IOC Report
a2e1G18mbz.exe

loading gif

Files

File Path
Type
Category
Malicious
a2e1G18mbz.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\System.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abobus.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\a2e1G18mbz.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\B029.tmp\B02A.tmp\B02B.bat
ISO-8859 text, with CRLF, NEL line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ci30rtx.3f3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3qsfmq05.1qj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dfvlri5.h3n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ecuwkaa.0g2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5moraiz2.q3j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agc0sr5w.t4u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_au4qzfr3.035.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cp35hvuu.ujy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cygajdqy.4jh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvbsjgz2.2x3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0jhuem4.030.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i4oqhhcr.1cf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j3jvzqck.sbm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldah0aml.3hu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkyc03eo.uhf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqqrqrxp.jng.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odbewboe.tbz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_op3p5ze5.moi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s24l5coz.5uj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbgstyqj.hgg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_so1veanm.2hx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3ho1q4j.vja.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxqmndja.cby.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0xdtruo.v22.ps1
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\a2e1G18mbz.exe
"C:\Users\user\Desktop\a2e1G18mbz.exe"
malicious
C:\Users\user\AppData\Local\Temp\System.exe
"C:\Users\user\AppData\Local\Temp\System.exe"
malicious
C:\Users\user\AppData\Local\Temp\abobus.exe
"C:\Users\user\AppData\Local\Temp\abobus.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user\AppData\Local\Temp\svchost.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd" /c "C:\Users\user\AppData\Local\Temp\B029.tmp\B02A.tmp\B02B.bat C:\Users\user\AppData\Local\Temp\abobus.exe"
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\System.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\svchost.exe'
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\PING.EXE
ping -n 2 127.0.0.1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\System.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\find.exe
find /i "cs2.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
logo-active.gl.at.ply.gg
malicious
http://crl.micros(y
unknown
http://nuget.org/NuGet.exe
unknown
https://go.microsoft.co
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://osoft.co
unknown
http://go.microsoft.c
unknown
http://go.microsoft.ctain
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.micros
unknown
There are 12 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E92000
unkown
page readonly
malicious
2C61000
trusted library allocation
page read and write
malicious
632000
unkown
page readonly
malicious
24E01E24000
trusted library allocation
page read and write
1E4B5740000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2CE2E332000
trusted library allocation
page read and write
1E4CDE34000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
2810B420000
heap
page read and write
D46E7FE000
stack
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
5A6000
heap
page read and write
888000
unkown
page readonly
258D1C20000
trusted library allocation
page read and write
1AA94E2B000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1E4C5E1F000
trusted library allocation
page read and write
261C4214000
heap
page read and write
1AA94E1D000
heap
page read and write
E48000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
329E000
stack
page read and write
144A000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1AA94E1D000
heap
page read and write
261ABAB9000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
24E75B25000
heap
page read and write
24E77AF6000
heap
page read and write
2811D5C6000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
261AB778000
heap
page read and write
24E01E29000
trusted library allocation
page read and write
24E00087000
trusted library allocation
page read and write
1451000
heap
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
1420000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
24E77970000
heap
page read and write
2810D2D0000
heap
page execute and read and write
2CE1C469000
heap
page read and write
261ACB35000
trusted library allocation
page read and write
C50000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
258D4779000
trusted library allocation
page read and write
1E4B5E7D000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
1AA94DE0000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
6F71B7F000
stack
page read and write
258EBBC8000
heap
page read and write
BDA1DFD000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9BADA000
trusted library allocation
page read and write
ED18DFF000
stack
page read and write
2810B540000
trusted library allocation
page read and write
1E4B77D7000
trusted library allocation
page read and write
D30000
heap
page read and write
ED18CF8000
stack
page read and write
1AA94E19000
heap
page read and write
258EBBAD000
heap
page read and write
1E4CDDB0000
heap
page execute and read and write
258E3811000
trusted library allocation
page read and write
D46E3CE000
stack
page read and write
258D5080000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
C99C27F000
stack
page read and write
EBAD57E000
stack
page read and write
261AB891000
trusted library allocation
page read and write
258D3600000
heap
page read and write
258D3A39000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
261BBB82000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
207645D4000
heap
page read and write
258D1AE2000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2810CF25000
heap
page read and write
258D1C60000
trusted library allocation
page read and write
2810D008000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
258D1B1B000
heap
page read and write
258E3B0C000
trusted library allocation
page read and write
258D4263000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1AA94E2D000
heap
page read and write
1AA94E05000
heap
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
13B0000
heap
page execute and read and write
630000
unkown
page readonly
7FFD9BBB0000
trusted library allocation
page read and write
14CE000
heap
page read and write
2810B468000
heap
page read and write
258D3480000
trusted library allocation
page read and write
6F71AFF000
stack
page read and write
D46E77E000
stack
page read and write
BCEC77C000
stack
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
F75000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
28125650000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2810D508000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
2CE2E041000
trusted library allocation
page read and write
BDA1E76000
stack
page read and write
C99C2FA000
stack
page read and write
C00000
heap
page read and write
261BB8C1000
trusted library allocation
page read and write
132A3000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
24E75AB0000
trusted library allocation
page read and write
2CE364A0000
heap
page read and write
1440000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1E4B5780000
trusted library allocation
page read and write
261AB917000
trusted library allocation
page read and write
1E4B6727000
trusted library allocation
page read and write
BCEBDDE000
stack
page read and write
261A9C20000
heap
page read and write
2812573D000
heap
page read and write
C99C47D000
stack
page read and write
258D4844000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B771000
trusted library allocation
page read and write
1E4CE210000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
24E75930000
heap
page execute and read and write
FA5000
heap
page read and write
BDA1CFE000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
20764540000
heap
page read and write
2CE36740000
heap
page read and write
21F0000
heap
page read and write
142E000
heap
page read and write
1E4C59D1000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
258D3775000
heap
page read and write
ED19A4E000
stack
page read and write
D10000
heap
page read and write
2CE1DFA0000
heap
page execute and read and write
BCED2C7000
stack
page read and write
D46ED7F000
stack
page read and write
24E77BDB000
heap
page read and write
1B250000
heap
page read and write
261AC8C0000
trusted library allocation
page read and write
BBB000
heap
page read and write
BCED44E000
stack
page read and write
7FFD9BADA000
trusted library allocation
page read and write
1AA94E16000
heap
page read and write
7FFD9B902000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
14DB000
heap
page read and write
258D478E000
trusted library allocation
page read and write
1BBCE000
stack
page read and write
24E77A78000
heap
page read and write
2812576C000
heap
page read and write
C99C3F9000
stack
page read and write
800000
unkown
page readonly
7FFD9B912000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
2810B580000
trusted library allocation
page read and write
24E75965000
heap
page read and write
1E4CDE63000
heap
page read and write
1E4B3F65000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1AA94E35000
heap
page read and write
C99D44C000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BB63000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
BDA2C8C000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2CE1C461000
heap
page read and write
24E77909000
heap
page read and write
F60000
heap
page read and write
261BB8B1000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
D46ECF9000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
24E758F0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
2810EBD1000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1130000
heap
page read and write
2CE3686E000
heap
page read and write
281256AE000
heap
page read and write
261C4208000
heap
page read and write
1AA94E05000
heap
page read and write
258E3885000
trusted library allocation
page read and write
6F71BFE000
stack
page read and write
261AD015000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2810D352000
trusted library allocation
page read and write
1E4B671D000
trusted library allocation
page read and write
1E4CDDE8000
heap
page read and write
258D1C40000
trusted library allocation
page read and write
7FFD9B895000
trusted library allocation
page execute and read and write
258D5109000
trusted library allocation
page read and write
BCED24E000
stack
page read and write
24E773DA000
heap
page read and write
2CE1F381000
trusted library allocation
page read and write
2CE1F405000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
261C40FA000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
BDA2C0F000
stack
page read and write
24E759C3000
heap
page read and write
1AA94E1D000
heap
page read and write
1E4B5760000
trusted library allocation
page read and write
1B35E000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1AA94E3A000
heap
page read and write
E83000
trusted library allocation
page read and write
1E4B77B2000
trusted library allocation
page read and write
5AC000
heap
page read and write
1E4B3E6F000
heap
page read and write
1BCCE000
stack
page read and write
258EBBB7000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9BB77000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2810B466000
heap
page read and write
1AA94D10000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2CE1F869000
trusted library allocation
page read and write
143D000
heap
page read and write
1B9CE000
stack
page read and write
24E77B8B000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B954000
trusted library allocation
page read and write
24E77A70000
heap
page read and write
C99C17F000
stack
page read and write
1E4B3D10000
heap
page read and write
7FFD9BB96000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
24E01785000
trusted library allocation
page read and write
D5C000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
24E00F9A000
trusted library allocation
page read and write
2812574E000
heap
page read and write
261AC894000
trusted library allocation
page read and write
1802000
heap
page read and write
24E778B6000
heap
page read and write
1E4CE052000
heap
page read and write
C99D4CE000
stack
page read and write
10AE000
stack
page read and write
630000
unkown
page readonly
ED18EFF000
stack
page read and write
7FFD9B958000
trusted library allocation
page read and write
24E77520000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
20764647000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
258D3811000
trusted library allocation
page read and write
7FFD9BAB4000
trusted library allocation
page read and write
B0A000
heap
page read and write
261A9DF0000
heap
page read and write
2811D2F0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
24E77AB2000
heap
page read and write
261ABD5D000
trusted library allocation
page read and write
261AD6B4000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
24E00001000
trusted library allocation
page read and write
C99C5F9000
stack
page read and write
1220000
heap
page read and write
2CE1F0D3000
trusted library allocation
page read and write
261AD121000
trusted library allocation
page read and write
261C41C9000
heap
page read and write
24E77C1A000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
D46F7CE000
stack
page read and write
28125725000
heap
page read and write
C99C1FE000
stack
page read and write
7FFD9BB86000
trusted library allocation
page read and write
261C4150000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
B0C000
heap
page read and write
2810DEE6000
trusted library allocation
page read and write
258D478A000
trusted library allocation
page read and write
1E4B59B1000
trusted library allocation
page read and write
12823000
trusted library allocation
page read and write
7FFD9BACC000
trusted library allocation
page read and write
C99C4F7000
stack
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
C30B75F000
stack
page read and write
132A1000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
261A9EB5000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7DF44ADE0000
trusted library allocation
page execute and read and write
24E01031000
trusted library allocation
page read and write
1AA94E3C000
heap
page read and write
1E4CE01B000
heap
page read and write
12821000
trusted library allocation
page read and write
1AA94E3D000
heap
page read and write
BDA1F39000
stack
page read and write
BDA1C79000
stack
page read and write
BCEC67E000
stack
page read and write
258D374B000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
1BACF000
stack
page read and write
261C3D53000
heap
page read and write
1B600000
heap
page read and write
1E4C5CA2000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
2CE1F0FF000
trusted library allocation
page read and write
1E4B77D2000
trusted library allocation
page read and write
1E4B5710000
heap
page read and write
1E4B3F10000
heap
page read and write
BCED34E000
stack
page read and write
258D1B56000
heap
page read and write
BDA1B7F000
stack
page read and write
802000
unkown
page readonly
D46E9FD000
stack
page read and write
1E4B3E5D000
heap
page read and write
24E75870000
heap
page read and write
BCEC1FE000
stack
page read and write
32A1000
trusted library allocation
page read and write
132A8000
trusted library allocation
page read and write
258D1B0F000
heap
page read and write
2CE1F044000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
258E3B86000
trusted library allocation
page read and write
258EBF40000
heap
page read and write
D46EBFE000
stack
page read and write
2811D5B1000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
258E3AFE000
trusted library allocation
page read and write
24E77B15000
heap
page read and write
EBAD47E000
stack
page read and write
24E77C11000
heap
page read and write
D46E8FF000
stack
page read and write
1E4B3F60000
heap
page read and write
EBAE54D000
stack
page read and write
1AA94E06000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
E90000
unkown
page readonly
1E4B69B2000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7DF47A740000
trusted library allocation
page execute and read and write
258EBDF3000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
258D48A4000
trusted library allocation
page read and write
2CE1C3F0000
trusted library allocation
page read and write
1E4CDE6C000
heap
page read and write
261AD184000
trusted library allocation
page read and write
24E77990000
heap
page read and write
EBAD8FE000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
1E4C59B1000
trusted library allocation
page read and write
261C4126000
heap
page read and write
24E77C3A000
heap
page read and write
1413000
heap
page read and write
1E4B65B4000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9BA72000
trusted library allocation
page read and write
B21000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
5A0000
heap
page read and write
2810E283000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
24E00C5D000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
2CE36733000
heap
page read and write
2CE1F2E6000
trusted library allocation
page read and write
D80000
heap
page read and write
258D48D0000
trusted library allocation
page read and write
258D1C50000
heap
page readonly
BCEC2FE000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
24E102F3000
trusted library allocation
page read and write
261BB905000
trusted library allocation
page read and write
C99C77E000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
2CE1F8A8000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
2810E310000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FF4F7F90000
trusted library allocation
page execute and read and write
14001F000
unkown
page write copy
7FFD9B990000
trusted library allocation
page read and write
258D4F9A000
trusted library allocation
page read and write
24E004CE000
trusted library allocation
page read and write
2CE1C428000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
24E1044A000
trusted library allocation
page read and write
13A0000
heap
page read and write
261C3DF0000
heap
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
1E4C5CBA000
trusted library allocation
page read and write
C99C87F000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B9A2000
trusted library allocation
page read and write
24E77C70000
trusted library allocation
page read and write
261C3CA0000
heap
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
24E75B20000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7DF47A760000
trusted library allocation
page execute and read and write
261ACA69000
trusted library allocation
page read and write
22E296A9000
heap
page read and write
32AC000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
BCEC37B000
stack
page read and write
2CE1DD40000
trusted library allocation
page read and write
2810B400000
heap
page read and write
ED18C76000
stack
page read and write
2CE1FE67000
trusted library allocation
page read and write
1D4FE000
stack
page read and write
2CE2E33A000
trusted library allocation
page read and write
1E4CE058000
heap
page read and write
C99C7FC000
stack
page read and write
258D3670000
heap
page execute and read and write
261A9F50000
heap
page read and write
2811D5E4000
trusted library allocation
page read and write
261A9EE0000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1E4B5885000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
24E01212000
trusted library allocation
page read and write
24E013C2000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
261AC94F000
trusted library allocation
page read and write
261A9C10000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B954000
trusted library allocation
page read and write
20D0000
heap
page read and write
AE6000
heap
page read and write
2810B5F5000
heap
page read and write
1E4C59E1000
trusted library allocation
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
ED18D79000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2810B3C0000
heap
page read and write
ED18A7F000
stack
page read and write
22E29640000
heap
page read and write
261C40C0000
heap
page read and write
13F0000
heap
page execute and read and write
258E3841000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
2CE363DA000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
258D4B4A000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
CF0000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
C10000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
2810F101000
trusted library allocation
page read and write
D46EDFC000
stack
page read and write
1ADAD000
stack
page read and write
BCEC5FA000
stack
page read and write
13D0000
trusted library allocation
page read and write
261C3D82000
heap
page read and write
1135000
heap
page read and write
7DF473840000
trusted library allocation
page execute and read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
24E01952000
trusted library allocation
page read and write
1AA94E2F000
heap
page read and write
1AA94FC0000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2810B47C000
heap
page read and write
1E4CDEC8000
heap
page read and write
258EBDFC000
heap
page read and write
2CE1E010000
trusted library allocation
page read and write
1E4B3E57000
heap
page read and write
24E01307000
trusted library allocation
page read and write
24E773E1000
heap
page read and write
12C63000
trusted library allocation
page read and write
BDA2038000
stack
page read and write
2CE1F7C3000
trusted library allocation
page read and write
24E75940000
heap
page read and write
24E7597E000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
B10000
heap
page read and write
2810CEB0000
trusted library allocation
page read and write
261C4187000
heap
page read and write
28125773000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1E4B5BD9000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
258D1B19000
heap
page read and write
BCEC578000
stack
page read and write
7FFD9BB60000
trusted library allocation
page read and write
2CE1F162000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
12828000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1E4B6402000
trusted library allocation
page read and write
EBACFCE000
stack
page read and write
EBAE44E000
stack
page read and write
1478000
heap
page read and write
2CE1DDD6000
heap
page read and write
8B46A7C000
stack
page read and write
1E4B7219000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
24E0186A000
trusted library allocation
page read and write
BCEC4F7000
stack
page read and write
24E7794E000
heap
page read and write
28125783000
heap
page read and write
258D34CA000
heap
page read and write
1330000
heap
page read and write
2CE1C4A4000
heap
page read and write
2810D2E1000
trusted library allocation
page read and write
258D5619000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
2CE1F8CF000
trusted library allocation
page read and write
24E0182B000
trusted library allocation
page read and write
24E00D6F000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2CE1C340000
heap
page read and write
7FFD9BB5D000
trusted library allocation
page read and write
1E4B7133000
trusted library allocation
page read and write
24E10031000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2810B560000
trusted library allocation
page read and write
258E385C000
trusted library allocation
page read and write
E7A000
heap
page read and write
1E4CDF00000
heap
page read and write
24E778F4000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
140018000
unkown
page readonly
7FFD9B9F0000
trusted library allocation
page read and write
2810D270000
trusted library allocation
page read and write
2CE1F990000
trusted library allocation
page read and write
1E4B3E18000
heap
page read and write
BDA1D79000
stack
page read and write
7FFD9BAC8000
trusted library allocation
page read and write
2CE1C47B000
heap
page read and write
258D5167000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
24E77AE6000
heap
page read and write
258D441F000
trusted library allocation
page read and write
261C3E39000
heap
page read and write
261C411E000
heap
page read and write
258D1A80000
heap
page read and write
24E75988000
heap
page read and write
7FFD9BB7E000
trusted library allocation
page read and write
2810CFCA000
heap
page read and write
1AA94E35000
heap
page read and write
520000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
D46F94C000
stack
page read and write
2CE2E34A000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
BCEC3FE000
stack
page read and write
22E296A7000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
C55000
heap
page read and write
2811D5CC000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1B71E000
stack
page read and write
281259E0000
heap
page read and write
2CE36474000
heap
page read and write
2CE1EFE1000
trusted library allocation
page read and write
261A9C61000
heap
page read and write
258EBCB2000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
24E00233000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
2CE1E000000
heap
page execute and read and write
2CE1DDC0000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BBC6000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1B6C0000
heap
page execute and read and write
261A9C5C000
heap
page read and write
EBAE5CE000
stack
page read and write
1E4B6CB5000
trusted library allocation
page read and write
7D0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
ED19B4C000
stack
page read and write
14C000
stack
page read and write
1E4C5A22000
trusted library allocation
page read and write
DC2000
heap
page read and write
2CE1C3B0000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1E4B5840000
heap
page read and write
24E00F71000
trusted library allocation
page read and write
2810E285000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
9C4000
stack
page read and write
2811D34D000
trusted library allocation
page read and write
261C3CA7000
heap
page execute and read and write
1BF9E000
stack
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
C99BDCE000
stack
page read and write
7FFD9BA5F000
trusted library allocation
page read and write
24E00FA2000
trusted library allocation
page read and write
1502000
heap
page read and write
258D1C10000
trusted library section
page read and write
EBAD37F000
stack
page read and write
24E77A8C000
heap
page read and write
1492000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
EBAD6F8000
stack
page read and write
1BC02000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
24E01123000
trusted library allocation
page read and write
2CE2E061000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
261A9C67000
heap
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
24E758B0000
heap
page read and write
2810D075000
heap
page read and write
8B46AFF000
stack
page read and write
1AA94E30000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1E4B6B87000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
258D1CA5000
heap
page read and write
B50000
heap
page read and write
2811D301000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
1E4CE0B0000
heap
page read and write
2CE1C260000
heap
page read and write
2CE3675D000
heap
page read and write
140000000
unkown
page readonly
261C3D6E000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7DF487C60000
trusted library allocation
page execute and read and write
1AA94FC4000
heap
page read and write
2812566B000
heap
page read and write
1400000
heap
page read and write
258D5639000
trusted library allocation
page read and write
261C3E28000
heap
page read and write
2810B5B0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BAC2000
trusted library allocation
page read and write
1AA94C30000
heap
page read and write
1447000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1AA94E35000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1AA94E3C000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1A0000
heap
page read and write
24E10497000
trusted library allocation
page read and write
258EBDCE000
heap
page read and write
261AC9B2000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
2CE1C370000
heap
page read and write
D46E879000
stack
page read and write
FA0000
heap
page read and write
BCEC6FE000
stack
page read and write
261C3D9F000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
261C4108000
heap
page read and write
7DF487C50000
trusted library allocation
page execute and read and write
24E77B0B000
heap
page read and write
2810E2E4000
trusted library allocation
page read and write
BCED3CD000
stack
page read and write
1E4CDEAF000
heap
page read and write
2CE1F349000
trusted library allocation
page read and write
1E4B72A2000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
2810E254000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
258D3CDD000
trusted library allocation
page read and write
28125787000
heap
page read and write
781000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
2CE1C45D000
heap
page read and write
258E3831000
trusted library allocation
page read and write
2810D00F000
heap
page read and write
E70000
trusted library allocation
page read and write
1E4B3E30000
heap
page read and write
2810CF89000
heap
page read and write
258D4785000
trusted library allocation
page read and write
6F71CFF000
stack
page read and write
AE0000
heap
page read and write
2CE1DCC0000
heap
page readonly
7FFD9B773000
trusted library allocation
page read and write
1433000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
14F2000
heap
page read and write
20764460000
heap
page read and write
DF4000
heap
page read and write
2810E060000
trusted library allocation
page read and write
7DF4E7F30000
trusted library allocation
page execute and read and write
20764560000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
BDA223B000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
C99C67B000
stack
page read and write
7FFD9B952000
trusted library allocation
page read and write
BDA2E8E000
stack
page read and write
2CE1C467000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
261AC82F000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2810D0F0000
heap
page read and write
2810CF00000
heap
page execute and read and write
6F71A7B000
stack
page read and write
D46E673000
stack
page read and write
2CE1F3C5000
trusted library allocation
page read and write
2810E585000
trusted library allocation
page read and write
7DF4C73C0000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
ED1887E000
stack
page read and write
261C4219000
heap
page read and write
22E296AC000
heap
page read and write
1E4B3E97000
heap
page read and write
D46F84C000
stack
page read and write
258D1B2D000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
EBAE34E000
stack
page read and write
EBACF83000
stack
page read and write
1AA94E18000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
2810B428000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
13C0000
heap
page read and write
24E1046A000
trusted library allocation
page read and write
140001000
unkown
page execute read
258D36C7000
heap
page read and write
857000
unkown
page readonly
7FFD9BB80000
trusted library allocation
page read and write
BDA21BE000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
258D4BD3000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
140018000
unkown
page readonly
7FFD9BAA3000
trusted library allocation
page read and write
2CE1DD00000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
22E29660000
heap
page read and write
2810E4B9000
trusted library allocation
page read and write
1E4CDE37000
heap
page read and write
F00000
heap
page execute and read and write
261AC2E2000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
24E75AD0000
heap
page execute and read and write
24E773B0000
heap
page execute and read and write
C99C37F000
stack
page read and write
2CE36841000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BBEF000
trusted library allocation
page read and write
258D3747000
heap
page read and write
2811D54C000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
2810E402000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2810F0E1000
trusted library allocation
page read and write
1320000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
ED199CC000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
24E011D9000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
261AC831000
trusted library allocation
page read and write
258D49E9000
trusted library allocation
page read and write
2810CF80000
heap
page read and write
2CE1E268000
trusted library allocation
page read and write
ED18593000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1E4B69DE000
trusted library allocation
page read and write
24E102F1000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
261BBB8C000
trusted library allocation
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
12C68000
trusted library allocation
page read and write
258EBDBD000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
C99C0FE000
stack
page read and write
2CE1E041000
trusted library allocation
page read and write
2810B2C0000
heap
page read and write
2810E5E6000
trusted library allocation
page read and write
261A9E90000
trusted library allocation
page read and write
2CE1C380000
heap
page read and write
1E4B6C54000
trusted library allocation
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1AA94E2D000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
2810E6A3000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
2810F106000
trusted library allocation
page read and write
24E773D0000
heap
page read and write
261A9C5F000
heap
page read and write
1BECE000
stack
page read and write
1AA94E16000
heap
page read and write
258D36E6000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1E4B6949000
trusted library allocation
page read and write
258D4411000
trusted library allocation
page read and write
24E75920000
heap
page readonly
7FFD9B980000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
258D3683000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BAC2000
trusted library allocation
page read and write
261AD0FB000
trusted library allocation
page read and write
1E4B681F000
trusted library allocation
page read and write
2810D016000
heap
page read and write
1E4CE004000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2CE3688E000
heap
page read and write
261AD66F000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
140022000
unkown
page readonly
261C3DC0000
heap
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
258D374F000
heap
page read and write
24E77919000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
2811D2E1000
trusted library allocation
page read and write
258D1CA0000
heap
page read and write
24E778A6000
heap
page read and write
D46F8CE000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
ED18B7E000
stack
page read and write
261BBB9C000
trusted library allocation
page read and write
1AA94FCA000
heap
page read and write
2CE1EA93000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
261C3F10000
trusted library allocation
page read and write
1E4B59A0000
heap
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2CE2E071000
trusted library allocation
page read and write
1AA94E37000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
261AB700000
trusted library allocation
page read and write
7FFD9BAB9000
trusted library allocation
page read and write
261AD6B9000
trusted library allocation
page read and write
1429000
heap
page read and write
2821000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
258D3680000
heap
page read and write
258EBDB2000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
EA0000
heap
page execute and read and write
C99D34E000
stack
page read and write
ED1994E000
stack
page read and write
BCEC4FE000
stack
page read and write
BDA1A73000
stack
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
140000000
unkown
page readonly
7FFD9BB6A000
trusted library allocation
page read and write
261AB880000
heap
page read and write
13D3000
trusted library allocation
page read and write
20764640000
heap
page read and write
EBAE3CD000
stack
page read and write
258D1AD0000
heap
page read and write
C99D2CE000
stack
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
D46FACE000
stack
page read and write
D46EB7F000
stack
page read and write
EBAD97B000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
1E4C5CAA000
trusted library allocation
page read and write
2A60000
heap
page read and write
24E77DE0000
heap
page read and write
1AA94E31000
heap
page read and write
261A9CA5000
heap
page read and write
2CE367C4000
heap
page read and write
1B7FE000
stack
page read and write
2810EC30000
trusted library allocation
page read and write
2CE367F3000
heap
page read and write
BCEC479000
stack
page read and write
7FFD9B92A000
trusted library allocation
page read and write
2812569E000
heap
page read and write
258EBEA0000
trusted library allocation
page read and write
1AA94E32000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
258D3898000
trusted library allocation
page read and write
24E75910000
trusted library allocation
page read and write
1E4CE14D000
heap
page read and write
D46EAF6000
stack
page read and write
261A9C6D000
heap
page read and write
E80000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1E4CE13C000
heap
page read and write
1902000
heap
page read and write
261BB891000
trusted library allocation
page read and write
FE1000
stack
page read and write
590000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9BAC9000
trusted library allocation
page read and write
ED18AFB000
stack
page read and write
24E75A32000
heap
page read and write
7FFD9BBC7000
trusted library allocation
page read and write
261C3CB0000
heap
page read and write
281F000
stack
page read and write
2CE1F37C000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1E4B5897000
heap
page read and write
1E4B6D71000
trusted library allocation
page read and write
10D0000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
28125620000
heap
page read and write
EBAD87E000
stack
page read and write
24E01891000
trusted library allocation
page read and write
800000
unkown
page readonly
22E296A0000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9BA80000
trusted library allocation
page read and write
2CE36730000
heap
page read and write
2CE36424000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
EBAD676000
stack
page read and write
28125785000
heap
page read and write
2CE3647B000
heap
page read and write
7FFD9BACA000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1B7D0000
heap
page read and write
C99D4CC000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
BDA2E0D000
stack
page read and write
7FFD9B902000
trusted library allocation
page read and write
24E7597C000
heap
page read and write
7FFD9B902000
trusted library allocation
page read and write
C30B7DF000
stack
page read and write
2CE1E007000
heap
page execute and read and write
D46EA79000
stack
page read and write
258D50A6000
trusted library allocation
page read and write
2CE36720000
heap
page read and write
1E4B57B0000
trusted library allocation
page read and write
261C40DD000
heap
page read and write
24E77BF1000
heap
page read and write
1E4B6A6D000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
258D3677000
heap
page execute and read and write
24E75850000
heap
page read and write
C99C8FB000
stack
page read and write
1E4B3E4F000
heap
page read and write
1E4CE0AE000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
14B2000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9BB6C000
trusted library allocation
page read and write
24E7790F000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
258D373B000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
258D19A0000
heap
page read and write
261C41A4000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
24E77A84000
heap
page read and write
2810B4A4000
heap
page read and write
258D1B54000
heap
page read and write
281256EE000
heap
page read and write
258E3844000
trusted library allocation
page read and write
2810D130000
heap
page read and write
261AD694000
trusted library allocation
page read and write
1E4CDDE0000
heap
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
1E4CDE8E000
heap
page read and write
1BDCB000
stack
page read and write
24E77A7C000
heap
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
BAD000
heap
page read and write
1B1EC000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2076464B000
heap
page read and write
7FFD9BA93000
trusted library allocation
page read and write
BCEC073000
stack
page read and write
258EBE05000
heap
page read and write
C30B6DC000
stack
page read and write
2CE36736000
heap
page read and write
2810EB6E000
trusted library allocation
page read and write
2CE1FE42000
trusted library allocation
page read and write
7FFD9BBB7000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
D46E6FE000
stack
page read and write
2CE2E0B3000
trusted library allocation
page read and write
24E77C29000
heap
page read and write
ED1897E000
stack
page read and write
2810EB48000
trusted library allocation
page read and write
ED19AC7000
stack
page read and write
258D4409000
trusted library allocation
page read and write
1E4B6CE9000
trusted library allocation
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1E4B730D000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1E4B778D000
trusted library allocation
page read and write
DAD000
heap
page read and write
24E00A53000
trusted library allocation
page read and write
7FFD9BBBD000
trusted library allocation
page read and write
1AA94E0B000
heap
page read and write
D46FA4D000
stack
page read and write
ED18F7C000
stack
page read and write
2CE1F21B000
trusted library allocation
page read and write
261ACC51000
trusted library allocation
page read and write
EBAD7FE000
stack
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
2810B45C000
heap
page read and write
1E4C5CA0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
258EBC80000
heap
page read and write
7DF4C73B0000
trusted library allocation
page execute and read and write
7FFD9BAC8000
trusted library allocation
page read and write
20D4000
heap
page read and write
1437000
heap
page read and write
7FFD9BAC5000
trusted library allocation
page read and write
22E29690000
heap
page read and write
261A9EB0000
heap
page read and write
1AA94DE8000
heap
page read and write
24E01DDE000
trusted library allocation
page read and write
7DF44ADF0000
trusted library allocation
page execute and read and write
BDA1FBB000
stack
page read and write
281256D0000
heap
page read and write
2CE3645B000
heap
page read and write
BCEC0FF000
stack
page read and write
EBAD2FF000
stack
page read and write
261BBB7E000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1E4CDDD0000
heap
page execute and read and write
1E4B5A37000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
F7E000
stack
page read and write
BDA2D87000
stack
page read and write
14001F000
unkown
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1B7CD000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
258E3B04000
trusted library allocation
page read and write
261C3D00000
heap
page read and write
2810E373000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
2810F0BC000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
2810E39F000
trusted library allocation
page read and write
1E4CDDD7000
heap
page execute and read and write
2CE363A8000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B885000
trusted library allocation
page execute and read and write
1E4B6761000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
1AA94D30000
heap
page read and write
2810CFE9000
heap
page read and write
22E29695000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
2810B5F0000
heap
page read and write
7FFD9B948000
trusted library allocation
page read and write
24E75AD7000
heap
page execute and read and write
282C000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
EBAD3FA000
stack
page read and write
1E4B723F000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
24E77BEB000
heap
page read and write
1E4C5C9B000
trusted library allocation
page read and write
24E778FE000
heap
page read and write
24E010C0000
trusted library allocation
page read and write
261A9F20000
heap
page execute and read and write
123F000
stack
page read and write
258D3743000
heap
page read and write
258D4775000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
BDA213E000
stack
page read and write
7FFD9BB9F000
trusted library allocation
page read and write
258D373F000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1E4CE220000
trusted library allocation
page read and write
24E00DB4000
trusted library allocation
page read and write
1E4CE130000
heap
page read and write
2811D5CA000
trusted library allocation
page read and write
24E01094000
trusted library allocation
page read and write
EBAE4C9000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
24E77AD4000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
258D3724000
heap
page read and write
7FFD9BA93000
trusted library allocation
page read and write
1E4B57F0000
trusted library allocation
page read and write
24E77870000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
BCEC87B000
stack
page read and write
886000
unkown
page readonly
BDA2D0E000
stack
page read and write
2CE36884000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
258D4AB5000
trusted library allocation
page read and write
2810B570000
heap
page readonly
7FFD9B952000
trusted library allocation
page read and write
7DF47A750000
trusted library allocation
page execute and read and write
BCEC17F000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
BDA20BE000
stack
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
258EBD5B000
heap
page read and write
261C41E2000
heap
page read and write
258D1B59000
heap
page read and write
2CE1C420000
heap
page read and write
EBAD4F7000
stack
page read and write
D86000
heap
page read and write
B4B000
heap
page read and write
1AA94E2D000
heap
page read and write
24E10001000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
E90000
unkown
page readonly
7FFD9BBC6000
trusted library allocation
page read and write
1E4B3DF0000
heap
page read and write
2CE36895000
heap
page read and write
2CE1EFDB000
trusted library allocation
page read and write
1E4B3E10000
heap
page read and write
BCEC7FE000
stack
page read and write
22E29630000
heap
page read and write
261A9E50000
heap
page read and write
ED18BF9000
stack
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2CE1C410000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
2810DD31000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
2B6E000
stack
page read and write
C99C073000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1AA94E3C000
heap
page read and write
ED185DE000
stack
page read and write
261AD1E3000
trusted library allocation
page read and write
24E012A6000
trusted library allocation
page read and write
EBAD5F9000
stack
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
24E75A70000
trusted library allocation
page read and write
4E0000
heap
page read and write
1E4B6AD0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
24E778E4000
heap
page read and write
258D477D000
trusted library allocation
page read and write
258D3605000
heap
page read and write
24E77C3E000
heap
page read and write
24E75770000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1E4B6A41000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
24E75984000
heap
page read and write
258EBCCE000
heap
page read and write
24E1006C000
trusted library allocation
page read and write
EBAD27F000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1AA94E2D000
heap
page read and write
207645D0000
heap
page read and write
BDA1BFE000
stack
page read and write
F70000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
258D4B16000
trusted library allocation
page read and write
1E4B5770000
heap
page readonly
2810DFEC000
trusted library allocation
page read and write
24E01E04000
trusted library allocation
page read and write
EBAD779000
stack
page read and write
7FFD9B9C1000
trusted library allocation
page read and write
190000
heap
page read and write
24E773D5000
heap
page read and write
258D4932000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
D46E977000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
2C50000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
2CE1FE62000
trusted library allocation
page read and write
7FFD9BB96000
trusted library allocation
page read and write
BCEC27A000
stack
page read and write
D46F9CD000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
12C61000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B948000
trusted library allocation
page read and write
258D3800000
heap
page read and write
1E4B5880000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1AA94E16000
heap
page read and write
2811D311000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1445000
heap
page read and write
24E7599C000
heap
page read and write
8B46B7F000
stack
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
BA2000
heap
page read and write
1E4B7301000
trusted library allocation
page read and write
24E75982000
heap
page read and write
1E4CE10E000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1E4B3E51000
heap
page read and write
1E4CE091000
heap
page read and write
2CE363BD000
heap
page read and write
24E102E9000
trusted library allocation
page read and write
24E0022A000
trusted library allocation
page read and write
ED18E7F000
stack
page read and write
7FFD9B942000
trusted library allocation
page read and write
ED19BCD000
stack
page read and write
24E10021000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1E4CE022000
heap
page read and write
258D4781000
trusted library allocation
page read and write
1AA94E3E000
heap
page read and write
258D1B0D000
heap
page read and write
2810D110000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
DF0000
heap
page read and write
2CE1E50D000
trusted library allocation
page read and write
2810D691000
trusted library allocation
page read and write
7DF4E7F40000
trusted library allocation
page execute and read and write
D46EC78000
stack
page read and write
24E77B69000
heap
page read and write
1D202000
heap
page read and write
2CE1DDC5000
heap
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
24E759C5000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
24E759C8000
heap
page read and write
1E4B3E9A000
heap
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
2CE1DCD0000
trusted library allocation
page read and write
2810CF20000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2CE1C3D0000
trusted library section
page read and write
B14000
heap
page read and write
261AC9ED000
trusted library allocation
page read and write
C99D3C7000
stack
page read and write
24E102E5000
trusted library allocation
page read and write
261C40B0000
heap
page read and write
2CE1DEE0000
heap
page read and write
7FFD9BA31000
trusted library allocation
page read and write
261A9E10000
heap
page read and write
1D213000
heap
page read and write
2CE1C3E0000
trusted library section
page read and write
C99C577000
stack
page read and write
261A9C7D000
heap
page read and write
258D496D000
trusted library allocation
page read and write
261ACB96000
trusted library allocation
page read and write
7FFD9BAB4000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
261A9C6B000
heap
page read and write
24E77A88000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
DB7000
heap
page read and write
258EBB50000
heap
page execute and read and write
7FFD9BAD2000
trusted library allocation
page read and write
ED19C4E000
stack
page read and write
B4D000
heap
page read and write
6F71C7E000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
261C41BC000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
C99C6FE000
stack
page read and write
24E77C1D000
heap
page read and write
258D1AA0000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BA62000
trusted library allocation
page read and write
2CE2E32C000
trusted library allocation
page read and write
2CE2E330000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
2810EA62000
trusted library allocation
page read and write
B1F000
heap
page read and write
2810CFA0000
heap
page read and write
2CE1F070000
trusted library allocation
page read and write
258E3B1C000
trusted library allocation
page read and write
7FFD9BACC000
trusted library allocation
page read and write
1D0FE000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
2CE36822000
heap
page read and write
258D1BE0000
heap
page read and write
2280000
heap
page read and write
2CE1E0C1000
trusted library allocation
page read and write
2CE3640D000
heap
page read and write
1AA94E3C000
heap
page read and write
140022000
unkown
page readonly
261A9F55000
heap
page read and write
24E00BFD000
trusted library allocation
page read and write
2810D7AD000
trusted library allocation
page read and write
ED189FA000
stack
page read and write
20D6000
heap
page read and write
2CE1C45A000
heap
page read and write
D8C000
heap
page read and write
7FFD9B895000
trusted library allocation
page execute and read and write
2810B3A0000
heap
page read and write
7FFD9B958000
trusted library allocation
page read and write
261BBB84000
trusted library allocation
page read and write
7FFD9BADA000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BBE8000
trusted library allocation
page read and write
2810B43E000
heap
page read and write
258D371C000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
24E77904000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
258D55F4000
trusted library allocation
page read and write
261C3D20000
heap
page read and write
1AA94E0B000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
24E77B44000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
BDA1AFE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BBB6000
trusted library allocation
page read and write
B9E000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
24E00FA0000
trusted library allocation
page read and write
261A9EC0000
trusted library allocation
page read and write
2CE1C375000
heap
page read and write
261C3D2E000
heap
page read and write
BDA1EBE000
stack
page read and write
258EBE1D000
heap
page read and write
261A9CA8000
heap
page read and write
1E4CDE5D000
heap
page read and write
24E77894000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
261C3E10000
heap
page read and write
258EBBA0000
heap
page read and write
2810B4A9000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
1443000
heap
page read and write
7FFD9BBBD000
trusted library allocation
page read and write
258D563E000
trusted library allocation
page read and write
24E01005000
trusted library allocation
page read and write
261AC923000
trusted library allocation
page read and write
AEC000
heap
page read and write
1C0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
258D440F000
trusted library allocation
page read and write
258D1C70000
heap
page execute and read and write
2CE1EE27000
trusted library allocation
page read and write
2CE1FE1D000
trusted library allocation
page read and write
BE0000
heap
page read and write
1E4B694F000
trusted library allocation
page read and write
258D1C00000
trusted library section
page read and write
7FFD9B980000
trusted library allocation
page read and write
261AC673000
trusted library allocation
page read and write
24E75948000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2810CF96000
heap
page read and write
261A9ED0000
heap
page readonly
140001000
unkown
page execute read
258E3B02000
trusted library allocation
page read and write
ED188FE000
stack
page read and write
DC5000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2811D5D4000
trusted library allocation
page read and write
1240000
heap
page read and write
2CE36380000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1E4CDFF0000
heap
page read and write
2CE1E030000
heap
page execute and read and write
1B4FE000
stack
page read and write
258D1AD8000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1AA94E3C000
heap
page read and write
2810CDA6000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1E4B3EF1000
heap
page read and write
7DF473830000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
261AB730000
trusted library allocation
page read and write
24E10303000
trusted library allocation
page read and write
2810CF06000
heap
page execute and read and write
2810D210000
heap
page execute and read and write
7FFD9BB00000
trusted library allocation
page read and write
24E77A74000
heap
page read and write
There are 1437 hidden memdumps, click here to show them.