IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Z914UZ05TWILZJPY6FFQ8Q.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\config
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Users\user\AppData\Local\Temp\Z914UZ05TWILZJPY6FFQ8Q.exe
"C:\Users\user\AppData\Local\Temp\Z914UZ05TWILZJPY6FFQ8Q.exe"
malicious
C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
"C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
"C:\Users\Public\AccountPictures\(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 412
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 412

URLs

Name
IP
Malicious
http://195.2.70.38:30001/api/helper-first-register?buildVersion=05DI.JAU2w9y&md5=a64beab5d4516beca4c40b25dc0c1cd8&proxyPassword=9oMhAjNv&proxyUsername=1s8zDjlU&userId=MmYpaDvQrUoakoZku4BqsBUP
195.2.70.38
malicious
bordersoarmanusjuw.shop
malicious
mealplayerpreceodsju.shop
malicious
absentconvicsjawun.shop
malicious
pushjellysingeywus.shop
malicious
stripmarrystresew.shop
malicious
economicscreateojsu.shop
malicious
wifeplasterbakewis.shop
malicious
suitcaseacanehalk.shop
malicious
entitlementappwo.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://newvideo.link:443/temp/imgdrive_2.1.4_2.exe
unknown
https://stripmarrystresew.shop:443/api
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://stripmarrystresew.shop/h
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://management.core.usgovcloudapi.netGODEBUG
unknown
https://stripmarrystresew.shop/apito
unknown
https://stripmarrystresew.shop/apiN
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://picsum.photos/500/500%02x:%02x:%02x:%02x:%02x:%02x
unknown
https://stripmarrystresew.shop/
unknown
https://newvideo.link/temp/imgdrive_2.1.4_2.exe
216.10.247.145
https://stripmarrystresew.shop/api:
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://stripmarrystresew.shop/apiG
unknown
http://195.2.70.38:30001/api/helper-first-register?
unknown
http://195.2.70.38:30001/api/helper-first-register?abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVW
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://stripmarrystresew.shop/9
unknown
https://picsum.photos/208/500
unknown
https://management.core.chinacloudapi.cnchacha20poly1305:
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://www.principalproductize.biz/targetPronoun
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://login.microsoftonline.us/scalar
unknown
https://management.chinacloudapi.cnP224
unknown
https://stripmarrystresew.shop/--
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://login.chinacloudapi.cn/crypto/aes:
unknown
https://login.microsoftonline.com/crypto/rc4:
unknown
http://crl.microsoft.c
unknown
https://management.azure.cominvalid
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://stripmarrystresew.shop/api
104.21.15.37
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stripmarrystresew.shop
104.21.15.37
malicious
newvideo.link
216.10.247.145

IPs

IP
Domain
Country
Malicious
104.21.15.37
stripmarrystresew.shop
United States
malicious
195.2.70.38
unknown
Russian Federation
malicious
178.20.42.152
unknown
Russian Federation
malicious
216.10.247.145
newvideo.link
India

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
(29e57e917fdba537d4d31a6f12a1a9bc)Z914UZ05TWILZJPY6FFQ8Q.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
27B6C300000
direct allocation
page read and write
malicious
1A95F8C0000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
350C000
heap
page read and write
27B46FB4000
direct allocation
page read and write
7FF6FD997000
unkown
page write copy
27B47000000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000070000
direct allocation
page read and write
C000046000
direct allocation
page read and write
34FB000
heap
page read and write
C00013C000
direct allocation
page read and write
56D9000
trusted library allocation
page read and write
C00E000
direct allocation
page read and write
3533000
heap
page read and write
C00007C000
direct allocation
page read and write
C0001E4000
direct allocation
page read and write
C0001E2000
direct allocation
page read and write
C000047000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C000086000
direct allocation
page read and write
27B46D20000
heap
page read and write
350B000
heap
page read and write
3536000
heap
page read and write
C032000
direct allocation
page read and write
C000400000
direct allocation
page read and write
56DE000
trusted library allocation
page read and write
353A000
heap
page read and write
C03E000
direct allocation
page read and write
7FF623137000
unkown
page readonly
1A95FFC0000
direct allocation
page read and write
350D000
heap
page read and write
C000088000
direct allocation
page read and write
1F9F63A6000
direct allocation
page read and write
7FF6FD5E4000
unkown
page write copy
C000100000
direct allocation
page read and write
C070000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C128000
direct allocation
page read and write
C00017E000
direct allocation
page read and write
5A60000
trusted library allocation
page read and write
35B7000
remote allocation
page execute and read and write
59C7000
trusted library allocation
page read and write
C0001AA000
direct allocation
page read and write
C0001DC000
direct allocation
page read and write
C000064000
direct allocation
page read and write
3535000
heap
page read and write
56C2000
trusted library allocation
page read and write
34DA000
heap
page read and write
56DF000
trusted library allocation
page read and write
C00003D000
direct allocation
page read and write
21A7EEF0000
direct allocation
page read and write
353A000
heap
page read and write
C00030F000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
350F000
heap
page read and write
56F7000
trusted library allocation
page read and write
34DA000
heap
page read and write
56F9000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
C00045A000
direct allocation
page read and write
C000118000
direct allocation
page read and write
56E9000
trusted library allocation
page read and write
C00000A000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
C018000
direct allocation
page read and write
34FD000
heap
page read and write
C0000B6000
direct allocation
page read and write
C000136000
direct allocation
page read and write
5741000
trusted library allocation
page read and write
C000052000
direct allocation
page read and write
C00E000
direct allocation
page read and write
C00019B000
direct allocation
page read and write
34F7000
heap
page read and write
365E000
stack
page read and write
C00005D000
direct allocation
page read and write
1F9F5520000
direct allocation
page read and write
34FF000
heap
page read and write
C000064000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
353A000
heap
page read and write
C02E000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
C196000
direct allocation
page read and write
375E000
stack
page read and write
BDDE000
stack
page read and write
C000132000
direct allocation
page read and write
7FF6FD95C000
unkown
page read and write
5A61000
trusted library allocation
page read and write
C0000B2000
direct allocation
page read and write
5B07000
trusted library allocation
page read and write
C000050000
direct allocation
page read and write
378C000
direct allocation
page read and write
C000E6A000
direct allocation
page read and write
7FF7F8285000
unkown
page write copy
C00011C000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
353D000
heap
page read and write
BE7F000
stack
page read and write
3535000
heap
page read and write
BF1E000
stack
page read and write
34F6000
heap
page read and write
860D7FD000
stack
page read and write
C000076000
direct allocation
page read and write
5A72000
trusted library allocation
page read and write
3533000
heap
page read and write
7FF623717000
unkown
page write copy
2EDB000
stack
page read and write
5C11000
trusted library allocation
page read and write
C000400000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
C0023AC000
direct allocation
page read and write
350E000
heap
page read and write
BC5000
heap
page read and write
3621000
direct allocation
page read and write
34FB000
heap
page read and write
C000156000
direct allocation
page read and write
59C7000
trusted library allocation
page read and write
C0000D6000
direct allocation
page read and write
3535000
heap
page read and write
C0000D6000
direct allocation
page read and write
59C1000
trusted library allocation
page read and write
C0001DE000
direct allocation
page read and write
3535000
heap
page read and write
3508000
heap
page read and write
C000307000
direct allocation
page read and write
570D000
trusted library allocation
page read and write
C02C000
direct allocation
page read and write
3482000
heap
page read and write
C0001A2000
direct allocation
page read and write
BC0000
direct allocation
page read and write
C00112D000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C000172000
direct allocation
page read and write
3533000
heap
page read and write
C000066000
direct allocation
page read and write
7FF6FD639000
unkown
page readonly
C00001E000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
7FF623137000
unkown
page readonly
C0001DA000
direct allocation
page read and write
BF9E000
stack
page read and write
ABB000
heap
page read and write
27B6C34A000
direct allocation
page read and write
3508000
heap
page read and write
3502000
heap
page read and write
C000024000
direct allocation
page read and write
3510000
heap
page read and write
3538000
heap
page read and write
27B6C1B0000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
34EF000
heap
page read and write
7FF622737000
unkown
page readonly
75D000
stack
page read and write
C000462000
direct allocation
page read and write
C001BA5000
direct allocation
page read and write
34FF000
heap
page read and write
56C1000
trusted library allocation
page read and write
C000084000
direct allocation
page read and write
353C000
heap
page read and write
C00047C000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
56E6000
trusted library allocation
page read and write
3508000
heap
page read and write
C07E000
direct allocation
page read and write
27B46FE0000
direct allocation
page read and write
6581FD000
stack
page read and write
56D9000
trusted library allocation
page read and write
34FD000
heap
page read and write
C000400000
direct allocation
page read and write
C008000
direct allocation
page read and write
C0001E4000
direct allocation
page read and write
59CD000
trusted library allocation
page read and write
C06E000
direct allocation
page read and write
C001BA7000
direct allocation
page read and write
56ED000
trusted library allocation
page read and write
C000510000
direct allocation
page read and write
C002000
direct allocation
page read and write
C000480000
direct allocation
page read and write
57D2000
trusted library allocation
page read and write
C001D00000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C00006C000
direct allocation
page read and write
BCDE000
stack
page read and write
C30000
heap
page read and write
3501000
heap
page read and write
34FD000
heap
page read and write
34FA000
heap
page read and write
C000580000
direct allocation
page read and write
860DFFF000
stack
page read and write
27B46FD0000
direct allocation
page read and write
3490000
heap
page read and write
C000020000
direct allocation
page read and write
6575FD000
stack
page read and write
E30000
heap
page read and write
C000140000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
C0001DE000
direct allocation
page read and write
C002000000
direct allocation
page read and write
756E9FE000
stack
page read and write
5721000
trusted library allocation
page read and write
C018000
direct allocation
page read and write
C000466000
direct allocation
page read and write
C003846000
direct allocation
page read and write
6111000
trusted library allocation
page read and write
C001110000
direct allocation
page read and write
C000E00000
direct allocation
page read and write
7FF6FD994000
unkown
page write copy
3535000
heap
page read and write
34FF000
heap
page read and write
C00000A000
direct allocation
page read and write
56F1000
trusted library allocation
page read and write
59C2000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
C00011A000
direct allocation
page read and write
C000138000
direct allocation
page read and write
BEC0000
heap
page read and write
5ACF000
trusted library allocation
page read and write
21A7E7F0000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
3524000
heap
page read and write
C000036000
direct allocation
page read and write
C000198000
direct allocation
page read and write
C000025000
direct allocation
page read and write
349F000
heap
page read and write
5ACC000
trusted library allocation
page read and write
79E000
stack
page read and write
C000400000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
63C0000
trusted library allocation
page read and write
C0001D8000
direct allocation
page read and write
C000076000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C000059000
direct allocation
page read and write
A70000
heap
page read and write
C000200000
direct allocation
page read and write
5BF5000
trusted library allocation
page read and write
C00011E000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
34DA000
heap
page read and write
575E000
trusted library allocation
page read and write
7FF7F9208000
unkown
page readonly
C05C000
direct allocation
page read and write
3508000
heap
page read and write
27B47020000
heap
page read and write
C001400000
direct allocation
page read and write
FE427FE000
stack
page read and write
34EF000
heap
page read and write
C00003D000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C0001BA000
direct allocation
page read and write
3533000
heap
page read and write
C000020000
direct allocation
page read and write
57C1000
trusted library allocation
page read and write
C00006C000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
C00017C000
direct allocation
page read and write
C00A000
direct allocation
page read and write
56E7000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
34DA000
heap
page read and write
C0023A7000
direct allocation
page read and write
1A960B6F000
direct allocation
page read and write
34A8000
heap
page read and write
C000E72000
direct allocation
page read and write
5AD2000
trusted library allocation
page read and write
350F000
heap
page read and write
56D9000
trusted library allocation
page read and write
C061000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
349B000
heap
page read and write
4E90000
remote allocation
page read and write
34FB000
heap
page read and write
3535000
heap
page read and write
C054000
direct allocation
page read and write
C002BAE000
direct allocation
page read and write
5AF3000
trusted library allocation
page read and write
330F000
remote allocation
page execute and read and write
C000024000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
1A95F880000
direct allocation
page read and write
3508000
heap
page read and write
59C3000
trusted library allocation
page read and write
C000000000
direct allocation
page read and write
349D000
heap
page read and write
3533000
heap
page read and write
C000200000
direct allocation
page read and write
C0000E7000
direct allocation
page read and write
5ACD000
trusted library allocation
page read and write
3507000
heap
page read and write
34DA000
heap
page read and write
59C1000
trusted library allocation
page read and write
C001400000
direct allocation
page read and write
349F000
heap
page read and write
34F7000
heap
page read and write
C0001BE000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
756EDFE000
stack
page read and write
C0000B8000
direct allocation
page read and write
5B2C000
trusted library allocation
page read and write
C000056000
direct allocation
page read and write
FE425FE000
stack
page read and write
5A9F000
trusted library allocation
page read and write
C001BB8000
direct allocation
page read and write
3526000
heap
page read and write
C004A00000
direct allocation
page read and write
3508000
heap
page read and write
C000029000
direct allocation
page read and write
C130000
direct allocation
page read and write
7FF6FD632000
unkown
page read and write
C000176000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
3508000
heap
page read and write
C0000B4000
direct allocation
page read and write
3508000
heap
page read and write
C0011B2000
direct allocation
page read and write
C000088000
direct allocation
page read and write
3533000
heap
page read and write
7FF6FD371000
unkown
page execute read
C000020000
direct allocation
page read and write
5ACF000
trusted library allocation
page read and write
C00003B000
direct allocation
page read and write
C000307000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
56EF000
trusted library allocation
page read and write
369E000
stack
page read and write
C002402000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
C134000
direct allocation
page read and write
7FF623713000
unkown
page write copy
C0001E8000
direct allocation
page read and write
35BB000
remote allocation
page execute and read and write
5AA2000
trusted library allocation
page read and write
C035000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
BCC000
direct allocation
page read and write
C000124000
direct allocation
page read and write
5B10000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
C0001CA000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
C056000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C000180000
direct allocation
page read and write
5803000
trusted library allocation
page read and write
C050000
direct allocation
page read and write
570D000
trusted library allocation
page read and write
C000057000
direct allocation
page read and write
C000084000
direct allocation
page read and write
5BEF000
trusted library allocation
page read and write
C000134000
direct allocation
page read and write
349B000
heap
page read and write
7FF6FD623000
unkown
page read and write
575E000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
C001BA3000
direct allocation
page read and write
34FA000
heap
page read and write
C003200000
direct allocation
page read and write
56F7000
trusted library allocation
page read and write
3508000
heap
page read and write
C006000
direct allocation
page read and write
21A7E7B0000
direct allocation
page read and write
7FF6FD630000
unkown
page write copy
C13E000
direct allocation
page read and write
7FF6FD639000
unkown
page readonly
7FF6FD9A5000
unkown
page readonly
C00014A000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
35E0000
remote allocation
page execute and read and write
575E000
trusted library allocation
page read and write
353B000
heap
page read and write
C000162000
direct allocation
page read and write
C000026000
direct allocation
page read and write
7FF7F92C7000
unkown
page write copy
37A1000
direct allocation
page read and write
C000132000
direct allocation
page read and write
34F2000
heap
page read and write
59CF000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
C0000AC000
direct allocation
page read and write
34DA000
heap
page read and write
860E7FF000
stack
page read and write
C00007A000
direct allocation
page read and write
34FD000
heap
page read and write
34FD000
heap
page read and write
7FF6FD637000
unkown
page read and write
5ABC000
trusted library allocation
page read and write
C0023BC000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
7FF6FD98E000
unkown
page read and write
349F000
heap
page read and write
C0001E0000
direct allocation
page read and write
352E000
heap
page read and write
C00013E000
direct allocation
page read and write
C122000
direct allocation
page read and write
C000050000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
C001BA5000
direct allocation
page read and write
C000570000
direct allocation
page read and write
2F20000
remote allocation
page execute and read and write
C0000B6000
direct allocation
page read and write
57CC000
trusted library allocation
page read and write
C000168000
direct allocation
page read and write
7FF7F92D7000
unkown
page readonly
C00055F000
direct allocation
page read and write
C000000000
direct allocation
page read and write
A4E000
stack
page read and write
2EA0000
remote allocation
page execute and read and write
C000196000
direct allocation
page read and write
34FF000
heap
page read and write
3533000
heap
page read and write
C0001EE000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C02C000
direct allocation
page read and write
860DBFF000
stack
page read and write
56D9000
trusted library allocation
page read and write
3533000
heap
page read and write
3533000
heap
page read and write
58A3000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
C00013C000
direct allocation
page read and write
C000057000
direct allocation
page read and write
34F1000
heap
page read and write
C004A00000
direct allocation
page read and write
27B46D59000
direct allocation
page read and write
C00051E000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000026000
direct allocation
page read and write
56F9000
trusted library allocation
page read and write
E40000
heap
page read and write
C0001E2000
direct allocation
page read and write
C000180000
direct allocation
page read and write
56D9000
trusted library allocation
page read and write
C00046A000
direct allocation
page read and write
34EF000
heap
page read and write
56C8000
trusted library allocation
page read and write
C000054000
direct allocation
page read and write
1F9F4DE0000
direct allocation
page read and write
C000002000
direct allocation
page read and write
56C1000
trusted library allocation
page read and write
7FF623658000
unkown
page readonly
3533000
heap
page read and write
7FF6FD997000
unkown
page write copy
7FF7F92C3000
unkown
page write copy
7FF7F8CE7000
unkown
page readonly
C01A000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
BC9F000
stack
page read and write
C000124000
direct allocation
page read and write
3509000
heap
page read and write
C0000DC000
direct allocation
page read and write
57EB000
trusted library allocation
page read and write
C0004F0000
direct allocation
page read and write
C0023AE000
direct allocation
page read and write
C0001A4000
direct allocation
page read and write
27B6C350000
direct allocation
page read and write
7FF6226D5000
unkown
page write copy
56F9000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
C00013C000
direct allocation
page read and write
5A6F000
trusted library allocation
page read and write
C000000000
direct allocation
page read and write
6DC0000
trusted library allocation
page read and write
C01E000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
C001400000
direct allocation
page read and write
DD0000
direct allocation
page read and write
C00005B000
direct allocation
page read and write
3484000
heap
page read and write
C00004B000
direct allocation
page read and write
3538000
heap
page read and write
C02E000
direct allocation
page read and write
34F6000
heap
page read and write
6585FF000
stack
page read and write
C0023AA000
direct allocation
page read and write
34FD000
heap
page read and write
35E0000
remote allocation
page execute and read and write
3538000
heap
page read and write
6579FE000
stack
page read and write
353A000
heap
page read and write
C00015C000
direct allocation
page read and write
3504000
heap
page read and write
3533000
heap
page read and write
C000006000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C004CF0000
direct allocation
page read and write
C00016F000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
7FF623727000
unkown
page readonly
5B36000
trusted library allocation
page read and write
3533000
heap
page read and write
34DA000
heap
page read and write
3503000
heap
page read and write
3506000
heap
page read and write
C000116000
direct allocation
page read and write
C026000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
7FF623717000
unkown
page write copy
C000178000
direct allocation
page read and write
349F000
heap
page read and write
C0001E2000
direct allocation
page read and write
C012000
direct allocation
page read and write
C000012000
direct allocation
page read and write
5AE4000
trusted library allocation
page read and write
C000079000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
C0001A2000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C000136000
direct allocation
page read and write
7FF7F82E7000
unkown
page readonly
C000372000
direct allocation
page read and write
657FFF000
stack
page read and write
C004D00000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
34FF000
heap
page read and write
3508000
heap
page read and write
C00000C000
direct allocation
page read and write
34DA000
heap
page read and write
C0056F0000
direct allocation
page read and write
353C000
heap
page read and write
56F4000
trusted library allocation
page read and write
34EF000
heap
page read and write
C020000
direct allocation
page read and write
59C3000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
C000006000
direct allocation
page read and write
59C0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
C000074000
direct allocation
page read and write
3535000
heap
page read and write
C00013A000
direct allocation
page read and write
C004000000
direct allocation
page read and write
C002000
direct allocation
page read and write
27B46DB0000
heap
page read and write
34F6000
heap
page read and write
2EA0000
remote allocation
page execute and read and write
56C1000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
C0000F4000
direct allocation
page read and write
C000024000
direct allocation
page read and write
BDFF000
stack
page read and write
3508000
heap
page read and write
3533000
heap
page read and write
C3B000
heap
page read and write
C00017C000
direct allocation
page read and write
C001BA8000
direct allocation
page read and write
C001BA9000
direct allocation
page read and write
3327000
heap
page read and write
34DA000
heap
page read and write
C00003D000
direct allocation
page read and write
C0001DA000
direct allocation
page read and write
C000057000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
D9F000
stack
page read and write
C0000C6000
direct allocation
page read and write
27B46D50000
direct allocation
page read and write
5873000
trusted library allocation
page read and write
C0000B8000
direct allocation
page read and write
3641000
direct allocation
page read and write
7FF6FD5E6000
unkown
page write copy
5A81000
trusted library allocation
page read and write
C0000AC000
direct allocation
page read and write
5BD6000
trusted library allocation
page read and write
3508000
heap
page read and write
3535000
heap
page read and write
C0000D8000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000176000
direct allocation
page read and write
C10C000
direct allocation
page read and write
7FF622241000
unkown
page execute read
C000156000
direct allocation
page read and write
59CE000
trusted library allocation
page read and write
BEDF000
stack
page read and write
5AF9000
trusted library allocation
page read and write
C03A000
direct allocation
page read and write
C000122000
direct allocation
page read and write
5708000
trusted library allocation
page read and write
35B7000
remote allocation
page execute and read and write
C000052000
direct allocation
page read and write
6583FD000
stack
page read and write
56FF000
trusted library allocation
page read and write
C00005D000
direct allocation
page read and write
A60000
heap
page readonly
FE421FF000
stack
page read and write
5700000
trusted library allocation
page read and write
C0001E4000
direct allocation
page read and write
3536000
heap
page read and write
C0001D8000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
3780000
direct allocation
page read and write
59CD000
trusted library allocation
page read and write
C000038000
direct allocation
page read and write
FE423FC000
stack
page read and write
3770000
heap
page read and write
36DE000
stack
page read and write
C000046000
direct allocation
page read and write
C0004E0000
direct allocation
page read and write
3509000
heap
page read and write
5A54000
trusted library allocation
page read and write
7FF6FD635000
unkown
page write copy
C0011BA000
direct allocation
page read and write
353A000
heap
page read and write
C00004B000
direct allocation
page read and write
C00045E000
direct allocation
page read and write
3508000
heap
page read and write
C00017E000
direct allocation
page read and write
59C0000
trusted library allocation
page read and write
C0001AA000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C000132000
direct allocation
page read and write
C080000
direct allocation
page read and write
7FF6226D5000
unkown
page write copy
C000080000
direct allocation
page read and write
C0001F3000
direct allocation
page read and write
C004CF0000
direct allocation
page read and write
7FF6FD5E8000
unkown
page read and write
C004C68000
direct allocation
page read and write
C000006000
direct allocation
page read and write
4E90000
remote allocation
page read and write
3533000
heap
page read and write
5C3C000
trusted library allocation
page read and write
C00005B000
direct allocation
page read and write
C188000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
860E3FF000
stack
page read and write
C0000AC000
direct allocation
page read and write
C000045000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
C0001AA000
direct allocation
page read and write
5D34000
trusted library allocation
page read and write
C000456000
direct allocation
page read and write
C000560000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
59C1000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
C000464000
direct allocation
page read and write
C004000
direct allocation
page read and write
C000196000
direct allocation
page read and write
5C1F000
trusted library allocation
page read and write
C01A000
direct allocation
page read and write
C0001DA000
direct allocation
page read and write
C00008D000
direct allocation
page read and write
C000000
direct allocation
page read and write
5700000
trusted library allocation
page read and write
C00015E000
direct allocation
page read and write
C000176000
direct allocation
page read and write
C0011EA000
direct allocation
page read and write
353A000
heap
page read and write
C0011F4000
direct allocation
page read and write
34DA000
heap
page read and write
34EF000
heap
page read and write
5711000
trusted library allocation
page read and write
59CE000
trusted library allocation
page read and write
C04A000
direct allocation
page read and write
C150000
direct allocation
page read and write
BFE0000
heap
page read and write
3535000
heap
page read and write
C12A000
direct allocation
page read and write
34DA000
heap
page read and write
59CB000
trusted library allocation
page read and write
BD5E000
stack
page read and write
3624000
direct allocation
page read and write
C0011EC000
direct allocation
page read and write
C000161000
direct allocation
page read and write
C000000000
direct allocation
page read and write
5B8D000
trusted library allocation
page read and write
7FF6FD371000
unkown
page execute read
5C0C000
trusted library allocation
page read and write
C000041000
direct allocation
page read and write
353C000
heap
page read and write
C13C000
direct allocation
page read and write
7FF6FD993000
unkown
page read and write
C0000E4000
direct allocation
page read and write
C0001BE000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
330F000
remote allocation
page execute and read and write
C00003B000
direct allocation
page read and write
BF5F000
stack
page read and write
3500000
heap
page read and write
C001125000
direct allocation
page read and write
C0023FF000
direct allocation
page read and write
27B46DB8000
heap
page read and write
3508000
heap
page read and write
AB0000
heap
page read and write
C000035000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
C0001E8000
direct allocation
page read and write
C0056F0000
direct allocation
page read and write
C000E00000
direct allocation
page read and write
3508000
heap
page read and write
353D000
heap
page read and write
C0000E2000
direct allocation
page read and write
C001BA3000
direct allocation
page read and write
756E7FF000
stack
page read and write
756E5FE000
stack
page read and write
C001BAC000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
34FD000
heap
page read and write
C0000AE000
direct allocation
page read and write
353A000
heap
page read and write
5791000
trusted library allocation
page read and write
27B6C131000
direct allocation
page read and write
C184000
direct allocation
page read and write
5AE3000
trusted library allocation
page read and write
3533000
heap
page read and write
3533000
heap
page read and write
5A72000
trusted library allocation
page read and write
5739000
trusted library allocation
page read and write
27B47025000
heap
page read and write
C000026000
direct allocation
page read and write
C000020000
direct allocation
page read and write
56F7000
trusted library allocation
page read and write
34EF000
heap
page read and write
C0001DE000
direct allocation
page read and write
3535000
heap
page read and write
56C6000
trusted library allocation
page read and write
C000072000
direct allocation
page read and write
C000500000
direct allocation
page read and write
349F000
heap
page read and write
C000078000
direct allocation
page read and write
C020000
direct allocation
page read and write
27B6C1B3000
direct allocation
page read and write
34EF000
heap
page read and write
C00016D000
direct allocation
page read and write
5B4E000
trusted library allocation
page read and write
34DA000
heap
page read and write
349F000
heap
page read and write
59CC000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
C000146000
direct allocation
page read and write
C004000000
direct allocation
page read and write
C000028000
direct allocation
page read and write
59C2000
trusted library allocation
page read and write
27B6C133000
direct allocation
page read and write
C0001A2000
direct allocation
page read and write
5AA1000
trusted library allocation
page read and write
C0001C8000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C000036000
direct allocation
page read and write
C0001DC000
direct allocation
page read and write
C004CF0000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C028000
direct allocation
page read and write
3508000
heap
page read and write
C00017E000
direct allocation
page read and write
586D000
trusted library allocation
page read and write
C000006000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
BE80000
direct allocation
page read and write
657DFF000
stack
page read and write
56C8000
trusted library allocation
page read and write
349F000
heap
page read and write
C0000AA000
direct allocation
page read and write
5A50000
trusted library allocation
page read and write
353B000
heap
page read and write
C01C000
direct allocation
page read and write
C001BBA000
direct allocation
page read and write
C000144000
direct allocation
page read and write
C000305000
direct allocation
page read and write
3536000
heap
page read and write
C00011C000
direct allocation
page read and write
5B7D000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
C000102000
direct allocation
page read and write
C0001D8000
direct allocation
page read and write
C000138000
direct allocation
page read and write
7FF623727000
unkown
page readonly
C00006A000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
A75000
heap
page read and write
A3D000
stack
page read and write
C000084000
direct allocation
page read and write
59C8000
trusted library allocation
page read and write
3535000
heap
page read and write
59C7000
trusted library allocation
page read and write
27B46FC0000
direct allocation
page read and write
56C5000
trusted library allocation
page read and write
C00110E000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
27B46C20000
heap
page read and write
C000132000
direct allocation
page read and write
3516000
heap
page read and write
56C7000
trusted library allocation
page read and write
C00C000
direct allocation
page read and write
7FF6FD993000
unkown
page write copy
A80000
heap
page read and write
7CC000
stack
page read and write
59CC000
trusted library allocation
page read and write
21A7FA9F000
direct allocation
page read and write
34FD000
heap
page read and write
C001118000
direct allocation
page read and write
3508000
heap
page read and write
7FF623658000
unkown
page readonly
56C7000
trusted library allocation
page read and write
C00003C000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
59CA000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
C000080000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
3508000
heap
page read and write
C000172000
direct allocation
page read and write
3536000
heap
page read and write
7FF6FD9A5000
unkown
page readonly
35D7000
remote allocation
page execute and read and write
C0056F0000
direct allocation
page read and write
3504000
heap
page read and write
56D9000
trusted library allocation
page read and write
C13A000
direct allocation
page read and write
3536000
heap
page read and write
C000167000
direct allocation
page read and write
59C5000
trusted library allocation
page read and write
3508000
heap
page read and write
7FF6FD5E0000
unkown
page write copy
C20000
direct allocation
page read and write
860E9FE000
stack
page read and write
27B6C350000
direct allocation
page read and write
3535000
heap
page read and write
353C000
heap
page read and write
C18E000
direct allocation
page read and write
59C7000
trusted library allocation
page read and write
C000266000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
BEE0000
direct allocation
page read and write
34A8000
heap
page read and write
C0035AE000
direct allocation
page read and write
A78000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C000206000
direct allocation
page read and write
C000178000
direct allocation
page read and write
34DD000
heap
page read and write
C004000
direct allocation
page read and write
5AE7000
trusted library allocation
page read and write
C000016000
direct allocation
page read and write
3535000
heap
page read and write
C000162000
direct allocation
page read and write
34FD000
heap
page read and write
C00012C000
direct allocation
page read and write
34EF000
heap
page read and write
C0000AA000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
C000046000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
C008000
direct allocation
page read and write
C000074000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
1F9F60CF000
direct allocation
page read and write
A00000
heap
page read and write
C001BA1000
direct allocation
page read and write
C001BA7000
direct allocation
page read and write
353C000
heap
page read and write
3533000
heap
page read and write
C132000
direct allocation
page read and write
C000027000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
352E000
heap
page read and write
C058000
direct allocation
page read and write
C000070000
direct allocation
page read and write
5AFB000
trusted library allocation
page read and write
59C6000
trusted library allocation
page read and write
7FF623713000
unkown
page write copy
7FF7F7DF0000
unkown
page readonly
27B46FB0000
direct allocation
page read and write
BC8000
direct allocation
page read and write
C0004D0000
direct allocation
page read and write
56D9000
trusted library allocation
page read and write
C001BA5000
direct allocation
page read and write
C000050000
direct allocation
page read and write
27B6C390000
direct allocation
page read and write
C0001E8000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C06C000
direct allocation
page read and write
575E000
trusted library allocation
page read and write
C0001A0000
direct allocation
page read and write
5B76000
trusted library allocation
page read and write
C001BA1000
direct allocation
page read and write
C001BA3000
direct allocation
page read and write
6577FF000
stack
page read and write
34F9000
heap
page read and write
353A000
heap
page read and write
C0001EC000
direct allocation
page read and write
C001BC4000
direct allocation
page read and write
C000014000
direct allocation
page read and write
1F9F4E20000
direct allocation
page read and write
C000037000
direct allocation
page read and write
C016000
direct allocation
page read and write
3760000
heap
page read and write
C00001A000
direct allocation
page read and write
C000066000
direct allocation
page read and write
C004D00000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C000028000
direct allocation
page read and write
C00004E000
direct allocation
page read and write
58AB000
trusted library allocation
page read and write
C000120000
direct allocation
page read and write
5C5B000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
C000043000
direct allocation
page read and write
59C6000
trusted library allocation
page read and write
C000473000
direct allocation
page read and write
C07A000
direct allocation
page read and write
C00044A000
direct allocation
page read and write
59C3000
trusted library allocation
page read and write
27B46D00000
heap
page read and write
C000458000
direct allocation
page read and write
34F6000
heap
page read and write
34F7000
heap
page read and write
34FF000
heap
page read and write
C0000B4000
direct allocation
page read and write
C000031000
direct allocation
page read and write
3508000
heap
page read and write
C000124000
direct allocation
page read and write
C000138000
direct allocation
page read and write
5B0D000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
FE41DFF000
stack
page read and write
34DA000
heap
page read and write
C0001A4000
direct allocation
page read and write
C124000
direct allocation
page read and write
5C2B000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
34FD000
heap
page read and write
6625000
trusted library allocation
page read and write
C00010C000
direct allocation
page read and write
5745000
trusted library allocation
page read and write
C0001BA000
direct allocation
page read and write
3503000
heap
page read and write
C0001BA000
direct allocation
page read and write
59C5000
trusted library allocation
page read and write
C00001E000
direct allocation
page read and write
56F9000
trusted library allocation
page read and write
3533000
heap
page read and write
860E1FF000
stack
page read and write
C000180000
direct allocation
page read and write
59C1000
heap
page read and write
C0000B4000
direct allocation
page read and write
C0011B0000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C002800000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000002000
direct allocation
page read and write
5A80000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
E2E000
stack
page read and write
C028000
direct allocation
page read and write
5745000
trusted library allocation
page read and write
BE87000
direct allocation
page read and write
350B000
heap
page read and write
C000476000
direct allocation
page read and write
56CD000
trusted library allocation
page read and write
C000178000
direct allocation
page read and write
59C1000
trusted library allocation
page read and write
2F18000
stack
page read and write
C000172000
direct allocation
page read and write
3508000
heap
page read and write
5B00000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
BFDF000
stack
page read and write
C00010C000
direct allocation
page read and write
BE3E000
stack
page read and write
C00018E000
direct allocation
page read and write
34FD000
heap
page read and write
21A7F630000
direct allocation
page read and write
5AE9000
trusted library allocation
page read and write
34FF000
heap
page read and write
27B47010000
direct allocation
page read and write
C000070000
direct allocation
page read and write
BD1F000
stack
page read and write
59C2000
trusted library allocation
page read and write
C026000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
C000156000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
3503000
heap
page read and write
FE41BFD000
stack
page read and write
34FD000
heap
page read and write
C0001DC000
direct allocation
page read and write
5ABB000
trusted library allocation
page read and write
3508000
heap
page read and write
1F9F5C60000
direct allocation
page read and write
349F000
heap
page read and write
C000004000
direct allocation
page read and write
34E8000
heap
page read and write
C000198000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
3500000
heap
page read and write
3526000
heap
page read and write
59C3000
trusted library allocation
page read and write
C001BBC000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000165000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C00004A000
direct allocation
page read and write
C000162000
direct allocation
page read and write
353A000
heap
page read and write
34F6000
heap
page read and write
59CD000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
3508000
heap
page read and write
7FF622241000
unkown
page execute read
C010000
direct allocation
page read and write
A70000
direct allocation
page read and write
C136000
direct allocation
page read and write
34DA000
heap
page read and write
349D000
heap
page read and write
7FF6FD370000
unkown
page readonly
C00016E000
direct allocation
page read and write
3508000
heap
page read and write
34FF000
heap
page read and write
756EFFE000
stack
page read and write
56C8000
trusted library allocation
page read and write
C000088000
direct allocation
page read and write
27B6C170000
direct allocation
page read and write
1A960700000
direct allocation
page read and write
7FF622240000
unkown
page readonly
7FF6FD5E5000
unkown
page read and write
5B12000
trusted library allocation
page read and write
C000206000
direct allocation
page read and write
34F2000
heap
page read and write
7FF622737000
unkown
page readonly
3533000
heap
page read and write
C064000
direct allocation
page read and write
C182000
direct allocation
page read and write
C00047A000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
3535000
heap
page read and write
34EF000
heap
page read and write
C000E68000
direct allocation
page read and write
C040000
direct allocation
page read and write
59C2000
trusted library allocation
page read and write
C000078000
direct allocation
page read and write
5A94000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
34EF000
heap
page read and write
7FF6FD5E0000
unkown
page read and write
570E000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
5A5D000
trusted library allocation
page read and write
C000128000
direct allocation
page read and write
34FD000
heap
page read and write
7FF6FD5E9000
unkown
page write copy
BD9F000
stack
page read and write
56C2000
trusted library allocation
page read and write
657BFE000
stack
page read and write
C00012C000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
5A83000
trusted library allocation
page read and write
756F1FE000
stack
page read and write
3536000
heap
page read and write
C001123000
direct allocation
page read and write
34EF000
heap
page read and write
C000134000
direct allocation
page read and write
34F2000
heap
page read and write
C000066000
direct allocation
page read and write
C002800000
direct allocation
page read and write
3533000
heap
page read and write
589B000
trusted library allocation
page read and write
7FF622240000
unkown
page readonly
C00017C000
direct allocation
page read and write
C000124000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
27B46FF1000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
C0001A4000
direct allocation
page read and write
3533000
heap
page read and write
C000018000
direct allocation
page read and write
5BD3000
trusted library allocation
page read and write
353D000
heap
page read and write
BC0000
heap
page read and write
C014000
direct allocation
page read and write
4E90000
remote allocation
page read and write
C0000B6000
direct allocation
page read and write
3508000
heap
page read and write
7FF6FD370000
unkown
page readonly
56EB000
trusted library allocation
page read and write
FE41FFF000
stack
page read and write
C000138000
direct allocation
page read and write
C000068000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000140000
direct allocation
page read and write
353A000
heap
page read and write
756EBFE000
stack
page read and write
C000198000
direct allocation
page read and write
3532000
heap
page read and write
C0037FC000
direct allocation
page read and write
353B000
heap
page read and write
56CA000
trusted library allocation
page read and write
34FD000
heap
page read and write
3532000
heap
page read and write
C00004C000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C004CB2000
direct allocation
page read and write
5A78000
trusted library allocation
page read and write
59C3000
trusted library allocation
page read and write
C000010000
direct allocation
page read and write
3508000
heap
page read and write
5AD8000
trusted library allocation
page read and write
C0001F6000
direct allocation
page read and write
56E9000
trusted library allocation
page read and write
3539000
heap
page read and write
6E00000
trusted library allocation
page read and write
C0000F4000
direct allocation
page read and write
C000136000
direct allocation
page read and write
34EF000
heap
page read and write
59C5000
trusted library allocation
page read and write
349D000
heap
page read and write
C002000000
direct allocation
page read and write
756E3FC000
stack
page read and write
BB0000
heap
page readonly
593B000
trusted library allocation
page read and write
5BAE000
trusted library allocation
page read and write
C0000E4000
direct allocation
page read and write
371F000
stack
page read and write
349D000
heap
page read and write
27B46D54000
direct allocation
page read and write
7FF7F7DF1000
unkown
page execute read
34EF000
heap
page read and write
5AC4000
trusted library allocation
page read and write
C00006B000
direct allocation
page read and write
56D8000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
7FF6FD989000
unkown
page read and write
C142000
direct allocation
page read and write
35D7000
remote allocation
page execute and read and write
860DDFF000
stack
page read and write
C000134000
direct allocation
page read and write
B9E000
stack
page read and write
56F4000
trusted library allocation
page read and write
C0023BA000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
C000168000
direct allocation
page read and write
E2E000
stack
page read and write
C001BB5000
direct allocation
page read and write
C000038000
direct allocation
page read and write
7FF6FD934000
unkown
page read and write
C00044E000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
5C4F000
trusted library allocation
page read and write
860D9FF000
stack
page read and write
35BB000
remote allocation
page execute and read and write
59C3000
trusted library allocation
page read and write
860E5FC000
stack
page read and write
C000E00000
direct allocation
page read and write
C000022000
direct allocation
page read and write
756F3FF000
stack
page read and write
C0001B8000
direct allocation
page read and write
21A7FD76000
direct allocation
page read and write
1A960E46000
direct allocation
page read and write
5B08000
trusted library allocation
page read and write
C000022000
direct allocation
page read and write
There are 1168 hidden memdumps, click here to show them.