IOC Report

loading gif

Files

File Path
Type
Category
Malicious
Document..exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Document..exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\tmpB2D9.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Non-ISO extended-ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\kxZoOxAEYGrVyf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\kxZoOxAEYGrVyf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vcvemzy3.kuz.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zw03lgv3.i24.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
dropped
C:\Users\user\Documents\20220125\PowerShell_transcript.936905.kedcTF1Q.20220125103630.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Document..exe
"C:\Users\user\Desktop\Document..exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kxZoOxAEYGrVyf.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kxZoOxAEYGrVyf" /XML "C:\Users\user\AppData\Local\Temp\tmpB2D9.tmp
malicious
C:\Users\user\Desktop\Document..exe
C:\Users\user\Desktop\Document..exe
malicious
C:\Users\user\Desktop\Document..exe
C:\Users\user\Desktop\Document..exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
37.120.210.211
malicious
naki.airdns.org
malicious
http://google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
naki.airdns.org
146.70.76.43
malicious

IPs

IP
Domain
Country
Malicious
146.70.76.43
naki.airdns.org
United Kingdom
malicious
192.168.2.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
30A1000
trusted library allocation
page read and write
malicious
62E0000
trusted library section
page read and write
malicious
4129000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3F5C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F51000
trusted library allocation
page read and write
malicious
4132000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
415E87B000
stack
page read and write
1ED20B02000
unkown
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
1285000
heap
page read and write
C90000
unkown
page readonly
C92000
unkown
page readonly
17D0F2E6000
heap
page read and write
1E32EE7B000
unkown
page read and write
17D0FE60000
trusted library allocation
page read and write
7FD68000
trusted library allocation
page execute and read and write
11FD000
trusted library allocation
page execute and read and write
E785CF7000
stack
page read and write
17D0F2F4000
heap
page read and write
68AE000
stack
page read and write
1562000
trusted library allocation
page read and write
1310000
heap
page read and write
54D0000
heap
page execute and read and write
2F20000
heap
page read and write
53D4000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
1334000
heap
page read and write
13C9000
heap
page read and write
1B6A3C68000
heap
page read and write
20BC00E0000
heap
page read and write
58B0000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
1343000
heap
page read and write
6460000
heap
page read and write
139F000
heap
page read and write
5520000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1140000
remote allocation
page read and write
CB0000
heap
page read and write
1402000
heap
page read and write
6D4E000
trusted library allocation
page read and write
43E52F9000
stack
page read and write
5890000
trusted library allocation
page read and write
1E32F793000
unkown
page read and write
58B0000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
17D0F260000
heap
page read and write
5840000
trusted library allocation
page read and write
1ED20A5F000
unkown
page read and write
2DFA3F08000
unkown
page read and write
40A9000
trusted library allocation
page read and write
1B6A3FE5000
heap
page read and write
5A20000
trusted library allocation
page read and write
13E6000
heap
page read and write
6D21000
trusted library allocation
page read and write
13BB000
heap
page read and write
62B1000
heap
page read and write
21DC7910000
heap
page read and write
7F0000
heap
page read and write
1E32F771000
unkown
page read and write
5880000
trusted library allocation
page read and write
1E32FC02000
unkown
page read and write
1ED20A61000
unkown
page read and write
13BA000
heap
page read and write
13EF000
heap
page read and write
11817502000
unkown
page read and write
12B8000
heap
page read and write
6D21000
trusted library allocation
page read and write
E9CC15E000
stack
page read and write
5840000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
2DFA3E51000
unkown
page read and write
6D26000
trusted library allocation
page read and write
114437D000
stack
page read and write
121A000
trusted library allocation
page execute and read and write
43E4F9E000
stack
page read and write
5890000
trusted library allocation
page read and write
63B1000
trusted library allocation
page read and write
1484B820000
heap
page read and write
17D0FE70000
trusted library allocation
page read and write
1E32F715000
unkown
page read and write
6200000
trusted library allocation
page read and write
12C3000
heap
page read and write
131A000
heap
page read and write
5520000
trusted library allocation
page read and write
114427F000
stack
page read and write
6451000
heap
page read and write
1E32F795000
unkown
page read and write
21DC7A74000
unkown
page read and write
63D6000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
20BC024E000
unkown
page read and write
1490000
trusted library allocation
page execute and read and write
1B6A3C7A000
heap
page read and write
64EE000
stack
page read and write
12D7000
heap
page read and write
63B5000
trusted library allocation
page read and write
1E32F79E000
unkown
page read and write
1B6A3C30000
heap
page read and write
6D21000
trusted library allocation
page read and write
20BC0224000
unkown
page read and write
2F90000
heap
page read and write
6A9E000
stack
page read and write
3E0000
unkown
page readonly
58D0000
heap
page read and write
61DB000
stack
page read and write
5880000
trusted library allocation
page read and write
C92000
unkown
page readonly
1E32EE4A000
unkown
page read and write
34FFF9000
stack
page read and write
58B0000
trusted library allocation
page read and write
3F8000
unkown
page readonly
6690000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
1E32F7B7000
unkown
page read and write
6D21000
trusted library allocation
page read and write
12E2000
heap
page read and write
1544000
trusted library allocation
page read and write
54EB000
trusted library allocation
page read and write
20BC0302000
unkown
page read and write
58B0000
trusted library allocation
page read and write
11817475000
unkown
page read and write
7170000
trusted library allocation
page read and write
1E32F7B6000
unkown
page read and write
5590000
heap
page read and write
11817390000
heap
page read and write
43E527E000
stack
page read and write
11E0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
C48000
unkown
page readonly
62B1000
heap
page read and write
53BA2FE000
stack
page read and write
12B0000
heap
page read and write
6250000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
C90000
unkown
page readonly
C92000
unkown
page readonly
54FD000
trusted library allocation
page read and write
1E32F795000
unkown
page read and write
12AA000
heap
page read and write
1E32FC02000
unkown
page read and write
21DC7A50000
unkown
page read and write
C90000
unkown
page readonly
62CF000
stack
page read and write
415E8FF000
stack
page read and write
13FB000
heap
page read and write
1387000
heap
page read and write
6300000
trusted library allocation
page read and write
674D000
stack
page read and write
E785EFE000
stack
page read and write
1212000
trusted library allocation
page read and write
C90000
unkown
page readonly
1E32F791000
unkown
page read and write
1ED20A6D000
unkown
page read and write
58B0000
trusted library allocation
page read and write
1484B830000
heap
page read and write
699E000
stack
page read and write
6D21000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
1484BA5D000
unkown
page read and write
20BC0251000
unkown
page read and write
58B0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1216000
trusted library allocation
page execute and read and write
1B6A3C61000
heap
page read and write
5730000
trusted library allocation
page read and write
13F9000
heap
page read and write
13FB000
heap
page read and write
14A0000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
302000
unkown
page readonly
54C0000
trusted library allocation
page read and write
1BA16E70000
remote allocation
page read and write
D88000
unkown
page readonly
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
2DFA4602000
unkown
page read and write
1BA167E0000
unkown
page read and write
12D7000
heap
page read and write
5610000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
6308000
trusted library allocation
page read and write
1402000
heap
page read and write
114487E000
stack
page read and write
54E0000
trusted library allocation
page read and write
62B0000
heap
page read and write
58F0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
12B4000
heap
page read and write
54F7000
trusted library allocation
page read and write
11817513000
unkown
page read and write
1577000
heap
page read and write
53BA57D000
stack
page read and write
6300000
trusted library allocation
page read and write
12BF000
heap
page read and write
5A5E000
stack
page read and write
400000
remote allocation
page execute and read and write
DB0000
heap
page read and write
13F9000
heap
page read and write
8798A7E000
stack
page read and write
1200000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
6300000
trusted library section
page read and write
6250000
trusted library allocation
page read and write
1BA16829000
unkown
page read and write
12D2000
heap
page read and write
8798B77000
stack
page read and write
1E32F78D000
unkown
page read and write
686F000
stack
page read and write
2DFA3F13000
unkown
page read and write
12D3000
heap
page read and write
66B0000
trusted library allocation
page read and write
84AF7E000
stack
page read and write
6300000
trusted library allocation
page read and write
12F6000
heap
page read and write
1E32EE54000
unkown
page read and write
5570000
trusted library allocation
page read and write
1B6A3C73000
heap
page read and write
5610000
trusted library allocation
page read and write
1527000
heap
page read and write
67F0000
trusted library section
page read and write
17D0F545000
heap
page read and write
5956000
trusted library allocation
page read and write
6461000
heap
page read and write
20BC023C000
unkown
page read and write
1E32F76C000
unkown
page read and write
5830000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
2DFA3C00000
heap
page read and write
13EC000
heap
page read and write
6D21000
trusted library allocation
page read and write
1E32F76C000
unkown
page read and write
879887D000
stack
page read and write
66A0000
trusted library allocation
page execute and read and write
3F0000
unkown
page readonly
11817464000
unkown
page read and write
6ECC000
stack
page read and write
5860000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
415EB7B000
stack
page read and write
5420000
trusted library allocation
page read and write
63D000
stack
page read and write
3F0000
unkown
page readonly
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
1B6A3FE0000
heap
page read and write
6690000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
415E97F000
stack
page read and write
6451000
heap
page read and write
1140000
remote allocation
page read and write
3501F9000
stack
page read and write
17D0F1E0000
trusted library allocation
page read and write
71B0000
unkown
page read and write
61D0000
trusted library allocation
page read and write
1ED207E0000
heap
page read and write
1566000
trusted library allocation
page execute and read and write
20BC0150000
heap
page read and write
400000
remote allocation
page execute and read and write
1E32F787000
unkown
page read and write
6300000
trusted library allocation
page read and write
1E32EEB1000
unkown
page read and write
155D000
trusted library allocation
page execute and read and write
1BA166E0000
heap
page read and write
6D21000
trusted library allocation
page read and write
644D000
stack
page read and write
6450000
heap
page read and write
154D000
trusted library allocation
page execute and read and write
6451000
heap
page read and write
3053000
trusted library allocation
page read and write
1484BB02000
unkown
page read and write
11F4000
trusted library allocation
page read and write
83F000
stack
page read and write
42AC000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
1E32EE81000
unkown
page read and write
6D21000
trusted library allocation
page read and write
11817320000
heap
page read and write
5820000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
6D21000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
658D000
stack
page read and write
5850000
trusted library allocation
page read and write
84AEFE000
stack
page read and write
40E9000
trusted library allocation
page read and write
2DFA3E29000
unkown
page read and write
7FD50000
trusted library allocation
page execute and read and write
17D0F1D0000
heap
page read and write
2DFA3E55000
unkown
page read and write
54F4000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
5841000
trusted library allocation
page read and write
1227000
trusted library allocation
page execute and read and write
6F5D000
stack
page read and write
1E32EE70000
unkown
page read and write
13FD000
heap
page read and write
58B0000
unkown
page read and write
87988FE000
stack
page read and write
D88000
unkown
page readonly
87990F8000
stack
page read and write
58C0000
trusted library section
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
12B8000
heap
page read and write
41D9000
trusted library allocation
page read and write
3F0000
unkown
page readonly
310B000
trusted library allocation
page read and write
130D000
stack
page read and write
D88000
unkown
page readonly
672E000
stack
page read and write
6CE0000
unkown
page read and write
1E32F7D6000
unkown
page read and write
21DC7A29000
unkown
page read and write
C92000
unkown
page readonly
5610000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1ED20A45000
unkown
page read and write
1E32F590000
remote allocation
page read and write
20BC00F0000
heap
page read and write
1310000
heap
page read and write
6EF0000
trusted library allocation
page read and write
352C000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
C48000
unkown
page readonly
1B6A3B90000
heap
page read and write
1484D402000
unkown
page read and write
6D21000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
120D000
trusted library allocation
page execute and read and write
6D21000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
9F0000
heap
page read and write
6D21000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
1B6A3C7B000
heap
page read and write
65EE000
stack
page read and write
67D0000
unkown
page read and write
53BA6FF000
stack
page read and write
2DFA3C70000
heap
page read and write
1484BA13000
unkown
page read and write
5960000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1280000
heap
page read and write
1395000
heap
page read and write
680000
unkown
page read and write
1B6A3C56000
heap
page read and write
5730000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
1E32EED6000
unkown
page read and write
2DFA3E88000
unkown
page read and write
6D21000
trusted library allocation
page read and write
1B6A3C61000
heap
page read and write
5720000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32F76E000
unkown
page read and write
67A000
stack
page read and write
1E32F793000
unkown
page read and write
1E32EE4D000
unkown
page read and write
695E000
stack
page read and write
6D21000
trusted library allocation
page read and write
1ED20A6B000
unkown
page read and write
420C000
trusted library allocation
page read and write
156A000
trusted library allocation
page execute and read and write
719C000
stack
page read and write
701F000
stack
page read and write
5960000
trusted library allocation
page read and write
53BA1FE000
stack
page read and write
D88000
unkown
page readonly
6690000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
5505000
trusted library allocation
page read and write
43E4E9A000
stack
page read and write
705E000
stack
page read and write
1BA1685C000
unkown
page read and write
5890000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
21DC7B02000
unkown
page read and write
5511000
trusted library allocation
page read and write
1484BA4D000
unkown
page read and write
124A000
heap
page read and write
5890000
trusted library allocation
page read and write
55C0000
heap
page execute and read and write
138A000
heap
page read and write
6D21000
trusted library allocation
page read and write
C92000
unkown
page readonly
53DB000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
C92000
unkown
page readonly
422000
remote allocation
page execute and read and write
6D10000
unkown
page read and write
2DFA3E00000
unkown
page read and write
5960000
trusted library allocation
page read and write
C92000
unkown
page readonly
5575000
trusted library allocation
page read and write
20BC0200000
unkown
page read and write
84B17E000
stack
page read and write
6450000
trusted library allocation
page read and write
11817478000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1ED207F0000
heap
page read and write
1E32FC02000
unkown
page read and write
6D21000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
13FD000
heap
page read and write
5435000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
1B6A3B30000
heap
page read and write
6D21000
trusted library allocation
page read and write
71C0000
unkown
page read and write
5960000
trusted library allocation
page read and write
17D0F2A8000
heap
page read and write
6690000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
114467F000
stack
page read and write
5610000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
12BC000
heap
page read and write
62D0000
trusted library allocation
page read and write
21DC8202000
unkown
page read and write
71D0000
unkown
page read and write
58B0000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
1E32F7A0000
unkown
page read and write
E785AFB000
stack
page read and write
87985EB000
stack
page read and write
429C000
trusted library allocation
page read and write
53BA17C000
stack
page read and write
1484B890000
heap
page read and write
676E000
stack
page read and write
6D21000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
5970000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1140000
remote allocation
page read and write
58B0000
trusted library allocation
page read and write
B50000
unkown
page readonly
12AE000
heap
page read and write
5950000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1ED20A33000
unkown
page read and write
17D0F2F4000
heap
page read and write
400000
remote allocation
page execute and read and write
6D21000
trusted library allocation
page read and write
1140000
remote allocation
page read and write
5950000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
21DC7970000
heap
page read and write
5890000
trusted library allocation
page read and write
300000
unkown
page readonly
6306000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
21DC7A52000
unkown
page read and write
5610000
trusted library allocation
page read and write
13F8000
heap
page read and write
685E000
stack
page read and write
20BC0213000
unkown
page read and write
10E5000
heap
page read and write
5580000
trusted library allocation
page read and write
1E32F795000
unkown
page read and write
11817413000
unkown
page read and write
2E8E000
stack
page read and write
10E0000
heap
page read and write
17D10100000
unkown
page read and write
C70000
heap
page read and write
5960000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32F76C000
unkown
page read and write
B50000
unkown
page readonly
6D21000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
13E6000
heap
page read and write
20BC0270000
unkown
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32ED10000
heap
page read and write
5734000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
1402000
heap
page read and write
542F000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
12C3000
heap
page read and write
5610000
trusted library allocation
page read and write
20BC0308000
unkown
page read and write
17D0FEE0000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
40C9000
trusted library allocation
page read and write
20BC0300000
unkown
page read and write
58B0000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
58BE000
stack
page read and write
5730000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
1484B990000
unkown
page read and write
E785DFE000
stack
page read and write
6D21000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
D88000
unkown
page readonly
3B0000
heap
page read and write
1ED20A66000
unkown
page read and write
11817C02000
unkown
page read and write
5920000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
2DFA3C10000
heap
page read and write
13F9000
heap
page read and write
5480000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
17D0F2B0000
heap
page read and write
300000
unkown
page readonly
2F10000
heap
page execute and read and write
84AE7B000
stack
page read and write
1ED20A5E000
unkown
page read and write
1484BB18000
unkown
page read and write
4109000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
1390000
heap
page read and write
5460000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
17D0F2A0000
heap
page read and write
1484BA67000
unkown
page read and write
5490000
heap
page read and write
63B0000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
139F000
heap
page read and write
6451000
heap
page read and write
5610000
trusted library allocation
page read and write
21DC7A4F000
unkown
page read and write
557F000
trusted library allocation
page read and write
1ED20A7B000
unkown
page read and write
54E0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
E9CC67B000
stack
page read and write
139E000
heap
page read and write
1BA16670000
heap
page read and write
1484BB13000
unkown
page read and write
62F0000
trusted library allocation
page read and write
118173C0000
unkown
page read and write
12B0000
heap
page read and write
1484D600000
trusted library allocation
page read and write
1E32F791000
unkown
page read and write
114457D000
stack
page read and write
1E32F7B9000
unkown
page read and write
6307000
trusted library allocation
page read and write
1B6A3C68000
heap
page read and write
5FDF000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
8798C77000
stack
page read and write
74E0000
unkown
page read and write
5880000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
13FD000
heap
page read and write
1E32EF16000
unkown
page read and write
5950000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
1E32F78B000
unkown
page read and write
400000
remote allocation
page execute and read and write
13F4000
heap
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
2DFA3E53000
unkown
page read and write
1ED20A62000
unkown
page read and write
1E32EE47000
unkown
page read and write
1484BA5D000
unkown
page read and write
1402000
heap
page read and write
5FDF000
trusted library allocation
page read and write
13BC000
heap
page read and write
715F000
stack
page read and write
1ED20A58000
unkown
page read and write
1E32EEEB000
unkown
page read and write
6D4C000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
13A3000
heap
page read and write
74D0000
unkown
page read and write
21DC7B00000
unkown
page read and write
54E0000
trusted library allocation
page read and write
43E4F1F000
stack
page read and write
5730000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32EE29000
unkown
page read and write
55E0000
trusted library allocation
page read and write
1240000
heap
page read and write
12F6000
heap
page read and write
6ADE000
stack
page read and write
12E2000
heap
page read and write
13F9000
heap
page read and write
1310000
heap
page read and write
13FB000
heap
page read and write
C088FB000
stack
page read and write
B52000
unkown
page readonly
C0937E000
stack
page read and write
6F1D000
stack
page read and write
5910000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
69ED000
stack
page read and write
C90000
unkown
page readonly
21DC7A00000
unkown
page read and write
1402000
heap
page read and write
5890000
trusted library allocation
page read and write
C90000
unkown
page readonly
5960000
trusted library allocation
page read and write
114477E000
stack
page read and write
2E27000
trusted library allocation
page execute and read and write
11817424000
unkown
page read and write
6CDC000
stack
page read and write
E7855AB000
stack
page read and write
1520000
heap
page read and write
58E0000
trusted library allocation
page read and write
6305000
trusted library allocation
page read and write
1304000
heap
page read and write
1E32F7AD000
unkown
page read and write
5A20000
trusted library allocation
page read and write
13E8000
heap
page read and write
5460000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1144A7F000
stack
page read and write
6D00000
unkown
page read and write
5950000
trusted library allocation
page read and write
1ED20A77000
unkown
page read and write
13A7000
heap
page read and write
6D21000
trusted library allocation
page read and write
E785BFC000
stack
page read and write
5470000
trusted library allocation
page read and write
1280000
heap
page read and write
58B0000
trusted library allocation
page read and write
12F6000
heap
page read and write
D88000
unkown
page readonly
6D21000
trusted library allocation
page read and write
13A4000
heap
page read and write
53F0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
E9CC87D000
stack
page read and write
12BC000
heap
page read and write
87989FB000
stack
page read and write
647E000
heap
page read and write
5960000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
143F000
stack
page read and write
62DD000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
17D0F549000
heap
page read and write
6CF0000
unkown
page read and write
680000
unkown
page read and write
12FC000
heap
page read and write
6D21000
trusted library allocation
page read and write
1484D3A0000
trusted library allocation
page read and write
137F000
heap
page read and write
6451000
heap
page read and write
1B6A3BB0000
heap
page read and write
709C000
stack
page read and write
11F3000
trusted library allocation
page execute and read and write
5593000
heap
page read and write
8798D7E000
stack
page read and write
1E32FC02000
unkown
page read and write
13FD000
heap
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
3E0000
unkown
page readonly
1ED20A46000
unkown
page read and write
5860000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
2DFA3E3C000
unkown
page read and write
150C000
stack
page read and write
21DC7A13000
unkown
page read and write
5730000
trusted library allocation
page read and write
138B000
heap
page read and write
8798F7A000
stack
page read and write
58C0000
trusted library allocation
page read and write
1ED20A5A000
unkown
page read and write
1E32EF02000
unkown
page read and write
1484BA8E000
unkown
page read and write
6D21000
trusted library allocation
page read and write
1E32F7A7000
unkown
page read and write
62B1000
heap
page read and write
6451000
heap
page read and write
15BF000
stack
page read and write
1ED20A57000
unkown
page read and write
5840000
trusted library allocation
page read and write
137A000
heap
page read and write
103A000
stack
page read and write
5734000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
C0927C000
stack
page read and write
43E537F000
stack
page read and write
680000
unkown
page read and write
7D0000
trusted library allocation
page read and write
5F9E000
stack
page read and write
5840000
trusted library allocation
page read and write
1396000
heap
page read and write
58B4000
trusted library allocation
page read and write
5930000
trusted library section
page read and write
21DC7900000
heap
page read and write
8798E79000
stack
page read and write
1BA16902000
unkown
page read and write
1402000
heap
page read and write
2DFA3E4B000
unkown
page read and write
1BA16E70000
remote allocation
page read and write
591E000
stack
page read and write
6300000
trusted library allocation
page read and write
137F000
heap
page read and write
5530000
trusted library allocation
page read and write
1E32EE13000
unkown
page read and write
519E000
stack
page read and write
1E32FC02000
unkown
page read and write
12A8000
heap
page read and write
127E000
heap
page read and write
54FA000
trusted library allocation
page read and write
1484B9B0000
trusted library allocation
page read and write
1397000
heap
page read and write
5410000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
11817330000
heap
page read and write
13F9000
heap
page read and write
5500000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
1E32F74B000
unkown
page read and write
62E8000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32F791000
unkown
page read and write
1341000
heap
page read and write
C08E7E000
stack
page read and write
21DC7A81000
unkown
page read and write
55A0000
heap
page read and write
6730000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
17D10120000
trusted library allocation
page read and write
2DFA3E4E000
unkown
page read and write
6D21000
trusted library allocation
page read and write
1ED21202000
unkown
page read and write
53BA3FD000
stack
page read and write
1380000
heap
page read and write
60DD000
stack
page read and write
6D21000
trusted library allocation
page read and write
1ED20850000
heap
page read and write
2EE8000
trusted library allocation
page read and write
20BC0313000
unkown
page read and write
6D21000
trusted library allocation
page read and write
E9CC4FC000
stack
page read and write
1E32F7B4000
unkown
page read and write
12B8000
heap
page read and write
C0947D000
stack
page read and write
1ED20A3B000
unkown
page read and write
13A2000
heap
page read and write
6D21000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
74F0000
unkown
page read and write
5460000
trusted library allocation
page read and write
1E32F7B9000
unkown
page read and write
5880000
trusted library allocation
page read and write
17D101A0000
unkown
page read and write
302000
unkown
page readonly
1140000
remote allocation
page read and write
58B1000
trusted library allocation
page read and write
309E000
stack
page read and write
6D21000
trusted library allocation
page read and write
13DA000
heap
page read and write
5500000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
1BA16E70000
remote allocation
page read and write
6D21000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
11817464000
unkown
page read and write
12BD000
heap
page read and write
1E32F795000
unkown
page read and write
C90000
unkown
page readonly
6E5D000
stack
page read and write
12C6000
heap
page read and write
6D21000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
1E32F590000
remote allocation
page read and write
20BC0292000
unkown
page read and write
1BA16824000
unkown
page read and write
1E32FC02000
unkown
page read and write
1ED20A69000
unkown
page read and write
34FEFF000
stack
page read and write
1E32F590000
remote allocation
page read and write
400000
remote allocation
page execute and read and write
53B9CCB000
stack
page read and write
1382000
heap
page read and write
6D21000
trusted library allocation
page read and write
1B6A3C68000
heap
page read and write
62D0000
trusted library allocation
page read and write
14B0000
heap
page read and write
11817477000
unkown
page read and write
C90000
unkown
page readonly
5730000
trusted library allocation
page read and write
114497E000
stack
page read and write
5840000
trusted library allocation
page read and write
1398000
heap
page read and write
6D21000
trusted library allocation
page read and write
670D000
stack
page read and write
5730000
trusted library allocation
page read and write
1BA16813000
unkown
page read and write
53BA47E000
stack
page read and write
1E32F787000
unkown
page read and write
34FE7C000
stack
page read and write
5840000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
1E32EF13000
unkown
page read and write
54C0000
trusted library allocation
page read and write
6483000
heap
page read and write
11817400000
unkown
page read and write
1250000
trusted library allocation
page read and write
58ED000
trusted library allocation
page read and write
1ED20A25000
unkown
page read and write
1394000
heap
page read and write
1304000
heap
page read and write
1E32F7B1000
unkown
page read and write
1530000
trusted library allocation
page read and write
1E32EEA7000
unkown
page read and write
2DFA3E70000
unkown
page read and write
634D000
stack
page read and write
428C000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5FA3000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
5960000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
609C000
stack
page read and write
6D21000
trusted library allocation
page read and write
62B1000
heap
page read and write
302000
unkown
page readonly
5840000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
17D0FE70000
unkown
page read and write
6300000
trusted library allocation
page read and write
8BF000
stack
page read and write
1402000
heap
page read and write
6451000
heap
page read and write
1B6A3C46000
heap
page read and write
1484BA5A000
unkown
page read and write
7200000
trusted library allocation
page read and write
1ED20A32000
unkown
page read and write
1E32F78B000
unkown
page read and write
5520000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1140000
remote allocation
page read and write
5890000
trusted library allocation
page read and write
542B000
trusted library allocation
page read and write
13C9000
heap
page read and write
12CB000
heap
page read and write
1E32F795000
unkown
page read and write
1750000
heap
page read and write
DD7000
stack
page read and write
1E32F795000
unkown
page read and write
4A0C000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
6721000
trusted library allocation
page read and write
17D10130000
heap
page readonly
55E0000
trusted library allocation
page read and write
13EB000
heap
page read and write
61C0000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
1E32EE00000
unkown
page read and write
1BA17002000
unkown
page read and write
6D21000
trusted library allocation
page read and write
1E32EE48000
unkown
page read and write
6D21000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
C92000
unkown
page readonly
1E32F7AD000
unkown
page read and write
17D0F550000
trusted library allocation
page read and write
1543000
trusted library allocation
page execute and read and write
12B3000
heap
page read and write
34BD000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1E32F771000
unkown
page read and write
5570000
trusted library allocation
page read and write
5530000
trusted library allocation
page execute and read and write
6D21000
trusted library allocation
page read and write
1E32EE49000
unkown
page read and write
5890000
trusted library allocation
page read and write
1484BA4A000
unkown
page read and write
62B1000
heap
page read and write
647F000
heap
page read and write
1E32EEA8000
unkown
page read and write
21DC7A3C000
unkown
page read and write
12D2000
heap
page read and write
1E32F700000
unkown
page read and write
7B0000
remote allocation
page read and write
6690000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
21DC7B08000
unkown
page read and write
6C2F000
stack
page read and write
1B6A3C73000
heap
page read and write
63C7000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
67CE000
unkown
page read and write
1E32FC63000
unkown
page read and write
60A0000
trusted library section
page read and write
6D21000
trusted library allocation
page read and write
6305000
trusted library allocation
page read and write
1484BA00000
unkown
page read and write
5A70000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
20BC0276000
unkown
page read and write
58E0000
trusted library allocation
page read and write
13F3000
heap
page read and write
71F0000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
73CE000
stack
page read and write
2DFA3E13000
unkown
page read and write
1E32F793000
unkown
page read and write
17D0F2F4000
heap
page read and write
3F8000
unkown
page readonly
74CE000
unkown
page read and write
1390000
heap
page read and write
1E32F787000
unkown
page read and write
5401000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
54E0000
trusted library allocation
page execute and read and write
5530000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
5480000
heap
page read and write
5958000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
7500000
unkown
page read and write
62D6000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1BA16802000
unkown
page read and write
6451000
heap
page read and write
6CE6000
unkown
page read and write
13EB000
heap
page read and write
12BD000
heap
page read and write
58B0000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
13F0000
heap
page read and write
114417B000
stack
page read and write
E9CC1DF000
stack
page read and write
31C2000
trusted library allocation
page read and write
17D101A0000
trusted library allocation
page read and write
6451000
heap
page read and write
61B0000
trusted library allocation
page read and write
C90000
unkown
page readonly
2ECD000
stack
page read and write
1E32EE52000
unkown
page read and write
17D0F314000
heap
page read and write
58B0000
trusted library allocation
page read and write
6BDE000
stack
page read and write
13F9000
heap
page read and write
20BC0A02000
unkown
page read and write
54C0000
trusted library allocation
page read and write
647D000
heap
page read and write
6D21000
trusted library allocation
page read and write
6451000
heap
page read and write
7FB40000
trusted library allocation
page execute and read and write
6451000
heap
page read and write
5840000
trusted library allocation
page read and write
2F40000
heap
page read and write
5960000
trusted library allocation
page read and write
2F97000
heap
page read and write
6DCD000
stack
page read and write
1E32F791000
unkown
page read and write
12B8000
heap
page read and write
415EC77000
stack
page read and write
71E0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
13F4000
heap
page read and write
6D21000
trusted library allocation
page read and write
CDB000
stack
page read and write
E9CC97E000
stack
page read and write
12D2000
heap
page read and write
1ED20A29000
unkown
page read and write
17D10140000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
1E32F78D000
unkown
page read and write
6D21000
trusted library allocation
page read and write
1ED20950000
unkown
page read and write
5960000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
300000
unkown
page readonly
12B8000
heap
page read and write
1E32F78B000
unkown
page read and write
678D000
stack
page read and write
6D21000
trusted library allocation
page read and write
302000
unkown
page readonly
6250000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
1E32EE3C000
unkown
page read and write
1E32EEBD000
unkown
page read and write
54C0000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
13FB000
heap
page read and write
5840000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32F7B6000
unkown
page read and write
5890000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
2DFA3E49000
unkown
page read and write
352E000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
21DC7A4B000
unkown
page read and write
1ED20A40000
unkown
page read and write
9F8000
heap
page read and write
12AE000
heap
page read and write
5840000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
1BA16800000
unkown
page read and write
3F51000
trusted library allocation
page read and write
71A0000
unkown
page read and write
11817440000
unkown
page read and write
6D21000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
1B6A3C61000
heap
page read and write
5880000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
7B0000
remote allocation
page read and write
5620000
trusted library allocation
page read and write
1E32FC00000
unkown
page read and write
552F000
trusted library allocation
page read and write
6F9D000
stack
page read and write
84B37F000
stack
page read and write
58B0000
trusted library allocation
page read and write
13F4000
heap
page read and write
13F0000
heap
page read and write
17D0F308000
heap
page read and write
1ED20A00000
unkown
page read and write
6F00000
trusted library allocation
page read and write
1E32EEC4000
unkown
page read and write
5890000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1484BA02000
unkown
page read and write
5508000
trusted library allocation
page read and write
1E32F785000
unkown
page read and write
5521000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
1E32F76E000
unkown
page read and write
6D21000
trusted library allocation
page read and write
1E32F602000
unkown
page read and write
167D000
stack
page read and write
1402000
heap
page read and write
1271000
heap
page read and write
1210000
trusted library allocation
page read and write
3F8000
unkown
page readonly
2E2B000
trusted library allocation
page execute and read and write
6D21000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
21DC7A6F000
unkown
page read and write
1E32ED00000
heap
page read and write
69AE000
stack
page read and write
1484BA3D000
unkown
page read and write
13C0000
heap
page read and write
1BA1683D000
unkown
page read and write
2DFA3E7C000
unkown
page read and write
1307000
heap
page read and write
17D10150000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1181745B000
unkown
page read and write
6260000
trusted library allocation
page read and write
D88000
unkown
page readonly
6D21000
trusted library allocation
page read and write
300000
unkown
page readonly
87992FF000
stack
page read and write
6250000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
3F8000
unkown
page readonly
1E32F76A000
unkown
page read and write
13FD000
heap
page read and write
139F000
heap
page read and write
13BB000
heap
page read and write
6180000
trusted library allocation
page read and write
6250000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
1E32F787000
unkown
page read and write
E78587E000
stack
page read and write
6300000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
13FB000
heap
page read and write
58D0000
heap
page read and write
3500FF000
stack
page read and write
6D21000
trusted library allocation
page read and write
63E5000
trusted library allocation
page read and write
17D0F240000
heap
page read and write
13F1000
heap
page read and write
E9CC57F000
stack
page read and write
1ED20A64000
unkown
page read and write
13E6000
heap
page read and write
C92000
unkown
page readonly
1ED20A47000
unkown
page read and write
662E000
stack
page read and write
5560000
trusted library allocation
page read and write
1397000
heap
page read and write
1143D1C000
stack
page read and write
6D21000
trusted library allocation
page read and write
C0907F000
stack
page read and write
87991F8000
stack
page read and write
D88000
unkown
page readonly
5730000
trusted library allocation
page read and write
5FA1000
trusted library allocation
page read and write
5493000
heap
page read and write
1375000
heap
page read and write
58A0000
trusted library allocation
page read and write
13F4000
heap
page read and write
5880000
trusted library allocation
page read and write
62B1000
heap
page read and write
1ED20A4E000
unkown
page read and write
6D21000
trusted library allocation
page read and write
352A000
trusted library allocation
page read and write
D88000
unkown
page readonly
1E32F7B2000
unkown
page read and write
21DC79A0000
unkown
page read and write
17D0F2ED000
heap
page read and write
1484B9E0000
remote allocation
page read and write
424C000
trusted library allocation
page read and write
647C000
heap
page read and write
1E32EDA0000
unkown
page read and write
6451000
heap
page read and write
11817402000
unkown
page read and write
31D4000
trusted library allocation
page read and write
415EE79000
stack
page read and write
5880000
trusted library allocation
page read and write
1B6A3C73000
heap
page read and write
17D0F540000
heap
page read and write
581C000
stack
page read and write
5A1E000
stack
page read and write
6250000
trusted library allocation
page read and write
C92000
unkown
page readonly
108E000
stack
page read and write
422000
remote allocation
page execute and read and write
31B5000
trusted library allocation
page read and write
C0917C000
stack
page read and write
1135000
stack
page read and write
17D0FED0000
trusted library allocation
page read and write
40FF000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
628D000
stack
page read and write
422000
remote allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
1E32EE4E000
unkown
page read and write
5630000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
B52000
unkown
page readonly
12CD000
stack
page read and write
550C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1B6A3C55000
heap
page read and write
300000
unkown
page readonly
7160000
trusted library allocation
page read and write
1E32F795000
unkown
page read and write
1550000
trusted library allocation
page read and write
302000
unkown
page readonly
6B2E000
stack
page read and write
5970000
trusted library allocation
page read and write
415EA7B000
stack
page read and write
1384000
heap
page read and write
E9CC0DB000
stack
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1E32F76C000
unkown
page read and write
5570000
trusted library allocation
page read and write
508B000
stack
page read and write
5500000
trusted library allocation
page read and write
2DFA3F00000
unkown
page read and write
1222000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
40A1000
trusted library allocation
page read and write
1ED20A5C000
unkown
page read and write
2ED0000
heap
page execute and read and write
1BA16680000
heap
page read and write
1E32ED70000
heap
page read and write
1140000
remote allocation
page read and write
1402000
heap
page read and write
5620000
trusted library allocation
page execute and read and write
E7859FB000
stack
page read and write
1140000
remote allocation
page read and write
6D21000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
13E8000
heap
page read and write
53D0000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
1ED20A42000
unkown
page read and write
1ED20A84000
unkown
page read and write
2E6E000
stack
page read and write
1484B9E0000
remote allocation
page read and write
5960000
trusted library allocation
page read and write
7CE000
stack
page read and write
6D21000
trusted library allocation
page read and write
1E32F7BF000
unkown
page read and write
5870000
trusted library allocation
page execute and read and write
5430000
trusted library allocation
page read and write
20BC024B000
unkown
page read and write
1E32EEDE000
unkown
page read and write
1484BB00000
unkown
page read and write
148E000
stack
page read and write
1E32EE4B000
unkown
page read and write
1ED20A3D000
unkown
page read and write
62AD000
stack
page read and write
62D0000
trusted library allocation
page read and write
8798FFF000
stack
page read and write
62E0000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
13FD000
heap
page read and write
5860000
trusted library allocation
page read and write
1E32EEF3000
unkown
page read and write
6D50000
trusted library allocation
page read and write
84B27E000
stack
page read and write
1181741E000
unkown
page read and write
61A0000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1ED20A13000
unkown
page read and write
C08F7F000
stack
page read and write
1E32F711000
unkown
page read and write
1E32F789000
unkown
page read and write
13C0000
heap
page read and write
10CE000
stack
page read and write
5960000
trusted library allocation
page read and write
3E0000
unkown
page readonly
E7858FE000
stack
page read and write
1ED20A7E000
unkown
page read and write
4F8D000
stack
page read and write
5950000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
1570000
heap
page read and write
20BC0180000
unkown
page read and write
415ED7F000
stack
page read and write
2DFA3D70000
unkown
page read and write
1E32EF08000
unkown
page read and write
6710000
trusted library allocation
page read and write
6451000
heap
page read and write
668D000
stack
page read and write
5A9F000
stack
page read and write
13D9000
heap
page read and write
58C0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
2DFA3F02000
unkown
page read and write
5960000
trusted library allocation
page read and write
21DC7A4D000
unkown
page read and write
5FDE000
trusted library allocation
page read and write
E9CC777000
stack
page read and write
5730000
trusted library allocation
page read and write
87E000
stack
page read and write
1E32F7A6000
unkown
page read and write
1E32F795000
unkown
page read and write
6D21000
trusted library allocation
page read and write
647C000
heap
page read and write
1B6A3C41000
heap
page read and write
34C9000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
2DFA3E56000
unkown
page read and write
21DC7B13000
unkown
page read and write
71F0000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1E32F774000
unkown
page read and write
5890000
trusted library allocation
page read and write
1484BA4D000
unkown
page read and write
1484B9E0000
remote allocation
page read and write
1E32FC02000
unkown
page read and write
6D21000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1ED20A7A000
unkown
page read and write
5870000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
1484BA2A000
unkown
page read and write
12C3000
heap
page read and write
426C000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
35007E000
stack
page read and write
3F8000
unkown
page readonly
D88000
unkown
page readonly
C90000
unkown
page readonly
5890000
trusted library allocation
page read and write
122B000
trusted library allocation
page execute and read and write
61AD000
stack
page read and write
6AEF000
stack
page read and write
6255000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
There are 1324 hidden memdumps, click here to show them.