IOC Report
SecuriteInfo.com.generic.ml.22865.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.generic.ml.22865.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ArtDeco_green_6.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\MpCommu.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\OLIGOCARPOUS.SNO
data
dropped
C:\Users\user\AppData\Local\Temp\SourceCodePro-Black.otf
OpenType font data
dropped
C:\Users\user\AppData\Local\Temp\analysekapitlet.ini
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\applications-system.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\lang-1034.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libfreetype-6.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libpcre-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lilas.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\microphone-hardware-disabled-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\multimedia-player-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\network-server.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsr150B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\task-past-due.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.fides-kenya.com/yem/wam.bin
5.9.197.244
malicious
http://127.0.0.1:HTTP/1.1
unknown
http://V58nqJBvA8Uitwi1EyuW.com
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
https://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
https://api.telegram.org/
unknown
http://hqQZjN.com
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
http://www.avast.com0/
unknown
http://scripts.sil.org/OFLSource
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument
149.154.167.220
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
unknown
https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocumentdocument-----
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fides-kenya.com
5.9.197.244
malicious
www.fides-kenya.com
unknown
malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
5.9.197.244
fides-kenya.com
Germany
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlen
INTWISTING
HKEY_LOCAL_MACHINE\SOFTWARE\Klarings\DIALEKTEN
Ratifikationsdokumenternes159
HKEY_CURRENT_USER\SOFTWARE\Knscellens122\tabulr
Expand String Value
HKEY_CURRENT_USER\SOFTWARE\Struldbruggism\Redbook227
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\Klinken\Supervision
faststtende
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F00000
remote allocation
page execute and read and write
malicious
1D5C1000
trusted library allocation
page read and write
malicious
32A0000
direct allocation
page execute and read and write
malicious
1C441000
heap
page read and write
1FCA0000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
400000
unkown
page readonly
2219B502000
heap
page read and write
6E0000
heap
page read and write
1E5C1000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538D06D000
heap
page read and write
6E0000
heap
page read and write
1FF15000
trusted library allocation
page read and write
1FF15000
trusted library allocation
page read and write
6DF000
heap
page read and write
716A6000
unkown
page readonly
1C441000
heap
page read and write
2538DB29000
heap
page read and write
1C441000
heap
page read and write
4FE000
stack
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
20266000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
EFE000
stack
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
401000
unkown
page execute read
1D27A000
stack
page read and write
1FF10000
trusted library allocation
page read and write
84B8CFE000
stack
page read and write
2219B45E000
heap
page read and write
6B6000
heap
page read and write
202F0000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
2538D0BF000
heap
page read and write
1C441000
heap
page read and write
1E5E7000
trusted library allocation
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
144E000
stack
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
3A60000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1FB5D000
stack
page read and write
6E0000
heap
page read and write
185E7130000
unclassified section
page readonly
6DF000
heap
page read and write
20249000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
202B0000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
2538DB7C000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
202F0000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2538DB2C000
heap
page read and write
2538DA02000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1F8A0000
remote allocation
page read and write
6DF000
heap
page read and write
A8C1A7C000
stack
page read and write
1FF12000
trusted library allocation
page read and write
1E678000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
185E7213000
heap
page read and write
2D30000
trusted library allocation
page read and write
84B8EF9000
stack
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF5E000
stack
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
185E724E000
heap
page read and write
6DF000
heap
page read and write
20246000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2042E000
unkown
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
12EE000
stack
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
7FA00000
trusted library allocation
page execute and read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
11CA000
heap
page read and write
2538DA00000
heap
page read and write
1C441000
heap
page read and write
185E722A000
heap
page read and write
1FF12000
trusted library allocation
page read and write
23A4000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
3230000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1D61B000
trusted library allocation
page read and write
20310000
trusted library allocation
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
2D79000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
463000
unkown
page readonly
6DF000
heap
page read and write
1C441000
heap
page read and write
20320000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
670000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6A1000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1FF13000
trusted library allocation
page read and write
1C441000
heap
page read and write
20240000
trusted library allocation
page read and write
1E6D8000
trusted library allocation
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
BB0000
remote allocation
page read and write
2538DB76000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
2538DB3B000
heap
page read and write
1D4B0000
heap
page execute and read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
2538DB0E000
heap
page read and write
1C756000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1D47E000
stack
page read and write
20312000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1F8A0000
remote allocation
page read and write
1FF10000
trusted library allocation
page read and write
9AE000
stack
page read and write
1DACA000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1F7A0000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
20430000
trusted library allocation
page read and write
1C441000
heap
page read and write
20310000
trusted library allocation
page read and write
1C441000
heap
page read and write
20300000
trusted library allocation
page read and write
185E727E000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
202EC000
trusted library allocation
page read and write
1FF15000
trusted library allocation
page read and write
1C441000
heap
page read and write
F00000
remote allocation
page execute and read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
530000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1FF15000
trusted library allocation
page read and write
6E0000
heap
page read and write
20260000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
2219BE02000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538DB41000
heap
page read and write
22A0000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2538D040000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1D3FA000
trusted library allocation
page execute and read and write
1CB9E000
stack
page read and write
1D3C2000
trusted library allocation
page execute and read and write
20310000
trusted library allocation
page read and write
1F910000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2917000
trusted library allocation
page read and write
6E0000
heap
page read and write
2219B400000
heap
page read and write
2219B3A0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1DAD0000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
2538DB2D000
heap
page read and write
185E6FB0000
heap
page read and write
202A0000
trusted library allocation
page read and write
20320000
trusted library allocation
page read and write
1FE00000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6B1000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page execute and read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
3480000
heap
page read and write
1C441000
heap
page read and write
201A0000
trusted library section
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1FDF0000
trusted library allocation
page read and write
1FDC0000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
2219B451000
heap
page read and write
203AD000
unkown
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1F8F0000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
2538DB56000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
20240000
trusted library allocation
page read and write
121B000
heap
page read and write
1FF12000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2538DA15000
heap
page read and write
6E0000
heap
page read and write
463000
unkown
page readonly
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
202A0000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
20280000
trusted library allocation
page read and write
98000
stack
page read and write
1D407000
trusted library allocation
page execute and read and write
201E0000
trusted library allocation
page read and write
35A7DFA000
stack
page read and write
1D3D2000
trusted library allocation
page execute and read and write
1C441000
heap
page read and write
2538D0CF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1FCFB000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
401000
unkown
page execute read
1C441000
heap
page read and write
1D3EA000
trusted library allocation
page execute and read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
2538DB02000
heap
page read and write
1C441000
heap
page read and write
1CF00000
heap
page read and write
1165000
heap
page read and write
1FF10000
trusted library allocation
page read and write
202F0000
trusted library allocation
page read and write
1C441000
heap
page read and write
30000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
678000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1D402000
trusted library allocation
page read and write
1DA5A000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
2219B425000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
4ED0000
trusted library allocation
page read and write
6E0000
heap
page read and write
1208000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
BB0000
remote allocation
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
1E640000
trusted library allocation
page read and write
185E7202000
heap
page read and write
6E0000
heap
page read and write
86F000
stack
page read and write
1184000
heap
page read and write
6E0000
heap
page read and write
2219B425000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
20300000
trusted library allocation
page read and write
280F000
stack
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF15000
trusted library allocation
page read and write
1FCCE000
trusted library allocation
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1340000
heap
page read and write
2538D113000
heap
page read and write
2538D8C0000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538DB5B000
heap
page read and write
2538DB70000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
234E000
stack
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
112B000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
20250000
trusted library allocation
page read and write
2538DB2A000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
2538D000000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1D68E000
trusted library allocation
page read and write
427000
unkown
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
2538D08F000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C6BE000
stack
page read and write
2219B413000
heap
page read and write
1C441000
heap
page read and write
202F0000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF15000
trusted library allocation
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
BB0000
remote allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
435000
unkown
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
20310000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538DB2C000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
35A7BFE000
stack
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
2538D089000
heap
page read and write
2538DB0E000
heap
page read and write
2538DB37000
heap
page read and write
1FCB6000
trusted library allocation
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
202D0000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1FF17000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2219B402000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1FCF9000
trusted library allocation
page read and write
6E0000
heap
page read and write
2538D013000
heap
page read and write
1FF12000
trusted library allocation
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1FF10000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1FDC0000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
2219B420000
heap
page read and write
6E0000
heap
page read and write
2219B2F0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
96F000
stack
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1F890000
trusted library allocation
page execute and read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1D5BE000
stack
page read and write
1C441000
heap
page read and write
40A000
unkown
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF15000
trusted library allocation
page read and write
20270000
trusted library allocation
page read and write
20320000
trusted library allocation
page read and write
6DF000
heap
page read and write
1D430000
heap
page read and write
185E7240000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6C8000
heap
page read and write
6E0000
heap
page read and write
A8C1C7E000
stack
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1D694000
trusted library allocation
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
535000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C440000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
20430000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538DB40000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2219B44A000
heap
page read and write
1FCEA000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2538D05F000
heap
page read and write
A8C1D7D000
stack
page read and write
185E7251000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
2538D0A5000
heap
page read and write
6E0000
heap
page read and write
1D3F0000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
A8C167B000
stack
page read and write
6DF000
heap
page read and write
2009E000
stack
page read and write
2538DB13000
heap
page read and write
20310000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
11F3000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1550000
trusted library allocation
page read and write
6DF000
heap
page read and write
185E7237000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1D40B000
trusted library allocation
page execute and read and write
1C441000
heap
page read and write
2538DB7C000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
AF5000
heap
page read and write
202F0000
trusted library allocation
page read and write
6DF000
heap
page read and write
19A000
stack
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
20360000
trusted library allocation
page read and write
2219B465000
heap
page read and write
6E0000
heap
page read and write
84B870B000
stack
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
11D9000
heap
page read and write
6DF000
heap
page read and write
A8C1B7B000
stack
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
2219B42A000
heap
page read and write
422000
unkown
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
23C0000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
202F0000
trusted library allocation
page read and write
20270000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538DB6D000
heap
page read and write
1CEEF000
stack
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2005E000
stack
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1F810000
trusted library allocation
page read and write
6E0000
heap
page read and write
3C5B000
stack
page read and write
1D410000
trusted library allocation
page read and write
2219B432000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
716A4000
unkown
page readonly
6DF000
heap
page read and write
6E0000
heap
page read and write
201E0000
trusted library allocation
page read and write
1FF0C000
stack
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
11A6000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1D3B0000
trusted library allocation
page read and write
1FF15000
trusted library allocation
page read and write
6DF000
heap
page read and write
1FF15000
trusted library allocation
page read and write
A8C197F000
stack
page read and write
6E0000
heap
page read and write
40A000
unkown
page write copy
6DF000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
2538DB6B000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
6BA000
heap
page read and write
1D490000
trusted library allocation
page read and write
6E0000
heap
page read and write
2219B390000
unclassified section
page readonly
1D400000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
35A787B000
stack
page read and write
1C441000
heap
page read and write
4F09000
trusted library allocation
page read and write
716A0000
unkown
page readonly
2538DB4B000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1D621000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
185E7271000
heap
page read and write
2538DB10000
heap
page read and write
1FDD0000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
20300000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1FCEE000
trusted library allocation
page read and write
2538D100000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
2538DB00000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
20240000
trusted library allocation
page read and write
6DF000
heap
page read and write
202F0000
trusted library allocation
page read and write
6E0000
heap
page read and write
185E7140000
heap
page read and write
6E0000
heap
page read and write
2538D2D0000
heap
page read and write
1C441000
heap
page read and write
20470000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538D097000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
2019F000
stack
page read and write
1D3E6000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
1F8EC000
stack
page read and write
1FE10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
20260000
trusted library allocation
page read and write
6E0000
heap
page read and write
10F4000
heap
page read and write
6CE000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
2219B350000
heap
page read and write
6E0000
heap
page read and write
1D3F2000
trusted library allocation
page execute and read and write
1FCC3000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
A8C1E7D000
stack
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
BC0000
unclassified section
page readonly
6E0000
heap
page read and write
6DF000
heap
page read and write
185E7274000
heap
page read and write
20250000
trusted library allocation
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1F5C8000
trusted library allocation
page read and write
20290000
trusted library allocation
page read and write
2538CFB0000
heap
page read and write
2538DB29000
heap
page read and write
A8C1F7E000
stack
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
B20000
heap
page read and write
1FF12000
trusted library allocation
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
11C3000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
202E0000
trusted library allocation
page execute and read and write
1FE0D000
stack
page read and write
1FDF3000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
2538CF40000
heap
page read and write
716A1000
unkown
page execute read
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
3B5C000
stack
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
2538D02A000
heap
page read and write
1C441000
heap
page read and write
20280000
trusted library allocation
page read and write
6E0000
heap
page read and write
20290000
trusted library allocation
page read and write
6E0000
heap
page read and write
2538D089000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1CDEE000
stack
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2538D091000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1FF15000
trusted library allocation
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
207AE000
stack
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
20240000
trusted library allocation
page read and write
2538D08F000
heap
page read and write
2538DB74000
heap
page read and write
10D0000
unclassified section
page readonly
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
411000
unkown
page read and write
6E0000
heap
page read and write
2219B43B000
heap
page read and write
20312000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
202B0000
trusted library allocation
page read and write
10F0000
heap
page read and write
6DF000
heap
page read and write
2219B43F000
heap
page read and write
AAE000
stack
page read and write
2538D0BA000
heap
page read and write
185E7020000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
11D2000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
AF0000
heap
page read and write
23A0000
heap
page read and write
1C441000
heap
page read and write
2538DB76000
heap
page read and write
1FF12000
trusted library allocation
page read and write
408000
unkown
page readonly
1C441000
heap
page read and write
205AE000
stack
page read and write
1C441000
heap
page read and write
2538D0CF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
185E7190000
trusted library allocation
page read and write
1FF15000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1DA5D000
trusted library allocation
page read and write
20340000
trusted library allocation
page read and write
20270000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538DB7C000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
2538D102000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
20300000
trusted library allocation
page read and write
290F000
stack
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
610000
trusted library allocation
page read and write
1C441000
heap
page read and write
2538D0BF000
heap
page read and write
2219B47E000
heap
page read and write
6DF000
heap
page read and write
1F69C000
stack
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1D4A0000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FCBC000
trusted library allocation
page read and write
6DF000
heap
page read and write
201A0000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
2538CFF0000
unclassified section
page readonly
6E0000
heap
page read and write
2538DB32000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2538D07C000
heap
page read and write
2538D095000
heap
page read and write
202F2000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
11D4000
heap
page read and write
2538DB2C000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
2538D07E000
heap
page read and write
2219B41A000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1FF15000
trusted library allocation
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
2538DB2F000
heap
page read and write
35A7CFE000
stack
page read and write
1C441000
heap
page read and write
1FF15000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
2538D083000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
1D698000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1D3FC000
trusted library allocation
page execute and read and write
1FF10000
trusted library allocation
page read and write
1FF17000
trusted library allocation
page read and write
1FDE0000
trusted library allocation
page read and write
202E0000
trusted library allocation
page read and write
2538D064000
heap
page read and write
1F79E000
stack
page read and write
1FE20000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
202C0000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
A8C207E000
stack
page read and write
BB0000
remote allocation
page read and write
1C441000
heap
page read and write
BB0000
remote allocation
page read and write
1DA40000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
20330000
trusted library allocation
page read and write
6E0000
heap
page read and write
1FCEE000
trusted library allocation
page read and write
1C441000
heap
page read and write
1F8A0000
remote allocation
page read and write
20240000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
20365000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1FF10000
trusted library allocation
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
AEE000
stack
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1120000
heap
page read and write
1C441000
heap
page read and write
1FF1E000
trusted library allocation
page read and write
6E0000
heap
page read and write
2219BC70000
trusted library allocation
page read and write
2538DB70000
heap
page read and write
1D3E2000
trusted library allocation
page read and write
202F0000
trusted library allocation
page read and write
1D6D0000
trusted library allocation
page read and write
6E0000
heap
page read and write
20240000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
2538D09F000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1D376000
stack
page read and write
2219B46C000
heap
page read and write
6E0000
heap
page read and write
20250000
trusted library allocation
page read and write
1C441000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
20350000
trusted library allocation
page execute and read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1D68C000
trusted library allocation
page read and write
6E0000
heap
page read and write
B8D000
stack
page read and write
1C441000
heap
page read and write
1FDD0000
trusted library allocation
page read and write
2219B456000
heap
page read and write
1FF10000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
185E7302000
heap
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1D3E0000
trusted library allocation
page read and write
1FDA0000
trusted library allocation
page execute and read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
1D740000
trusted library allocation
page read and write
185E7200000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1D0000
unclassified section
page readonly
2538D07D000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
185E7A02000
trusted library allocation
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
408000
unkown
page readonly
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1FF10000
trusted library allocation
page read and write
2538DB74000
heap
page read and write
1FD16000
trusted library allocation
page read and write
1C441000
heap
page read and write
120F000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1FF10000
trusted library allocation
page read and write
1C441000
heap
page read and write
1FF1A000
trusted library allocation
page read and write
1DA56000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1F850000
trusted library allocation
page read and write
6DF000
heap
page read and write
6DF000
heap
page read and write
6E0000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
A8C18F9000
stack
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
6E0000
heap
page read and write
6DF000
heap
page read and write
2538DB2C000
heap
page read and write
1347000
heap
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2219B441000
heap
page read and write
400000
unkown
page readonly
6E0000
heap
page read and write
1FF10000
trusted library allocation
page read and write
4BE000
stack
page read and write
1FF15000
trusted library allocation
page read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
2219B44E000
heap
page read and write
1D3CA000
trusted library allocation
page execute and read and write
1C441000
heap
page read and write
1C441000
heap
page read and write
20260000
trusted library allocation
page read and write
6DF000
heap
page read and write
1C441000
heap
page read and write
6E0000
heap
page read and write
1C750000
heap
page read and write
1C441000
heap
page read and write
There are 1184 hidden memdumps, click here to show them.