IOC Report

loading gif

Files

File Path
Type
Category
Malicious
evilnominatuscrypto.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\ThumbCacheToDelete\thm6B05.tmp (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
data
dropped
C:\Users\user\Desktop\autorun.inf
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\evilnominatuscrypto.exe
"C:\Users\user\Desktop\evilnominatuscrypto.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C echo ^[autorun^] >autorun.inf
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C echo ^open^=KasperskyScan^.exe >>autorun.inf
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C echo ^execute=^KasperskyScan^.exe >>autorun.inf
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet && wmic shadowcopy delete
malicious
C:\Windows\SysWOW64\vssadmin.exe
vssadmin delete shadows /all /quiet
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.tiro.com8
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.zhongyicts.com.cnva
unknown
http://www.fontbureau.comld
unknown
http://www.fontbureau.comm
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.sandoll.co.krim
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fontbureau.comv
unknown
http://www.fonts.com
unknown
http://www.founder.com.cn/cn-%
unknown
http://www.founder.com.cn/cn/_$
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 24 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files\Common Files\Microsoft Shared\Office16\oregres.dll,-205
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@wmploc.dll,-102
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFilesHash
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2421000
trusted library allocation
page read and write
malicious
1C0AC960000
heap
page read and write
6F80000
trusted library allocation
page read and write
D3A79FB000
stack
page read and write
26F3A24E000
unkown
page read and write
3320000
trusted library allocation
page read and write
1C0AAB22000
heap
page read and write
1C0B14E0000
heap
page read and write
DD0F000
trusted library allocation
page read and write
26F3A28A000
unkown
page read and write
1C0ACA45000
heap
page read and write
53C4000
trusted library allocation
page read and write
19C6CE13000
unkown
page read and write
4428000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
1C0AAB2B000
heap
page read and write
53BB000
trusted library allocation
page read and write
1C0ACA57000
heap
page read and write
2E4F7F60000
trusted library allocation
page read and write
71A000
heap
page read and write
1C0AAAE7000
heap
page read and write
775000
heap
page read and write
53B6000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
26F3A23C000
unkown
page read and write
5370000
trusted library allocation
page read and write
1C0AAAE6000
heap
page read and write
2E4FC240000
trusted library allocation
page read and write
21CA6895000
heap
page read and write
2E50000
heap
page read and write
53A5000
trusted library allocation
page read and write
20586C4F000
unkown
page read and write
1C0AC871000
heap
page read and write
5394000
trusted library allocation
page read and write
2D70000
unkown
page readonly
22E6FB83000
unkown
page read and write
A52000
trusted library allocation
page read and write
1C0AC310000
heap
page read and write
B0770FE000
stack
page read and write
49E0000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
2E4F7504000
unkown
page read and write
22E6FB74000
unkown
page read and write
53C4000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
1C0AAAF8000
heap
page read and write
22E6F254000
unkown
page read and write
22E6F2BF000
unkown
page read and write
53C4000
trusted library allocation
page read and write
26F3A27E000
unkown
page read and write
4EEE000
stack
page read and write
53BA000
trusted library allocation
page read and write
7BE3F7F000
stack
page read and write
53C4000
trusted library allocation
page read and write
20586BA0000
unkown
page read and write
2333FF40000
heap
page read and write
2FB0000
unkown
page readonly
19C6CE02000
unkown
page read and write
2AC0000
heap
page read and write
27234202000
unkown
page read and write
1C0ACA13000
heap
page read and write
6F90000
trusted library allocation
page read and write
1C0AEF08000
heap
page read and write
53C4000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
34F0000
heap
page read and write
1C0ACA2E000
heap
page read and write
53C4000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
22E6FB9D000
unkown
page read and write
1C0AC9C3000
heap
page read and write
26F3A313000
unkown
page read and write
53C4000
trusted library allocation
page read and write
2333FC9D000
heap
page read and write
2E4FC450000
remote allocation
page read and write
26F3A930000
unkown
page read and write
24DDEE15000
heap
page read and write
1C0AAAF3000
heap
page read and write
1C0AAB08000
heap
page read and write
1C0AAAB9000
heap
page read and write
1C0AC88A000
heap
page read and write
2E4FC450000
remote allocation
page read and write
2E20000
heap
page read and write
331D000
stack
page read and write
1C0AF390000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AEF05000
heap
page read and write
5397000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
1C0ACA2E000
heap
page read and write
22E6F2F9000
unkown
page read and write
22E70002000
unkown
page read and write
22E6FBAB000
unkown
page read and write
539F000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6FB8B000
unkown
page read and write
1C0AC877000
heap
page read and write
2E4FC540000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AAB25000
heap
page read and write
1C0ACA59000
heap
page read and write
539B000
trusted library allocation
page read and write
1C0ACA0B000
heap
page read and write
5395000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
2D90000
unkown
page read and write
2E4FC1C0000
trusted library allocation
page read and write
22E6F308000
unkown
page read and write
22E6FB73000
unkown
page read and write
20586C49000
unkown
page read and write
1C0ACA57000
heap
page read and write
2E21000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
2E4FBFD0000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
272338C0000
heap
page read and write
1C0AC8A1000
heap
page read and write
1C0AAAB0000
heap
page read and write
5390000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
D3A7DFF000
stack
page read and write
1C0ACA13000
heap
page read and write
6980000
trusted library allocation
page read and write
FE2D000
trusted library allocation
page read and write
1C0ACA45000
heap
page read and write
53B5000
trusted library allocation
page read and write
22E6F24B000
unkown
page read and write
1C0AC9FD000
heap
page read and write
53C4000
trusted library allocation
page read and write
3059000
heap
page read and write
227E000
stack
page read and write
53B3000
trusted library allocation
page read and write
1C0AEFC3000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0B0E04000
trusted library allocation
page read and write
240E000
trusted library allocation
page read and write
2B50000
unkown
page read and write
1C0ACA2E000
heap
page read and write
1C0AC8A4000
heap
page read and write
923DEFD000
stack
page read and write
22E6F200000
unkown
page read and write
923E1F7000
stack
page read and write
22E6FBAD000
unkown
page read and write
22E6FB71000
unkown
page read and write
7120000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
22E6F2A5000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AEF18000
heap
page read and write
5388000
trusted library allocation
page read and write
1C0AC9BD000
heap
page read and write
23CE000
stack
page read and write
1C0AAAAD000
heap
page read and write
78C000
heap
page read and write
1C0AC98D000
heap
page read and write
538D000
trusted library allocation
page read and write
78B000
heap
page read and write
4BA0000
trusted library allocation
page read and write
2E4FC120000
trusted library allocation
page read and write
1C0ACA57000
heap
page read and write
20586C00000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AAB02000
heap
page read and write
53C4000
trusted library allocation
page read and write
2E4FC400000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
CF18000
trusted library allocation
page read and write
1C0AC9FD000
heap
page read and write
53A6000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
23340A70000
heap
page readonly
37D6000
heap
page read and write
22E6F252000
unkown
page read and write
27233A70000
unkown
page read and write
26F3A250000
unkown
page read and write
27233B13000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AC899000
heap
page read and write
49E0000
trusted library allocation
page read and write
1C0AC89B000
heap
page read and write
777000
heap
page read and write
7BE3BFF000
stack
page read and write
1C0AAAFE000
heap
page read and write
1C0ACA2E000
heap
page read and write
53A4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AAAB1000
heap
page read and write
2F90000
heap
page read and write
22E6F251000
unkown
page read and write
1C0AAA4F000
heap
page read and write
1C0AC8B2000
heap
page read and write
2E4F7559000
unkown
page read and write
53B6000
trusted library allocation
page read and write
1C0AAB3B000
heap
page read and write
9331000
trusted library allocation
page read and write
743000
heap
page read and write
2E4F7500000
unkown
page read and write
781000
heap
page read and write
2980000
unkown
page read and write
22E6FBC1000
unkown
page read and write
3200000
trusted library allocation
page read and write
1C0AEF1C000
heap
page read and write
1C0ACA2E000
heap
page read and write
22E6FBD1000
unkown
page read and write
1C0AC898000
heap
page read and write
21CA666E000
heap
page read and write
1C0AC9A3000
heap
page read and write
712A000
trusted library allocation
page read and write
1C0ACA1C000
heap
page read and write
53C4000
trusted library allocation
page read and write
2B50000
unkown
page read and write
539F000
trusted library allocation
page read and write
24DDEBDE000
heap
page read and write
4F2F000
stack
page read and write
5395000
trusted library allocation
page read and write
1C0ACA45000
heap
page read and write
1C0AC8A1000
heap
page read and write
1C0AA9E0000
heap
page read and write
53B5000
trusted library allocation
page read and write
26F3A308000
unkown
page read and write
27233A47000
unkown
page read and write
22E7009D000
unkown
page read and write
22E6FB88000
unkown
page read and write
295D000
stack
page read and write
770000
heap
page read and write
22E6FB19000
unkown
page read and write
2E4FC0FE000
trusted library allocation
page read and write
32F2000
heap
page read and write
53AF000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
923DE7E000
stack
page read and write
1C0AC993000
heap
page read and write
539D000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
7BE3E7E000
stack
page read and write
69BE000
stack
page read and write
1C0B15E0000
heap
page read and write
1C0ACA1C000
heap
page read and write
53A5000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA2E000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA57000
heap
page read and write
20586D02000
unkown
page read and write
2FFC000
stack
page read and write
A4D000
trusted library allocation
page execute and read and write
53AF000
trusted library allocation
page read and write
2E4F6CFC000
unkown
page read and write
1C0AEF3F000
heap
page read and write
2E4FC1C0000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
170000
unkown
page readonly
53C4000
trusted library allocation
page read and write
1C0AC871000
heap
page read and write
53AB000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
1C0B0E22000
trusted library allocation
page read and write
22E6FB73000
unkown
page read and write
1C0ACA51000
heap
page read and write
1C0AC8B2000
heap
page read and write
22E6FB9C000
unkown
page read and write
28F0000
heap
page read and write
712A000
trusted library allocation
page read and write
19C6CBB0000
heap
page read and write
4B80000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
323E000
stack
page read and write
3420000
heap
page read and write
5393000
trusted library allocation
page read and write
27233B00000
unkown
page read and write
20586C4B000
unkown
page read and write
53AD000
trusted library allocation
page read and write
FD46000
trusted library allocation
page read and write
1C0AEF31000
heap
page read and write
53A5000
trusted library allocation
page read and write
1C0AC9E7000
heap
page read and write
1C0AC9CE000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
21CA6664000
heap
page read and write
26F3A170000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
1C0AC8A1000
heap
page read and write
690000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
22E6F9B0000
remote allocation
page read and write
4B70000
trusted library allocation
page read and write
3426000
heap
page read and write
B21457E000
stack
page read and write
5395000
trusted library allocation
page read and write
798000
heap
page read and write
22E6FBA0000
unkown
page read and write
22E6FB71000
unkown
page read and write
1C0AC8B2000
heap
page read and write
24DDEBDE000
heap
page read and write
539B000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
5398000
trusted library allocation
page read and write
D50A7F9000
stack
page read and write
6D0000
trusted library allocation
page read and write
1C0AC9C3000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6FB41000
unkown
page read and write
1C0AEF31000
heap
page read and write
2970000
unkown
page readonly
1C0AAAB7000
heap
page read and write
22E6FBCE000
unkown
page read and write
B2146FE000
stack
page read and write
49A0000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
1C0AC88F000
heap
page read and write
22E6F9B0000
remote allocation
page read and write
539D000
trusted library allocation
page read and write
1C0AC89A000
heap
page read and write
1C0ACA45000
heap
page read and write
22E6FB4E000
unkown
page read and write
22E6F120000
heap
page read and write
1C0ACA2E000
heap
page read and write
53C4000
trusted library allocation
page read and write
76B000
heap
page read and write
1C0ACA2E000
heap
page read and write
49E0000
trusted library allocation
page read and write
1C0AC89D000
heap
page read and write
6F80000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
784000
heap
page read and write
7BE3CF8000
stack
page read and write
53A4000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
1C0AC89A000
heap
page read and write
43A000
stack
page read and write
1C0AC861000
heap
page read and write
20586C29000
unkown
page read and write
2333FF49000
heap
page read and write
C8010FF000
stack
page read and write
53C4000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
22E6FBAD000
unkown
page read and write
22E6F2F4000
unkown
page read and write
22E70100000
unkown
page read and write
53B9000
trusted library allocation
page read and write
1C0ACA0B000
heap
page read and write
539B000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1C0AEF2F000
heap
page read and write
4E50000
trusted library allocation
page read and write
78D000
heap
page read and write
1C0ACA5C000
heap
page read and write
53C4000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
24DDEBD7000
heap
page read and write
20586C78000
unkown
page read and write
785000
heap
page read and write
1C0ACA0B000
heap
page read and write
A5A000
trusted library allocation
page execute and read and write
2333FB20000
trusted library allocation
page read and write
1C0ACA0B000
heap
page read and write
2960000
unkown
page readonly
3151000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
C800CFB000
stack
page read and write
4931000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
1C0AAB25000
heap
page read and write
22E6FBB5000
unkown
page read and write
53A3000
trusted library allocation
page read and write
2410000
heap
page execute and read and write
1C0AAAD6000
heap
page read and write
4914000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
1C0AAACF000
heap
page read and write
2333FC9D000
heap
page read and write
1C0ACA5C000
heap
page read and write
1C0AEF05000
heap
page read and write
2E4F7558000
unkown
page read and write
1C0AC897000
heap
page read and write
783000
heap
page read and write
4D9E000
stack
page read and write
22E6F248000
unkown
page read and write
53C4000
trusted library allocation
page read and write
22E6FBAD000
unkown
page read and write
2E9D000
stack
page read and write
53B6000
trusted library allocation
page read and write
D3A78FF000
stack
page read and write
53C4000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
1C0AC9B5000
heap
page read and write
2333FC9D000
heap
page read and write
1C0AC9FD000
heap
page read and write
5398000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
1C0AC897000
heap
page read and write
6F50000
trusted library section
page read and write
22E6FB7E000
unkown
page read and write
53C4000
trusted library allocation
page read and write
26F3A271000
unkown
page read and write
19C6D402000
unkown
page read and write
77F000
heap
page read and write
1C0AAB37000
heap
page read and write
27233A4C000
unkown
page read and write
1C0ACA45000
heap
page read and write
22E6FB75000
unkown
page read and write
53A6000
trusted library allocation
page read and write
1C0ACA59000
heap
page read and write
53C4000
trusted library allocation
page read and write
22E6F130000
heap
page read and write
53C4000
trusted library allocation
page read and write
6970000
trusted library allocation
page execute and read and write
76F000
heap
page read and write
26F3A200000
unkown
page read and write
26F3A229000
unkown
page read and write
23340810000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
1C0AAAD2000
heap
page read and write
22E6FBC1000
unkown
page read and write
923DFFB000
stack
page read and write
22E6FBC0000
unkown
page read and write
53C4000
trusted library allocation
page read and write
79A000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
1C0AAACE000
heap
page read and write
2333FC58000
heap
page read and write
1C0AEEF4000
heap
page read and write
22E6FBC9000
unkown
page read and write
4E60000
heap
page read and write
53B5000
trusted library allocation
page read and write
20586C13000
unkown
page read and write
53C4000
trusted library allocation
page read and write
A8D000
heap
page read and write
1C0ACA1C000
heap
page read and write
26F3A280000
unkown
page read and write
53C4000
trusted library allocation
page read and write
2D90000
unkown
page read and write
1C0AEF17000
heap
page read and write
53A6000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
777000
heap
page read and write
19C6CC20000
heap
page read and write
53AF000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
1C0ACA0B000
heap
page read and write
1C0AC89A000
heap
page read and write
5390000
trusted library allocation
page read and write
923E3FF000
stack
page read and write
1C0AEF31000
heap
page read and write
D3A7CFE000
stack
page read and write
49E0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
2E4FC430000
trusted library allocation
page read and write
1C0AC9C3000
heap
page read and write
1C0ACA2E000
heap
page read and write
5392000
trusted library allocation
page read and write
8B30000
trusted library allocation
page read and write
27233A75000
unkown
page read and write
1C0AEF13000
heap
page read and write
BCCD000
trusted library allocation
page read and write
30FF000
stack
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
539A000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
22E6FBCF000
unkown
page read and write
1C0ACA57000
heap
page read and write
53C4000
trusted library allocation
page read and write
A56000
trusted library allocation
page execute and read and write
1C0AEF2A000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AC9B5000
heap
page read and write
1C0AC9BB000
heap
page read and write
1C0ACA0B000
heap
page read and write
1C0ACA45000
heap
page read and write
2333FD70000
heap
page read and write
1C0AC8B2000
heap
page read and write
2D70000
unkown
page readonly
53C4000
trusted library allocation
page read and write
22E6FB9C000
unkown
page read and write
53C4000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
22E6FB72000
unkown
page read and write
B214A7A000
stack
page read and write
2E4F6D02000
unkown
page read and write
22E6FB8F000
unkown
page read and write
1C0AC8B2000
heap
page read and write
1C0AC9FF000
heap
page read and write
92D000
trusted library allocation
page execute and read and write
22E6FBC2000
unkown
page read and write
4925000
trusted library allocation
page read and write
1C0AC9FF000
heap
page read and write
539F000
trusted library allocation
page read and write
4960000
heap
page read and write
4B70000
trusted library allocation
page read and write
27233860000
heap
page read and write
76B000
heap
page read and write
1C0AC9FD000
heap
page read and write
5221E7E000
stack
page read and write
22E6FB5C000
unkown
page read and write
AFD12FE000
stack
page read and write
538A000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
21CA6890000
heap
page read and write
2E4F7AE0000
trusted library allocation
page read and write
22E6FB7C000
unkown
page read and write
2B40000
unkown
page readonly
539F000
trusted library allocation
page read and write
7BE37FF000
stack
page read and write
3641000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
1C0AC8A1000
heap
page read and write
7A5000
heap
page read and write
1C0ACA0B000
heap
page read and write
1C0ACA5A000
heap
page read and write
4E6E000
stack
page read and write
24DDEB70000
heap
page read and write
23340820000
trusted library allocation
page read and write
22E70002000
unkown
page read and write
1C0AAACE000
heap
page read and write
2EFE000
stack
page read and write
2333FC50000
heap
page read and write
7BE336B000
stack
page read and write
539E000
trusted library allocation
page read and write
2E4FC450000
remote allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6F229000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA1C000
heap
page read and write
5398000
trusted library allocation
page read and write
D50A979000
stack
page read and write
9A74000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
26F3A24C000
unkown
page read and write
539D000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
3645000
heap
page read and write
5395000
trusted library allocation
page read and write
1C0AC9BB000
heap
page read and write
1C0AAB38000
heap
page read and write
49C0000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
789000
heap
page read and write
798000
heap
page read and write
777000
heap
page read and write
2E0E000
stack
page read and write
27233A29000
unkown
page read and write
32F6000
heap
page read and write
21CA6657000
heap
page read and write
2FA0000
unkown
page readonly
7127000
trusted library allocation
page read and write
22E6FB5C000
unkown
page read and write
27233A8F000
unkown
page read and write
9A62000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
1C0ACA13000
heap
page read and write
22E6FBCD000
unkown
page read and write
539B000
trusted library allocation
page read and write
22E6FB86000
unkown
page read and write
1C0AEF1C000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AAAFF000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA1C000
heap
page read and write
B07707A000
stack
page read and write
53C4000
trusted library allocation
page read and write
22E6FBA0000
unkown
page read and write
53C4000
trusted library allocation
page read and write
233407A0000
trusted library allocation
page read and write
1C0AC893000
heap
page read and write
2333FD50000
heap
page read and write
22E6F9B0000
remote allocation
page read and write
1C0AEF2A000
heap
page read and write
6F90000
trusted library allocation
page read and write
B214476000
stack
page read and write
1C0ACA0B000
heap
page read and write
1C0AF0BB000
heap
page read and write
5390000
trusted library allocation
page read and write
1C0AC9C3000
heap
page read and write
1C0AAA40000
heap
page read and write
1C0AAB32000
heap
page read and write
1C0AC9FD000
heap
page read and write
23D0000
trusted library allocation
page execute and read and write
D3A7BF7000
stack
page read and write
20586B70000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AC9FD000
heap
page read and write
77B000
heap
page read and write
53A5000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
9D31000
trusted library allocation
page read and write
1C0ACA1C000
heap
page read and write
A67000
trusted library allocation
page execute and read and write
1C0ACA57000
heap
page read and write
2BD0000
trusted library allocation
page read and write
1C0ACA13000
heap
page read and write
53C4000
trusted library allocation
page read and write
2E4F7518000
unkown
page read and write
1C0AA8A0000
heap
page read and write
31F6000
heap
page read and write
22E6FB9C000
unkown
page read and write
53B8000
trusted library allocation
page read and write
22E70002000
unkown
page read and write
7320000
trusted library allocation
page read and write
22E6FB69000
unkown
page read and write
22E6F281000
unkown
page read and write
923E0FB000
stack
page read and write
53C4000
trusted library allocation
page read and write
FD8E000
trusted library allocation
page read and write
27233A3C000
unkown
page read and write
1C0AC9C3000
heap
page read and write
172000
unkown
page readonly
345E000
stack
page read and write
C800AFF000
stack
page read and write
5020000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
B0771FC000
stack
page read and write
172000
unkown
page readonly
1C0ACA13000
heap
page read and write
3151000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
1C0AC87D000
heap
page read and write
76B000
heap
page read and write
53C4000
trusted library allocation
page read and write
24DDEBC7000
heap
page read and write
1C0AC9A1000
heap
page read and write
2E4FC120000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
7F3000
heap
page read and write
53C4000
trusted library allocation
page read and write
24DDEBC2000
heap
page read and write
5392000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
1C0AC880000
heap
page read and write
53C4000
trusted library allocation
page read and write
6BFE000
stack
page read and write
1C0ACA45000
heap
page read and write
910000
trusted library allocation
page read and write
2E4FC0F8000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
1C0AC9FF000
heap
page read and write
2B30000
unkown
page readonly
76D000
heap
page read and write
22E6F2B1000
unkown
page read and write
53AD000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
22E6FB87000
unkown
page read and write
23340AE0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6F2D4000
unkown
page read and write
3331000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
5396000
trusted library allocation
page read and write
1C0AAAE0000
heap
page read and write
A43000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
1C0AC871000
heap
page read and write
2280000
heap
page read and write
53A4000
trusted library allocation
page read and write
4BFC000
stack
page read and write
53C4000
trusted library allocation
page read and write
21CA6651000
heap
page read and write
3320000
trusted library allocation
page read and write
1C0AC9BD000
heap
page read and write
2E4FBF60000
trusted library allocation
page read and write
20586C4A000
unkown
page read and write
1C0AEF06000
heap
page read and write
D50A3CB000
stack
page read and write
53B6000
trusted library allocation
page read and write
34F7000
heap
page read and write
1C0AC8A4000
heap
page read and write
539B000
trusted library allocation
page read and write
22E70002000
unkown
page read and write
AFD137F000
stack
page read and write
21CA65C0000
heap
page read and write
4980000
trusted library allocation
page read and write
2E4FC114000
trusted library allocation
page read and write
22E6FB8D000
unkown
page read and write
1C0AC99E000
heap
page read and write
1C0AAA56000
heap
page read and write
26F3A251000
unkown
page read and write
6470000
trusted library allocation
page read and write
22E6FB80000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AC9BB000
heap
page read and write
362F000
stack
page read and write
24DDEBDE000
heap
page read and write
4990000
trusted library allocation
page read and write
1C0AC860000
heap
page read and write
D50A9FA000
stack
page read and write
29FE000
stack
page read and write
53C4000
trusted library allocation
page read and write
3080000
heap
page read and write
1C0AC8A8000
heap
page read and write
53B6000
trusted library allocation
page read and write
6F70000
trusted library section
page read and write
53B6000
trusted library allocation
page read and write
1C0AC89E000
heap
page read and write
539A000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
26F3A213000
unkown
page read and write
C800BFB000
stack
page read and write
1C0AC8B2000
heap
page read and write
AFD14FF000
stack
page read and write
1C0AEF29000
heap
page read and write
1C0AAB0E000
heap
page read and write
21CA6460000
heap
page read and write
53B3000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AAB05000
heap
page read and write
53C4000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
27233B08000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
1C0AC87A000
heap
page read and write
4E2F000
stack
page read and write
20586D08000
unkown
page read and write
20586D00000
unkown
page read and write
32B0000
heap
page read and write
1C0ACA0B000
heap
page read and write
2D70000
unkown
page readonly
1C0AC9BB000
heap
page read and write
1C0AC9BB000
heap
page read and write
7BE367E000
stack
page read and write
27233A51000
unkown
page read and write
539B000
trusted library allocation
page read and write
1C0AC9A1000
heap
page read and write
26F3A1D0000
heap
page read and write
5397000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
1C0AAA53000
heap
page read and write
5390000
trusted library allocation
page read and write
2BCE000
stack
page read and write
53C4000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
1C0AC896000
heap
page read and write
1C0AAAE0000
heap
page read and write
5390000
trusted library allocation
page read and write
22E6FB87000
unkown
page read and write
539B000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
710000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AAAC8000
heap
page read and write
538F000
trusted library allocation
page read and write
2970000
unkown
page readonly
539B000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
22E6FB6F000
unkown
page read and write
27233A81000
unkown
page read and write
53A7000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
B214B7E000
stack
page read and write
53B8000
trusted library allocation
page read and write
24DDEB50000
heap
page read and write
1C0ACA1C000
heap
page read and write
5391000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
27233A50000
unkown
page read and write
1C0AC9FD000
heap
page read and write
C8007AC000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4963000
heap
page read and write
49E0000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
2960000
unkown
page readonly
53C4000
trusted library allocation
page read and write
22E6F24A000
unkown
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
4991000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
799000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6FA02000
unkown
page read and write
1C0AEF13000
heap
page read and write
1C0AEF35000
heap
page read and write
1C0AC9A1000
heap
page read and write
1C0AC9C3000
heap
page read and write
4E40000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
53B6000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6FB8B000
unkown
page read and write
1C0ACA59000
heap
page read and write
22E6F2A7000
unkown
page read and write
1C0AAA10000
heap
page read and write
20586B10000
heap
page read and write
22E6FBA1000
unkown
page read and write
6592000
trusted library allocation
page read and write
2333FF45000
heap
page read and write
22E6FB9A000
unkown
page read and write
1C0ACA57000
heap
page read and write
24DDEBF1000
heap
page read and write
22E6FB5C000
unkown
page read and write
AFD157F000
stack
page read and write
53B7000
trusted library allocation
page read and write
1C0ACA13000
heap
page read and write
1C0AEF40000
heap
page read and write
2E4FC580000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
49E2000
trusted library allocation
page read and write
22E6FB89000
unkown
page read and write
2E10000
trusted library allocation
page read and write
7BE38F7000
stack
page read and write
53C4000
trusted library allocation
page read and write
7133000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AC9C3000
heap
page read and write
53C4000
trusted library allocation
page read and write
20586C57000
unkown
page read and write
53B9000
trusted library allocation
page read and write
27233A00000
unkown
page read and write
1C0AC894000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AAB0C000
heap
page read and write
C800EFF000
stack
page read and write
27233A55000
unkown
page read and write
53B8000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
77F000
heap
page read and write
539B000
trusted library allocation
page read and write
1C0AC340000
heap
page read and write
53A6000
trusted library allocation
page read and write
45BE000
stack
page read and write
1C0AC9FF000
heap
page read and write
20586C86000
unkown
page read and write
53C4000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
2FB0000
unkown
page readonly
4C90000
heap
page execute and read and write
22E6FB85000
unkown
page read and write
53BE000
trusted library allocation
page read and write
1C0ACA13000
heap
page read and write
2E4FC420000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
3809000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
D3A7AFB000
stack
page read and write
23340A60000
trusted library allocation
page read and write
1C0AC315000
heap
page read and write
2E4F7518000
unkown
page read and write
1C0AC8B2000
heap
page read and write
53B9000
trusted library allocation
page read and write
1C0AAAF9000
heap
page read and write
1C0AAB3B000
heap
page read and write
5395000
trusted library allocation
page read and write
1C0AC874000
heap
page read and write
2980000
unkown
page read and write
1C0AC9EA000
heap
page read and write
1C0AAAE3000
heap
page read and write
53C4000
trusted library allocation
page read and write
19C6CE29000
unkown
page read and write
49C0000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
4917000
trusted library allocation
page read and write
22E6FB86000
unkown
page read and write
24DDEBF0000
heap
page read and write
22E6FBDF000
unkown
page read and write
76F000
heap
page read and write
1C0AC8A0000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AAACE000
heap
page read and write
1C0AC882000
heap
page read and write
9A65000
trusted library allocation
page read and write
53AF000
trusted library allocation
page read and write
1C0AC9B5000
heap
page read and write
22E6FBAA000
unkown
page read and write
4900000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
1C0AC879000
heap
page read and write
2960000
unkown
page readonly
2B50000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AAB25000
heap
page read and write
22E6FB86000
unkown
page read and write
1C0ACA1C000
heap
page read and write
22E6FB99000
unkown
page read and write
53AE000
trusted library allocation
page read and write
735B000
trusted library allocation
page read and write
1C0AEEF5000
heap
page read and write
1C0AC8AE000
heap
page read and write
2E4FC134000
trusted library allocation
page read and write
1C0ACA45000
heap
page read and write
272339C0000
unkown
page read and write
22E6FB99000
unkown
page read and write
22E70002000
unkown
page read and write
4990000
trusted library allocation
page read and write
19C6CDF0000
unkown
page read and write
1C0AAAC8000
heap
page read and write
2E4F7502000
unkown
page read and write
D3A75FB000
stack
page read and write
2D80000
unkown
page readonly
22E6F1C0000
unkown
page read and write
1C0AC887000
heap
page read and write
22E6FBBF000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
2230000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AAAE5000
heap
page read and write
539B000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
53A5000
trusted library allocation
page read and write
647E000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
5221B2B000
stack
page read and write
53AE000
trusted library allocation
page read and write
1C0AAABA000
heap
page read and write
6971000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
1C0AC9BB000
heap
page read and write
22E6FB9C000
unkown
page read and write
53A4000
trusted library allocation
page read and write
22E6FB78000
unkown
page read and write
19C6CE00000
unkown
page read and write
1C0AC8B2000
heap
page read and write
2B2D000
stack
page read and write
777000
heap
page read and write
3120000
heap
page read and write
3630000
trusted library allocation
page read and write
4E65000
heap
page read and write
1C0AC885000
heap
page read and write
9939000
trusted library allocation
page read and write
923E2FE000
stack
page read and write
1C0AC996000
heap
page read and write
4B70000
trusted library allocation
page read and write
1C0ACA5A000
heap
page read and write
2E4FC410000
trusted library allocation
page read and write
B214AFB000
stack
page read and write
1C0AC9A3000
heap
page read and write
1C0AAAE6000
heap
page read and write
53AF000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
1C0ACA45000
heap
page read and write
53C4000
trusted library allocation
page read and write
21CA6630000
heap
page read and write
1C0AC899000
heap
page read and write
22E6F289000
unkown
page read and write
53C4000
trusted library allocation
page read and write
20586C4E000
unkown
page read and write
53B4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
DF4E000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
22E6FB77000
unkown
page read and write
793000
heap
page read and write
F077000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
26F3A253000
unkown
page read and write
2E4FBFE0000
trusted library allocation
page read and write
2E4FC0F0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AC89C000
heap
page read and write
3429000
trusted library allocation
page read and write
1C0AEAA0000
trusted library allocation
page read and write
3426000
heap
page read and write
1C0AAAD7000
heap
page read and write
1C0AC9BD000
heap
page read and write
22E6FBB8000
unkown
page read and write
1C0AAAF9000
heap
page read and write
22E6FBD1000
unkown
page read and write
77D000
heap
page read and write
1C0AC981000
heap
page read and write
5382000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6FB9C000
unkown
page read and write
22E6FB88000
unkown
page read and write
53C4000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
22E6FBC0000
unkown
page read and write
22E6FBB1000
unkown
page read and write
537000
stack
page read and write
2FB0000
unkown
page readonly
B076B5D000
stack
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6F2E1000
unkown
page read and write
2F5F000
stack
page read and write
53B9000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
2333FB10000
heap
page read and write
53B9000
trusted library allocation
page read and write
20586B00000
heap
page read and write
53C4000
trusted library allocation
page read and write
24DDEBBB000
heap
page read and write
1C0ACA57000
heap
page read and write
770000
heap
page read and write
680000
heap
page read and write
53A6000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
930000
heap
page read and write
1C0ACA5C000
heap
page read and write
A822000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
20586D13000
unkown
page read and write
4DE0000
trusted library allocation
page read and write
9B41000
trusted library allocation
page read and write
22E6FBCE000
unkown
page read and write
4980000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
539F000
trusted library allocation
page read and write
31F6000
heap
page read and write
AFD127A000
stack
page read and write
2D6E000
stack
page read and write
2333FCB7000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0ACA59000
heap
page read and write
21CA6652000
heap
page read and write
1C0AC873000
heap
page read and write
785000
heap
page read and write
5387000
trusted library allocation
page read and write
CD09000
trusted library allocation
page read and write
22E6FBCD000
unkown
page read and write
6AFE000
stack
page read and write
22E6FBBA000
unkown
page read and write
4B70000
trusted library allocation
page read and write
769000
heap
page read and write
491A000
trusted library allocation
page read and write
26F3A300000
unkown
page read and write
78B000
heap
page read and write
1C0AC9CF000
heap
page read and write
53C4000
trusted library allocation
page read and write
22E6FBAB000
unkown
page read and write
32DE000
stack
page read and write
19C6CE33000
unkown
page read and write
53C4000
trusted library allocation
page read and write
19C6CBC0000
heap
page read and write
22E6FBBE000
unkown
page read and write
1C0AC9FD000
heap
page read and write
539E000
trusted library allocation
page read and write
2E4FC0F0000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
23340A80000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
791000
heap
page read and write
5380000
trusted library allocation
page read and write
1C0AC9FD000
heap
page read and write
22E6F302000
unkown
page read and write
1C0AAAD5000
heap
page read and write
24DDEE10000
heap
page read and write
34B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
21CA666E000
heap
page read and write
178000
unkown
page readonly
539F000
trusted library allocation
page read and write
1C0AC89F000
heap
page read and write
9962000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
1C0AC9FF000
heap
page read and write
27233850000
heap
page read and write
A80000
heap
page read and write
4990000
trusted library allocation
page read and write
21CA6657000
heap
page read and write
539F000
trusted library allocation
page read and write
2B30000
unkown
page readonly
78C000
heap
page read and write
53C4000
trusted library allocation
page read and write
7AB000
heap
page read and write
53C4000
trusted library allocation
page read and write
491D000
trusted library allocation
page read and write
22E6F271000
unkown
page read and write
1C0ACA59000
heap
page read and write
21CA65A0000
heap
page read and write
6F60000
trusted library section
page read and write
788000
heap
page read and write
20586C4D000
unkown
page read and write
792000
heap
page read and write
53A4000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
20586C51000
unkown
page read and write
1C0AC88C000
heap
page read and write
53C4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
233407B0000
trusted library allocation
page read and write
32F6000
heap
page read and write
20587402000
unkown
page read and write
26F3A302000
unkown
page read and write
4A00000
trusted library allocation
page execute and read and write
A87000
heap
page read and write
53B5000
trusted library allocation
page read and write
2333FC9A000
heap
page read and write
1C0ACA51000
heap
page read and write
539B000
trusted library allocation
page read and write
1C0ACA45000
heap
page read and write
53C4000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
769000
heap
page read and write
22E6FBCF000
unkown
page read and write
3360000
heap
page read and write
923DBFB000
stack
page read and write
53AD000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
492C000
trusted library allocation
page read and write
1C0AAAE3000
heap
page read and write
2970000
unkown
page readonly
2333FF50000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
2D90000
unkown
page read and write
22E70000000
unkown
page read and write
1C0AC9CF000
heap
page read and write
1C0AC9C3000
heap
page read and write
1C0AAACE000
heap
page read and write
5392000
trusted library allocation
page read and write
331F000
stack
page read and write
53AF000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
B2147FB000
stack
page read and write
238E000
stack
page read and write
20586C3C000
unkown
page read and write
2FA0000
unkown
page readonly
A6B000
trusted library allocation
page execute and read and write
53C4000
trusted library allocation
page read and write
AFD13F9000
stack
page read and write
733F000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
1C0AAAC3000
heap
page read and write
1C0AC9B5000
heap
page read and write
78F000
heap
page read and write
2C6D000
stack
page read and write
539B000
trusted library allocation
page read and write
20586C70000
unkown
page read and write
7BE377C000
stack
page read and write
2E4FC111000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
D3A787F000
stack
page read and write
22E6F316000
unkown
page read and write
1C0ACA13000
heap
page read and write
22E6FB76000
unkown
page read and write
53C4000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
22E6FB59000
unkown
page read and write
22E6FB88000
unkown
page read and write
539F000
trusted library allocation
page read and write
1C0ACA5A000
heap
page read and write
1C0AAAEC000
heap
page read and write
5383000
trusted library allocation
page read and write
1C0ACA5C000
heap
page read and write
539E000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
77F000
heap
page read and write
538D000
trusted library allocation
page read and write
2E4FC1C0000
trusted library allocation
page read and write
77B000
heap
page read and write
BFA9000
trusted library allocation
page read and write
22E6FB9C000
unkown
page read and write
1C0AC8A8000
heap
page read and write
22E6FB89000
unkown
page read and write
7BE3AF7000
stack
page read and write
1C0ACA5C000
heap
page read and write
1C0AC89B000
heap
page read and write
1C0ACA57000
heap
page read and write
362E000
stack
page read and write
22E6FB87000
unkown
page read and write
53C4000
trusted library allocation
page read and write
22E6FB85000
unkown
page read and write
22E6FB87000
unkown
page read and write
1C0AC9BB000
heap
page read and write
323C000
stack
page read and write
37D0000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
2FC0000
unkown
page read and write
1C0ACA51000
heap
page read and write
1C0AAAC6000
heap
page read and write
7150000
trusted library allocation
page read and write
785000
heap
page read and write
53C4000
trusted library allocation
page read and write
49D0000
heap
page read and write
1C0AC8A8000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
1C0AAAFF000
heap
page read and write
20586C53000
unkown
page read and write
22E6FB96000
unkown
page read and write
1C0AEFBB000
heap
page read and write
B2144FE000
stack
page read and write
2FC0000
unkown
page read and write
B21497E000
stack
page read and write
781000
heap
page read and write
22E6FB9C000
unkown
page read and write
1C0AC9C3000
heap
page read and write
1C0ACA5C000
heap
page read and write
22E6FBBE000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
1C0AC876000
heap
page read and write
1C0AC879000
heap
page read and write
22E7009D000
unkown
page read and write
1C0AC8A2000
heap
page read and write
4DB0000
trusted library allocation
page read and write
79D000
heap
page read and write
1C0AC8B2000
heap
page read and write
53A4000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
1C0AC9FD000
heap
page read and write
26F3AA02000
unkown
page read and write
6F80000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
1C0ACA1C000
heap
page read and write
32F6000
heap
page read and write
4DA0000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
1C0AC9FD000
heap
page read and write
4DE0000
trusted library allocation
page read and write
22E6FBDD000
unkown
page read and write
2E4FC130000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
2E4FC250000
trusted library allocation
page read and write
1C0AC8A7000
heap
page read and write
53C4000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
20586C55000
unkown
page read and write
6F80000
trusted library allocation
page read and write
1C0ACA57000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
22E6FB00000
unkown
page read and write
6F80000
trusted library allocation
page read and write
77F000
heap
page read and write
53C4000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
19C6CF02000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
2E30000
heap
page read and write
3240000
trusted library allocation
page read and write
1C0AEF2F000
heap
page read and write
22E6F213000
unkown
page read and write
5399000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
178000
unkown
page readonly
53A4000
trusted library allocation
page read and write
C800FFE000
stack
page read and write
539A000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
22E6FB72000
unkown
page read and write
22E6F24E000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
53AA000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
1C0AC9FF000
heap
page read and write
789000
heap
page read and write
1C0ACA0B000
heap
page read and write
3140000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
2E4F7513000
unkown
page read and write
53C4000
trusted library allocation
page read and write
21CA6644000
heap
page read and write
2E4F73C1000
trusted library allocation
page read and write
22E70002000
unkown
page read and write
AFD147A000
stack
page read and write
F03D000
trusted library allocation
page read and write
4C00000
trusted library section
page readonly
2D80000
unkown
page readonly
787000
heap
page read and write
49E0000
trusted library allocation
page read and write
3640000
heap
page read and write
53C4000
trusted library allocation
page read and write
1C0AEEF0000
heap
page read and write
7B6000
heap
page read and write
53C4000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
2666000
trusted library allocation
page read and write
2754000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2B30000
unkown
page readonly
22E6F24C000
unkown
page read and write
53C4000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
1C0AAB1D000
heap
page read and write
22E7003C000
unkown
page read and write
787000
heap
page read and write
777000
heap
page read and write
77F000
heap
page read and write
924000
trusted library allocation
page read and write
1C0AEEEE000
heap
page read and write
53C4000
trusted library allocation
page read and write
923000
trusted library allocation
page execute and read and write
1C0ACA13000
heap
page read and write
24DDEBB0000
heap
page read and write
538D000
trusted library allocation
page read and write
21CA666E000
heap
page read and write
522207D000
stack
page read and write
32F0000
heap
page read and write
24DDEAF0000
heap
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
2FA0000
unkown
page readonly
53B6000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
20586C58000
unkown
page read and write
49E0000
trusted library allocation
page read and write
77D000
heap
page read and write
1C0ACA51000
heap
page read and write
2333FC95000
heap
page read and write
53AF000
trusted library allocation
page read and write
1C0AC871000
heap
page read and write
D50A879000
stack
page read and write
C800DF7000
stack
page read and write
22E7003C000
unkown
page read and write
22E6FB8B000
unkown
page read and write
53C4000
trusted library allocation
page read and write
27233A13000
unkown
page read and write
5221BAF000
stack
page read and write
789000
heap
page read and write
1C0AC9CF000
heap
page read and write
1C0AEF31000
heap
page read and write
794000
heap
page read and write
1C0AC8A4000
heap
page read and write
21CA6665000
heap
page read and write
53B8000
trusted library allocation
page read and write
23340A90000
trusted library allocation
page read and write
1C0AC9FF000
heap
page read and write
1C0AC984000
heap
page read and write
1C0AC9FF000
heap
page read and write
5395000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
22E6F249000
unkown
page read and write
2F9E000
stack
page read and write
B21477E000
stack
page read and write
27233B02000
unkown
page read and write
7EF000
heap
page read and write
7BE39F8000
stack
page read and write
1C0AC9BD000
heap
page read and write
490B000
trusted library allocation
page read and write
1C0ACA59000
heap
page read and write
53A6000
trusted library allocation
page read and write
1C0ACA2E000
heap
page read and write
1C0AC8A4000
heap
page read and write
A40000
trusted library allocation
page read and write
22E6FB81000
unkown
page read and write
2E4FC110000
trusted library allocation
page read and write
76E000
heap
page read and write
1C0AC8B2000
heap
page read and write
A50000
trusted library allocation
page read and write
2B0C000
trusted library allocation
page read and write
1C0AAB03000
heap
page read and write
1C0ACA1C000
heap
page read and write
22E6FB17000
unkown
page read and write
22E6F313000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AC8B2000
heap
page read and write
2B40000
unkown
page readonly
1C0AC9FF000
heap
page read and write
1C0AC89A000
heap
page read and write
53A8000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
6D3E000
stack
page read and write
349E000
stack
page read and write
53C4000
trusted library allocation
page read and write
5221F7C000
stack
page read and write
27233A48000
unkown
page read and write
2E30000
heap
page read and write
1C0ACA59000
heap
page read and write
78F000
heap
page read and write
539F000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
1C0AC899000
heap
page read and write
1C0AC9B5000
heap
page read and write
53C4000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
4945000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
1C0AC9FF000
heap
page read and write
7BE33EF000
stack
page read and write
4990000
trusted library allocation
page read and write
1C0ACA51000
heap
page read and write
6FA0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
1C0ACA45000
heap
page read and write
53C4000
trusted library allocation
page read and write
26F3A160000
heap
page read and write
1C0AC9FF000
heap
page read and write
22E6FB56000
unkown
page read and write
2C00000
heap
page read and write
539A000
trusted library allocation
page read and write
22E6FB22000
unkown
page read and write
1A0000
heap
page read and write
1C0ACA2E000
heap
page read and write
49C0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
B214677000
stack
page read and write
7BE3D7F000
stack
page read and write
1C0ACA5C000
heap
page read and write
1C0AC898000
heap
page read and write
170000
unkown
page readonly
1C0ACA59000
heap
page read and write
4EAF000
stack
page read and write
6C3E000
stack
page read and write
5394000
trusted library allocation
page read and write
1C0AEEF1000
heap
page read and write
1C0AC9C4000
heap
page read and write
22E70002000
unkown
page read and write
22E6F2C6000
unkown
page read and write
1C0AC89A000
heap
page read and write
2CFD000
stack
page read and write
1C0AEED0000
heap
page read and write
53C4000
trusted library allocation
page read and write
769000
heap
page read and write
22E6FB71000
unkown
page read and write
712B000
trusted library allocation
page read and write
37D6000
heap
page read and write
53A6000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
1C0ACA13000
heap
page read and write
22E6F190000
heap
page read and write
B076FFD000
stack
page read and write
1C0AEF31000
heap
page read and write
31F0000
heap
page read and write
53B6000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
19C6CE2F000
unkown
page read and write
3340000
heap
page read and write
22E6F23C000
unkown
page read and write
22E6FBAB000
unkown
page read and write
53C4000
trusted library allocation
page read and write
1C0AAB3B000
heap
page read and write
1C0AAAF5000
heap
page read and write
2D80000
unkown
page readonly
ED04000
trusted library allocation
page read and write
3040000
heap
page read and write
4950000
trusted library allocation
page read and write
1C0ACA0B000
heap
page read and write
22E6F24F000
unkown
page read and write
1C0AC89C000
heap
page read and write
22E70002000
unkown
page read and write
1C0ACA13000
heap
page read and write
22E70102000
unkown
page read and write
2B40000
unkown
page readonly
53C4000
trusted library allocation
page read and write
1C0ACA57000
heap
page read and write
53AF000
trusted library allocation
page read and write
522217F000
stack
page read and write
53C4000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
C800A7F000
stack
page read and write
49E0000
trusted library allocation
page read and write
1C0AAAC6000
heap
page read and write
22E6FB5F000
unkown
page read and write
53C4000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
7E0000
heap
page read and write
1C0AAAFF000
heap
page read and write
53B9000
trusted library allocation
page read and write
2980000
unkown
page read and write
B2145FD000
stack
page read and write
53C4000
trusted library allocation
page read and write
22E6FB89000
unkown
page read and write
4B90000
trusted library allocation
page read and write
2E4F73F0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
6ABE000
stack
page read and write
49C0000
trusted library allocation
page read and write
22E6FB76000
unkown
page read and write
D50A8FE000
stack
page read and write
1C0AAAD1000
heap
page read and write
1C0ACA1C000
heap
page read and write
53C4000
trusted library allocation
page read and write
24DDEBD6000
heap
page read and write
4920000
trusted library allocation
page read and write
2E4FC1E0000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
1C0ACA59000
heap
page read and write
FDAE000
trusted library allocation
page read and write
1C0AF0BB000
heap
page read and write
4B70000
trusted library allocation
page read and write
22E6FB6D000
unkown
page read and write
2FC0000
unkown
page read and write
There are 1518 hidden memdumps, click here to show them.