IOC Report
INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe

loading gif

Files

File Path
Type
Category
Malicious
INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_6fbbc0b515d27881fa5e3ddbdce1d76a1eaa5f56_ac8c2a05_1e491ecf-ed80-4a5d-a544-09bfac26ab9b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_6fbbc0b515d27881fa5e3ddbdce1d76a1eaa5f56_ac8c2a05_49d8dff7-a5a3-41b2-a831-9d5ed8b6c6c7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_6fbbc0b515d27881fa5e3ddbdce1d76a1eaa5f56_ac8c2a05_5728b76f-367a-42b4-8042-d1a67ad722df\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_ff4eaa128a01465bc0285c227bcf12ffe534_ac8c2a05_1db01ede-f8a4-4a47-9a1d-72c2e498d6aa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER87E9.tmp.dmp
Mini DuMP crash report, 16 streams, Thu May 2 06:30:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89BE.tmp.dmp
Mini DuMP crash report, 16 streams, Thu May 2 06:30:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AC8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B46.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B54.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B93.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CAD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CDD.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CDD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D2C.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC55F.tmp.dmp
Mini DuMP crash report, 16 streams, Thu May 2 06:30:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6A8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6E8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC738.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7D5.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDACC.tmp.dmp
Mini DuMP crash report, 16 streams, Thu May 2 06:30:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2EB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE31B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE31F.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE36E.tmp.txt
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv9D36.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\tmp462D.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\yklstw
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe
"C:\Users\user\Desktop\INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp462D.tmp.bat""
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\System32\notepad.exe
"C:\Windows\System32\notepad.exe"
malicious
C:\Windows\System32\calc.exe
"C:\Windows\System32\calc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
malicious
C:\Windows\System32\calc.exe
"C:\Windows\System32\calc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yklstw"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\jmycmollj"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\jmycmollj"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lgevnhwnfrks"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 3
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 468 -p 6364 -ip 6364
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6364 -s 1092
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 440 -p 5480 -ip 5480
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5480 -s 1064
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 484 -p 984 -ip 984
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 984 -s 1072
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 544 -p 1004 -ip 1004
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1004 -s 1088
There are 26 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://geoplugin.net/json.gp/C
unknown
malicious
64.188.18.137
malicious
https://www.google.com
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpJ
unknown
http://www.imvu.com
unknown
https://127.0.0.1/
unknown
https://www.google.com/accounts/servicelogin
unknown
http://geoplugin.net/json.gpq
unknown
http://upx.sf.net
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://www.ebuddy.com
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
64.188.18.137
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-CIJU8D
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-CIJU8D
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-CIJU8D
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
ProgramId
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
FileId
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
LowerCaseLongPath
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
LongPathHash
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
Name
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
OriginalFileName
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
Publisher
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
Version
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
BinFileVersion
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
BinaryType
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
ProductName
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
ProductVersion
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
LinkDate
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
BinProductVersion
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
AppxPackageFullName
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
AppxPackageRelativeId
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
Size
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
Language
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000F12C64205
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20181C95000
trusted library allocation
page read and write
malicious
1BFC4373000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
57AB000
heap
page read and write
malicious
20181901000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1DB50F74000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1BFC3FE1000
trusted library allocation
page read and write
malicious
293B75B3000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
205DE1A8000
trusted library allocation
page read and write
malicious
293B7221000
trusted library allocation
page read and write
malicious
205CE573000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5318000
heap
page read and write
malicious
988000
heap
page read and write
malicious
205CE1E1000
trusted library allocation
page read and write
malicious
5487000
heap
page read and write
malicious
1BFC2443000
heap
page read and write
293B7760000
trusted library allocation
page read and write
1BFD409B000
trusted library allocation
page read and write
1BFC4410000
trusted library allocation
page read and write
7FFD9B768000
trusted library allocation
page read and write
400000
system
page execute and read and write
28D952F000
stack
page read and write
494BCFD000
stack
page read and write
1BFC458C000
trusted library allocation
page read and write
293B7728000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
1BFC457E000
trusted library allocation
page read and write
1594DFF000
stack
page read and write
1DB51158000
trusted library allocation
page read and write
7FFD9B991000
trusted library allocation
page read and write
10001000
direct allocation
page execute and read and write
293B7684000
trusted library allocation
page read and write
1DB51122000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1BFC448E000
trusted library allocation
page read and write
293B772E000
trusted library allocation
page read and write
1BFC4552000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1DB51178000
trusted library allocation
page read and write
293B766A000
trusted library allocation
page read and write
1DB51160000
trusted library allocation
page read and write
293B77A2000
trusted library allocation
page read and write
7FFD9B935000
trusted library allocation
page read and write
910000
heap
page read and write
1DB510F0000
trusted library allocation
page read and write
293B7680000
trusted library allocation
page read and write
293B7786000
trusted library allocation
page read and write
539F000
stack
page read and write
1674442B000
heap
page read and write
293B7624000
trusted library allocation
page read and write
494B6FF000
stack
page read and write
1DB4EE41000
heap
page read and write
1DB510F6000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
200DC100000
heap
page read and write
1BFC43F0000
trusted library allocation
page read and write
1DB4EE99000
heap
page read and write
1BFC4436000
trusted library allocation
page read and write
7FFD9B982000
trusted library allocation
page read and write
7FFD9B798000
trusted library allocation
page read and write
494BEFD000
stack
page read and write
293B7646000
trusted library allocation
page read and write
293B7640000
trusted library allocation
page read and write
7FFD9B976000
trusted library allocation
page read and write
293B54A0000
heap
page read and write
1DB51026000
trusted library allocation
page read and write
293B7648000
trusted library allocation
page read and write
1BFC443E000
trusted library allocation
page read and write
20181AE9000
trusted library allocation
page read and write
7FFD9B96E000
trusted library allocation
page read and write
293B77C8000
trusted library allocation
page read and write
1BFC43AA000
trusted library allocation
page read and write
293B76CA000
trusted library allocation
page read and write
293B7708000
trusted library allocation
page read and write
293B76E8000
trusted library allocation
page read and write
293CFB41000
heap
page read and write
201819BB000
trusted library allocation
page read and write
7FFD9B887000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
205E6B00000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
1DB50F80000
trusted library allocation
page read and write
20B34FD000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
1BFC44C6000
trusted library allocation
page read and write
1DB5109A000
trusted library allocation
page read and write
293B772C000
trusted library allocation
page read and write
7BDF000
stack
page read and write
201FF890000
heap
page read and write
201FFB65000
heap
page read and write
293B7784000
trusted library allocation
page read and write
1BFD3FA8000
trusted library allocation
page read and write
1BFC4466000
trusted library allocation
page read and write
201FFB60000
heap
page read and write
293B77C6000
trusted library allocation
page read and write
1BFC4520000
trusted library allocation
page read and write
E1A10FE000
stack
page read and write
1BFC4506000
trusted library allocation
page read and write
1DB611C4000
trusted library allocation
page read and write
293B77CC000
trusted library allocation
page read and write
293B7732000
trusted library allocation
page read and write
205CE1A1000
trusted library allocation
page read and write
20181AFD000
trusted library allocation
page read and write
7FFD9B976000
trusted library allocation
page read and write
53FC000
stack
page read and write
1DB511A8000
trusted library allocation
page read and write
1BFC450A000
trusted library allocation
page read and write
1DB5109E000
trusted library allocation
page read and write
293B778A000
trusted library allocation
page read and write
A00000
heap
page read and write
20181A62000
trusted library allocation
page read and write
1BFC44A0000
trusted library allocation
page read and write
1BFC4570000
trusted library allocation
page read and write
1DB5101C000
trusted library allocation
page read and write
1BFC2448000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1DB510EE000
trusted library allocation
page read and write
1DB5111A000
trusted library allocation
page read and write
293B7606000
trusted library allocation
page read and write
8DC51CD000
stack
page read and write
201FF830000
heap
page read and write
1DB510FC000
trusted library allocation
page read and write
1DB5114A000
trusted library allocation
page read and write
261D102B000
heap
page read and write
201998F0000
trusted library allocation
page read and write
20181A9E000
trusted library allocation
page read and write
1BFC4574000
trusted library allocation
page read and write
1BFC43CA000
trusted library allocation
page read and write
1DB51040000
trusted library allocation
page read and write
521E000
stack
page read and write
7FFD9B763000
trusted library allocation
page read and write
201FF920000
heap
page read and write
1DB50C7C000
trusted library allocation
page read and write
15955FA000
stack
page read and write
1BFC44E4000
trusted library allocation
page read and write
293B7618000
trusted library allocation
page read and write
1BFC451A000
trusted library allocation
page read and write
6F10000
heap
page read and write
1BFC43B0000
trusted library allocation
page read and write
1BFC45A4000
trusted library allocation
page read and write
200DBBF0000
trusted library allocation
page read and write
1BFC4500000
trusted library allocation
page read and write
7FFD9B887000
trusted library allocation
page execute and read and write
1DB6A402000
heap
page execute and read and write
1DB4F313000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
4D4D000
heap
page read and write
1BFC4456000
trusted library allocation
page read and write
1DB51100000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
2019A1EA000
heap
page read and write
293B7600000
trusted library allocation
page read and write
293B5679000
heap
page read and write
1BFC4546000
trusted library allocation
page read and write
54FE000
heap
page read and write
200DBD02000
trusted library allocation
page read and write
293B7706000
trusted library allocation
page read and write
1DB5112C000
trusted library allocation
page read and write
293CF8A3000
trusted library allocation
page read and write
1BFC455E000
trusted library allocation
page read and write
7FFD9B885000
trusted library allocation
page execute and read and write
1BFC44D0000
trusted library allocation
page read and write
1DB51014000
trusted library allocation
page read and write
7FFD9B885000
trusted library allocation
page execute and read and write
1DB51068000
trusted library allocation
page read and write
261D1044000
heap
page read and write
1DB50FDC000
trusted library allocation
page read and write
4FD0000
heap
page read and write
293B77B8000
trusted library allocation
page read and write
1BFC23E3000
trusted library allocation
page read and write
8DC55FF000
stack
page read and write
1BFC4396000
trusted library allocation
page read and write
20181B68000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
1BFC44FA000
trusted library allocation
page read and write
261D0F80000
trusted library allocation
page read and write
1BFC4464000
trusted library allocation
page read and write
20181BB9000
trusted library allocation
page read and write
1DB60BA1000
trusted library allocation
page read and write
1BFC4556000
trusted library allocation
page read and write
293C7665000
trusted library allocation
page read and write
55E0000
heap
page read and write
6F1C000
heap
page read and write
1BFC43F8000
trusted library allocation
page read and write
1DB51038000
trusted library allocation
page read and write
1DB50FA4000
trusted library allocation
page read and write
20181B03000
trusted library allocation
page read and write
205CC600000
heap
page read and write
293C7262000
trusted library allocation
page read and write
5220000
heap
page read and write
20B2FFE000
stack
page read and write
1BFC44BE000
trusted library allocation
page read and write
293CFB3A000
heap
page read and write
1BFD4425000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1DB51094000
trusted library allocation
page read and write
293B56D3000
heap
page read and write
293B7744000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
200DBC2B000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1BFC4582000
trusted library allocation
page read and write
494B4F3000
stack
page read and write
1DB4EF02000
heap
page read and write
1BFC4578000
trusted library allocation
page read and write
293B764E000
trusted library allocation
page read and write
1BFC44D8000
trusted library allocation
page read and write
293B7642000
trusted library allocation
page read and write
293B75BA000
trusted library allocation
page read and write
1BFC4558000
trusted library allocation
page read and write
293B7758000
trusted library allocation
page read and write
1BFD4022000
trusted library allocation
page read and write
1BFC4454000
trusted library allocation
page read and write
E1A0EF3000
stack
page read and write
201FF903000
heap
page read and write
1DB50FF0000
trusted library allocation
page read and write
200DBD00000
trusted library allocation
page read and write
1BFC4470000
trusted library allocation
page read and write
5290000
heap
page read and write
1DB50FD8000
trusted library allocation
page read and write
20181BAC000
trusted library allocation
page read and write
1BFC4446000
trusted library allocation
page read and write
20181A6D000
trusted library allocation
page read and write
1DB50FFE000
trusted library allocation
page read and write
201FF90A000
heap
page read and write
9E0000
heap
page read and write
293B765A000
trusted library allocation
page read and write
1DB51132000
trusted library allocation
page read and write
20181B62000
trusted library allocation
page read and write
86C000
stack
page read and write
1BFC4398000
trusted library allocation
page read and write
293B7746000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
4FC8000
heap
page read and write
5310000
heap
page read and write
1BFC44EA000
trusted library allocation
page read and write
C8687FE000
stack
page read and write
1DB510F4000
trusted library allocation
page read and write
200DC002000
heap
page read and write
20181A03000
trusted library allocation
page read and write
1BFC45AA000
trusted library allocation
page read and write
1DB510C6000
trusted library allocation
page read and write
1DB51118000
trusted library allocation
page read and write
293B76B4000
trusted library allocation
page read and write
20B35FA000
stack
page read and write
20181A3B000
trusted library allocation
page read and write
1BFC4544000
trusted library allocation
page read and write
293B76D6000
trusted library allocation
page read and write
1DB510B6000
trusted library allocation
page read and write
526D000
stack
page read and write
293B7736000
trusted library allocation
page read and write
293B77B0000
trusted library allocation
page read and write
1BFC3FAE000
trusted library allocation
page read and write
1BFC454C000
trusted library allocation
page read and write
1DB50FBE000
trusted library allocation
page read and write
1BFC43A0000
trusted library allocation
page read and write
293CF8C0000
heap
page execute and read and write
2019A192000
heap
page read and write
1BFC4512000
trusted library allocation
page read and write
1DB5106A000
trusted library allocation
page read and write
293B76FC000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
1594CFE000
stack
page read and write
1DB50FC8000
trusted library allocation
page read and write
1DB510C8000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
293B76B0000
trusted library allocation
page read and write
293C71E1000
trusted library allocation
page read and write
4FD9000
heap
page read and write
1DB510A8000
trusted library allocation
page read and write
201819DD000
trusted library allocation
page read and write
1BFC24DE000
heap
page read and write
1BFC4534000
trusted library allocation
page read and write
1BFC449A000
trusted library allocation
page read and write
2019A250000
trusted library section
page read and write
51D0000
heap
page read and write
1DB51086000
trusted library allocation
page read and write
293B7650000
trusted library allocation
page read and write
1DB51008000
trusted library allocation
page read and write
1DB51018000
trusted library allocation
page read and write
1DB5117A000
trusted library allocation
page read and write
C868CFE000
unkown
page readonly
1BFC402C000
trusted library allocation
page read and write
1DB51194000
trusted library allocation
page read and write
293B773A000
trusted library allocation
page read and write
1DB51140000
trusted library allocation
page read and write
1DB50FA6000
trusted library allocation
page read and write
16744420000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1BFC43AE000
trusted library allocation
page read and write
1BFC45A6000
trusted library allocation
page read and write
9F0000
heap
page readonly
293B77BA000
trusted library allocation
page read and write
293B76B2000
trusted library allocation
page read and write
E1A13FE000
stack
page read and write
293B77DE000
trusted library allocation
page read and write
4DEA000
stack
page read and write
293B7644000
trusted library allocation
page read and write
293B76EE000
trusted library allocation
page read and write
293B776A000
trusted library allocation
page read and write
1BFC2260000
heap
page read and write
1DB50CC0000
trusted library allocation
page read and write
50FF000
stack
page read and write
1DB4EDC0000
heap
page read and write
1BFC4402000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1BFC4488000
trusted library allocation
page read and write
16744462000
heap
page read and write
1DB51016000
trusted library allocation
page read and write
1DB60C22000
trusted library allocation
page read and write
293B56EB000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
3E09EF2000
stack
page read and write
1DB510AE000
trusted library allocation
page read and write
6AB0000
heap
page read and write
8100000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1DB51110000
trusted library allocation
page read and write
494B7FF000
stack
page read and write
1DB5100A000
trusted library allocation
page read and write
1859D078000
heap
page read and write
1BFC243C000
heap
page read and write
1DB51054000
trusted library allocation
page read and write
1BFC4406000
trusted library allocation
page read and write
293B763E000
trusted library allocation
page read and write
4D2E000
stack
page read and write
201819CF000
trusted library allocation
page read and write
205DE625000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
968000
stack
page read and write
1DB51044000
trusted library allocation
page read and write
1BFC43EE000
trusted library allocation
page read and write
1BFC43C8000
trusted library allocation
page read and write
1DB51130000
trusted library allocation
page read and write
5517000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
6DE0000
heap
page read and write
293B71C0000
heap
page read and write
1BFC45A0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1BFC44AA000
trusted library allocation
page read and write
293B76AE000
trusted library allocation
page read and write
1DB50FE8000
trusted library allocation
page read and write
200DC100000
heap
page read and write
7FFD9B778000
trusted library allocation
page read and write
293B768E000
trusted library allocation
page read and write
51BF000
stack
page read and write
1BFC44A6000
trusted library allocation
page read and write
1DB511B0000
trusted library allocation
page read and write
293B75C4000
trusted library allocation
page read and write
1DB51024000
trusted library allocation
page read and write
200DC113000
heap
page read and write
261D1802000
trusted library allocation
page read and write
1BFC439C000
trusted library allocation
page read and write
7FFD9B935000
trusted library allocation
page read and write
1DB510C0000
trusted library allocation
page read and write
293B77BE000
trusted library allocation
page read and write
293B770A000
trusted library allocation
page read and write
293B7782000
trusted library allocation
page read and write
722F000
stack
page read and write
205CC611000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
1BFC4432000
trusted library allocation
page read and write
15952FE000
stack
page read and write
87D000
stack
page read and write
293B7632000
trusted library allocation
page read and write
1BFC4542000
trusted library allocation
page read and write
1DB51060000
trusted library allocation
page read and write
261D0F20000
heap
page read and write
1BFC438E000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
293B7670000
trusted library allocation
page read and write
4DFE000
stack
page read and write
1BFC43FC000
trusted library allocation
page read and write
1DB50FCC000
trusted library allocation
page read and write
7FFD9B926000
trusted library allocation
page read and write
1595AFE000
stack
page read and write
205CC63D000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
293B777E000
trusted library allocation
page read and write
293B76DA000
trusted library allocation
page read and write
293B5622000
heap
page read and write
201918C8000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
201FF870000
heap
page read and write
7FFD9B768000
trusted library allocation
page read and write
293B7672000
trusted library allocation
page read and write
293B76D0000
trusted library allocation
page read and write
293B5600000
heap
page read and write
293B7772000
trusted library allocation
page read and write
20181AE3000
trusted library allocation
page read and write
1BFC43FA000
trusted library allocation
page read and write
1BFC452A000
trusted library allocation
page read and write
293B778E000
trusted library allocation
page read and write
1BFC241D000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1DB4F123000
trusted library allocation
page read and write
205CC641000
heap
page read and write
494B8FB000
stack
page read and write
1DB4EEEA000
heap
page read and write
701E000
stack
page read and write
20181A21000
trusted library allocation
page read and write
201FF895000
heap
page read and write
54F3000
heap
page read and write
1BFC2702000
heap
page read and write
1DB510CA000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
293B766C000
trusted library allocation
page read and write
1DB50FC0000
trusted library allocation
page read and write
1DB51176000
trusted library allocation
page read and write
205CC5B0000
trusted library allocation
page read and write
E1A15FF000
stack
page read and write
293B7620000
trusted library allocation
page read and write
1BFC447A000
trusted library allocation
page read and write
293B75DE000
trusted library allocation
page read and write
200DBC38000
heap
page read and write
1BFC447C000
trusted library allocation
page read and write
1BFC449C000
trusted library allocation
page read and write
1BFC442A000
trusted library allocation
page read and write
20181A98000
trusted library allocation
page read and write
E1A18FD000
stack
page read and write
293B76AA000
trusted library allocation
page read and write
200DC102000
heap
page read and write
716F000
stack
page read and write
20181BE9000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1594EFE000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
293B75F6000
trusted library allocation
page read and write
5536000
heap
page read and write
1DB5116C000
trusted library allocation
page read and write
4D90000
heap
page read and write
293B7794000
trusted library allocation
page read and write
293B7726000
trusted library allocation
page read and write
1BFC43EC000
trusted library allocation
page read and write
293B760C000
trusted library allocation
page read and write
1BFC4462000
trusted library allocation
page read and write
4E50000
heap
page read and write
4E60000
heap
page readonly
8DC577E000
stack
page read and write
201818B0000
heap
page execute and read and write
293B75EC000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B923000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B9B8000
trusted library allocation
page read and write
293B762A000
trusted library allocation
page read and write
770F000
stack
page read and write
1DB50F92000
trusted library allocation
page read and write
1DB51146000
trusted library allocation
page read and write
1BFC444E000
trusted library allocation
page read and write
293B77BC000
trusted library allocation
page read and write
1BFC438A000
trusted library allocation
page read and write
1BFC43BE000
trusted library allocation
page read and write
1BFC450E000
trusted library allocation
page read and write
7A6B000
stack
page read and write
1DB5112A000
trusted library allocation
page read and write
6EF0000
heap
page read and write
293B770C000
trusted library allocation
page read and write
1DB50FA2000
trusted library allocation
page read and write
7FFD9B971000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
6F20000
heap
page read and write
1BFC44CC000
trusted library allocation
page read and write
5375000
heap
page read and write
1DB51196000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
6D80000
heap
page read and write
293B7780000
trusted library allocation
page read and write
1DB51128000
trusted library allocation
page read and write
293B75E4000
trusted library allocation
page read and write
293B7720000
trusted library allocation
page read and write
293B7740000
trusted library allocation
page read and write
293B7688000
trusted library allocation
page read and write
1DB50FD6000
trusted library allocation
page read and write
1DB51062000
trusted library allocation
page read and write
1DB511A4000
trusted library allocation
page read and write
1DB51022000
trusted library allocation
page read and write
6F0D000
heap
page read and write
8B0000
heap
page read and write
1BFC4502000
trusted library allocation
page read and write
1DB5119E000
trusted library allocation
page read and write
1DB50F7A000
trusted library allocation
page read and write
201817F0000
trusted library allocation
page read and write
2019A19B000
heap
page read and write
1BFC4430000
trusted library allocation
page read and write
293B776E000
trusted library allocation
page read and write
1DB5102A000
trusted library allocation
page read and write
1BFC24D0000
heap
page read and write
1BFC44AE000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1DB5117E000
trusted library allocation
page read and write
1DB50FA0000
trusted library allocation
page read and write
1DB510AC000
trusted library allocation
page read and write
1DB51072000
trusted library allocation
page read and write
293B5613000
heap
page read and write
1DB4F302000
heap
page read and write
293B72BD000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
293B76A8000
trusted library allocation
page read and write
1BFC4516000
trusted library allocation
page read and write
1DB5113C000
trusted library allocation
page read and write
293B761E000
trusted library allocation
page read and write
1BFC4418000
trusted library allocation
page read and write
4D38000
heap
page read and write
4DB0000
heap
page readonly
293B7692000
trusted library allocation
page read and write
1DB50FE4000
trusted library allocation
page read and write
1BFC406A000
trusted library allocation
page read and write
530D000
stack
page read and write
293B7628000
trusted library allocation
page read and write
7FFD9B778000
trusted library allocation
page read and write
2019A158000
heap
page read and write
1DB510D2000
trusted library allocation
page read and write
541E000
stack
page read and write
1DB50F7C000
trusted library allocation
page read and write
1BFC407D000
trusted library allocation
page read and write
7FFD9B973000
trusted library allocation
page read and write
293B7756000
trusted library allocation
page read and write
293B7682000
trusted library allocation
page read and write
205CC560000
trusted library allocation
page read and write
2019A0F0000
heap
page read and write
474000
remote allocation
page execute and read and write
1BFC44E2000
trusted library allocation
page read and write
1DB5116A000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
201819C7000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
2019A1EE000
heap
page read and write
201FF4C0000
unkown
page readonly
20181B22000
trusted library allocation
page read and write
1DB5107C000
trusted library allocation
page read and write
1BFC453E000
trusted library allocation
page read and write
293B776C000
trusted library allocation
page read and write
1BFC447E000
trusted library allocation
page read and write
293B7678000
trusted library allocation
page read and write
1BFC4538000
trusted library allocation
page read and write
1DB51046000
trusted library allocation
page read and write
293B761A000
trusted library allocation
page read and write
200DBC02000
unkown
page read and write
293B7696000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1DB4F140000
heap
page execute and read and write
293B7796000
trusted library allocation
page read and write
201819F1000
trusted library allocation
page read and write
1BFC23E0000
trusted library allocation
page read and write
1DB6A500000
heap
page read and write
1DB51124000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
5330000
heap
page readonly
1DB5111C000
trusted library allocation
page read and write
2018198C000
trusted library allocation
page read and write
1BFC43D0000
trusted library allocation
page read and write
1859EA40000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1BFC437C000
trusted library allocation
page read and write
C8685FD000
stack
page read and write
1BFC4504000
trusted library allocation
page read and write
1DB50FC2000
trusted library allocation
page read and write
1BFC4566000
trusted library allocation
page read and write
205CC6B6000
heap
page read and write
1BFC43E8000
trusted library allocation
page read and write
20181ACB000
trusted library allocation
page read and write
1BFC43CC000
trusted library allocation
page read and write
1DB51076000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1BFC449E000
trusted library allocation
page read and write
1BFC23B0000
trusted library allocation
page read and write
54FA000
heap
page read and write
205CC520000
heap
page read and write
1DB5119C000
trusted library allocation
page read and write
1DB51066000
trusted library allocation
page read and write
3E09FFE000
stack
page read and write
1DB51082000
trusted library allocation
page read and write
7FFD9B94E000
trusted library allocation
page read and write
205CE1C6000
trusted library allocation
page read and write
293B767E000
trusted library allocation
page read and write
1BFC4388000
trusted library allocation
page read and write
1BFC24B2000
heap
page read and write
1DB510D0000
trusted library allocation
page read and write
1DB51192000
trusted library allocation
page read and write
780F000
stack
page read and write
200DBC38000
heap
page read and write
293B7754000
trusted library allocation
page read and write
201FF94E000
heap
page read and write
293B77E2000
trusted library allocation
page read and write
201FF8E0000
heap
page read and write
1BFC4526000
trusted library allocation
page read and write
1BFC4452000
trusted library allocation
page read and write
201FF850000
heap
page read and write
1BFC4590000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1DB510A2000
trusted library allocation
page read and write
293B75C8000
trusted library allocation
page read and write
293B763C000
trusted library allocation
page read and write
7FFD9B93E000
trusted library allocation
page read and write
200DC102000
heap
page read and write
1BFC2428000
heap
page read and write
1DB5100E000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2019A150000
heap
page read and write
293B76D4000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
20191929000
trusted library allocation
page read and write
1DB510FA000
trusted library allocation
page read and write
20181A8D000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
1BFC43F6000
trusted library allocation
page read and write
1BFC4536000
trusted library allocation
page read and write
1BFC23D0000
heap
page execute and read and write
293B77EE000
trusted library allocation
page read and write
201819B2000
trusted library allocation
page read and write
1DB51120000
trusted library allocation
page read and write
293B771C000
trusted library allocation
page read and write
1DB50FAE000
trusted library allocation
page read and write
1BFC43D4000
trusted library allocation
page read and write
1DB5105E000
trusted library allocation
page read and write
1BFDC941000
heap
page read and write
4FBC000
stack
page read and write
20181A54000
trusted library allocation
page read and write
7FFD9B89D000
trusted library allocation
page execute and read and write
1BFC4514000
trusted library allocation
page read and write
E1A14FF000
stack
page read and write
7FFD9B98F000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1BFC454A000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1BFC43E0000
trusted library allocation
page read and write
293B760E000
trusted library allocation
page read and write
1BFC44D6000
trusted library allocation
page read and write
201819B8000
trusted library allocation
page read and write
545E000
stack
page read and write
1859EA45000
heap
page read and write
1594FFE000
stack
page read and write
1595BFB000
stack
page read and write
1DB50F7E000
trusted library allocation
page read and write
1DB4EE50000
heap
page read and write
1DB510A0000
trusted library allocation
page read and write
20181AAF000
trusted library allocation
page read and write
1DB51070000
trusted library allocation
page read and write
1DB4F0F0000
trusted library allocation
page read and write
51FC000
stack
page read and write
1DB50FAC000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
1DB51096000
trusted library allocation
page read and write
1BFC43B6000
trusted library allocation
page read and write
293B563F000
heap
page read and write
293B71D0000
heap
page execute and read and write
20B2CF3000
stack
page read and write
1DB5104E000
trusted library allocation
page read and write
1BFC4586000
trusted library allocation
page read and write
1BFC456C000
trusted library allocation
page read and write
293B7750000
trusted library allocation
page read and write
20181A87000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page read and write
1DB4EEAF000
heap
page read and write
1DB51170000
trusted library allocation
page read and write
293B7622000
trusted library allocation
page read and write
293B75FA000
trusted library allocation
page read and write
205CC699000
heap
page read and write
1BFC4474000
trusted library allocation
page read and write
293B7778000
trusted library allocation
page read and write
2019A140000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BFC44A8000
trusted library allocation
page read and write
201FF923000
heap
page read and write
6F31000
heap
page read and write
293B76B6000
trusted library allocation
page read and write
293B770E000
trusted library allocation
page read and write
293B7700000
trusted library allocation
page read and write
200DBC38000
heap
page read and write
5320000
heap
page read and write
1DB510B8000
trusted library allocation
page read and write
20B2EFF000
stack
page read and write
1BFC4378000
trusted library allocation
page read and write
4F80000
heap
page readonly
1BFC43BC000
trusted library allocation
page read and write
1DB510B2000
trusted library allocation
page read and write
293B71EE000
trusted library allocation
page read and write
C868BFC000
stack
page read and write
293B76BE000
trusted library allocation
page read and write
16744380000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1BFC443A000
trusted library allocation
page read and write
52FC000
stack
page read and write
261D1002000
heap
page read and write
1BFC446A000
trusted library allocation
page read and write
1DB50F98000
trusted library allocation
page read and write
7FFD9B987000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1BFC4390000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
C86827B000
stack
page read and write
1DB4EE13000
heap
page read and write
1DB51144000
trusted library allocation
page read and write
293B777A000
trusted library allocation
page read and write
1BFC4392000
trusted library allocation
page read and write
7BF0000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
1DB51000000
trusted library allocation
page read and write
4FC0000
heap
page read and write
293B71B0000
trusted library allocation
page read and write
1BFC4400000
trusted library allocation
page read and write
1DB51084000
trusted library allocation
page read and write
200DBC79000
heap
page read and write
293B76A4000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
1BFC24A9000
heap
page read and write
1DB50C6A000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
1DB50FB2000
trusted library allocation
page read and write
20181BA1000
trusted library allocation
page read and write
20181A79000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
1BFC438C000
trusted library allocation
page read and write
15953FF000
stack
page read and write
1BFC457C000
trusted library allocation
page read and write
1DB50FCE000
trusted library allocation
page read and write
1DB50FC6000
trusted library allocation
page read and write
205DE1A1000
trusted library allocation
page read and write
494B5FF000
stack
page read and write
1DB50F96000
trusted library allocation
page read and write
3E0A5FF000
stack
page read and write
970000
heap
page read and write
1BFC243E000
heap
page read and write
478000
remote allocation
page execute and read and write
1DB50F94000
trusted library allocation
page read and write
20181B39000
trusted library allocation
page read and write
7FFD9B988000
trusted library allocation
page read and write
1DB50F8C000
trusted library allocation
page read and write
15951FF000
stack
page read and write
1BFC4518000
trusted library allocation
page read and write
293B75DA000
trusted library allocation
page read and write
1DB5119A000
trusted library allocation
page read and write
1BFC453A000
trusted library allocation
page read and write
1BFC43F4000
trusted library allocation
page read and write
1DB4F202000
heap
page read and write
293B77B2000
trusted library allocation
page read and write
201FF9B0000
heap
page read and write
1BFC44BA000
trusted library allocation
page read and write
1859CF20000
heap
page read and write
1BFC45B0000
trusted library allocation
page read and write
6D5E000
stack
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
1BFC4424000
trusted library allocation
page read and write
1BFD45C4000
trusted library allocation
page read and write
1BFC43CE000
trusted library allocation
page read and write
205CC6B8000
heap
page read and write
1DB51182000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
16744451000
heap
page read and write
1BFC4426000
trusted library allocation
page read and write
293B7206000
trusted library allocation
page read and write
1DB5101A000
trusted library allocation
page read and write
5478000
heap
page read and write
1BFC44EC000
trusted library allocation
page read and write
1BFC44FE000
trusted library allocation
page read and write
3E0A8FE000
stack
page read and write
1DB5115A000
trusted library allocation
page read and write
1BFC44BC000
trusted library allocation
page read and write
5790000
heap
page read and write
1BFC44DA000
trusted library allocation
page read and write
474000
remote allocation
page execute and read and write
1DB50FDA000
trusted library allocation
page read and write
1BFC44F2000
trusted library allocation
page read and write
1DB5108E000
trusted library allocation
page read and write
7FFD9B966000
trusted library allocation
page read and write
16744520000
heap
page read and write
200DC013000
heap
page read and write
1BFC4540000
trusted library allocation
page read and write
293B76BC000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FF4D6950000
trusted library allocation
page execute and read and write
7FFD9B9DB000
trusted library allocation
page read and write
1DB51126000
trusted library allocation
page read and write
1DB50FB8000
trusted library allocation
page read and write
1DB510DC000
trusted library allocation
page read and write
1DB4EE2C000
heap
page read and write
1BFC4444000
trusted library allocation
page read and write
1DB510DA000
trusted library allocation
page read and write
293B77C4000
trusted library allocation
page read and write
1DB51180000
trusted library allocation
page read and write
1BFD44F5000
trusted library allocation
page read and write
1DB5112E000
trusted library allocation
page read and write
293B7654000
trusted library allocation
page read and write
293B763A000
trusted library allocation
page read and write
293B76B8000
trusted library allocation
page read and write
20B2DFF000
stack
page read and write
1BFC4394000
trusted library allocation
page read and write
1BFC451E000
trusted library allocation
page read and write
1DB5106C000
trusted library allocation
page read and write
1BFC4458000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
201817D0000
trusted library allocation
page read and write
201FF957000
heap
page read and write
201918C1000
trusted library allocation
page read and write
1DB511AC000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
293B77AE000
trusted library allocation
page read and write
1BFC4492000
trusted library allocation
page read and write
50D7000
stack
page read and write
1DB51138000
trusted library allocation
page read and write
293B76E0000
trusted library allocation
page read and write
6F12000
heap
page read and write
293B7602000
trusted library allocation
page read and write
293B54C0000
heap
page read and write
1DB51106000
trusted library allocation
page read and write
1DB60C9B000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
293B7674000
trusted library allocation
page read and write
1DB51102000
trusted library allocation
page read and write
293B75C6000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
293B56A5000
heap
page read and write
38F56B000
stack
page read and write
1DB50FEC000
trusted library allocation
page read and write
1DB50FEA000
trusted library allocation
page read and write
1BFC4532000
trusted library allocation
page read and write
293B7738000
trusted library allocation
page read and write
201FF998000
heap
page read and write
1BFC44F4000
trusted library allocation
page read and write
1DB51010000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
C8688FE000
unkown
page readonly
7FFD9B846000
trusted library allocation
page execute and read and write
1DB51166000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
8DC5979000
stack
page read and write
205CC590000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
45D000
system
page execute and read and write
1BFC4494000
trusted library allocation
page read and write
1DB50FB6000
trusted library allocation
page read and write
1DB50F9C000
trusted library allocation
page read and write
1DB60F56000
trusted library allocation
page read and write
200DBC00000
unkown
page read and write
1DB51058000
trusted library allocation
page read and write
293CF8A0000
trusted library allocation
page read and write
293B77B4000
trusted library allocation
page read and write
7FFD9B923000
trusted library allocation
page read and write
1BFC4450000
trusted library allocation
page read and write
1BFC4478000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
1DB511AA000
trusted library allocation
page read and write
1BFC457A000
trusted library allocation
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
293B7766000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1BFC441E000
trusted library allocation
page read and write
1BFC2240000
heap
page read and write
293B7686000
trusted library allocation
page read and write
293B775A000
trusted library allocation
page read and write
1BFC44B0000
trusted library allocation
page read and write
1DB51012000
trusted library allocation
page read and write
1BFC44FC000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
1DB4EE75000
heap
page read and write
8410000
heap
page read and write
293B5647000
heap
page read and write
20181B1F000
trusted library allocation
page read and write
1BFC4584000
trusted library allocation
page read and write
1BFC459A000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
1BFC44F8000
trusted library allocation
page read and write
293B772A000
trusted library allocation
page read and write
293B77E4000
trusted library allocation
page read and write
1BFC4460000
trusted library allocation
page read and write
796D000
stack
page read and write
20181AD9000
trusted library allocation
page read and write
1DB50F82000
trusted library allocation
page read and write
293B76EA000
trusted library allocation
page read and write
1BFC43F2000
trusted library allocation
page read and write
1DB5107E000
trusted library allocation
page read and write
293B7668000
trusted library allocation
page read and write
1BFC43C6000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
1BFDC660000
heap
page execute and read and write
20181A18000
trusted library allocation
page read and write
293B77A0000
trusted library allocation
page read and write
456000
system
page execute and read and write
1BFC459E000
trusted library allocation
page read and write
1DB510C2000
trusted library allocation
page read and write
293B7748000
trusted library allocation
page read and write
712F000
stack
page read and write
1DB50FFC000
trusted library allocation
page read and write
293B7774000
trusted library allocation
page read and write
1DB51042000
trusted library allocation
page read and write
205CC702000
heap
page read and write
1BFC43C4000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
8124000
heap
page read and write
1BFC437A000
trusted library allocation
page read and write
1BFC43DC000
trusted library allocation
page read and write
51D0000
heap
page read and write
1DB51116000
trusted library allocation
page read and write
200DBD24000
heap
page read and write
1DB50FAA000
trusted library allocation
page read and write
293B76EC000
trusted library allocation
page read and write
1DB5110C000
trusted library allocation
page read and write
473000
system
page execute and read and write
1DB51064000
trusted library allocation
page read and write
1BFC24E4000
heap
page read and write
293B764A000
trusted library allocation
page read and write
205CC902000
heap
page read and write
293C7596000
trusted library allocation
page read and write
7FFD9B913000
trusted library allocation
page read and write
20181A9B000
trusted library allocation
page read and write
1859D070000
heap
page read and write
261D0F50000
heap
page read and write
1BFC440E000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
293B75E0000
trusted library allocation
page read and write
293B77EA000
trusted library allocation
page read and write
1DB51080000
trusted library allocation
page read and write
293B769C000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1DB51108000
trusted library allocation
page read and write
1DB5105C000
trusted library allocation
page read and write
20181820000
heap
page read and write
1BFC456A000
trusted library allocation
page read and write
8210000
heap
page read and write
5340000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1DB61025000
trusted library allocation
page read and write
1DB4F110000
heap
page execute and read and write
4CEC000
stack
page read and write
293B75CE000
trusted library allocation
page read and write
7FFD9B971000
trusted library allocation
page read and write
1DB50FA8000
trusted library allocation
page read and write
1BFC4428000
trusted library allocation
page read and write
293B77C2000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
293C7804000
trusted library allocation
page read and write
293C72DB000
trusted library allocation
page read and write
2E6E000
stack
page read and write
1DB50BA1000
trusted library allocation
page read and write
293B7788000
trusted library allocation
page read and write
1BFC448C000
trusted library allocation
page read and write
1DB5118C000
trusted library allocation
page read and write
205CC430000
heap
page read and write
201819F7000
trusted library allocation
page read and write
1BFC4486000
trusted library allocation
page read and write
7FFD9B976000
trusted library allocation
page read and write
205CC677000
heap
page read and write
95E000
stack
page read and write
261D1000000
heap
page read and write
1BFC4386000
trusted library allocation
page read and write
1BFC444C000
trusted library allocation
page read and write
1BFC4588000
trusted library allocation
page read and write
293B769A000
trusted library allocation
page read and write
1BFC45AE000
trusted library allocation
page read and write
293B7690000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1DB510BE000
trusted library allocation
page read and write
1BFC43C2000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1BFC43E4000
trusted library allocation
page read and write
293B769E000
trusted library allocation
page read and write
1BFC43BA000
trusted library allocation
page read and write
E1A17FA000
stack
page read and write
1BFC2390000
trusted library allocation
page read and write
1BFC4434000
trusted library allocation
page read and write
293B76F6000
trusted library allocation
page read and write
1DB510D8000
trusted library allocation
page read and write
83C000
stack
page read and write
1BFC43C0000
trusted library allocation
page read and write
1DB50FEE000
trusted library allocation
page read and write
293B71E1000
trusted library allocation
page read and write
1BFC24EF000
heap
page read and write
293B7616000
trusted library allocation
page read and write
1BFC45A8000
trusted library allocation
page read and write
1BFC2340000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BFC2502000
heap
page read and write
7FFD9B773000
trusted library allocation
page read and write
1DB5111E000
trusted library allocation
page read and write
1594972000
stack
page read and write
6F41000
heap
page read and write
20181AA1000
trusted library allocation
page read and write
293B7698000
trusted library allocation
page read and write
20181B52000
trusted library allocation
page read and write
293B7764000
trusted library allocation
page read and write
1BFC4568000
trusted library allocation
page read and write
201FF792000
unkown
page readonly
293B75DC000
trusted library allocation
page read and write
1DB5118E000
trusted library allocation
page read and write
1BFC44F6000
trusted library allocation
page read and write
1DB51034000
trusted library allocation
page read and write
1DB510E8000
trusted library allocation
page read and write
15950FB000
stack
page read and write
293B77D0000
trusted library allocation
page read and write
205CC6E2000
heap
page read and write
1DB510CC000
trusted library allocation
page read and write
1BFC4498000
trusted library allocation
page read and write
E1A0FFF000
stack
page read and write
293B761C000
trusted library allocation
page read and write
293B7710000
trusted library allocation
page read and write
1DB51148000
trusted library allocation
page read and write
1DB50FE0000
trusted library allocation
page read and write
28D94AC000
stack
page read and write
293B76CC000
trusted library allocation
page read and write
4DA0000
heap
page read and write
293B779A000
trusted library allocation
page read and write
1DB50FBC000
trusted library allocation
page read and write
293B75CC000
trusted library allocation
page read and write
1DB5113E000
trusted library allocation
page read and write
1DB5117C000
trusted library allocation
page read and write
5797000
heap
page read and write
1DB5105A000
trusted library allocation
page read and write
20181A4E000
trusted library allocation
page read and write
1BFC3FD2000
trusted library allocation
page read and write
293C7735000
trusted library allocation
page read and write
293B775E000
trusted library allocation
page read and write
5200000
heap
page read and write
1BFC452C000
trusted library allocation
page read and write
1BFC44C4000
trusted library allocation
page read and write
1BFC4412000
trusted library allocation
page read and write
1BFC4440000
trusted library allocation
page read and write
293B7666000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page execute and read and write
205CC62D000
heap
page read and write
1DB51050000
trusted library allocation
page read and write
293B7752000
trusted library allocation
page read and write
1BFC4550000
trusted library allocation
page read and write
1BFC4408000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1BFDC802000
heap
page execute and read and write
293B77E8000
trusted library allocation
page read and write
1DB5110E000
trusted library allocation
page read and write
1DB5118A000
trusted library allocation
page read and write
293B76BA000
trusted library allocation
page read and write
50DC000
stack
page read and write
1DB51036000
trusted library allocation
page read and write
293B77D8000
trusted library allocation
page read and write
1DB50FFA000
trusted library allocation
page read and write
7FFD9B91D000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
293B76F4000
trusted library allocation
page read and write
5450000
heap
page read and write
1DB510CE000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1BFC43B2000
trusted library allocation
page read and write
77EF000
stack
page read and write
293B7724000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
293D0010000
heap
page read and write
1DB60D13000
trusted library allocation
page read and write
293B75F8000
trusted library allocation
page read and write
205CC5A0000
heap
page execute and read and write
7FFD9B752000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
1DB50F70000
trusted library allocation
page read and write
7FFD9B971000
trusted library allocation
page read and write
293B7636000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
293B75FE000
trusted library allocation
page read and write
16744451000
heap
page read and write
1DB5102E000
trusted library allocation
page read and write
1BFC451C000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1DB50FB0000
trusted library allocation
page read and write
205CC580000
trusted library allocation
page read and write
20181B95000
trusted library allocation
page read and write
293B77D4000
trusted library allocation
page read and write
1DB51092000
trusted library allocation
page read and write
1DB5113A000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
1DB51028000
trusted library allocation
page read and write
1BFC4472000
trusted library allocation
page read and write
293B75FC000
trusted library allocation
page read and write
201819E3000
trusted library allocation
page read and write
1DB510BA000
trusted library allocation
page read and write
293B76AC000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
38F8FF000
unkown
page read and write
293B7722000
trusted library allocation
page read and write
1DB50FF6000
trusted library allocation
page read and write
293B764C000
trusted library allocation
page read and write
293CFB3F000
heap
page read and write
1BFC43FE000
trusted library allocation
page read and write
1BFC4414000
trusted library allocation
page read and write
4EAE000
stack
page read and write
1BFC445E000
trusted library allocation
page read and write
4DFE000
stack
page read and write
7FFD9B9BF000
trusted library allocation
page read and write
293B75BC000
trusted library allocation
page read and write
1BFC4404000
trusted library allocation
page read and write
1DB5106E000
trusted library allocation
page read and write
1DB50FD0000
trusted library allocation
page read and write
1DB68BD0000
trusted library allocation
page read and write
1DB5107A000
trusted library allocation
page read and write
1BFC4576000
trusted library allocation
page read and write
293CFB00000
heap
page read and write
E1A11FE000
stack
page read and write
1BFC45A2000
trusted library allocation
page read and write
293B77A4000
trusted library allocation
page read and write
20B32FF000
stack
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
293B75F0000
trusted library allocation
page read and write
293B76D8000
trusted library allocation
page read and write
205E6A02000
heap
page execute and read and write
293B75D2000
trusted library allocation
page read and write
200DBBE0000
heap
page read and write
1DB5103C000
trusted library allocation
page read and write
1DB5101E000
trusted library allocation
page read and write
1DB51142000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1DB51006000
trusted library allocation
page read and write
1DB50FE6000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
205CC410000
heap
page read and write
293B7662000
trusted library allocation
page read and write
7FFD9B89D000
trusted library allocation
page execute and read and write
3E0A3FF000
stack
page read and write
201FF4C2000
unkown
page readonly
7FFD9B9A0000
trusted library allocation
page read and write
1BFC455C000
trusted library allocation
page read and write
15956FD000
stack
page read and write
1DB50FC4000
trusted library allocation
page read and write
1DB50FD2000
trusted library allocation
page read and write
1DB51032000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7020000
heap
page read and write
293B7658000
trusted library allocation
page read and write
1BFC4598000
trusted library allocation
page read and write
1DB51150000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
293B7716000
trusted library allocation
page read and write
293B76A6000
trusted library allocation
page read and write
16744461000
heap
page read and write
293B7792000
trusted library allocation
page read and write
20181B2B000
trusted library allocation
page read and write
1DB51056000
trusted library allocation
page read and write
4DB0000
heap
page readonly
293B7614000
trusted library allocation
page read and write
200DBC13000
unkown
page read and write
10000000
direct allocation
page read and write
1DB510B0000
trusted library allocation
page read and write
1DB510D6000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
7FFD9B916000
trusted library allocation
page read and write
1BFC445C000
trusted library allocation
page read and write
1DB50FF4000
trusted library allocation
page read and write
1DB50F84000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
293B762E000
trusted library allocation
page read and write
293B766E000
trusted library allocation
page read and write
3E0A4FE000
stack
page read and write
293B778C000
trusted library allocation
page read and write
1BFC44B2000
trusted library allocation
page read and write
7410000
heap
page read and write
3E0A1FE000
stack
page read and write
400000
system
page execute and read and write
1DB510C4000
trusted library allocation
page read and write
293B77AC000
trusted library allocation
page read and write
205CC651000
heap
page read and write
1BFC4480000
trusted library allocation
page read and write
20181BAF000
trusted library allocation
page read and write
1BFC443C000
trusted library allocation
page read and write
4DA0000
heap
page read and write
1BFC4562000
trusted library allocation
page read and write
1BFC44C8000
trusted library allocation
page read and write
293B7612000
trusted library allocation
page read and write
293B77F0000
trusted library allocation
page read and write
7FFD9B996000
trusted library allocation
page read and write
293B7770000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
20181B7D000
trusted library allocation
page read and write
201FF954000
heap
page read and write
293B7660000
trusted library allocation
page read and write
205DE6F5000
trusted library allocation
page read and write
6EEE000
stack
page read and write
293B76DC000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1DB5103A000
trusted library allocation
page read and write
205E6B02000
heap
page read and write
6F70000
heap
page read and write
293B77D6000
trusted library allocation
page read and write
16744280000
heap
page read and write
293B777C000
trusted library allocation
page read and write
494BDFA000
stack
page read and write
205CC613000
heap
page read and write
1DB4EE3C000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B926000
trusted library allocation
page read and write
293B76C4000
trusted library allocation
page read and write
7FFD9B948000
trusted library allocation
page read and write
200DBC38000
heap
page read and write
5610000
heap
page read and write
293C71E8000
trusted library allocation
page read and write
205CC510000
heap
page read and write
293B76D2000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1DB51114000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1859D040000
heap
page read and write
1BFC43A8000
trusted library allocation
page read and write
1DB510FE000
trusted library allocation
page read and write
205CC646000
heap
page read and write
293B5626000
heap
page read and write
474000
remote allocation
page execute and read and write
C70000
heap
page read and write
1BFD4113000
trusted library allocation
page read and write
20181BBB000
trusted library allocation
page read and write
1BFC43A2000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1BFC4442000
trusted library allocation
page read and write
1BFC4524000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
1DB51104000
trusted library allocation
page read and write
1BFC4560000
trusted library allocation
page read and write
1DB510F2000
trusted library allocation
page read and write
459000
system
page execute and read and write
293B5641000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
293B76E4000
trusted library allocation
page read and write
1BFC44B4000
trusted library allocation
page read and write
1BFDBFD0000
trusted library allocation
page read and write
1DB50F8A000
trusted library allocation
page read and write
1DB51112000
trusted library allocation
page read and write
293B7762000
trusted library allocation
page read and write
293B5802000
heap
page read and write
41B000
system
page execute and read and write
474000
remote allocation
page execute and read and write
1BFC43A6000
trusted library allocation
page read and write
1BFC4510000
trusted library allocation
page read and write
1DB511A2000
trusted library allocation
page read and write
293B5702000
heap
page read and write
7ADE000
stack
page read and write
205CC624000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
293B76C0000
trusted library allocation
page read and write
1DB51030000
trusted library allocation
page read and write
7FFD9B893000
trusted library allocation
page execute and read and write
1BFC2400000
heap
page read and write
1DB60BA8000
trusted library allocation
page read and write
1BFC4384000
trusted library allocation
page read and write
1BFC44DE000
trusted library allocation
page read and write
293B765E000
trusted library allocation
page read and write
1BFC440C000
trusted library allocation
page read and write
293B76DE000
trusted library allocation
page read and write
9A0000
heap
page read and write
1BFC445A000
trusted library allocation
page read and write
1BFC44A4000
trusted library allocation
page read and write
1BFC4416000
trusted library allocation
page read and write
1DB51048000
trusted library allocation
page read and write
293B77CA000
trusted library allocation
page read and write
1DB510BC000
trusted library allocation
page read and write
1DB4F0D0000
trusted library allocation
page read and write
1DB510DE000
trusted library allocation
page read and write
494BAFE000
stack
page read and write
1BFC456E000
trusted library allocation
page read and write
293B562D000
heap
page read and write
293B7702000
trusted library allocation
page read and write
1DB510A4000
trusted library allocation
page read and write
550E000
stack
page read and write
205CC5B3000
trusted library allocation
page read and write
1DB50F90000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
293B774C000
trusted library allocation
page read and write
1DB5108C000
trusted library allocation
page read and write
1DB4EE24000
heap
page read and write
293B76F2000
trusted library allocation
page read and write
1BFC24EB000
heap
page read and write
293B75D8000
trusted library allocation
page read and write
293B56AF000
heap
page read and write
7E2E000
stack
page read and write
293B768A000
trusted library allocation
page read and write
4CEE000
stack
page read and write
1DB510A6000
trusted library allocation
page read and write
205CC63B000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1BFC4594000
trusted library allocation
page read and write
2019A16C000
heap
page read and write
293B76C6000
trusted library allocation
page read and write
1DB69010000
heap
page read and write
1DB510F8000
trusted library allocation
page read and write
1BFC43EA000
trusted library allocation
page read and write
1BFC44D2000
trusted library allocation
page read and write
90D000
stack
page read and write
1DB51162000
trusted library allocation
page read and write
1DB51078000
trusted library allocation
page read and write
7040000
heap
page read and write
1DB4EE3A000
heap
page read and write
1DB51088000
trusted library allocation
page read and write
293B76F0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1BFC439E000
trusted library allocation
page read and write
293B7712000
trusted library allocation
page read and write
293B75B8000
trusted library allocation
page read and write
261D0F40000
heap
page read and write
293B561F000
heap
page read and write
4D2C000
stack
page read and write
16744462000
heap
page read and write
293B5652000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
20181A8A000
trusted library allocation
page read and write
293B765C000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
293B76FA000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
1DB51198000
trusted library allocation
page read and write
293B77D2000
trusted library allocation
page read and write
293B7790000
trusted library allocation
page read and write
293B77C0000
trusted library allocation
page read and write
4FFF000
stack
page read and write
1DB511A6000
trusted library allocation
page read and write
1BFC4438000
trusted library allocation
page read and write
293B75D0000
trusted library allocation
page read and write
1DB510E2000
trusted library allocation
page read and write
1BFC446E000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1BFDC94B000
heap
page read and write
293B760A000
trusted library allocation
page read and write
1BFC437E000
trusted library allocation
page read and write
1DB5104A000
trusted library allocation
page read and write
293B7626000
trusted library allocation
page read and write
201818E6000
trusted library allocation
page read and write
1BFC458A000
trusted library allocation
page read and write
760F000
stack
page read and write
1BFC4508000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B98B000
trusted library allocation
page read and write
167446E0000
heap
page read and write
16744360000
heap
page read and write
2019A211000
heap
page read and write
1BFC4476000
trusted library allocation
page read and write
1DB51184000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
293B7768000
trusted library allocation
page read and write
1BFC44EE000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
293B768C000
trusted library allocation
page read and write
53DE000
stack
page read and write
7FFD9B991000
trusted library allocation
page read and write
1DB610F5000
trusted library allocation
page read and write
1BFC455A000
trusted library allocation
page read and write
1DB4EDA0000
heap
page read and write
54C1000
heap
page read and write
293B75F4000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
20199C40000
heap
page read and write
20181BD5000
trusted library allocation
page read and write
C8686FE000
unkown
page readonly
1BFC442C000
trusted library allocation
page read and write
261D1013000
heap
page read and write
293CF210000
trusted library allocation
page read and write
1BFC44CA000
trusted library allocation
page read and write
293B76A0000
trusted library allocation
page read and write
1DB50FDE000
trusted library allocation
page read and write
293B7798000
trusted library allocation
page read and write
293B75E8000
trusted library allocation
page read and write
1DB51004000
trusted library allocation
page read and write
5370000
heap
page read and write
1BFC458E000
trusted library allocation
page read and write
293B76C8000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page read and write
522D000
heap
page read and write
20181A47000
trusted library allocation
page read and write
1BFC4468000
trusted library allocation
page read and write
1BFC2350000
heap
page read and write
7FFD9B991000
trusted library allocation
page read and write
1BFC249A000
heap
page read and write
E1A12FB000
stack
page read and write
54E2000
heap
page read and write
1DB50F9E000
trusted library allocation
page read and write
1BFC453C000
trusted library allocation
page read and write
293B77DC000
trusted library allocation
page read and write
20B36FD000
stack
page read and write
205CC6EF000
heap
page read and write
293B77A6000
trusted library allocation
page read and write
20181AFA000
trusted library allocation
page read and write
1BFC43B8000
trusted library allocation
page read and write
293B771E000
trusted library allocation
page read and write
1DB5115C000
trusted library allocation
page read and write
5290000
heap
page read and write
1DB4EDB0000
heap
page read and write
293B779C000
trusted library allocation
page read and write
1DB50F86000
trusted library allocation
page read and write
1BFC4580000
trusted library allocation
page read and write
782E000
stack
page read and write
1BFC4554000
trusted library allocation
page read and write
45C000
system
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
1BFC4496000
trusted library allocation
page read and write
20181A2C000
trusted library allocation
page read and write
293B7656000
trusted library allocation
page read and write
293B7718000
trusted library allocation
page read and write
400000
system
page execute and read and write
4D30000
heap
page read and write
293B55B0000
heap
page read and write
1BFC2478000
heap
page read and write
1DB510E4000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1BFDC93A000
heap
page read and write
1BFC4448000
trusted library allocation
page read and write
1DB5109C000
trusted library allocation
page read and write
494BBFF000
stack
page read and write
293B76C2000
trusted library allocation
page read and write
1BFC44AC000
trusted library allocation
page read and write
293B75BE000
trusted library allocation
page read and write
2019A214000
heap
page read and write
293B76A2000
trusted library allocation
page read and write
1BFC4484000
trusted library allocation
page read and write
1DB51156000
trusted library allocation
page read and write
1DB51134000
trusted library allocation
page read and write
1DB5103E000
trusted library allocation
page read and write
205E61D0000
trusted library allocation
page read and write
1BFC4592000
trusted library allocation
page read and write
1BFC4564000
trusted library allocation
page read and write
1DB50F88000
trusted library allocation
page read and write
293B767A000
trusted library allocation
page read and write
293B7630000
trusted library allocation
page read and write
1DB50CBE000
trusted library allocation
page read and write
1DB50FCA000
trusted library allocation
page read and write
5470000
heap
page read and write
1DB51152000
trusted library allocation
page read and write
1BFC446C000
trusted library allocation
page read and write
3E0A2FB000
stack
page read and write
293B77DA000
trusted library allocation
page read and write
20181B93000
trusted library allocation
page read and write
1DB5100C000
trusted library allocation
page read and write
1DB5104C000
trusted library allocation
page read and write
201FF94B000
heap
page read and write
50F3000
stack
page read and write
1BFC4596000
trusted library allocation
page read and write
293B72A1000
trusted library allocation
page read and write
293B75D6000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
200DBC78000
heap
page read and write
1BFC44A2000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
1BFC44C0000
trusted library allocation
page read and write
560E000
stack
page read and write
7FFD9B893000
trusted library allocation
page execute and read and write
205CC802000
heap
page read and write
1DB4EED9000
heap
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
1DB50F9A000
trusted library allocation
page read and write
200DBC78000
heap
page read and write
1BFC44DC000
trusted library allocation
page read and write
293B7776000
trusted library allocation
page read and write
2019A206000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
4EB0000
heap
page read and write
293B7652000
trusted library allocation
page read and write
1DB5114C000
trusted library allocation
page read and write
1BFC459C000
trusted library allocation
page read and write
1DB51154000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1BFC4490000
trusted library allocation
page read and write
20181A7F000
trusted library allocation
page read and write
1BFC43B4000
trusted library allocation
page read and write
20181AD0000
trusted library allocation
page read and write
1BFC43DA000
trusted library allocation
page read and write
7FFD9B891000
trusted library allocation
page execute and read and write
15959FE000
stack
page read and write
293B76E6000
trusted library allocation
page read and write
1DB51020000
trusted library allocation
page read and write
1BFC23C0000
heap
page read and write
1DB510EA000
trusted library allocation
page read and write
20B30FD000
stack
page read and write
293B75E6000
trusted library allocation
page read and write
1DB4ED80000
heap
page read and write
1DB51002000
trusted library allocation
page read and write
293B76E2000
trusted library allocation
page read and write
1BFC454E000
trusted library allocation
page read and write
293B7734000
trusted library allocation
page read and write
1DB5115E000
trusted library allocation
page read and write
1BFD4356000
trusted library allocation
page read and write
4EE0000
heap
page read and write
1DB5108A000
trusted library allocation
page read and write
200DBBC0000
heap
page read and write
201FF820000
heap
page read and write
205CC6EB000
heap
page read and write
1DB51174000
trusted library allocation
page read and write
1BFC439A000
trusted library allocation
page read and write
C8689FE000
stack
page read and write
7FFD9B961000
trusted library allocation
page read and write
293B7604000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BFC2602000
heap
page read and write
293B7704000
trusted library allocation
page read and write
293B771A000
trusted library allocation
page read and write
790F000
stack
page read and write
293B77B6000
trusted library allocation
page read and write
1DB51172000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BFD3FA1000
trusted library allocation
page read and write
15954FD000
stack
page read and write
1DB50FD4000
trusted library allocation
page read and write
1BFC3FA1000
trusted library allocation
page read and write
1DB5116E000
trusted library allocation
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
293B5902000
heap
page read and write
293B7610000
trusted library allocation
page read and write
1DB510E6000
trusted library allocation
page read and write
4F0C000
stack
page read and write
1DB5102C000
trusted library allocation
page read and write
293B774E000
trusted library allocation
page read and write
293B77EC000
trusted library allocation
page read and write
7FFD9B973000
trusted library allocation
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
10016000
direct allocation
page execute and read and write
1BFC44D4000
trusted library allocation
page read and write
1BFC44C2000
trusted library allocation
page read and write
1DB51074000
trusted library allocation
page read and write
1DB51090000
trusted library allocation
page read and write
20181B70000
trusted library allocation
page read and write
293B779E000
trusted library allocation
page read and write
293B774A000
trusted library allocation
page read and write
1BFC4572000
trusted library allocation
page read and write
1BFC4528000
trusted library allocation
page read and write
205CC5D0000
heap
page execute and read and write
20B33FE000
stack
page read and write
1DB50FE2000
trusted library allocation
page read and write
7FFD9B94E000
trusted library allocation
page read and write
1BFC45AC000
trusted library allocation
page read and write
16744462000
heap
page read and write
1BFC2413000
heap
page read and write
293B7634000
trusted library allocation
page read and write
1BFC4522000
trusted library allocation
page read and write
1BFC43E2000
trusted library allocation
page read and write
1BFC4530000
trusted library allocation
page read and write
1BFC4380000
trusted library allocation
page read and write
1DB4EE45000
heap
page read and write
261D1102000
heap
page read and write
1DB50FBA000
trusted library allocation
page read and write
1BFC44E6000
trusted library allocation
page read and write
293B75CA000
trusted library allocation
page read and write
1DB51168000
trusted library allocation
page read and write
1BFC4482000
trusted library allocation
page read and write
76EE000
stack
page read and write
2019A15C000
heap
page read and write
1BFDC900000
heap
page read and write
C868AFE000
unkown
page readonly
980000
heap
page read and write
293B77A8000
trusted library allocation
page read and write
1BFC2420000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
205DE7C4000
trusted library allocation
page read and write
1DB510AA000
trusted library allocation
page read and write
293B564C000
heap
page read and write
2019A164000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
1BFC4422000
trusted library allocation
page read and write
293B77E6000
trusted library allocation
page read and write
4D3C000
stack
page read and write
3E0A0FF000
stack
page read and write
8C0000
heap
page readonly
1DB510E0000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
20181B7B000
trusted library allocation
page read and write
1BFC442E000
trusted library allocation
page read and write
1BFC43DE000
trusted library allocation
page read and write
1DB510EC000
trusted library allocation
page read and write
293B762C000
trusted library allocation
page read and write
1BFC448A000
trusted library allocation
page read and write
293CFA02000
heap
page execute and read and write
1BFC43D2000
trusted library allocation
page read and write
200DC000000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
20B31FE000
stack
page read and write
1BFC44F0000
trusted library allocation
page read and write
7FFD9B968000
trusted library allocation
page read and write
293B56B6000
heap
page read and write
6DE0000
heap
page read and write
1BFC44E0000
trusted library allocation
page read and write
1BFC444A000
trusted library allocation
page read and write
293B55F0000
trusted library allocation
page read and write
293B77E0000
trusted library allocation
page read and write
20181BB2000
trusted library allocation
page read and write
201819AC000
trusted library allocation
page read and write
1DB51098000
trusted library allocation
page read and write
1BFC44CE000
trusted library allocation
page read and write
293B75C0000
trusted library allocation
page read and write
C4E000
stack
page read and write
293B7608000
trusted library allocation
page read and write
200DC113000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
7D2E000
stack
page read and write
293B75EA000
trusted library allocation
page read and write
1BFC3FC6000
trusted library allocation
page read and write
1DB51052000
trusted library allocation
page read and write
1DB5114E000
trusted library allocation
page read and write
293B76CE000
trusted library allocation
page read and write
1BFC43D8000
trusted library allocation
page read and write
1DB51188000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
293B775C000
trusted library allocation
page read and write
7FFD9B768000
trusted library allocation
page read and write
5480000
heap
page read and write
293B77CE000
trusted library allocation
page read and write
1BFC452E000
trusted library allocation
page read and write
200DBC78000
heap
page read and write
38F9FF000
stack
page read and write
205E7010000
heap
page read and write
1DB4EEDD000
heap
page read and write
1DB4F120000
trusted library allocation
page read and write
293B7287000
trusted library allocation
page read and write
20181B5D000
trusted library allocation
page read and write
3E0A7FA000
stack
page read and write
50EF000
stack
page read and write
20181B42000
trusted library allocation
page read and write
201818C1000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
494B9FF000
stack
page read and write
20181A0C000
trusted library allocation
page read and write
1DB50FF8000
trusted library allocation
page read and write
1DB4EE00000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1BFC43AC000
trusted library allocation
page read and write
293B75F2000
trusted library allocation
page read and write
6B20000
heap
page read and write
293B7714000
trusted library allocation
page read and write
1DB51190000
trusted library allocation
page read and write
792E000
stack
page read and write
28D95AF000
stack
page read and write
1BFC44B6000
trusted library allocation
page read and write
1DB51164000
trusted library allocation
page read and write
293B75EE000
trusted library allocation
page read and write
1DB51186000
trusted library allocation
page read and write
1DB510B4000
trusted library allocation
page read and write
7FFD9B926000
trusted library allocation
page read and write
293B55A0000
heap
page read and write
293B7730000
trusted library allocation
page read and write
1BFC441A000
trusted library allocation
page read and write
1DB510D4000
trusted library allocation
page read and write
293B767C000
trusted library allocation
page read and write
200DBD15000
trusted library allocation
page read and write
1BFC43D6000
trusted library allocation
page read and write
7FFD9B982000
trusted library allocation
page read and write
293B7638000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1BFC4382000
trusted library allocation
page read and write
6FDD000
stack
page read and write
1BFC4548000
trusted library allocation
page read and write
1DB511A0000
trusted library allocation
page read and write
293B7664000
trusted library allocation
page read and write
1DB6A53A000
heap
page read and write
293B7742000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
293B75E2000
trusted library allocation
page read and write
293B7694000
trusted library allocation
page read and write
293B7212000
trusted library allocation
page read and write
1DB5110A000
trusted library allocation
page read and write
293B75C2000
trusted library allocation
page read and write
550B000
heap
page read and write
1DB50FF2000
trusted library allocation
page read and write
1BFDD010000
heap
page read and write
1859D000000
heap
page read and write
1DB4EE3F000
heap
page read and write
1BFC2452000
heap
page read and write
8DC587E000
stack
page read and write
1BFC44E8000
trusted library allocation
page read and write
1DB51136000
trusted library allocation
page read and write
293B77AA000
trusted library allocation
page read and write
293C7353000
trusted library allocation
page read and write
1BFC4420000
trusted library allocation
page read and write
1BFC43E6000
trusted library allocation
page read and write
2018199E000
trusted library allocation
page read and write
293B7676000
trusted library allocation
page read and write
4F70000
heap
page read and write
20181A65000
trusted library allocation
page read and write
1BFC450C000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
1BFC441C000
trusted library allocation
page read and write
1BFC44B8000
trusted library allocation
page read and write
7FFD9B94E000
trusted library allocation
page read and write
293B75D4000
trusted library allocation
page read and write
293B773E000
trusted library allocation
page read and write
1DB50FB4000
trusted library allocation
page read and write
293B773C000
trusted library allocation
page read and write
1DB50F8E000
trusted library allocation
page read and write
293B76FE000
trusted library allocation
page read and write
1DB4F100000
heap
page read and write
2019A600000
trusted library section
page read and write
1BFC43A4000
trusted library allocation
page read and write
293B76F8000
trusted library allocation
page read and write
20181985000
trusted library allocation
page read and write
205CE26A000
trusted library allocation
page read and write
1DB511AE000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page read and write
1BFC440A000
trusted library allocation
page read and write
7FFD9B77C000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
There are 1694 hidden memdumps, click here to show them.