IOC Report
692BB93169319EBA2F556174D781A8636D610A67E6838.exe

loading gif

Files

File Path
Type
Category
Malicious
692BB93169319EBA2F556174D781A8636D610A67E6838.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ople.exe.vbs
data
dropped
malicious
C:\Users\user\AppData\Roaming\etwa\ople.exe.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\692BB93169319EBA2F556174D781A8636D610A67E6838.exe
"C:\Users\user\Desktop\692BB93169319EBA2F556174D781A8636D610A67E6838.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Users\user\Desktop\692BB93169319EBA2F556174D781A8636D610A67E6838.exe"
malicious
C:\Users\user\AppData\Roaming\etwa\ople.exe.exe
C:\Users\user\AppData\Roaming\etwa\ople.exe.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Users\user\AppData\Roaming\etwa\ople.exe.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ople.exe.vbs"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
127.0.0.1
malicious
dinolachy.duckdns.org
malicious

Domains

Name
IP
Malicious
dinolachy.duckdns.org
192.169.69.25
malicious

IPs

IP
Domain
Country
Malicious
192.169.69.25
dinolachy.duckdns.org
United States
malicious
127.0.0.1
unknown
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
56A0000
trusted library section
page read and write
malicious
D80000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2D91000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3F99000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2F91000
trusted library allocation
page read and write
malicious
3DD9000
trusted library allocation
page read and write
malicious
2A00000
direct allocation
page read and write
malicious
5897000
unkown
page read and write
1F2069C0000
trusted library allocation
page read and write
2670FC83000
heap
page read and write
56B0000
trusted library allocation
page read and write
2BB6000
direct allocation
page read and write
1388000
heap
page read and write
10AB000
trusted library allocation
page execute and read and write
62EF000
trusted library allocation
page read and write
1D5FF070000
trusted library allocation
page read and write
29C9F159000
heap
page read and write
5360000
trusted library allocation
page read and write
30FB000
direct allocation
page read and write
CB4000
heap
page read and write
2D3F000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
138C000
heap
page read and write
29C9F7E0000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
30C000
stack
page read and write
22552665000
heap
page read and write
52C0000
trusted library allocation
page read and write
11E4000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
26710561000
heap
page read and write
62EF000
trusted library allocation
page read and write
E0ACA7F000
stack
page read and write
1F206A68000
heap
page read and write
6B10000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
30DB000
direct allocation
page read and write
5360000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
11F0000
heap
page read and write
55E0000
trusted library allocation
page read and write
263DF85A000
heap
page read and write
63C1000
heap
page read and write
26710583000
heap
page read and write
27BE9A41000
heap
page read and write
263DF813000
heap
page read and write
5660000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
29C9E89F000
heap
page read and write
1364000
heap
page read and write
8035CFF000
stack
page read and write
26710591000
heap
page read and write
263DF860000
heap
page read and write
1576F9D4000
heap
page read and write
549C000
trusted library allocation
page read and write
8BDB8FD000
stack
page read and write
D20000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
584D000
stack
page read and write
BA0000
heap
page read and write
C8D000
stack
page read and write
225524F0000
heap
page read and write
29CA3C70000
trusted library allocation
page read and write
11E3000
trusted library allocation
page execute and read and write
6610000
trusted library allocation
page read and write
183AF0E5000
heap
page read and write
2AFBFC40000
heap
page read and write
B60000
remote allocation
page read and write
52C0000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
26710591000
heap
page read and write
62EF000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
1123000
heap
page read and write
263DF900000
heap
page read and write
FD1D87C000
stack
page read and write
5650000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
1F206B00000
heap
page read and write
1147000
heap
page read and write
1D5FE854000
heap
page read and write
5340000
trusted library allocation
page execute and read and write
2F50000
heap
page read and write
3D99000
trusted library allocation
page read and write
26710597000
heap
page read and write
8FEEE7F000
stack
page read and write
62E1000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
7B4000
heap
page read and write
62E1000
trusted library allocation
page read and write
2FE0000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
26710595000
heap
page read and write
CB4000
heap
page read and write
E0AC2FB000
stack
page read and write
2F7A000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
AB1000
unkown
page execute read
5540000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
208ED213000
heap
page read and write
5660000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
1F206A63000
heap
page read and write
13A1000
heap
page read and write
5EF0000
trusted library allocation
page read and write
5210000
heap
page read and write
208ED1A0000
trusted library allocation
page read and write
225525E0000
remote allocation
page read and write
4ECE000
stack
page read and write
62EF000
trusted library allocation
page read and write
1576F9D4000
heap
page read and write
1576F9F9000
heap
page read and write
CC4127B000
stack
page read and write
5680000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
58A0000
unkown
page read and write
5650000
trusted library allocation
page read and write
DDA207D000
stack
page read and write
2D8B000
direct allocation
page read and write
5484000
trusted library allocation
page read and write
29C9F301000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
678E000
stack
page read and write
2D3B000
direct allocation
page read and write
54E0000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
DDA1BFC000
stack
page read and write
27BE9A7F000
heap
page read and write
225525E0000
remote allocation
page read and write
1118000
heap
page read and write
139A000
heap
page read and write
62EF000
trusted library allocation
page read and write
DCC3F7B000
stack
page read and write
CB4000
heap
page read and write
27BE9A29000
heap
page read and write
56D0000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
267105A8000
heap
page read and write
974227F000
stack
page read and write
B60000
remote allocation
page read and write
2FE0000
direct allocation
page read and write
263DF898000
heap
page read and write
7B4000
heap
page read and write
2FC0000
direct allocation
page read and write
8FEE69C000
stack
page read and write
7B4000
heap
page read and write
13A1000
heap
page read and write
CC4117B000
stack
page read and write
DCC437E000
stack
page read and write
2A50000
trusted library allocation
page read and write
580E000
stack
page read and write
8035DFF000
stack
page read and write
29CA4030000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
208ED0A0000
heap
page read and write
62EA000
trusted library allocation
page read and write
208ED313000
heap
page read and write
60CE000
stack
page read and write
62E1000
trusted library allocation
page read and write
974207C000
stack
page read and write
5540000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
251B3B02000
heap
page read and write
617E000
stack
page read and write
2D4B000
direct allocation
page read and write
183AF0B1000
heap
page read and write
F54000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
D70000
remote allocation
page read and write
DCC3A78000
stack
page read and write
55E0000
trusted library allocation
page read and write
FD1DD7F000
stack
page read and write
DDA1E7C000
stack
page read and write
29CA4160000
remote allocation
page read and write
22552649000
heap
page read and write
F5E000
stack
page read and write
225525E0000
remote allocation
page read and write
1576FC70000
heap
page read and write
22CD57C000
stack
page read and write
1576FC7D000
heap
page read and write
62E1000
trusted library allocation
page read and write
251B37D0000
heap
page read and write
114E000
heap
page read and write
111E000
heap
page read and write
225540B0000
trusted library allocation
page read and write
108D000
stack
page read and write
1D5FE800000
heap
page read and write
5550000
trusted library allocation
page read and write
CB4000
heap
page read and write
111B000
heap
page read and write
26710A02000
heap
page read and write
631D000
trusted library allocation
page read and write
22554202000
trusted library allocation
page read and write
54C0000
heap
page read and write
DDA1CFD000
stack
page read and write
62DE000
trusted library allocation
page read and write
1F206B02000
heap
page read and write
112F000
heap
page read and write
2C20000
direct allocation
page read and write
22552702000
heap
page read and write
E0ACC7E000
stack
page read and write
26710598000
heap
page read and write
631D000
trusted library allocation
page read and write
2AFBFE5A000
heap
page read and write
62DE000
trusted library allocation
page read and write
22CD37E000
stack
page read and write
5330000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
29CA3E00000
heap
page read and write
1132000
heap
page read and write
F53000
trusted library allocation
page execute and read and write
22CD2FF000
stack
page read and write
52CF000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
1D5FE856000
heap
page read and write
62EA000
trusted library allocation
page read and write
2255265A000
heap
page read and write
2C30000
direct allocation
page read and write
55F0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
8FEEB7E000
stack
page read and write
62EA000
trusted library allocation
page read and write
26710595000
heap
page read and write
26710551000
heap
page read and write
29C9F8D0000
trusted library section
page readonly
AB0000
unkown
page readonly
2B06000
direct allocation
page read and write
63EE000
heap
page read and write
523B000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
63C1000
heap
page read and write
7B4000
heap
page read and write
13A8000
heap
page read and write
5550000
trusted library allocation
page read and write
CB4000
heap
page read and write
62EF000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
139C000
heap
page read and write
2670FC4E000
heap
page read and write
5360000
trusted library allocation
page read and write
8FEEA7E000
stack
page read and write
26710A02000
heap
page read and write
62E1000
trusted library allocation
page read and write
29CA3EFB000
heap
page read and write
6D40000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
1129000
heap
page read and write
135B8FF000
stack
page read and write
B8C000
stack
page read and write
62EE000
trusted library allocation
page read and write
27BE9A7B000
heap
page read and write
62EA000
trusted library allocation
page read and write
664E000
stack
page read and write
DB0000
trusted library allocation
page read and write
1123000
heap
page read and write
890000
heap
page read and write
139A000
heap
page read and write
62EA000
trusted library allocation
page read and write
B60000
remote allocation
page read and write
2D8F000
direct allocation
page read and write
5898000
trusted library allocation
page read and write
F6D000
trusted library allocation
page execute and read and write
27BE9A45000
heap
page read and write
5930000
heap
page execute and read and write
2D4F000
direct allocation
page read and write
1149000
heap
page read and write
123E000
stack
page read and write
2A70000
direct allocation
page read and write
2F87000
heap
page read and write
29CA3EDC000
heap
page read and write
5360000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
127E000
stack
page read and write
183AF0E2000
heap
page read and write
770000
direct allocation
page read and write
62E9000
trusted library allocation
page read and write
27BE9A5F000
heap
page read and write
12CB000
trusted library allocation
page execute and read and write
52C0000
trusted library allocation
page read and write
FD1DE7C000
stack
page read and write
73E000
stack
page read and write
1D5FE760000
heap
page read and write
29C9E855000
heap
page read and write
29CA4140000
trusted library allocation
page read and write
E0ACD7F000
stack
page read and write
1576F9EC000
heap
page read and write
5650000
trusted library allocation
page read and write
12AA000
trusted library allocation
page execute and read and write
6C3D000
stack
page read and write
1120000
heap
page read and write
29C9E875000
heap
page read and write
5610000
trusted library allocation
page read and write
29CA4020000
trusted library allocation
page read and write
D20000
direct allocation
page read and write
29CA3EFB000
heap
page read and write
55E0000
trusted library allocation
page read and write
2D4B000
direct allocation
page read and write
128D000
trusted library allocation
page execute and read and write
55E0000
trusted library allocation
page read and write
E4361FF000
unkown
page read and write
29CA3EF1000
heap
page read and write
29C9E660000
heap
page read and write
62EF000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
263DF85B000
heap
page read and write
27BE9A5A000
heap
page read and write
E0ABECC000
stack
page read and write
135B7FF000
stack
page read and write
1D5FE829000
heap
page read and write
30FF000
direct allocation
page read and write
10F4000
heap
page read and write
5680000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
208EDB00000
heap
page read and write
DCC3E7A000
stack
page read and write
1129000
heap
page read and write
1328000
heap
page read and write
62E1000
trusted library allocation
page read and write
4DCE000
stack
page read and write
29CA3CF0000
trusted library allocation
page read and write
D60000
heap
page read and write
1096000
trusted library allocation
page execute and read and write
62EA000
trusted library allocation
page read and write
22552659000
heap
page read and write
1F206A28000
heap
page read and write
2AFBFE3F000
heap
page read and write
527C000
trusted library allocation
page read and write
22552613000
heap
page read and write
1389000
heap
page read and write
62DD000
trusted library allocation
page read and write
29C9F8E0000
trusted library section
page readonly
1D5FE83C000
heap
page read and write
5F06000
trusted library allocation
page read and write
1576F9BC000
heap
page read and write
400000
system
page execute and read and write
62EF000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
DCC3FFE000
stack
page read and write
62E1000
trusted library allocation
page read and write
FD1DB7B000
stack
page read and write
5890000
trusted library allocation
page read and write
EF5000
stack
page read and write
2670FCB5000
heap
page read and write
5495000
trusted library allocation
page read and write
183AF0AB000
heap
page read and write
62E4000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
138F000
heap
page read and write
62EF000
trusted library allocation
page read and write
28D1000
heap
page read and write
55E0000
trusted library allocation
page read and write
8BDB9FF000
stack
page read and write
275000
unkown
page readonly
1D5FE884000
heap
page read and write
27BE9A5C000
heap
page read and write
5610000
trusted library allocation
page read and write
27BE9A78000
heap
page read and write
5660000
trusted library allocation
page read and write
29CA4160000
trusted library allocation
page read and write
7B0000
heap
page read and write
267105C0000
heap
page read and write
29CA3EA7000
heap
page read and write
2E50000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
1290000
heap
page read and write
2AFBFBD0000
heap
page read and write
62EF000
trusted library allocation
page read and write
27BE9A13000
heap
page read and write
CB4000
heap
page read and write
22552718000
heap
page read and write
5890000
unkown
page read and write
2C9B000
direct allocation
page read and write
130F000
trusted library allocation
page read and write
AC5000
unkown
page readonly
13A4000
heap
page read and write
DCC387B000
stack
page read and write
251B3A13000
heap
page read and write
AB1000
unkown
page execute read
208ED200000
heap
page read and write
1576F9F2000
heap
page read and write
113A000
heap
page read and write
251B4202000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
111D000
heap
page read and write
1D5FE857000
heap
page read and write
2C87000
heap
page read and write
5540000
trusted library allocation
page read and write
2AFBFF02000
heap
page read and write
9741F7F000
stack
page read and write
1280000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
263DF85D000
heap
page read and write
10F8000
stack
page read and write
974237C000
stack
page read and write
E0AC47E000
stack
page read and write
CB4000
heap
page read and write
2670FCDC000
heap
page read and write
10D0000
direct allocation
page execute and read and write
3020000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
263DF760000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
183AF0A0000
heap
page read and write
1576F8C0000
heap
page read and write
62E1000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
422000
system
page execute and read and write
1576F760000
heap
page read and write
6C00000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
1D5FE813000
heap
page read and write
62EE000
trusted library allocation
page read and write
7B4000
heap
page read and write
26710990000
remote allocation
page read and write
2BE8000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
97417AB000
stack
page read and write
62E1000
trusted library allocation
page read and write
112F000
heap
page read and write
5247000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
2DBF000
stack
page read and write
29CA3E2C000
heap
page read and write
2F66000
direct allocation
page read and write
29C9E7F0000
trusted library allocation
page read and write
2255264A000
heap
page read and write
1147000
heap
page read and write
114E000
heap
page read and write
974217D000
stack
page read and write
29CA3EE0000
heap
page read and write
2D8F000
direct allocation
page read and write
55C0000
trusted library allocation
page read and write
1F206A79000
heap
page read and write
E435A7E000
stack
page read and write
5890000
trusted library allocation
page read and write
FD1DF7A000
stack
page read and write
62E1000
trusted library allocation
page read and write
63C1000
heap
page read and write
3E31000
trusted library allocation
page read and write
29CA3C60000
trusted library allocation
page read and write
183AF0C1000
heap
page read and write
5660000
trusted library allocation
page read and write
2670FD16000
heap
page read and write
62EF000
trusted library allocation
page read and write
29C9E8B8000
heap
page read and write
2C9F000
direct allocation
page read and write
DDA18FB000
stack
page read and write
370000
trusted library allocation
page read and write
524D000
trusted library allocation
page read and write
183AF345000
heap
page read and write
2255265A000
heap
page read and write
1320000
trusted library allocation
page read and write
2C70000
direct allocation
page read and write
631D000
trusted library allocation
page read and write
29CA4000000
trusted library allocation
page read and write
63C0000
heap
page read and write
2F80000
heap
page read and write
62EA000
trusted library allocation
page read and write
260000
unkown
page readonly
26710597000
heap
page read and write
62BD000
stack
page read and write
5680000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
113D000
heap
page read and write
5500000
trusted library allocation
page read and write
10A2000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
2D1B000
direct allocation
page read and write
263DF730000
heap
page read and write
2E50000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
29C9E770000
trusted library section
page read and write
7B4000
heap
page read and write
111B000
heap
page read and write
1133000
heap
page read and write
5600000
trusted library allocation
page read and write
1F206A02000
heap
page read and write
27BE9A31000
heap
page read and write
54E0000
trusted library allocation
page read and write
183AF0B6000
heap
page read and write
DDA148C000
stack
page read and write
2670FD02000
heap
page read and write
5540000
trusted library allocation
page read and write
E43607F000
stack
page read and write
5370000
trusted library allocation
page read and write
2671059F000
heap
page read and write
55E0000
trusted library allocation
page read and write
2670FC00000
heap
page read and write
1391000
heap
page read and write
8FEEBFE000
stack
page read and write
D00000
direct allocation
page execute and read and write
CC40B6C000
stack
page read and write
62C1000
trusted library allocation
page read and write
263DF800000
heap
page read and write
62EA000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
26710A02000
heap
page read and write
62EF000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
183AF0C8000
heap
page read and write
2670FD13000
heap
page read and write
55C0000
trusted library allocation
page read and write
225525B0000
trusted library allocation
page read and write
5261000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
30DF000
direct allocation
page read and write
251B3A5C000
heap
page read and write
62E9000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
52B0000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
1199000
heap
page read and write
55E5000
trusted library allocation
page read and write
CB4000
heap
page read and write
251B3970000
remote allocation
page read and write
1D5FE913000
heap
page read and write
1D5FE900000
heap
page read and write
26710599000
heap
page read and write
5650000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
80358FE000
stack
page read and write
105E000
stack
page read and write
2F0F000
stack
page read and write
589D000
trusted library allocation
page read and write
6FA000
stack
page read and write
5660000
trusted library allocation
page read and write
139A000
heap
page read and write
5310000
heap
page read and write
22552678000
heap
page read and write
1F206A7F000
heap
page read and write
13A4000
heap
page read and write
52F1000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
22552602000
heap
page read and write
5470000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
525C000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
1151000
heap
page read and write
7FD00000
trusted library allocation
page execute and read and write
52C0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
53A0000
heap
page read and write
135B6F9000
stack
page read and write
5360000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
780000
heap
page read and write
2671059B000
heap
page read and write
DCC40FE000
stack
page read and write
1D5FF202000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
263DF913000
heap
page read and write
568D000
trusted library allocation
page read and write
29C9E8FE000
heap
page read and write
261000
unkown
page execute read
139C000
heap
page read and write
2C00000
direct allocation
page read and write
55C0000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
2A00000
direct allocation
page read and write
2F4C000
stack
page read and write
2CBE000
stack
page read and write
2E30000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
275000
unkown
page readonly
400000
system
page execute and read and write
2C70000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
29C9F118000
heap
page read and write
26710597000
heap
page read and write
5540000
trusted library allocation
page read and write
2AFBFE6C000
heap
page read and write
62EF000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
2670FC70000
heap
page read and write
29CA3E3F000
heap
page read and write
2EDA000
trusted library allocation
page read and write
111F000
heap
page read and write
8035AFE000
stack
page read and write
62EA000
trusted library allocation
page read and write
208ED2B9000
heap
page read and write
138E000
heap
page read and write
62EF000
trusted library allocation
page read and write
11F5000
heap
page read and write
569D000
stack
page read and write
139A000
heap
page read and write
2A90000
direct allocation
page read and write
527F000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
CB4000
heap
page read and write
2D1F000
direct allocation
page read and write
12F0000
trusted library allocation
page read and write
22552590000
trusted library allocation
page read and write
1139000
heap
page read and write
CB4000
heap
page read and write
5520000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
313F000
direct allocation
page read and write
590E000
stack
page read and write
111E000
heap
page read and write
2571000
heap
page read and write
26710597000
heap
page read and write
12D0000
heap
page execute and read and write
263E0202000
trusted library allocation
page read and write
26710A02000
heap
page read and write
1D5FE870000
heap
page read and write
138C000
heap
page read and write
7B4000
heap
page read and write
2A70000
direct allocation
page read and write
2C70000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
5880000
heap
page read and write
62E9000
trusted library allocation
page read and write
2E90000
direct allocation
page read and write
1D5FE879000
heap
page read and write
DCC46FF000
stack
page read and write
DCC41FE000
stack
page read and write
55E0000
trusted library allocation
page read and write
2AE0000
direct allocation
page read and write
29CA4040000
trusted library allocation
page read and write
29CA3F00000
heap
page read and write
803597E000
stack
page read and write
1576FC75000
heap
page read and write
29C9E813000
heap
page read and write
2AA0000
direct allocation
page read and write
5330000
trusted library allocation
page read and write
2AFBFE29000
heap
page read and write
7B4000
heap
page read and write
1198000
heap
page read and write
2E00000
heap
page execute and read and write
29CA3F02000
heap
page read and write
29C9F113000
heap
page read and write
53A3000
heap
page read and write
22552560000
heap
page read and write
63C1000
heap
page read and write
27BE9A5E000
heap
page read and write
27BE9870000
heap
page read and write
7B4000
heap
page read and write
1576F9D4000
heap
page read and write
263DF908000
heap
page read and write
5630000
trusted library allocation
page read and write
1576F9D4000
heap
page read and write
26710500000
heap
page read and write
62E1000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
63C1000
heap
page read and write
29C9E877000
heap
page read and write
1F206B13000
heap
page read and write
62EA000
trusted library allocation
page read and write
251B3970000
remote allocation
page read and write
62E1000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
27BE9A46000
heap
page read and write
5244000
trusted library allocation
page read and write
29CA3EE2000
heap
page read and write
263DF826000
heap
page read and write
1129000
heap
page read and write
29C9E902000
heap
page read and write
29CA3E62000
heap
page read and write
260000
unkown
page readonly
E435E77000
stack
page read and write
29C9E893000
heap
page read and write
251B3940000
trusted library allocation
page read and write
CB4000
heap
page read and write
29CA4000000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
7B4000
heap
page read and write
5680000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
208EDA02000
heap
page read and write
ABD000
unkown
page readonly
803587B000
stack
page read and write
251B3840000
heap
page read and write
2B80000
direct allocation
page read and write
2D8B000
direct allocation
page read and write
2670FCAB000
heap
page read and write
6318000
trusted library allocation
page read and write
27BE9B02000
heap
page read and write
263DF829000
heap
page read and write
5896000
trusted library allocation
page read and write
5EAE000
stack
page read and write
62EE000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
183AF0B6000
heap
page read and write
29C9F900000
trusted library section
page readonly
26710572000
heap
page read and write
52A0000
trusted library allocation
page read and write
7B4000
heap
page read and write
62EF000
trusted library allocation
page read and write
89A000
heap
page read and write
688E000
stack
page read and write
607D000
stack
page read and write
62EF000
trusted library allocation
page read and write
7B4000
heap
page read and write
10B0000
heap
page read and write
183AF0CE000
heap
page read and write
251B3A02000
heap
page read and write
55E0000
trusted library allocation
page read and write
29C9E925000
heap
page read and write
5610000
trusted library allocation
page read and write
112D000
heap
page read and write
1060000
direct allocation
page read and write
183AF030000
heap
page read and write
CE0000
heap
page read and write
1320000
heap
page read and write
55E0000
trusted library allocation
page read and write
1120000
heap
page read and write
DCC407E000
stack
page read and write
5680000
trusted library allocation
page read and write
D70000
remote allocation
page read and write
267105DC000
heap
page read and write
29C9E7F3000
trusted library allocation
page read and write
2670FCF6000
heap
page read and write
62EA000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
2571000
heap
page read and write
54E0000
trusted library allocation
page read and write
208ED229000
heap
page read and write
E435AFD000
stack
page read and write
5660000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
251B3A29000
heap
page read and write
27BE9A85000
heap
page read and write
2B86000
direct allocation
page read and write
55E0000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
2AFBFE02000
heap
page read and write
5670000
trusted library allocation
page read and write
1576F9C6000
heap
page read and write
54E0000
trusted library allocation
page read and write
5F3D000
stack
page read and write
263DF863000
heap
page read and write
62E9000
trusted library allocation
page read and write
1576F8A0000
heap
page read and write
A50000
trusted library allocation
page read and write
30FF000
direct allocation
page read and write
29C9E600000
heap
page read and write
183AF0CE000
heap
page read and write
7F9E0000
trusted library allocation
page execute and read and write
3020000
direct allocation
page read and write
2670FAF0000
heap
page read and write
62D0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
11ED000
trusted library allocation
page execute and read and write
27BE9A3D000
heap
page read and write
251B3A00000
heap
page read and write
29CA3EF8000
heap
page read and write
2AFBFE87000
heap
page read and write
F3D000
stack
page read and write
29C9E88C000
heap
page read and write
1576F9A8000
heap
page read and write
251B3A40000
heap
page read and write
1576F9A0000
heap
page read and write
62E1000
trusted library allocation
page read and write
250000
heap
page read and write
54A1000
trusted library allocation
page read and write
1576F9E8000
heap
page read and write
5330000
trusted library allocation
page read and write
55D0000
trusted library allocation
page execute and read and write
1F206920000
heap
page read and write
13B1000
heap
page read and write
1195000
heap
page read and write
5895000
trusted library allocation
page read and write
DCC44FA000
stack
page read and write
26710990000
remote allocation
page read and write
2670FCEE000
heap
page read and write
273000
unkown
page read and write
2AA0000
direct allocation
page read and write
400000
system
page execute and read and write
1129000
heap
page read and write
DDA1D7B000
stack
page read and write
5895000
trusted library allocation
page read and write
1F206990000
heap
page read and write
1141000
heap
page read and write
27BE9A4E000
heap
page read and write
1129000
heap
page read and write
183AF0E2000
heap
page read and write
112D000
heap
page read and write
263DF88C000
heap
page read and write
10A0000
trusted library allocation
page read and write
208ED2E3000
heap
page read and write
183AF010000
heap
page read and write
29C9F102000
heap
page read and write
2670FC3C000
heap
page read and write
5ED0000
trusted library allocation
page read and write
29C9E760000
trusted library allocation
page read and write
29CA4044000
trusted library allocation
page read and write
8BDB47E000
stack
page read and write
3FE000
stack
page read and write
1D5FE770000
heap
page read and write
130C000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
1151000
heap
page read and write
62EF000
trusted library allocation
page read and write
E0AC67E000
stack
page read and write
208ED26D000
heap
page read and write
27BE9A00000
heap
page read and write
208ED2CA000
heap
page read and write
263DF861000
heap
page read and write
27BE9A57000
heap
page read and write
4631000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
2BB6000
direct allocation
page read and write
2AE0000
direct allocation
page read and write
1D5FE7D0000
heap
page read and write
BB0000
trusted library allocation
page read and write
5550000
trusted library allocation
page execute and read and write
1D5FE848000
heap
page read and write
2AFBFE72000
heap
page read and write
1F206A13000
heap
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
63CE000
stack
page read and write
1138000
heap
page read and write
62EA000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
29CA4130000
trusted library allocation
page read and write
26710515000
heap
page read and write
2BF6000
direct allocation
page read and write
263DF889000
heap
page read and write
62E1000
trusted library allocation
page read and write
2670FD08000
heap
page read and write
1139000
heap
page read and write
7B4000
heap
page read and write
55F0000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
64C0000
trusted library allocation
page execute and read and write
8FEEDFD000
stack
page read and write
2A80000
direct allocation
page read and write
27BEA202000
trusted library allocation
page read and write
26710597000
heap
page read and write
55B0000
trusted library allocation
page read and write
DDA217F000
stack
page read and write
183AF0C7000
heap
page read and write
1F206A55000
heap
page read and write
7B4000
heap
page read and write
64C0000
trusted library allocation
page read and write
1D5FE852000
heap
page read and write
27BE9A76000
heap
page read and write
26710A03000
heap
page read and write
2DC0000
direct allocation
page read and write
2255268B000
heap
page read and write
1D5FE902000
heap
page read and write
5680000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
27BE9810000
heap
page read and write
183AF0E4000
heap
page read and write
29C9FC60000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
D6A000
heap
page read and write
29C9F910000
trusted library section
page readonly
5540000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
2255264A000
heap
page read and write
29C9E5F0000
heap
page read and write
DDA1F7F000
stack
page read and write
26710587000
heap
page read and write
2F66000
direct allocation
page read and write
CFE000
stack
page read and write
131E000
stack
page read and write
26710A02000
heap
page read and write
183AF340000
heap
page read and write
DDA1B7F000
stack
page read and write
55C0000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
62DF000
trusted library allocation
page read and write
7B4000
heap
page read and write
5660000
trusted library allocation
page read and write
29CA4110000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
2FA6000
direct allocation
page read and write
26710597000
heap
page read and write
267105AA000
heap
page read and write
5680000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
2D8E000
stack
page read and write
5280000
trusted library allocation
page execute and read and write
7B4000
heap
page read and write
55B0000
trusted library allocation
page read and write
54C3000
heap
page read and write
55B0000
trusted library allocation
page read and write
1310000
trusted library allocation
page execute and read and write
2670FC52000
heap
page read and write
27BE9A2F000
heap
page read and write
E0ACB7E000
stack
page read and write
30FF000
direct allocation
page read and write
12AD000
stack
page read and write
5670000
trusted library allocation
page execute and read and write
58A8000
unkown
page read and write
27BE9A49000
heap
page read and write
5660000
trusted library allocation
page read and write
22CD3FE000
stack
page read and write
62EA000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
183AF0E2000
heap
page read and write
1576F9ED000
heap
page read and write
22CD27A000
stack
page read and write
29F0000
direct allocation
page read and write
29CA3ED6000
heap
page read and write
27BE9A65000
heap
page read and write
62E1000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
183AF0E2000
heap
page read and write
5540000
trusted library allocation
page read and write
29C9E870000
heap
page read and write
29CA3CE0000
trusted library allocation
page read and write
111C000
heap
page read and write
29CA4021000
trusted library allocation
page read and write
6B21000
trusted library allocation
page read and write
313B000
direct allocation
page read and write
183AF0DD000
heap
page read and write
26710595000
heap
page read and write
5330000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
27BE9A75000
heap
page read and write
208ED302000
heap
page read and write
64D0000
trusted library allocation
page read and write
138E000
heap
page read and write
62E1000
trusted library allocation
page read and write
D4A000
stack
page read and write
2D1F000
direct allocation
page read and write
5360000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
56C0000
heap
page execute and read and write
5660000
trusted library allocation
page read and write
10BB000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
2E90000
direct allocation
page read and write
52C5000
trusted library allocation
page read and write
29C9F158000
heap
page read and write
6D3E000
stack
page read and write
52D0000
trusted library allocation
page read and write
1576F9F9000
heap
page read and write
52C0000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
2BA6000
direct allocation
page read and write
29CA4160000
remote allocation
page read and write
603D000
stack
page read and write
2BF6000
direct allocation
page read and write
55B0000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
FD1DA7B000
stack
page read and write
2F66000
direct allocation
page read and write
BDA000
stack
page read and write
422000
system
page execute and read and write
62EE000
trusted library allocation
page read and write
26710A00000
heap
page read and write
2BB6000
direct allocation
page read and write
29CA3E1E000
heap
page read and write
62E1000
trusted library allocation
page read and write
183AEEE0000
heap
page read and write
111B000
heap
page read and write
F75000
heap
page read and write
26710990000
remote allocation
page read and write
5360000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
8BDB1DC000
stack
page read and write
55B0000
trusted library allocation
page read and write
422000
system
page execute and read and write
10A7000
trusted library allocation
page execute and read and write
62EC000
trusted library allocation
page read and write
2670FCB1000
heap
page read and write
62EF000
trusted library allocation
page read and write
2D8B000
direct allocation
page read and write
E43579B000
stack
page read and write
2680000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
28D1000
heap
page read and write
62EF000
trusted library allocation
page read and write
27BE9A3A000
heap
page read and write
2670FCE4000
heap
page read and write
ABD000
unkown
page readonly
62E9000
trusted library allocation
page read and write
61CE000
stack
page read and write
12B0000
heap
page read and write
263DF902000
heap
page read and write
7EC000
stack
page read and write
5330000
trusted library allocation
page read and write
2D8F000
direct allocation
page read and write
5890000
trusted library allocation
page read and write
2D4F000
direct allocation
page read and write
2FE0000
direct allocation
page read and write
27BE9970000
trusted library allocation
page read and write
2671059B000
heap
page read and write
1397000
heap
page read and write
29C9F8C0000
trusted library section
page readonly
58A0000
trusted library section
page read and write
263DF6C0000
heap
page read and write
62EE000
trusted library allocation
page read and write
1D5FE84E000
heap
page read and write
8FEEF7D000
stack
page read and write
2671059B000
heap
page read and write
DCC3C7A000
stack
page read and write
29C9F002000
heap
page read and write
62E8000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
29C9E829000
heap
page read and write
29C9E857000
heap
page read and write
263DF881000
heap
page read and write
27BE9A42000
heap
page read and write
26710A02000
heap
page read and write
CB0000
heap
page read and write
62CE000
stack
page read and write
3F91000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
22552700000
heap
page read and write
1394000
heap
page read and write
29CA40D0000
trusted library allocation
page read and write
3020000
direct allocation
page read and write
29CA3EAE000
heap
page read and write
62EF000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
5650000
trusted library section
page read and write
7B4000
heap
page read and write
29C9E913000
heap
page read and write
29C9F8F0000
trusted library section
page readonly
114E000
heap
page read and write
135BAFF000
stack
page read and write
F40000
trusted library allocation
page read and write
183AF0C0000
heap
page read and write
62EA000
trusted library allocation
page read and write
63EB000
heap
page read and write
5510000
trusted library allocation
page read and write
2D4B000
direct allocation
page read and write
2F70000
trusted library allocation
page read and write
29CA3E0F000
heap
page read and write
8BDB7F7000
stack
page read and write
263DF852000
heap
page read and write
28D1000
heap
page read and write
5540000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
12C2000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
1F207402000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
313B000
direct allocation
page read and write
6318000
trusted library allocation
page read and write
22CD4FF000
stack
page read and write
5380000
trusted library allocation
page read and write
27BE9A7C000
heap
page read and write
1122000
heap
page read and write
62EF000
trusted library allocation
page read and write
422000
system
page execute and read and write
62E1000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
22552500000
heap
page read and write
2AFBFD40000
trusted library allocation
page read and write
DDA1A7F000
stack
page read and write
9741D7F000
stack
page read and write
29C9F118000
heap
page read and write
AD0000
heap
page read and write
CC4107B000
stack
page read and write
B3A000
stack
page read and write
63C1000
heap
page read and write
2AE0000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
267105C0000
heap
page read and write
29CA4024000
trusted library allocation
page read and write
2AFBFE66000
heap
page read and write
54E5000
trusted library allocation
page read and write
26710587000
heap
page read and write
2A70000
direct allocation
page read and write
2670FC13000
heap
page read and write
58CE000
stack
page read and write
313F000
direct allocation
page read and write
29C9E7D1000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
183AF0CE000
heap
page read and write
5540000
trusted library allocation
page read and write
29CA3EF5000
heap
page read and write
5610000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
263DF83C000
heap
page read and write
597E000
stack
page read and write
62E9000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
1137000
heap
page read and write
12C0000
trusted library allocation
page read and write
63EE000
heap
page read and write
E435D78000
stack
page read and write
1356000
heap
page read and write
1090000
trusted library allocation
page read and write
2DFE000
stack
page read and write
2670FCC4000
heap
page read and write
2E30000
trusted library allocation
page read and write
208ED030000
heap
page read and write
26710A20000
heap
page read and write
DC0000
heap
page read and write
26D000
unkown
page readonly
29C9E8A1000
heap
page read and write
56A0000
trusted library allocation
page read and write
565A000
trusted library allocation
page read and write
27BE9A61000
heap
page read and write
12A6000
trusted library allocation
page execute and read and write
29CA4160000
remote allocation
page read and write
208ED243000
heap
page read and write
26710595000
heap
page read and write
62E1000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
26710583000
heap
page read and write
5685000
trusted library allocation
page read and write
E0AC77F000
stack
page read and write
E0AC87D000
stack
page read and write
29CA4030000
trusted library allocation
page read and write
7B4000
heap
page read and write
29C9E83F000
heap
page read and write
E435C7F000
stack
page read and write
BDF000
stack
page execute and read and write
8FEECFF000
stack
page read and write
52C0000
trusted library allocation
page read and write
2F46000
direct allocation
page read and write
26710402000
heap
page read and write
22552600000
heap
page read and write
5540000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
27BE9A3E000
heap
page read and write
1396000
heap
page read and write
548A000
trusted library allocation
page read and write
2B86000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
D70000
remote allocation
page read and write
64C0000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
27BE9A5B000
heap
page read and write
109A000
trusted library allocation
page execute and read and write
E0AC97F000
stack
page read and write
29CA3EED000
heap
page read and write
5890000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
29CA400E000
trusted library allocation
page read and write
B60000
remote allocation
page read and write
8BDB4FE000
stack
page read and write
5330000
trusted library allocation
page read and write
29C9E800000
heap
page read and write
6610000
trusted library allocation
page read and write
AC3000
unkown
page read and write
27BE9A62000
heap
page read and write
54D0000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
183AF0C4000
heap
page read and write
DCC42FE000
stack
page read and write
62E1000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
27BE9A44000
heap
page read and write
251B37E0000
heap
page read and write
2670FBF0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
29CA3E4C000
heap
page read and write
400000
system
page execute and read and write
63C1000
heap
page read and write
31B0000
trusted library allocation
page read and write
2AFBFBE0000
heap
page read and write
26710597000
heap
page read and write
1117000
heap
page read and write
2FA6000
direct allocation
page read and write
CB4000
heap
page read and write
55E0000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
1126000
heap
page read and write
1576F940000
heap
page read and write
313F000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
22552713000
heap
page read and write
2670FA90000
heap
page read and write
5270000
trusted library allocation
page read and write
26710510000
heap
page read and write
62EF000
trusted library allocation
page read and write
26710A02000
heap
page read and write
2255263D000
heap
page read and write
139C000
heap
page read and write
2FA6000
direct allocation
page read and write
2AFC0602000
trusted library allocation
page read and write
5EEE000
stack
page read and write
62E9000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
2670FCA4000
heap
page read and write
1576F9C4000
heap
page read and write
631D000
trusted library allocation
page read and write
6610000
unkown
page read and write
27BE9A6C000
heap
page read and write
5890000
trusted library allocation
page execute and read and write
631D000
trusted library allocation
page read and write
313B000
direct allocation
page read and write
208ED2E7000
heap
page read and write
2670FCCA000
heap
page read and write
27BE9A6A000
heap
page read and write
183AF0DE000
heap
page read and write
5660000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
2255262A000
heap
page read and write
135BBFE000
stack
page read and write
112D000
heap
page read and write
E0AC57C000
stack
page read and write
631D000
trusted library allocation
page read and write
61BD000
stack
page read and write
CC4137E000
stack
page read and write
29CA4120000
trusted library allocation
page read and write
7B4000
heap
page read and write
1576F9F6000
heap
page read and write
2AFBFE76000
heap
page read and write
29CA3E8B000
heap
page read and write
29C9F015000
heap
page read and write
56C3000
heap
page execute and read and write
1129000
heap
page read and write
183AF0C2000
heap
page read and write
2AA0000
direct allocation
page read and write
27BE9800000
heap
page read and write
31D4000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
27BE9A64000
heap
page read and write
5EF0000
trusted library allocation
page read and write
FD1D8FE000
stack
page read and write
2BDE000
stack
page read and write
7B4000
heap
page read and write
9741E7E000
stack
page read and write
26710597000
heap
page read and write
1576F9F5000
heap
page read and write
2D4F000
direct allocation
page read and write
5650000
trusted library allocation
page read and write
62DF000
trusted library allocation
page read and write
CB4000
heap
page read and write
5295000
trusted library allocation
page read and write
6FF000
stack
page execute and read and write
6620000
trusted library allocation
page read and write
135BCFF000
stack
page read and write
7B4000
heap
page read and write
29C9F100000
heap
page read and write
2E90000
direct allocation
page read and write
8BDB6FB000
stack
page read and write
674E000
stack
page read and write
55B0000
trusted library allocation
page read and write
D70000
remote allocation
page read and write
2670FC89000
heap
page read and write
2AFBFE13000
heap
page read and write
27BE9A6E000
heap
page read and write
139E000
heap
page read and write
CB4000
heap
page read and write
62E1000
trusted library allocation
page read and write
2D1B000
direct allocation
page read and write
5490000
trusted library allocation
page read and write
26D000
unkown
page readonly
5690000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
263DF85C000
heap
page read and write
62EF000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
30FB000
direct allocation
page read and write
E436177000
stack
page read and write
B60000
remote allocation
page read and write
5610000
trusted library allocation
page read and write
28D0000
heap
page read and write
1122000
heap
page read and write
D70000
remote allocation
page read and write
5610000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
1152000
heap
page read and write
1F206A3E000
heap
page read and write
55ED000
trusted library allocation
page read and write
584D000
stack
page read and write
512D000
stack
page read and write
2570000
heap
page read and write
1D5FE888000
heap
page read and write
5610000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
27BE9A63000
heap
page read and write
251B3970000
remote allocation
page read and write
6610000
trusted library allocation
page read and write
548D000
trusted library allocation
page read and write
1F206930000
heap
page read and write
62E1000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
2AFBFE76000
heap
page read and write
2670FA80000
heap
page read and write
208ED2C1000
heap
page read and write
AC3000
unkown
page write copy
29C9F000000
heap
page read and write
5350000
trusted library allocation
page read and write
1330000
heap
page read and write
263DF6D0000
heap
page read and write
55BA000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
27BE9A2D000
heap
page read and write
5680000
trusted library allocation
page read and write
1D5FE908000
heap
page read and write
208ED040000
heap
page read and write
5540000
trusted library allocation
page read and write
261000
unkown
page execute read
5890000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
8FEF07D000
stack
page read and write
2670FC4A000
heap
page read and write
588E000
stack
page read and write
CB4000
heap
page read and write
62EE000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
27BE9A60000
heap
page read and write
27BE9A68000
heap
page read and write
2C80000
heap
page read and write
5560000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
1F206A00000
heap
page read and write
1300000
trusted library allocation
page read and write
111D000
heap
page read and write
1D5FE84C000
heap
page read and write
5530000
trusted library allocation
page read and write
10E6000
heap
page read and write
1390000
heap
page read and write
2AFBFF13000
heap
page read and write
F5D000
trusted library allocation
page execute and read and write
62E9000
trusted library allocation
page read and write
DCC3B7C000
stack
page read and write
62E1000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
29CA4150000
trusted library allocation
page read and write
263DF85F000
heap
page read and write
CB4000
heap
page read and write
5680000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
26710599000
heap
page read and write
AC5000
unkown
page readonly
5680000
trusted library allocation
page read and write
2670FC29000
heap
page read and write
1D5FE849000
heap
page read and write
DCC3D7F000
stack
page read and write
22CD478000
stack
page read and write
5650000
trusted library allocation
page read and write
3BE000
stack
page read and write
273000
unkown
page write copy
1576F9B8000
heap
page read and write
DCC43FF000
stack
page read and write
26710591000
heap
page read and write
13A4000
heap
page read and write
D20000
trusted library allocation
page read and write
FD1DC77000
stack
page read and write
6610000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
FD1D97E000
stack
page read and write
E435F78000
stack
page read and write
CB4000
heap
page read and write
1D5FE851000
heap
page read and write
7B4000
heap
page read and write
5660000
trusted library allocation
page read and write
1D5FE84F000
heap
page read and write
2BF6000
direct allocation
page read and write
2670FC57000
heap
page read and write
2C30000
direct allocation
page read and write
139E000
heap
page read and write
529A000
trusted library allocation
page read and write
2AFBFE00000
heap
page read and write
62E1000
trusted library allocation
page read and write
A9D000
stack
page read and write
5890000
trusted library allocation
page read and write
26710A02000
heap
page read and write
22554070000
trusted library allocation
page read and write
CB4000
heap
page read and write
267105D8000
heap
page read and write
631C000
trusted library allocation
page read and write
8035BFE000
stack
page read and write
27BE9A58000
heap
page read and write
AB0000
unkown
page readonly
29C9E87A000
heap
page read and write
F70000
heap
page read and write
30FB000
direct allocation
page read and write
1576F9F9000
heap
page read and write
29CA4008000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
7B4000
heap
page read and write
A8D000
stack
page read and write
There are 1415 hidden memdumps, click here to show them.