unkown
page readonly
AC0000
heap
page read and write
7FF657B6A000
unkown
page readonly
14AD000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
1EBAD310000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
6A0000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
1ED0000
heap
page read and write
3644DFE000
stack
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
2176FE01000
trusted library allocation
page read and write
1EBC5A60000
heap
page execute and read and write
D60000
remote allocation
page execute and read and write
2176FB11000
trusted library allocation
page read and write
6BE9000
stack
page read and write
DEF000
stack
page read and write
7FF657B9F000
unkown
page readonly
21761912000
trusted library allocation
page read and write
127D000
heap
page read and write
21760BCF000
trusted library allocation
page read and write
23D3DC00000
remote allocation
page read and write
23D3BF59000
heap
page read and write
1EBAD565000
trusted library allocation
page read and write
1DC1D190000
trusted library allocation
page read and write
F90000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
3A1B000
heap
page read and write
1F90000
trusted library allocation
page read and write
1DC1B920000
trusted library allocation
page read and write
7FF657BB7000
unkown
page readonly
1F90000
trusted library allocation
page read and write
7FF699B14000
unkown
page readonly
2AFF000
stack
page read and write
2439B3A9000
heap
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
69F0000
heap
page read and write
1A930000
trusted library allocation
page read and write
1DC1E222000
trusted library allocation
page read and write
1B620000
trusted library allocation
page read and write
2C80000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
B53000
heap
page read and write
2FB0000
heap
page read and write
2E00000
heap
page read and write
7FF6579A6000
unkown
page readonly
7026000
heap
page read and write
DDF000
stack
page read and write
F069D4C000
stack
page read and write
131F000
heap
page read and write
2D50000
trusted library allocation
page read and write
36457FE000
stack
page read and write
23D3BF54000
heap
page read and write
DA0000
heap
page read and write
217618EC000
trusted library allocation
page read and write
F068AFE000
stack
page read and write
6CE8000
stack
page read and write
B29000
heap
page read and write
7FF699B00000
unkown
page readonly
5F8B57E000
stack
page read and write
12131000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BAD9000
trusted library allocation
page read and write
1FC0000
trusted library allocation
page read and write
1F90000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
1B4CE000
stack
page read and write
1270000
heap
page read and write
7FF657B7A000
unkown
page readonly
1EBAF2E4000
trusted library allocation
page read and write
7FFD9B908000
trusted library allocation
page execute and read and write
67E000
stack
page read and write
7FFD9BA93000
trusted library allocation
page read and write
13A0000
heap
page read and write
24399707000
heap
page read and write
36455FE000
stack
page read and write
7FF657B56000
unkown
page readonly
1016000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1A12B8D2000
heap
page read and write
2175DD80000
heap
page readonly
7FFD9B76D000
trusted library allocation
page execute and read and write
7FF657BAA000
unkown
page readonly
1A112D40000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
12139000
trusted library allocation
page read and write
2175F9FA000
heap
page read and write
6F6000
heap
page read and write
7FFD9B964000
trusted library allocation
page read and write
F068D79000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1FB0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
7F75000
heap
page read and write
1EBAB98D000
heap
page read and write
1DC1B778000
heap
page read and write
69D6000
heap
page read and write
23D3BF3F000
heap
page read and write
72EA000
stack
page read and write
2C60000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FF6579A6000
unkown
page readonly
7FFD9B876000
trusted library allocation
page execute and read and write
19394F9B000
heap
page read and write
217780B9000
heap
page read and write
7FF657B81000
unkown
page readonly
7FFD9BAE4000
trusted library allocation
page read and write
7FF6576E0000
unkown
page readonly
7FFD9B784000
trusted library allocation
page read and write
112E000
heap
page read and write
1DC1D96F000
trusted library allocation
page read and write
7FF657B27000
unkown
page readonly
1DC1E419000
trusted library allocation
page read and write
3644FFF000
stack
page read and write
1306000
heap
page read and write
1DC1E564000
trusted library allocation
page read and write
19394F46000
heap
page read and write
7DF440050000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
1FA0000
heap
page execute and read and write
36443F7000
stack
page read and write
1EBAE4B1000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
23D3BF10000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
7FF657BAA000
unkown
page readonly
1A111468000
heap
page read and write
7FF657BA6000
unkown
page readonly
2175DDB0000
heap
page read and write
11E5000
heap
page read and write
FE1000
heap
page read and write
1DC35822000
heap
page read and write
A7B000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
6D70DFD000
stack
page read and write
1EBAEC65000
trusted library allocation
page read and write
53AA9FE000
stack
page read and write
74A9000
stack
page read and write
2176FB81000
trusted library allocation
page read and write
1DC1ED36000
trusted library allocation
page read and write
1DC1D526000
trusted library allocation
page read and write
1F93000
trusted library allocation
page read and write
5F8B378000
stack
page read and write
5F89E7E000
stack
page read and write
74BF673000
stack
page read and write
DC0000
heap
page read and write
7FF657A58000
unkown
page read and write
2D50000
trusted library allocation
page read and write
11E8000
heap
page read and write
A0BDFFE000
stack
page read and write
F069DCE000
stack
page read and write
7FF657B85000
unkown
page readonly
1DC1E681000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1DC1D2B5000
heap
page read and write
1EBAB958000
heap
page read and write
2D40000
trusted library allocation
page read and write
1B4B0000
trusted library allocation
page read and write
7FF657BB4000
unkown
page readonly
7FF699B0B000
unkown
page readonly
1A12B8EF000
heap
page read and write
1330000
heap
page read and write
1298000
heap
page read and write
75A1000
heap
page read and write
1A1141A5000
trusted library allocation
page read and write
74BFDFB000
stack
page read and write
1A1112D0000
heap
page read and write
1EBABCC5000
heap
page read and write
1A12B405000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
2176FE07000
trusted library allocation
page read and write
1324000
heap
page read and write
1F90000
trusted library allocation
page read and write
7FF6D4344000
unkown
page readonly
7FFD9BA00000
trusted library allocation
page read and write
1DC1D260000
heap
page execute and read and write
7FFD9B8F0000
trusted library allocation
page read and write
131BF000
trusted library allocation
page read and write
1125000
heap
page read and write
1DC1D490000
heap
page execute and read and write
1DC1D6CA000
trusted library allocation
page read and write
562000
heap
page read and write
1A12B7F6000
heap
page read and write
1DC1D430000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
4972000
heap
page read and write
7FF657B7A000
unkown
page readonly
1DC35A3C000
heap
page read and write
1A114E84000
trusted library allocation
page read and write
1DC1E74D000
trusted library allocation
page read and write
BE0000
heap
page read and write
1A12B4C0000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
1A113020000
heap
page execute and read and write
2175DCB0000
heap
page read and write
7FF699B0A000
unkown
page read and write
1E01EC10000
heap
page read and write
1EBBD7CD000
trusted library allocation
page read and write
6D703FE000
stack
page read and write
2175DD90000
trusted library allocation
page read and write
7597000
heap
page read and write
7FF699B0B000
unkown
page readonly
DD0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
3AA0000
heap
page read and write
520000
heap
page read and write
1EBC5A00000
heap
page read and write
7FFD9BAE9000
trusted library allocation
page read and write
7FFD9BACC000
trusted library allocation
page read and write
131E3000
trusted library allocation
page read and write
12C0E000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
7FF6D4341000
unkown
page read and write
7FFD9B922000
trusted library allocation
page read and write
7FF6579A6000
unkown
page readonly
7FFD9B91A000
trusted library allocation
page read and write
7FF6579A6000
unkown
page readonly
7FF6D433B000
unkown
page readonly
1455000
heap
page read and write
1DC1B7FB000
heap
page read and write
7608000
stack
page read and write
7FF6576E1000
unkown
page execute read
294F000
stack
page read and write
1EBAB996000
heap
page read and write
23D3DC00000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1DC1E476000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1327000
heap
page read and write
11C0000
heap
page read and write
1DC2D4C1000
trusted library allocation
page read and write
7FF6576E0000
unkown
page readonly
7FF657B7A000
unkown
page readonly
21760B4C000
trusted library allocation
page read and write
19396D00000
heap
page read and write
81E000
stack
page read and write
1A11354D000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2175DE34000
heap
page read and write
2A90000
heap
page read and write
1120000
heap
page read and write
2B60000
trusted library allocation
page read and write
2B1E000
stack
page read and write
11D7000
heap
page read and write
1320000
heap
page read and write
29C0000
trusted library allocation
page read and write
1DC1E538000
trusted library allocation
page read and write
FD0000
heap
page read and write
49A5000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1A12B3C7000
heap
page read and write
5F89513000
stack
page read and write
7FF699B14000
unkown
page readonly
4F0000
direct allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
21760A10000
trusted library allocation
page read and write
F069CC9000
stack
page read and write
56A000
heap
page read and write
1167000
heap
page read and write
23D3BF46000
heap
page read and write
576000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
132E000
heap
page read and write
23D3BF5C000
heap
page read and write
2439973B000
heap
page read and write
132E000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
6F0000
heap
page readonly
5F8AEFE000
stack
page read and write
6E8000
heap
page read and write
2175DDFC000
heap
page read and write
1269000
heap
page read and write
7FF657B66000
unkown
page readonly
7FF657A5F000
unkown
page readonly
19394FCB000
heap
page read and write
7FF657BAA000
unkown
page readonly
1EBAE151000
trusted library allocation
page read and write
8FE000
stack
page read and write
29F3000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1EBC5DC0000
trusted library allocation
page read and write
12E19000
trusted library allocation
page read and write
2175DE0E000
heap
page read and write
6A9000
heap
page read and write
1EBC5930000
heap
page read and write
1B600000
trusted library allocation
page read and write
7FF657B85000
unkown
page readonly
1EBC5BA0000
heap
page read and write
1EBAE738000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
5F8C04E000
stack
page read and write
5F8C24E000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FF657BA6000
unkown
page readonly
218E000
stack
page read and write
7A70000
heap
page read and write
19394F4C000
heap
page read and write
4CF8000
heap
page read and write
7FF657B5F000
unkown
page readonly
E00000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
2175E060000
heap
page read and write
19396E10000
heap
page read and write
A0BE5FA000
stack
page read and write
4C30000
heap
page read and write
2439971B000
heap
page read and write
7FF657A5F000
unkown
page readonly
19394FC3000
heap
page read and write
66BF000
heap
page read and write
7FF657B6D000
unkown
page readonly
1EBC5DF0000
heap
page read and write
7FF657B6D000
unkown
page readonly
5F8987E000
stack
page read and write
4BDB000
heap
page read and write
1EBAD400000
heap
page read and write
1B500000
trusted library allocation
page read and write
1DC35A7A000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1DC1E597000
trusted library allocation
page read and write
1E01EB10000
heap
page read and write
7DF4158E0000
trusted library allocation
page execute and read and write
12FE000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
217780CC000
heap
page read and write
11E4000
heap
page read and write
74C0A4E000
stack
page read and write
1A114328000
trusted library allocation
page read and write
1B57D000
stack
page read and write
5F8AB93000
stack
page read and write
21761293000
trusted library allocation
page read and write
1A11149C000
heap
page read and write
1F93000
trusted library allocation
page read and write
1164000
heap
page read and write
1A1140B2000
trusted library allocation
page read and write
5F89A77000
stack
page read and write
19396E00000
heap
page read and write
7DF41A1D0000
trusted library allocation
page execute and read and write
7FFD9B93A000
trusted library allocation
page read and write
F5E000
stack
page read and write
5F8AFF9000
stack
page read and write
1A1114BC000
heap
page read and write
1EBABCC0000
heap
page read and write
2175F9D8000
heap
page read and write
23D3BF4E000
heap
page read and write
1294000
heap
page read and write
2B53000
trusted library allocation
page read and write
7FF699B0B000
unkown
page readonly
1DC357F3000
heap
page read and write
2C22000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1E01EE20000
remote allocation
page read and write
7FF657BAA000
unkown
page readonly
1EBAE8AD000
trusted library allocation
page read and write
686D000
heap
page read and write
2175FB8E000
trusted library allocation
page read and write
1E01EEC5000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
19394F30000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
1016000
heap
page read and write
6D709FE000
stack
page read and write
21760A84000
trusted library allocation
page read and write
108C000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
4920000
heap
page read and write
7FF657A58000
unkown
page read and write
6865000
heap
page read and write
2175F910000
heap
page read and write
1FD0000
trusted library allocation
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
E29000
heap
page read and write
1DC35A50000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1A112D70000
trusted library allocation
page read and write
2A80000
heap
page read and write
21777FA8000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1939502D000
heap
page read and write
1DC359FF000
heap
page read and write
29F0000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FFD9B974000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FF657BB7000
unkown
page readonly
7DF418460000
trusted library allocation
page execute and read and write
36EF000
stack
page read and write
7FFD9B915000
trusted library allocation
page read and write
131EE000
trusted library allocation
page read and write
23D3BF46000
heap
page read and write
1A1114A8000
heap
page read and write
5F8C0C7000
stack
page read and write
1A114143000
trusted library allocation
page read and write
1A111460000
heap
page read and write
1EBAE5A5000
trusted library allocation
page read and write
2175DD10000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1EBBD4E1000
trusted library allocation
page read and write
2F1A000
stack
page read and write
1EBAE642000
trusted library allocation
page read and write
700000
heap
page read and write
7FF657B66000
unkown
page readonly
2175E065000
heap
page read and write
131CF000
trusted library allocation
page read and write
1EBAE25B000
trusted library allocation
page read and write
63F0000
heap
page read and write
11D4000
heap
page read and write
1330000
heap
page read and write
2175F989000
heap
page read and write
A0BD9FE000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
11D9000
heap
page read and write
7FF699B11000
unkown
page read and write
1020000
remote allocation
page execute and read and write
7FF657B56000
unkown
page readonly
2A84000
heap
page read and write
6530000
heap
page read and write
7FF657B7A000
unkown
page readonly
163E000
stack
page read and write
131D3000
trusted library allocation
page read and write
2DF8000
stack
page read and write
F74000
heap
page read and write
1EBBD511000
trusted library allocation
page read and write
1A12338B000
trusted library allocation
page read and write
1EBAB9DA000
heap
page read and write
1A12B803000
heap
page read and write
2175F9AE000
heap
page read and write
6B35000
heap
page read and write
7FF657B96000
unkown
page readonly
6A38000
heap
page read and write
1213E000
trusted library allocation
page read and write
3AEB000
heap
page read and write
131D6000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
1E01EE20000
remote allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1E01ED5E000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
6600000
heap
page read and write
24399800000
remote allocation
page read and write
1F90000
trusted library allocation
page read and write
1A11438B000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
7FF657B96000
unkown
page readonly
7FFD9B826000
trusted library allocation
page read and write
1260000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
220E000
stack
page read and write
74BF977000
stack
page read and write
7FFD9B911000
trusted library allocation
page read and write
1DC1B770000
heap
page read and write
1B650000
trusted library allocation
page read and write
12F5000
heap
page read and write
2FB4000
heap
page read and write
21777F50000
heap
page read and write
7FF657B6D000
unkown
page readonly
7FFD9B770000
trusted library allocation
page read and write
12DD000
heap
page read and write
7FF657B6A000
unkown
page readonly
132D000
heap
page read and write
1A12B8F3000
heap
page read and write
1EBAE2C9000
trusted library allocation
page read and write
7FF657B56000
unkown
page readonly
6930000
heap
page read and write
1EBC54E1000
heap
page read and write
1FC0000
trusted library allocation
page read and write
6D705FE000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
7FF657A58000
unkown
page read and write
1A1149D3000
trusted library allocation
page read and write
2439972D000
heap
page read and write
1321D000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FF699B01000
unkown
page execute read
1EBAED4B000
trusted library allocation
page read and write
7DF4158D0000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
21760ED1000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
6745000
heap
page read and write
1A1114AC000
heap
page read and write
1A113AD2000
trusted library allocation
page read and write
2439973B000
heap
page read and write
7FFD9B916000
trusted library allocation
page execute and read and write
1FD3000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
1B4F0000
trusted library allocation
page read and write
7FF699B11000
unkown
page read and write
1A111450000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1DC1B7B3000
heap
page read and write
7FF657B89000
unkown
page readonly
5C8000
heap
page read and write
6F6000
heap
page read and write
1304000
heap
page read and write
1A1230B1000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1FC0000
trusted library allocation
page read and write
7FF657A7F000
unkown
page readonly
1095000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
6B71000
heap
page read and write
7FF657BB4000
unkown
page readonly
2B30000
trusted library allocation
page read and write
7FF699B14000
unkown
page readonly
E23000
heap
page read and write
7FF657B27000
unkown
page readonly
29C0000
trusted library allocation
page read and write
1B47E000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
A0BE1FD000
stack
page read and write
AF0000
heap
page read and write
1A1148EB000
trusted library allocation
page read and write
65AF000
heap
page read and write
7FF699B14000
unkown
page readonly
6684000
heap
page read and write
820000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BBED000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
8590000
heap
page read and write
19394FD3000
heap
page read and write
1DC2D4A1000
trusted library allocation
page read and write
74BFBFA000
stack
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
1AD70000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
1FD0000
trusted library allocation
page read and write
5F89D7F000
stack
page read and write
7FF657BAA000
unkown
page readonly
7FFD9B958000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
7FF657B81000
unkown
page readonly
7FFD9BBD6000
trusted library allocation
page read and write
3180000
heap
page read and write
7F7B000
heap
page read and write
1A12B580000
heap
page read and write
19394FE2000
heap
page read and write
7FF657B5F000
unkown
page readonly
7FFD9B920000
trusted library allocation
page read and write
1FD0000
trusted library allocation
page read and write
746D000
stack
page read and write
24399719000
heap
page read and write
2E34000
heap
page read and write
1BB1C000
stack
page read and write
6BA7000
heap
page read and write
21760A7B000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1DC35B6C000
heap
page read and write
19396CD0000
remote allocation
page read and write
1B5B0000
heap
page execute and read and write
6D6FDFE000
stack
page read and write
1B8BE000
stack
page read and write
1050000
heap
page read and write
29F0000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
7FF657B87000
unkown
page readonly
7DF440040000
trusted library allocation
page execute and read and write
63EA000
heap
page read and write
7FF657B27000
unkown
page readonly
2D49000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page execute and read and write
7DF4E5E70000
trusted library allocation
page execute and read and write
1EBABA43000
heap
page read and write
1A8F0000
trusted library allocation
page read and write
5F8959D000
stack
page read and write
6C0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1DC2D79A000
trusted library allocation
page read and write
7FF699B0A000
unkown
page read and write
2175DDF6000
heap
page read and write
114E000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
62E0000
heap
page read and write
BB8000
stack
page read and write
1A112DB0000
trusted library allocation
page read and write
6730000
heap
page read and write
1F90000
trusted library allocation
page read and write
69E000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
5F89BF6000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FF657B96000
unkown
page readonly
2DB000
stack
page read and write
7FF657BA6000
unkown
page readonly
21760895000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
66F5000
heap
page read and write
19394FE1000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1095000
heap
page read and write
7FF657B6A000
unkown
page readonly
23D3BF46000
heap
page read and write
1EBAE82A000
trusted library allocation
page read and write
1A114EA4000
trusted library allocation
page read and write
5EC000
heap
page read and write
1EBAE6C2000
trusted library allocation
page read and write
1DC1D2A0000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
107B000
stack
page read and write
5F8AAC9000
stack
page read and write
1A12B842000
heap
page read and write
24399741000
heap
page read and write
7FF699B0E000
unkown
page readonly
2110000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1043000
heap
page read and write
74C094B000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
716D000
stack
page read and write
7FF657B66000
unkown
page readonly
7FF657A7F000
unkown
page readonly
1DC1E41D000
trusted library allocation
page read and write
7FF6576E1000
unkown
page execute read
1A12B7A0000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1DC35851000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FF699B0B000
unkown
page readonly
680A000
heap
page read and write
21760A8C000
trusted library allocation
page read and write
7FF6D4330000
unkown
page readonly
11AC000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
2177805A000
heap
page read and write
5F8B1F9000
stack
page read and write
13215000
trusted library allocation
page read and write
1A12B8E2000
heap
page read and write
7FF657B89000
unkown
page readonly
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FF657B6A000
unkown
page readonly
53A9FFE000
stack
page read and write
A0BE9FE000
stack
page read and write
74C08CA000
stack
page read and write
680000
heap
page read and write
2D0D000
stack
page read and write
DF0000
heap
page read and write
7FF657B81000
unkown
page readonly
1205000
heap
page read and write
4950000
heap
page read and write
2175F6B0000
trusted library allocation
page read and write
6D6F9F7000
stack
page read and write
4C47000
heap
page read and write
1EBC5BB2000
heap
page read and write
23D3BF5C000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
19395026000
heap
page read and write
7FF6576E1000
unkown
page execute read
B43000
heap
page read and write
100D000
heap
page read and write
7FF699B0B000
unkown
page readonly
7FFD9B7CC000
trusted library allocation
page execute and read and write
11E1000
heap
page read and write
A0BD7FF000
stack
page read and write
116C000
heap
page read and write
2A7F000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
24399800000
remote allocation
page read and write
1A113070000
heap
page execute and read and write
2E0A000
stack
page read and write
1EBBD80B000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
21761931000
trusted library allocation
page read and write
2439973E000
heap
page read and write
1EBAD340000
heap
page execute and read and write
1E01ED2C000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2175F995000
heap
page read and write
1A113106000
trusted library allocation
page read and write
7FF657A58000
unkown
page write copy
7FFD9BA30000
trusted library allocation
page read and write
13A5000
heap
page read and write
1A12B8AC000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
2176139F000
trusted library allocation
page read and write
134C000
heap
page read and write
F80000
heap
page read and write
2177808B000
heap
page read and write
7FF657B6D000
unkown
page readonly
7FF657B81000
unkown
page readonly
7FFD9BA40000
trusted library allocation
page read and write
22D0000
heap
page read and write
1EBAD320000
heap
page readonly
9BF000
stack
page read and write
74BFA79000
stack
page read and write
1EBAE513000
trusted library allocation
page read and write
74BFAF7000
stack
page read and write
13208000
trusted library allocation
page read and write
DC5000
heap
page read and write
2A1E000
stack
page read and write
7FB1000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
6F1000
heap
page read and write
1DC35AC2000
heap
page read and write
5F895DE000
stack
page read and write
21778096000
heap
page read and write
6690000
heap
page read and write
24399737000
heap
page read and write
1F5E000
stack
page read and write
B43000
heap
page read and write
2D40000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7DF4F3650000
trusted library allocation
page execute and read and write
6E5D000
stack
page read and write
1B630000
trusted library allocation
page read and write
BD3000
stack
page read and write
719C000
heap
page read and write
E29000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2D20000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
B59000
heap
page read and write
61D0000
heap
page read and write
67C9000
heap
page read and write
23D3BE70000
heap
page read and write
FC0000
heap
page read and write
1DC1E605000
trusted library allocation
page read and write
3540000
heap
page read and write
6C6D000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1B4F0000
trusted library allocation
page read and write
1DC35B75000
heap
page read and write
574000
heap
page read and write
2C70000
trusted library allocation
page read and write
1140000
trusted library section
page read and write
1B4F0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FFD9B928000
trusted library allocation
page execute and read and write
243996A7000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
D50000
heap
page read and write
131FF000
trusted library allocation
page read and write
21760DB4000
trusted library allocation
page read and write
1205000
heap
page read and write
1B7B6000
heap
page read and write
6A0F000
heap
page read and write
11F6000
heap
page read and write
7FF657B89000
unkown
page readonly
7FFD9BA70000
trusted library allocation
page read and write
1A910000
trusted library allocation
page read and write
1EBAE4E8000
trusted library allocation
page read and write
1DC1F2A9000
trusted library allocation
page read and write
1EBADF32000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
132E000
heap
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
1DC35A4C000
heap
page read and write
7FF657B89000
unkown
page readonly
7FF657B89000
unkown
page readonly
1DC1E7AE000
trusted library allocation
page read and write
7DF4AE820000
trusted library allocation
page execute and read and write
1EBBD54F000
trusted library allocation
page read and write
1A1114A4000
heap
page read and write
1F93000
trusted library allocation
page read and write
1328000
heap
page read and write
1174000
heap
page read and write
7FF6576E1000
unkown
page execute read
7FFD9BB00000
trusted library allocation
page read and write
1EBAE607000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1EBBD7C8000
trusted library allocation
page read and write
1110000
heap
page read and write
3B5E000
stack
page read and write
74BF9FE000
stack
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
29F7000
trusted library allocation
page read and write
1DC1B680000
heap
page read and write
7FFD9B924000
trusted library allocation
page read and write
19394F10000
heap
page read and write
2B33000
trusted library allocation
page read and write
6D79000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
1279000
heap
page read and write
6229000
heap
page read and write
101E000
heap
page read and write
1FD0000
trusted library allocation
page read and write
1A12B7C0000
heap
page read and write
7FF699B00000
unkown
page readonly
1FB5000
heap
page read and write
1DC1B890000
heap
page read and write
1EBAE825000
trusted library allocation
page read and write
7FF699B01000
unkown
page execute read
1DC1B7CD000
heap
page read and write
1DC1B940000
trusted library allocation
page read and write
1E01EBF0000
heap
page read and write
1A114912000
trusted library allocation
page read and write
243995D0000
heap
page read and write
7FFD9B903000
trusted library allocation
page read and write
1B640000
trusted library allocation
page read and write
1EBC5CE4000
heap
page read and write
29CE000
stack
page read and write
5F8AF7E000
stack
page read and write
1EBAD9AD000
trusted library allocation
page read and write
7FF657B85000
unkown
page readonly
7FFD9B972000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
4D93000
heap
page read and write
5F898FF000
stack
page read and write
F069BCE000
stack
page read and write
2B40000
trusted library allocation
page read and write
1320F000
trusted library allocation
page read and write
7FF657B96000
unkown
page readonly
1DC35DA0000
heap
page read and write
2439971B000
heap
page read and write
2AD0000
heap
page read and write
7FF699B00000
unkown
page readonly
23D3BE7C000
heap
page read and write
74BF77E000
stack
page read and write
1EBAB8D0000
heap
page read and write
21760712000
trusted library allocation
page read and write
5A0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1DC1B9B5000
heap
page read and write
120E000
heap
page read and write
FE7000
heap
page read and write
7DF4F3640000
trusted library allocation
page execute and read and write
2175DCD0000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
4CE4000
heap
page read and write
7FF657B87000
unkown
page readonly
1A1114E7000
heap
page read and write
7FF657BB7000
unkown
page readonly
5F8B17D000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FF657B81000
unkown
page readonly
7FFD9B92A000
trusted library allocation
page read and write
23D3BF2E000
heap
page read and write
23D3BE00000
heap
page read and write
23D3BE25000
heap
page read and write
1A900000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
12F0000
heap
page read and write
E40000
heap
page read and write
1EBAEE32000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1E01ECE5000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
1A1114A6000
heap
page read and write
1DC35A14000
heap
page read and write
7FFD9B915000
trusted library allocation
page read and write
79AA000
stack
page read and write
1E01ED2E000
heap
page read and write
3AF5000
heap
page read and write
1EBAF2BF000
trusted library allocation
page read and write
5F89C79000
stack
page read and write
10CE000
stack
page read and write
1270000
heap
page read and write
11F3000
heap
page read and write
7589000
stack
page read and write
1370000
heap
page read and write
1B560000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
327E000
stack
page read and write
1DC1EC2A000
trusted library allocation
page read and write
1EBC5CF8000
heap
page read and write
1EBAD330000
trusted library allocation
page read and write
1DC1E40C000
trusted library allocation
page read and write
1DC1B900000
trusted library allocation
page read and write
19394FDF000
heap
page read and write
23D3BF4C000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
B30000
heap
page read and write
7FF657BB7000
unkown
page readonly
7FFD9BAB0000
trusted library allocation
page read and write
7FF657BA6000
unkown
page readonly
C3000
stack
page read and write
2E30000
heap
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
1B5C0000
heap
page execute and read and write
7FF6576E1000
unkown
page execute read
12DD000
heap
page read and write
1B500000
trusted library allocation
page read and write
1E0209B0000
heap
page read and write
2D43000
trusted library allocation
page read and write
F068B79000
stack
page read and write
2175FA60000
heap
page execute and read and write
7FF699B01000
unkown
page execute read
1E01ED47000
heap
page read and write
7FF657B87000
unkown
page readonly
1A1113D0000
heap
page read and write
1092000
heap
page read and write
A0BD5FE000
stack
page read and write
7FF657B6D000
unkown
page readonly
1DC1F2C9000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
74C09CD000
stack
page read and write
19394F40000
heap
page read and write
1DC1B7B5000
heap
page read and write
29C0000
trusted library allocation
page read and write
1A1141E0000
trusted library allocation
page read and write
36453FE000
stack
page read and write
2B40000
trusted library allocation
page read and write
131E000
stack
page read and write
7000000
heap
page read and write
23D3BF54000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1B4A0000
trusted library allocation
page read and write
278F000
stack
page read and write
2176088C000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
BBE000
stack
page read and write
7FFD9B944000
trusted library allocation
page read and write
6B4D000
stack
page read and write
7FF657B5F000
unkown
page readonly
F58000
heap
page read and write
5F8B276000
stack
page read and write
1BC17000
stack
page read and write
130000
heap
page read and write
2B53000
trusted library allocation
page read and write
6D70BFE000
stack
page read and write
7FFD9BAFC000
trusted library allocation
page read and write
24399895000
heap
page read and write
1A1113B0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1DC2D754000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
4D2C000
heap
page read and write
7FF657B5F000
unkown
page readonly
1939502D000
heap
page read and write
2439B380000
heap
page read and write
F50000
heap
page read and write
74BFD7E000
stack
page read and write
F069B4D000
stack
page read and write
965000
heap
page read and write
7FF657B96000
unkown
page readonly
7FFD9B91D000
trusted library allocation
page execute and read and write
5F8C1CC000
stack
page read and write
7FF657BAA000
unkown
page readonly
7FFD9BBD0000
trusted library allocation
page read and write
F70000
heap
page read and write
19394FDA000
heap
page read and write
6D3000
heap
page read and write
2D43000
trusted library allocation
page read and write
24399890000
heap
page read and write
7FF6576E1000
unkown
page execute read
2151000
trusted library allocation
page read and write
752B000
stack
page read and write
5F8B07E000
stack
page read and write
7FF657BB4000
unkown
page readonly
7FF657B7A000
unkown
page readonly
23D3BE30000
heap
page read and write
6BC7000
heap
page read and write
4CAD000
heap
page read and write
23D3BF38000
heap
page read and write
2175F760000
heap
page read and write
766A000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B978000
trusted library allocation
page read and write
131EA000
trusted library allocation
page read and write
960000
heap
page read and write
1A12B8A6000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1939502D000
heap
page read and write
2DF3000
trusted library allocation
page read and write
713D000
heap
page read and write
7FF699B11000
unkown
page read and write
1A114086000
trusted library allocation
page read and write
243995F0000
heap
page read and write
2176FDFA000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FF657B6A000
unkown
page readonly
7FFD9BAA0000
trusted library allocation
page read and write
7FF657B27000
unkown
page readonly
53AA3FB000
stack
page read and write
7FF657B9F000
unkown
page readonly
74BFB7B000
stack
page read and write
1B10D000
stack
page read and write
6CC8000
stack
page read and write
1204000
heap
page read and write
1B500000
trusted library allocation
page read and write
21760C32000
trusted library allocation
page read and write
1E01EE20000
remote allocation
page read and write
2E48000
stack
page read and write
1E0209D9000
heap
page execute and read and write
2E31000
trusted library allocation
page read and write
2175FA17000
heap
page execute and read and write
1A12B8A4000
heap
page read and write
23D3DC00000
remote allocation
page read and write
69EB000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
104D000
heap
page read and write
1A112D20000
trusted library allocation
page read and write
2175FAF0000
heap
page read and write
9C0000
heap
page read and write
2175FA80000
trusted library allocation
page read and write
2175FB11000
trusted library allocation
page read and write
1EBAB930000
heap
page read and write
12D49000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
115E000
heap
page read and write
11F6000
heap
page read and write
1DC1E4D4000
trusted library allocation
page read and write
7FF657A58000
unkown
page write copy
15D5000
heap
page read and write
7FF657A7E000
unkown
page write copy
7FF657BB4000
unkown
page readonly
D55000
heap
page read and write
66F4000
heap
page read and write
1E01EEC0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
705000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2176FDFF000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
1DC1B7BB000
heap
page read and write
7FF6576E1000
unkown
page execute read
F068FFF000
stack
page read and write
5F8ABDE000
stack
page read and write
4991000
heap
page read and write
2DF0000
trusted library allocation
page read and write
1DC1D160000
trusted library allocation
page read and write
2BCF000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2175F765000
heap
page read and write
1B510000
trusted library allocation
page read and write
1A12B83C000
heap
page read and write
79F0000
heap
page read and write
7FAB000
heap
page read and write
2B33000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
1EBC5989000
heap
page read and write
F069C4E000
stack
page read and write
1DC2D7AA000
trusted library allocation
page read and write
1DC35AA0000
heap
page read and write
7DF4158C0000
trusted library allocation
page execute and read and write
2175F97C000
heap
page read and write
1A1230A1000
trusted library allocation
page read and write
7FFD9B752000
trusted library allocation
page read and write
5F8B2FA000
stack
page read and write
24399741000
heap
page read and write
7DF41A1C0000
trusted library allocation
page execute and read and write
2D33000
trusted library allocation
page read and write
132E000
stack
page read and write
7FF657B56000
unkown
page readonly
DF9000
heap
page read and write
12E1E000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
30B0000
heap
page read and write
7DF4E5E60000
trusted library allocation
page execute and read and write
12FF000
heap
page read and write
7FFD9B90D000
trusted library allocation
page execute and read and write
123D000
heap
page read and write
1B540000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7FF657B6D000
unkown
page readonly
5F8AE7F000
stack
page read and write
7DF4AE810000
trusted library allocation
page execute and read and write
F068A7E000
stack
page read and write
1EBC5BF8000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
500000
heap
page read and write
1E0000
heap
page read and write
7FF657B87000
unkown
page readonly
1A12B790000
heap
page read and write
1EBAB8C0000
heap
page read and write
1DC1B7AD000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FF6579A6000
unkown
page readonly
7A13000
heap
page read and write
1331000
heap
page read and write
2CFF000
stack
page read and write
1DC2D4D1000
trusted library allocation
page read and write
7FF657B7A000
unkown
page readonly
7FFD9BADC000
trusted library allocation
page read and write
131F2000
trusted library allocation
page read and write
1A1116F0000
heap
page read and write
1DC1E86B000
trusted library allocation
page read and write
5F89DFE000
stack
page read and write
23D3BF62000
heap
page read and write
6D6FFFF000
stack
page read and write
217780B4000
heap
page read and write
24399650000
heap
page read and write
6D8000
heap
page read and write
7FF6576E1000
unkown
page execute read
7FFD9BAD0000
trusted library allocation
page read and write
FD8000
heap
page read and write
D90000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
F20000
heap
page read and write
19394FE2000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1DC35A8C000
heap
page read and write
19394EE0000
heap
page read and write
2175DDF4000
heap
page read and write
1EBAD709000
trusted library allocation
page read and write
1EBAE6FB000
trusted library allocation
page read and write
7FF657BB7000
unkown
page readonly
7FF657B96000
unkown
page readonly
7FFD9B7A0000
trusted library allocation
page read and write
5F8AB4D000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
7FF699B0B000
unkown
page readonly
7FF657A7F000
unkown
page readonly
24399658000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FF657A58000
unkown
page write copy
7FFD9B944000
trusted library allocation
page read and write
7FF657B56000
unkown
page readonly
21760563000
trusted library allocation
page read and write
1EBC597F000
heap
page read and write
62F0000
heap
page read and write
7FF657B6A000
unkown
page readonly
7FFD9B968000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1278000
heap
page read and write
2175F900000
heap
page read and write
1DC1B7B1000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
2A30000
trusted library allocation
page read and write
53AA7FD000
stack
page read and write
265E000
stack
page read and write
2BCE000
stack
page read and write
1B500000
trusted library allocation
page read and write
4D16000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FF657BA6000
unkown
page readonly
1A12B8CC000
heap
page read and write
7FF699B14000
unkown
page readonly
7FF6D4330000
unkown
page readonly
930000
heap
page read and write
7FF657A7E000
unkown
page write copy
133A000
heap
page read and write
7F7E000
heap
page read and write
7FF657BB7000
unkown
page readonly
1DC35B7A000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1068000
heap
page read and write
F48000
stack
page read and write
74C084C000
stack
page read and write
7FF657B6D000
unkown
page readonly
6B39000
heap
page read and write
7FF657B27000
unkown
page readonly
19394EF0000
heap
page read and write
1A1132AA000
trusted library allocation
page read and write
2175DBD0000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
E29000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
F0687AD000
stack
page read and write
19396CD0000
remote allocation
page read and write
74BFCFE000
stack
page read and write
768D000
stack
page read and write
1DC1F284000
trusted library allocation
page read and write
2B70000
heap
page read and write
7DF4AE800000
trusted library allocation
page execute and read and write
23D3DC00000
remote allocation
page read and write
67F0000
heap
page read and write
F9F000
heap
page read and write
1EBAB9D5000
heap
page read and write
1DC1B870000
heap
page read and write
1FF0000
heap
page read and write
12E0000
heap
page read and write
1DC1ED0F000
trusted library allocation
page read and write
7FF657B81000
unkown
page readonly
2175FB00000
heap
page execute and read and write
39D0000
heap
page read and write
7FF657B56000
unkown
page readonly
F069ACE000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2175DDEE000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
6AF4000
heap
page read and write
F9B000
heap
page read and write
6F6000
heap
page read and write
1170000
heap
page read and write
21761378000
trusted library allocation
page read and write
6B7E000
heap
page read and write
FD4000
heap
page read and write
7FF657B85000
unkown
page readonly
5F8B0F9000
stack
page read and write
1DC35A40000
heap
page read and write
1DC35B70000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7A79000
heap
page read and write
2DF0000
trusted library allocation
page read and write
12D71000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
21760A77000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
1EBAE0E5000
trusted library allocation
page read and write
66EF000
heap
page read and write
1F83000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
10F5000
heap
page read and write
53AA5FE000
stack
page read and write
5E1000
heap
page read and write
1DC1D2A5000
heap
page read and write
7FF6579A6000
unkown
page readonly
1DC2D790000
trusted library allocation
page read and write
11FC000
heap
page read and write
1EBC5CD0000
heap
page read and write
2B23000
trusted library allocation
page read and write
B20000
heap
page read and write
53A9DFE000
stack
page read and write
1DC3586B000
heap
page read and write
2A40000
heap
page read and write
1B4F0000
trusted library allocation
page read and write
70DE000
heap
page read and write
1EBAE579000
trusted library allocation
page read and write
217606EE000
trusted library allocation
page read and write
21777E70000
heap
page read and write
E35000
heap
page read and write
6C3000
heap
page read and write
2B20000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
4C5B000
heap
page read and write
2BF0000
heap
page read and write
6BAC000
heap
page read and write
1EBBD7D7000
trusted library allocation
page read and write
2D30000
heap
page execute and read and write
7FF657B81000
unkown
page readonly
1A1230F3000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
2F04000
stack
page read and write
7DF418450000
trusted library allocation
page execute and read and write
1B4F9000
trusted library allocation
page read and write
1A112E75000
heap
page read and write
756B000
heap
page read and write
7FFD9B952000
trusted library allocation
page read and write
1EBAD380000
trusted library allocation
page read and write
1EBAB9AE000
heap
page read and write
1EBC5A87000
heap
page execute and read and write
1F99000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
1A113DF5000
trusted library allocation
page read and write
139E000
stack
page read and write
7FF657A7E000
unkown
page write copy
7F94000
heap
page read and write
653E000
heap
page read and write
5F899FE000
stack
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FF699B0E000
unkown
page readonly
1DC1E415000
trusted library allocation
page read and write
2B20000
heap
page readonly
7FF657A5F000
unkown
page readonly
1B580000
trusted library allocation
page read and write
2A40000
heap
page readonly
7FF657A5F000
unkown
page readonly
1A12B48D000
heap
page read and write
29D0000
trusted library allocation
page read and write
D6F000
stack
page read and write
7FF657BA6000
unkown
page readonly
1302000
heap
page read and write
6B50000
heap
page read and write
7A6E000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
2D40000
trusted library allocation
page read and write
19394F35000
heap
page read and write
7FF657B6D000
unkown
page readonly
12C01000
trusted library allocation
page read and write
7FF657BB4000
unkown
page readonly
23D3BF66000
heap
page read and write
5F8BFCE000
stack
page read and write
5F8B5FB000
stack
page read and write
2BD0000
trusted library allocation
page read and write
67A3000
heap
page read and write
13A0000
heap
page read and write
1A123371000
trusted library allocation
page read and write
1E01EC90000
heap
page read and write
7A05000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FF657B56000
unkown
page readonly
7FF6D433E000
unkown
page readonly
790E000
stack
page read and write
1DC1D5E7000
trusted library allocation
page read and write
19394FDA000
heap
page read and write
280F000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
F068F7E000
stack
page read and write
21778076000
heap
page read and write
4BF8000
heap
page read and write
7FF657B27000
unkown
page readonly
7FFD9B9D0000
trusted library allocation
page read and write
7FF657B5F000
unkown
page readonly
1A112E8A000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1EBAB992000
heap
page read and write
7B90000
heap
page read and write
1B510000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
65A5000
heap
page read and write
2B50000
trusted library allocation
page read and write
FA0000
heap
page read and write
11AF000
stack
page read and write
5F89AFD000
stack
page read and write
53A9BFF000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
1DC1B8C0000
heap
page read and write
1A113081000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FF657B9F000
unkown
page readonly
B65000
heap
page read and write
7FF699B0E000
unkown
page readonly
23D3BF12000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
23D3BF5C000
heap
page read and write
14BE000
stack
page read and write
F068E7A000
stack
page read and write
2B30000
trusted library allocation
page read and write
1DC358AC000
heap
page read and write
7C2E000
stack
page read and write
1210000
heap
page read and write
1EBAEDD4000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1939502D000
heap
page read and write
4D88000
heap
page read and write
7FF657B89000
unkown
page readonly
7FF699B0E000
unkown
page readonly
E13000
heap
page read and write
2D50000
trusted library allocation
page read and write
2175DE39000
heap
page read and write
5F8C14C000
stack
page read and write
7FFD9B932000
trusted library allocation
page read and write
6AE8000
stack
page read and write
6D6FBFE000
stack
page read and write
21760CE8000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9BAB3000
trusted library allocation
page read and write
5080000
heap
page read and write
5F89B79000
stack
page read and write
1A12336C000
trusted library allocation
page read and write
11C8000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
2175DDB8000
heap
page read and write
7FFD9B91D000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
F72000
heap
page read and write
2A50000
trusted library allocation
page read and write
7FF657BB4000
unkown
page readonly
7FFD9B880000
trusted library allocation
page execute and read and write
7FF657B87000
unkown
page readonly
A0BDDFE000
stack
page read and write
1F80000
trusted library allocation
page read and write
13213000
trusted library allocation
page read and write
7530000
heap
page read and write
7FF699B01000
unkown
page execute read
23D3BEC7000
heap
page read and write
21760D21000
trusted library allocation
page read and write
2A44000
heap
page read and write
1A12B8F8000
heap
page read and write
1B5F0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1EBAD4D5000
heap
page read and write
2D41000
trusted library allocation
page read and write
7FFD9B928000
trusted library allocation
page execute and read and write
7158000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1130000
trusted library section
page read and write
2C4E000
stack
page read and write
13220000
trusted library allocation
page read and write
320000
heap
page read and write
1200000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FF657B9F000
unkown
page readonly
4BB0000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
299F000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
5F8A94D000
stack
page read and write
1096000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
2F44000
stack
page read and write
A0BDBFE000
stack
page read and write
74BF6FE000
stack
page read and write
1DC35B31000
heap
page read and write
7FF657B96000
unkown
page readonly
1B500000
trusted library allocation
page read and write
7FFD9BAF8000
trusted library allocation
page read and write
5F8B4FC000
stack
page read and write
1EBAB950000
heap
page read and write
131F0000
trusted library allocation
page read and write
1FD3000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
A0BE3FE000
stack
page read and write
1B4F0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FF657B5F000
unkown
page readonly
1EBC59E2000
heap
page read and write
7FF657B89000
unkown
page readonly
2DF3000
trusted library allocation
page read and write
1A11401B000
trusted library allocation
page read and write
7FF699B11000
unkown
page write copy
7FF657BB7000
unkown
page readonly
7FF657B27000
unkown
page readonly
7FFD9BB53000
trusted library allocation
page read and write
1B590000
trusted library allocation
page read and write
7FF657A7E000
unkown
page write copy
24399749000
heap
page read and write
7FF657B85000
unkown
page readonly
7FFD9BAB4000
trusted library allocation
page read and write
1A112D30000
heap
page readonly
2E88000
stack
page read and write
1DC1B9B0000
heap
page read and write
12C09000
trusted library allocation
page read and write
1DC1E0A5000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FF657B5F000
unkown
page readonly
36449FE000
stack
page read and write
7FF657B87000
unkown
page readonly
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BAE8000
trusted library allocation
page read and write
7FFD9BBDD000
trusted library allocation
page read and write
2A95000
heap
page read and write
1EBAF309000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
1B480000
trusted library allocation
page read and write
10A0000
heap
page read and write
2DF0000
trusted library allocation
page read and write
1DC1B930000
heap
page readonly
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1DC1D4A1000
trusted library allocation
page read and write
There are 1963 hidden memdumps, click here to show them.