IOC Report
C.png

loading gif

Files

File Path
Type
Category
Malicious
C.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\C.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d56bdb83eb9d4cf28c9bde832a0f519ccf44d5f_82810a17_0bbf029b\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC572.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jun 23 15:55:36 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB20.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCE7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\20220623\PowerShell_transcript.724536.04iY03ef.20220623175558.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\20220623\PowerShell_transcript.724536.4jRUxIKh.20220623175701.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_5ss0gna4.r3v.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_cyx5weiu.qmq.psm1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_et0gmkgs.0m3.ps1
very short file (no magic)
dropped
C:\Windows\Temp\__PSScriptPolicyTest_hwx3zdj0.32k.ps1
very short file (no magic)
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\C.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\C.dll",#1
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
malicious
C:\Windows\System32\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Users\user\Desktop\C.dll
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
malicious
C:\Windows\System32\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Users\user\Desktop\C.dll
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://www.borland.com/namespaces/Types-IAppServerSOAP
unknown
https://sectigo.com/CPS0
unknown
http://www.borland.com/namespaces/Types
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://ocsp.sectigo.com0#
unknown
http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAP
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
3d9dd611
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
802065f
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
a432623
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
b2ff4146
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
cff70ecc
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
774b69a9
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
b0be613a
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
42d4b9e7
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
3d9dd611
HKEY_CURRENT_USER\Software\Microsoft\Grgganpwctzo
3d9dd611
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{310c3c0f-b649-1ba3-9097-9825317ca22e}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
51800d90
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
641fddde
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
665efda2
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
dee29ac7
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
a3ead54d
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
1b56b228
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
dca3babb
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
2ec96266
HKEY_USERS.DEFAULT\Software\Microsoft\Oiyamnnomejtlb
51800d90
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
10A0000
direct allocation
page execute and read and write
malicious
3B10000
direct allocation
page execute and read and write
malicious
1070000
direct allocation
page execute and read and write
malicious
2FB0000
system
page execute and read and write
malicious
1070000
direct allocation
page execute and read and write
malicious
2750000
direct allocation
page execute and read and write
malicious
3230000
system
page execute and read and write
malicious
10C0000
direct allocation
page execute and read and write
malicious
3AF0000
direct allocation
page execute and read and write
malicious
2FB0000
system
page execute and read and write
malicious
10C0000
direct allocation
page execute and read and write
malicious
10C0000
direct allocation
page execute and read and write
malicious
10A0000
direct allocation
page execute and read and write
malicious
3230000
system
page execute and read and write
malicious
27A0000
direct allocation
page execute and read and write
malicious
3AC0000
direct allocation
page execute and read and write
malicious
2780000
direct allocation
page execute and read and write
malicious
10A0000
direct allocation
page execute and read and write
malicious
1070000
direct allocation
page execute and read and write
malicious
32F0000
trusted library allocation
page read and write
1C6CDA13000
heap
page read and write
18D25502000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
B10000
unkown
page readonly
1BE5CA20000
trusted library allocation
page read and write
9D0000
unkown
page readonly
33C7000
heap
page read and write
203068E0000
trusted library allocation
page read and write
4D8F000
stack
page read and write
32F0000
trusted library allocation
page read and write
207E7C2F000
heap
page read and write
1BE5BD25000
heap
page read and write
3C7F000
heap
page read and write
7A0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BA12EA0000
heap
page read and write
1BDF2399000
heap
page read and write
20E30263000
heap
page read and write
1BE5CCE0000
trusted library allocation
page read and write
1BDF2392000
heap
page read and write
3F4F000
trusted library allocation
page read and write
6E9D97E000
stack
page read and write
32F0000
trusted library allocation
page read and write
1C1A7A50000
heap
page read and write
1C6CDA47000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BDF17A0000
heap
page read and write
20306C10000
trusted library allocation
page read and write
18D25490000
heap
page read and write
4380000
trusted library allocation
page read and write
207E7C3D000
heap
page read and write
20306920000
remote allocation
page read and write
1BDF184B000
heap
page read and write
2030126D000
heap
page read and write
207E7C77000
heap
page read and write
341C000
heap
page read and write
F70000
direct allocation
page read and write
C5992FE000
stack
page read and write
32F0000
trusted library allocation
page read and write
2CAF000
heap
page read and write
4380000
trusted library allocation
page read and write
16CCFFF000
unkown
page read and write
3220000
remote allocation
page read and write
2E60000
remote allocation
page read and write
323E47F000
stack
page read and write
32F0000
trusted library allocation
page read and write
16CCC78000
stack
page read and write
1BDF18B4000
heap
page read and write
3760000
heap
page read and write
33C7000
heap
page read and write
64201FE000
stack
page read and write
1BDF2351000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BDF2384000
heap
page read and write
3370000
trusted library allocation
page read and write
1C3379B0000
heap
page read and write
5600000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
F30000
direct allocation
page execute and read and write
1BDF2399000
heap
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
18D25413000
heap
page read and write
20301A00000
heap
page read and write
1C6CD910000
heap
page read and write
F00000
trusted library allocation
page read and write
4DA0000
heap
page read and write
203067E0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
18D2544C000
heap
page read and write
57FF000
stack
page read and write
4380000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BDF236F000
heap
page read and write
1C6CD9D0000
trusted library allocation
page read and write
1BDF18D2000
heap
page read and write
10C0000
heap
page read and write
2E11000
heap
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
2C30000
heap
page read and write
32F0000
trusted library allocation
page read and write
207E7C67000
heap
page read and write
207E7C50000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
1BDF237E000
heap
page read and write
5600000
trusted library allocation
page read and write
20306804000
trusted library allocation
page read and write
1BDF2202000
heap
page read and write
2030129C000
heap
page read and write
1C337C4C000
heap
page read and write
20E300B0000
heap
page read and write
1BDF1886000
heap
page read and write
F90BBCB000
stack
page read and write
4CE000
unkown
page write copy
32F0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
3500000
heap
page read and write
3370000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
8E2F97C000
stack
page read and write
C598FFE000
stack
page read and write
1BDF2362000
heap
page read and write
1BDF2802000
heap
page read and write
1BA12F10000
heap
page read and write
23760FE000
stack
page read and write
1BDF1839000
heap
page read and write
1BDF2395000
heap
page read and write
EDF000
stack
page read and write
8E2F57F000
stack
page read and write
3370000
trusted library allocation
page read and write
1C6CDA76000
heap
page read and write
3760000
heap
page read and write
1C1A7AD6000
heap
page read and write
1BDF2393000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
18D25E02000
trusted library allocation
page read and write
C20000
heap
page read and write
1BDF2387000
heap
page read and write
23766FC000
stack
page read and write
3D0000
trusted library allocation
page read and write
2E11000
heap
page read and write
4380000
trusted library allocation
page read and write
1BDF2382000
heap
page read and write
3220000
remote allocation
page read and write
32F0000
trusted library allocation
page read and write
16CCA7E000
stack
page read and write
1BDF1913000
heap
page read and write
1BDF184C000
heap
page read and write
3CF0000
heap
page read and write
401000
unkown
page execute read
1BDF23A9000
heap
page read and write
2F7A000
stack
page read and write
1BDF2372000
heap
page read and write
20301273000
heap
page read and write
5600000
trusted library allocation
page read and write
5500000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BDF2375000
heap
page read and write
7C4000
heap
page read and write
1BDF18DF000
heap
page read and write
F90C27A000
stack
page read and write
2DCA000
heap
page read and write
300000
unkown
page readonly
203011F3000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
1BDF2384000
heap
page read and write
207E7AB0000
heap
page read and write
147B6858000
heap
page read and write
203067E1000
trusted library allocation
page read and write
1BDF184E000
heap
page read and write
2DF6000
heap
page read and write
207E7C4D000
heap
page read and write
3370000
trusted library allocation
page read and write
4BA1000
heap
page read and write
3370000
trusted library allocation
page read and write
1BDF23DC000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BDF2389000
heap
page read and write
1C1A7AF0000
heap
page read and write
20E30200000
heap
page read and write
E1E000
stack
page read and write
32F0000
trusted library allocation
page read and write
D1E000
stack
page read and write
1C6CDB02000
heap
page read and write
147B6900000
heap
page read and write
207E7C4A000
heap
page read and write
1BDF2394000
heap
page read and write
1BE5C9A0000
trusted library allocation
page read and write
203068D0000
trusted library allocation
page read and write
147B6660000
heap
page read and write
4690000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
1BDF239B000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
147B6800000
heap
page read and write
3CF000
stack
page read and write
207E7C4F000
heap
page read and write
1BDF237C000
heap
page read and write
1BDF23AC000
heap
page read and write
3370000
trusted library allocation
page read and write
20306A9F000
heap
page read and write
82E000
stack
page read and write
5F159FE000
stack
page read and write
F25000
heap
page read and write
1BDF2802000
heap
page read and write
3370000
trusted library allocation
page read and write
1BA13100000
heap
page read and write
1C1A7AD4000
heap
page read and write
7C0000
heap
page read and write
20306A9D000
heap
page read and write
7B0000
heap
page read and write
1BE5BD50000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
1BDF1889000
heap
page read and write
2030128C000
heap
page read and write
1BE5CC80000
trusted library allocation
page read and write
20301229000
heap
page read and write
4380000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
203066B0000
trusted library allocation
page read and write
A9C000
unkown
page read and write
1BDF23A7000
heap
page read and write
7C4000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BA1304B000
heap
page read and write
33C7000
heap
page read and write
46A0000
trusted library allocation
page read and write
29173064000
heap
page read and write
323E2FB000
stack
page read and write
18D25459000
heap
page read and write
583E000
stack
page read and write
3370000
trusted library allocation
page read and write
6E9DB7E000
stack
page read and write
207E7AC0000
heap
page read and write
1BDF23CA000
heap
page read and write
1BDF2800000
heap
page read and write
1C1A7AD5000
heap
page read and write
1BE5BD2D000
heap
page read and write
DF0000
remote allocation
page read and write
203068B0000
trusted library allocation
page read and write
1BE5CC60000
trusted library allocation
page read and write
3DFF000
heap
page read and write
8D0000
heap
page read and write
F70000
direct allocation
page read and write
20E3025C000
heap
page read and write
207E7C13000
heap
page read and write
5600000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
1BA1304C000
heap
page read and write
1BDF1908000
heap
page read and write
3370000
trusted library allocation
page read and write
207E7C51000
heap
page read and write
1BDF2382000
heap
page read and write
8E2F67C000
stack
page read and write
32F0000
trusted library allocation
page read and write
4D4E000
stack
page read and write
20E309F0000
remote allocation
page read and write
4380000
trusted library allocation
page read and write
207E7C7A000
heap
page read and write
32F0000
trusted library allocation
page read and write
F90C57B000
stack
page read and write
F30000
direct allocation
page execute and read and write
3370000
trusted library allocation
page read and write
3D3E000
stack
page read and write
1BDF2399000
heap
page read and write
16CCF78000
stack
page read and write
32F0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
310000
unkown
page read and write
1BE5CA10000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
18D25486000
heap
page read and write
2600000
direct allocation
page execute and read and write
BE3000
unkown
page readonly
1BDF2316000
heap
page read and write
4D90000
trusted library allocation
page readonly
203066A0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
3BEA7FF000
stack
page read and write
1C6CDA57000
heap
page read and write
1C1A7D10000
heap
page read and write
1BDF2100000
remote allocation
page read and write
1BA1304F000
heap
page read and write
237637B000
stack
page read and write
20300FC0000
heap
page read and write
10CB000
heap
page read and write
954000
heap
page read and write
32F0000
trusted library allocation
page read and write
207E7C64000
heap
page read and write
3E2A000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
20306AFB000
heap
page read and write
3D00000
trusted library allocation
page read and write
1B2F4600000
heap
page read and write
CBB000
stack
page read and write
370E000
stack
page read and write
3370000
trusted library allocation
page read and write
1BE5BCB0000
heap
page read and write
3BE9FDC000
stack
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
BDC000
unkown
page read and write
2FA0000
remote allocation
page read and write
5600000
trusted library allocation
page read and write
20301A15000
heap
page read and write
32F0000
trusted library allocation
page read and write
20E30202000
heap
page read and write
32AB000
stack
page read and write
3E05000
heap
page read and write
543487B000
stack
page read and write
1B2F466C000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BDF2382000
heap
page read and write
20301302000
heap
page read and write
464D000
stack
page read and write
32F0000
trusted library allocation
page read and write
67B000
stack
page read and write
20306AAC000
heap
page read and write
1C6CDA65000
heap
page read and write
B00000
heap
page read and write
3370000
trusted library allocation
page read and write
641F8FB000
stack
page read and write
207E7C74000
heap
page read and write
207E7C7B000
heap
page read and write
3370000
trusted library allocation
page read and write
3260000
remote allocation
page read and write
28B0000
heap
page read and write
1BE5BD2D000
heap
page read and write
2D30000
trusted library allocation
page read and write
1C1A7D15000
heap
page read and write
5600000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
4E7F000
heap
page read and write
5600000
trusted library allocation
page read and write
1BDF2802000
heap
page read and write
543467B000
stack
page read and write
2650000
direct allocation
page read and write
1BDF1854000
heap
page read and write
3370000
trusted library allocation
page read and write
1BDF2395000
heap
page read and write
1BDF2375000
heap
page read and write
1BDF2373000
heap
page read and write
207E7C2A000
heap
page read and write
32F0000
trusted library allocation
page read and write
6B0000
heap
page read and write
32F0000
trusted library allocation
page read and write
20301302000
heap
page read and write
5501000
heap
page read and write
1BDF2372000
heap
page read and write
8F2000
heap
page read and write
1BE5BCB9000
heap
page read and write
2D60000
heap
page read and write
1BA13000000
heap
page read and write
5600000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
1BDF2373000
heap
page read and write
207E7C46000
heap
page read and write
8DA000
heap
page read and write
20306C30000
trusted library allocation
page read and write
1C1A7AB0000
heap
page read and write
954000
heap
page read and write
18D2544B000
heap
page read and write
7C4000
heap
page read and write
1BDF2395000
heap
page read and write
1C1A7AC6000
heap
page read and write
3370000
trusted library allocation
page read and write
4710000
heap
page read and write
32F0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
18D25400000
heap
page read and write
C5993FF000
stack
page read and write
1C338402000
trusted library allocation
page read and write
1C337C9D000
heap
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
7C4000
heap
page read and write
1BE5BCE0000
heap
page read and write
3548000
heap
page read and write
1C6CF530000
remote allocation
page read and write
3370000
trusted library allocation
page read and write
1B2F4F12000
heap
page read and write
5600000
trusted library allocation
page read and write
1BDF18C5000
heap
page read and write
1BDF283E000
heap
page read and write
468E000
stack
page read and write
4380000
trusted library allocation
page read and write
1C337C2A000
heap
page read and write
3370000
trusted library allocation
page read and write
1BDF2396000
heap
page read and write
3260000
remote allocation
page read and write
8DA000
heap
page read and write
1BDF1813000
heap
page read and write
3C1D000
stack
page read and write
29173102000
heap
page read and write
3CA0000
heap
page read and write
3370000
trusted library allocation
page read and write
54FF000
stack
page read and write
2DC0000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BDF23A0000
heap
page read and write
32F0000
trusted library allocation
page read and write
AA3000
unkown
page readonly
53EE000
stack
page read and write
32F0000
trusted library allocation
page read and write
1BDF1870000
heap
page read and write
1C6CDA58000
heap
page read and write
207E7C02000
heap
page read and write
1BE5BCB5000
heap
page read and write
EDF000
stack
page read and write
64200FD000
stack
page read and write
4380000
trusted library allocation
page read and write
20301B00000
heap
page read and write
1C1A7A30000
heap
page read and write
2FE0000
remote allocation
page read and write
6A5197E000
stack
page read and write
16CC8FE000
stack
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3A90000
direct allocation
page execute and read and write
4380000
trusted library allocation
page read and write
4E00000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BDF1858000
heap
page read and write
1BDF1881000
heap
page read and write
3C00000
heap
page read and write
3220000
remote allocation
page read and write
32F0000
trusted library allocation
page read and write
35D0000
direct allocation
page read and write
4D3000
unkown
page readonly
1BA1308A000
heap
page read and write
3370000
trusted library allocation
page read and write
1C6CDA3D000
heap
page read and write
1BDF2382000
heap
page read and write
2FA0000
remote allocation
page read and write
2E60000
remote allocation
page read and write
3C9C000
stack
page read and write
9B0000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BA12EB0000
heap
page read and write
4BA0000
heap
page read and write
2FE0000
remote allocation
page read and write
5434BFE000
stack
page read and write
38E000
stack
page read and write
1C337A10000
heap
page read and write
207E7C41000
heap
page read and write
203012F9000
heap
page read and write
4280000
heap
page read and write
1C6CDA48000
heap
page read and write
F20000
heap
page read and write
29173069000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
C2B000
heap
page read and write
2FFA000
stack
page read and write
12B0000
heap
page read and write
1BDF2375000
heap
page read and write
D314DFE000
stack
page read and write
20306920000
trusted library allocation
page read and write
2F0000
unkown
page readonly
207E7B20000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
147B6902000
heap
page read and write
203067E4000
trusted library allocation
page read and write
34B0000
heap
page read and write
23764F7000
stack
page read and write
AF0000
direct allocation
page execute and read and write
1C1A7AF2000
heap
page read and write
20301020000
heap
page read and write
3370000
trusted library allocation
page read and write
20E30240000
heap
page read and write
4710000
heap
page read and write
1BDF2803000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BA1302A000
heap
page read and write
3370000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
1BA13802000
trusted library allocation
page read and write
18D25457000
heap
page read and write
4690000
trusted library allocation
page read and write
23765FE000
stack
page read and write
4CC000
unkown
page read and write
F60000
heap
page read and write
3370000
trusted library allocation
page read and write
4E8000
stack
page read and write
1BDF18EC000
heap
page read and write
203012A9000
heap
page read and write
D90000
heap
page read and write
1C6CDA02000
heap
page read and write
29173013000
heap
page read and write
3424000
heap
page read and write
8D0000
heap
page read and write
1BDF239B000
heap
page read and write
3520000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
207E7D02000
heap
page read and write
86F000
stack
page read and write
2FA0000
remote allocation
page read and write
4380000
trusted library allocation
page read and write
3426000
heap
page read and write
1BDF23AC000
heap
page read and write
F90BFF8000
stack
page read and write
641F97D000
stack
page read and write
207E7C47000
heap
page read and write
32F0000
trusted library allocation
page read and write
29173002000
heap
page read and write
AA3000
unkown
page readonly
1C1A7AD2000
heap
page read and write
10F0000
direct allocation
page execute and read and write
1B2F4410000
heap
page read and write
1BE5CC90000
trusted library allocation
page read and write
D314AFE000
stack
page read and write
5501000
heap
page read and write
203012F9000
heap
page read and write
3370000
trusted library allocation
page read and write
1BE5C9B0000
trusted library allocation
page read and write
147B67C0000
trusted library allocation
page read and write
27E0000
heap
page read and write
1B2F4702000
heap
page read and write
3200000
heap
page read and write
63E000
stack
page read and write
8A0000
heap
page read and write
20306A40000
heap
page read and write
1C1A7AF4000
heap
page read and write
5600000
trusted library allocation
page read and write
9D0000
unkown
page readonly
32F0000
trusted library allocation
page read and write
2E9000
stack
page read and write
3370000
trusted library allocation
page read and write
207E7C75000
heap
page read and write
32F0000
trusted library allocation
page read and write
4281000
heap
page read and write
16CD0FC000
stack
page read and write
3020000
heap
page read and write
32F0000
trusted library allocation
page read and write
3260000
remote allocation
page read and write
3421000
heap
page read and write
2FA0000
remote allocation
page read and write
20306AE8000
heap
page read and write
1C337C99000
heap
page read and write
3420000
heap
page read and write
5600000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
310000
unkown
page read and write
1BDF2399000
heap
page read and write
A9C000
unkown
page read and write
1C6CF602000
trusted library allocation
page read and write
9D0000
unkown
page readonly
3370000
trusted library allocation
page read and write
1C337D13000
heap
page read and write
4380000
trusted library allocation
page read and write
16CC5AB000
stack
page read and write
2030128A000
heap
page read and write
1B2F4713000
heap
page read and write
203067C0000
trusted library allocation
page read and write
1B2F46CC000
heap
page read and write
32F0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
207E7C4E000
heap
page read and write
1BDF18F8000
heap
page read and write
20301A02000
heap
page read and write
1BDF2384000
heap
page read and write
32F0000
trusted library allocation
page read and write
4714000
heap
page read and write
20306800000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3CA1000
heap
page read and write
29173075000
heap
page read and write
32F0000
trusted library allocation
page read and write
AA3000
unkown
page readonly
1B2F4F00000
heap
page read and write
20E30A02000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1C6CDA00000
heap
page read and write
A1B000
heap
page read and write
1BDF2382000
heap
page read and write
8D0000
heap
page read and write
207E7C52000
heap
page read and write
1BDF23AA000
heap
page read and write
4380000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
20306AF5000
heap
page read and write
5600000
trusted library allocation
page read and write
6E9D8FE000
stack
page read and write
90B000
heap
page read and write
323DE9C000
stack
page read and write
C5986AC000
stack
page read and write
4690000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
207E7C6D000
heap
page read and write
1B2F4480000
heap
page read and write
107B000
stack
page read and write
16CCE7F000
stack
page read and write
3370000
trusted library allocation
page read and write
D314FFF000
stack
page read and write
20306AEF000
heap
page read and write
1C6CDB18000
heap
page read and write
1C1A7AF5000
heap
page read and write
3370000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1BA13070000
heap
page read and write
1BDF23A7000
heap
page read and write
3370000
trusted library allocation
page read and write
20306890000
trusted library allocation
page read and write
20E309F0000
remote allocation
page read and write
4380000
trusted library allocation
page read and write
3424000
heap
page read and write
3370000
trusted library allocation
page read and write
3CDF000
stack
page read and write
3370000
trusted library allocation
page read and write
7C4000
heap
page read and write
33E5000
heap
page read and write
54349FB000
stack
page read and write
1C3379A0000
heap
page read and write
1C6CF530000
remote allocation
page read and write
18D25452000
heap
page read and write
3E01000
heap
page read and write
32F0000
trusted library allocation
page read and write
7C4000
heap
page read and write
1BDF236F000
heap
page read and write
3370000
trusted library allocation
page read and write
29173802000
trusted library allocation
page read and write
34E0000
trusted library allocation
page readonly
8E2F77C000
stack
page read and write
3370000
trusted library allocation
page read and write
1BDF2370000
heap
page read and write
3370000
trusted library allocation
page read and write
207E7C45000
heap
page read and write
1C6CF470000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
5F15A79000
stack
page read and write
C5991FF000
stack
page read and write
2E10000
heap
page read and write
147B6828000
heap
page read and write
90B000
heap
page read and write
20306A00000
heap
page read and write
1BDF2100000
remote allocation
page read and write
18D25330000
heap
page read and write
1BDF2384000
heap
page read and write
2D64000
heap
page read and write
4B7F000
heap
page read and write
7A0000
trusted library allocation
page read and write
3765000
heap
page read and write
3370000
trusted library allocation
page read and write
20301213000
heap
page read and write
1BDF23B6000
heap
page read and write
903000
heap
page read and write
20302601000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
4E7F000
heap
page read and write
3370000
trusted library allocation
page read and write
5034000
trusted library allocation
page read and write
4B7F000
heap
page read and write
F90C47A000
stack
page read and write
990000
heap
page read and write
20306920000
remote allocation
page read and write
F00000
trusted library allocation
page read and write
20306A2B000
heap
page read and write
4380000
trusted library allocation
page read and write
8BE000
stack
page read and write
12B5000
heap
page read and write
20301307000
heap
page read and write
3418000
heap
page read and write
237617E000
stack
page read and write
4F00000
heap
page read and write
20E309C0000
trusted library allocation
page read and write
6A51B7C000
stack
page read and write
32F0000
trusted library allocation
page read and write
950000
heap
page read and write
5501000
heap
page read and write
32F0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
1C337B10000
trusted library allocation
page read and write
20306A10000
heap
page read and write
468E000
stack
page read and write
641FEF7000
stack
page read and write
4714000
heap
page read and write
1BDF17D0000
trusted library allocation
page read and write
323EA7F000
stack
page read and write
1B2F4629000
heap
page read and write
5F1550C000
stack
page read and write
3D7F000
stack
page read and write
F30000
direct allocation
page execute and read and write
326A000
stack
page read and write
20301B18000
heap
page read and write
1BDF231E000
heap
page read and write
32F0000
trusted library allocation
page read and write
23767FE000
stack
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BDF23CE000
heap
page read and write
F60000
heap
page read and write
641FDFB000
stack
page read and write
5501000
heap
page read and write
57BE000
stack
page read and write
32F0000
trusted library allocation
page read and write
207E7C42000
heap
page read and write
20301256000
heap
page read and write
1BDF1857000
heap
page read and write
10F0000
direct allocation
page execute and read and write
1BDF18B2000
heap
page read and write
34C0000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
1C1A7ADD000
heap
page read and write
1BDF1838000
heap
page read and write
32F0000
trusted library allocation
page read and write
3B40000
direct allocation
page execute and read and write
1BDF2381000
heap
page read and write
4281000
heap
page read and write
641FCFC000
stack
page read and write
8F2000
heap
page read and write
1BE5BC40000
heap
page read and write
1C1A7ADD000
heap
page read and write
2D64000
heap
page read and write
AF0000
direct allocation
page execute and read and write
16CC87F000
stack
page read and write
240000
heap
page read and write
207E7C53000
heap
page read and write
20E30302000
heap
page read and write
18D2544D000
heap
page read and write
1BDF23A0000
heap
page read and write
23763FE000
stack
page read and write
3370000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1BDF1916000
heap
page read and write
4B7F000
heap
page read and write
1BDF1884000
heap
page read and write
8DA000
heap
page read and write
1BDF236F000
heap
page read and write
980000
remote allocation
page read and write
3BEA5FF000
stack
page read and write
3370000
trusted library allocation
page read and write
1BE5BBD0000
heap
page read and write
3370000
trusted library allocation
page read and write
4CF000
unkown
page read and write
1BDF2300000
heap
page read and write
1BA1304A000
heap
page read and write
203068F0000
trusted library allocation
page read and write
1BA13049000
heap
page read and write
29172E20000
heap
page read and write
7C0000
heap
page read and write
29173000000
heap
page read and write
4B00000
heap
page read and write
1BDF2802000
heap
page read and write
18D2542A000
heap
page read and write
C598AFB000
stack
page read and write
32F0000
trusted library allocation
page read and write
203067C0000
trusted library allocation
page read and write
29172E90000
heap
page read and write
32F0000
trusted library allocation
page read and write
20300FB0000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1C337C7E000
heap
page read and write
3370000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
1C337D02000
heap
page read and write
A49000
heap
page read and write
237607B000
stack
page read and write
F90C37E000
stack
page read and write
F90C97A000
stack
page read and write
2DBE000
stack
page read and write
1BDF239B000
heap
page read and write
5600000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
20306620000
trusted library allocation
page read and write
1BDF239A000
heap
page read and write
4714000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BDF23BC000
heap
page read and write
3370000
trusted library allocation
page read and write
8E2F37E000
stack
page read and write
16CCD77000
stack
page read and write
1BDF236F000
heap
page read and write
1BDF23BC000
heap
page read and write
32F0000
trusted library allocation
page read and write
4DFD000
stack
page read and write
3340000
heap
page read and write
28B4000
heap
page read and write
1C337C63000
heap
page read and write
4380000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
C598EFD000
stack
page read and write
32F0000
trusted library allocation
page read and write
8BE000
stack
page read and write
1BDF236F000
heap
page read and write
5600000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
954000
heap
page read and write
1BE5BBE0000
trusted library allocation
page read and write
1BDF2372000
heap
page read and write
86F000
stack
page read and write
1BDF23A0000
heap
page read and write
903000
heap
page read and write
3C0000
unkown
page read and write
20306900000
trusted library allocation
page read and write
468E000
stack
page read and write
1BDF18AA000
heap
page read and write
34D3000
heap
page read and write
5600000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1C1A7AC1000
heap
page read and write
5600000
trusted library allocation
page read and write
4281000
heap
page read and write
641F9FE000
stack
page read and write
B00000
heap
page read and write
20301287000
heap
page read and write
1BDF2395000
heap
page read and write
4380000
trusted library allocation
page read and write
2D64000
heap
page read and write
33C7000
heap
page read and write
20306A56000
heap
page read and write
954000
heap
page read and write
323E87D000
stack
page read and write
207E7C49000
heap
page read and write
203067F0000
trusted library allocation
page read and write
310000
unkown
page read and write
1BA1304E000
heap
page read and write
18D252D0000
heap
page read and write
1BDF2397000
heap
page read and write
F70000
direct allocation
page read and write
147B66C0000
heap
page read and write
1C6CDB13000
heap
page read and write
1BDF1829000
heap
page read and write
1BDF183C000
heap
page read and write
3370000
trusted library allocation
page read and write
F90CB7F000
stack
page read and write
AF0000
direct allocation
page execute and read and write
207E8402000
trusted library allocation
page read and write
6A5187A000
stack
page read and write
25D0000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
54346FD000
stack
page read and write
3E01000
heap
page read and write
3370000
trusted library allocation
page read and write
3CA1000
heap
page read and write
1C337C3C000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
207E7C83000
heap
page read and write
6E9DBFF000
stack
page read and write
3C7F000
heap
page read and write
1BDF2802000
heap
page read and write
1BDF23CD000
heap
page read and write
203021E0000
trusted library allocation
page read and write
1BDF237F000
heap
page read and write
3370000
trusted library allocation
page read and write
1BDF2395000
heap
page read and write
46A0000
remote allocation
page read and write
3000000
direct allocation
page execute and read and write
32F0000
trusted library allocation
page read and write
6A51AFF000
stack
page read and write
3370000
trusted library allocation
page read and write
147B6840000
heap
page read and write
3370000
trusted library allocation
page read and write
1BDF1740000
heap
page read and write
1BDF2374000
heap
page read and write
1BDF2100000
remote allocation
page read and write
1BA13050000
heap
page read and write
480000
heap
page read and write
3370000
trusted library allocation
page read and write
147B6650000
heap
page read and write
7C4000
heap
page read and write
147B6813000
heap
page read and write
2630000
direct allocation
page execute and read and write
32F0000
trusted library allocation
page read and write
1B2F4580000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1C6CDA2A000
heap
page read and write
16CCB79000
stack
page read and write
67F000
stack
page read and write
B11000
unkown
page execute read
10F0000
direct allocation
page execute and read and write
9F0000
direct allocation
page execute and read and write
F00000
trusted library allocation
page read and write
3220000
remote allocation
page read and write
32F0000
trusted library allocation
page read and write
29173077000
heap
page read and write
18D25360000
trusted library allocation
page read and write
20301B13000
heap
page read and write
1BDF18C0000
heap
page read and write
34F5000
heap
page read and write
32F0000
trusted library allocation
page read and write
2F50000
heap
page read and write
A50000
heap
page read and write
3370000
trusted library allocation
page read and write
1BA13102000
heap
page read and write
1BA137B0000
trusted library allocation
page read and write
1B2F4688000
heap
page read and write
1BDF2820000
heap
page read and write
32F0000
trusted library allocation
page read and write
20E30229000
heap
page read and write
20307000000
heap
page read and write
3370000
trusted library allocation
page read and write
1C1A7ABB000
heap
page read and write
4380000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1C6CD980000
heap
page read and write
1B2F463E000
heap
page read and write
4BA1000
heap
page read and write
99D000
stack
page read and write
3370000
trusted library allocation
page read and write
4D0F000
stack
page read and write
903000
heap
page read and write
20306630000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BDF2395000
heap
page read and write
203012A6000
heap
page read and write
641FFFF000
stack
page read and write
3370000
trusted library allocation
page read and write
9D1000
unkown
page execute read
20306A1F000
heap
page read and write
4B00000
heap
page read and write
5600000
trusted library allocation
page read and write
18D25455000
heap
page read and write
5F158F9000
stack
page read and write
32F0000
trusted library allocation
page read and write
2FBC000
stack
page read and write
29173040000
heap
page read and write
3370000
trusted library allocation
page read and write
3D80000
heap
page read and write
1C337C2D000
heap
page read and write
4380000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
20301277000
heap
page read and write
3BD0000
trusted library allocation
page read and write
29173113000
heap
page read and write
20E30213000
heap
page read and write
32F0000
trusted library allocation
page read and write
54348FE000
stack
page read and write
3370000
trusted library allocation
page read and write
3C5F000
stack
page read and write
1C337D08000
heap
page read and write
32F0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1BDF239B000
heap
page read and write
1BDF23AA000
heap
page read and write
5600000
trusted library allocation
page read and write
1BDF2372000
heap
page read and write
4380000
trusted library allocation
page read and write
1B2F4420000
heap
page read and write
3370000
trusted library allocation
page read and write
1BE5BEB0000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
1C6CF4B0000
trusted library allocation
page read and write
4B7F000
heap
page read and write
33FA000
heap
page read and write
4EDE000
stack
page read and write
5600000
trusted library allocation
page read and write
C598BFE000
stack
page read and write
20306A4D000
heap
page read and write
3DFF000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
323E5FC000
stack
page read and write
1B2F46E4000
heap
page read and write
147B6913000
heap
page read and write
1BA13113000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
20306B00000
heap
page read and write
5F1597F000
stack
page read and write
207E7C39000
heap
page read and write
D314EFE000
stack
page read and write
3370000
trusted library allocation
page read and write
1BDF2318000
heap
page read and write
9D1000
unkown
page execute read
32F0000
trusted library allocation
page read and write
1B2F4E02000
heap
page read and write
1C337D00000
heap
page read and write
3370000
trusted library allocation
page read and write
29173029000
heap
page read and write
32F0000
trusted library allocation
page read and write
1BA1303C000
heap
page read and write
33F0000
heap
page read and write
20301B04000
heap
page read and write
1C6CDA48000
heap
page read and write
6E9D7FC000
stack
page read and write
20E309F0000
remote allocation
page read and write
4380000
trusted library allocation
page read and write
203067CE000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
34F0000
heap
page read and write
1C337C4F000
heap
page read and write
20301120000
trusted library allocation
page read and write
54BE000
stack
page read and write
1BDF2375000
heap
page read and write
3390000
heap
page read and write
2F3D000
stack
page read and write
1BDF2802000
heap
page read and write
207E7C3F000
heap
page read and write
1BDF2375000
heap
page read and write
C7B000
stack
page read and write
3370000
trusted library allocation
page read and write
207E7C6F000
heap
page read and write
3540000
heap
page read and write
1C337C6B000
heap
page read and write
20301B02000
heap
page read and write
2D64000
heap
page read and write
207E7C79000
heap
page read and write
5600000
trusted library allocation
page read and write
3C0000
heap
page read and write
F90C17A000
stack
page read and write
5600000
trusted library allocation
page read and write
2FA0000
remote allocation
page read and write
207E7C00000
heap
page read and write
6A518FE000
stack
page read and write
18D2547E000
heap
page read and write
3370000
trusted library allocation
page read and write
33E0000
heap
page read and write
1BDF235C000
heap
page read and write
1C1A7900000
heap
page read and write
4380000
trusted library allocation
page read and write
323E77B000
stack
page read and write
207E7C44000
heap
page read and write
32F0000
trusted library allocation
page read and write
400000
unkown
page readonly
300000
unkown
page readonly
3DFF000
heap
page read and write
207E7C7D000
heap
page read and write
1C6CDA89000
heap
page read and write
1BA13052000
heap
page read and write
1BE5BCF1000
heap
page read and write
6A519F9000
stack
page read and write
1C6CD920000
heap
page read and write
1BDF23A9000
heap
page read and write
18D25450000
heap
page read and write
1BDF23CE000
heap
page read and write
4380000
trusted library allocation
page read and write
20306890000
trusted library allocation
page read and write
33C5000
heap
page read and write
980000
remote allocation
page read and write
1BA13080000
heap
page read and write
1C337C63000
heap
page read and write
4380000
trusted library allocation
page read and write
D314A7B000
stack
page read and write
5600000
trusted library allocation
page read and write
1BDF18A3000
heap
page read and write
8BE000
stack
page read and write
1C1A7ADF000
heap
page read and write
29172E30000
heap
page read and write
8E2ED9C000
stack
page read and write
32F0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
1BDF2372000
heap
page read and write
1BDF235C000
heap
page read and write
2FCF000
stack
page read and write
4380000
trusted library allocation
page read and write
20306890000
trusted library allocation
page read and write
1C6CD9B0000
trusted library allocation
page read and write
9DE000
stack
page read and write
1C1A7ADF000
heap
page read and write
2ED0000
heap
page read and write
29173073000
heap
page read and write
5434CFF000
stack
page read and write
203067F0000
trusted library allocation
page read and write
95B000
stack
page read and write
464D000
stack
page read and write
1BDF1859000
heap
page read and write
7B8000
heap
page read and write
67B000
stack
page read and write
20306AA9000
heap
page read and write
C5990FE000
stack
page read and write
4380000
trusted library allocation
page read and write
638000
stack
page read and write
1BDF23B4000
heap
page read and write
3370000
trusted library allocation
page read and write
1C6CDA58000
heap
page read and write
A10000
heap
page read and write
1BDF184F000
heap
page read and write
1C6CDB00000
heap
page read and write
3569000
heap
page read and write
3370000
trusted library allocation
page read and write
6E9DCFD000
stack
page read and write
323E57F000
stack
page read and write
86F000
stack
page read and write
20E300C0000
heap
page read and write
2917305B000
heap
page read and write
32F0000
trusted library allocation
page read and write
DF0000
remote allocation
page read and write
1BDF236F000
heap
page read and write
90B000
heap
page read and write
1B2F46BB000
heap
page read and write
3370000
trusted library allocation
page read and write
1B2F46C3000
heap
page read and write
9F0000
heap
page read and write
82E000
stack
page read and write
207E7C4B000
heap
page read and write
3370000
trusted library allocation
page read and write
A9C000
unkown
page read and write
7C0000
heap
page read and write
4F1A000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
1BDF2389000
heap
page read and write
8F2000
heap
page read and write
32F0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
20301200000
heap
page read and write
1BDF2393000
heap
page read and write
6E9D67B000
stack
page read and write
323E6FD000
stack
page read and write
3370000
trusted library allocation
page read and write
1BDF1856000
heap
page read and write
3BEA4FB000
stack
page read and write
4710000
heap
page read and write
18D25470000
heap
page read and write
1BDF2382000
heap
page read and write
147B6802000
heap
page read and write
34B7000
heap
page read and write
1BE5BD2D000
heap
page read and write
300000
unkown
page readonly
D314B7E000
stack
page read and write
53AC000
stack
page read and write
1BDF2382000
heap
page read and write
9D1000
unkown
page execute read
1BE5CC70000
heap
page readonly
2F0000
unkown
page readonly
2AD000
stack
page read and write
4380000
trusted library allocation
page read and write
20E30120000
heap
page read and write
147B7002000
trusted library allocation
page read and write
2FE0000
remote allocation
page read and write
32F0000
trusted library allocation
page read and write
203011F0000
trusted library allocation
page read and write
2E60000
remote allocation
page read and write
82E000
stack
page read and write
587F000
stack
page read and write
323E97E000
stack
page read and write
5EC000
stack
page read and write
1BDF2384000
heap
page read and write
4E7F000
heap
page read and write
207E83C0000
trusted library allocation
page read and write
1C337C54000
heap
page read and write
1BDF2396000
heap
page read and write
1BA13108000
heap
page read and write
3E02000
heap
page read and write
543477E000
stack
page read and write
6A51A79000
stack
page read and write
3370000
trusted library allocation
page read and write
1BDF1902000
heap
page read and write
5378000
trusted library allocation
page read and write
4BA0000
heap
page read and write
1BDF2370000
heap
page read and write
4B00000
heap
page read and write
954000
heap
page read and write
3370000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
1BDF23B6000
heap
page read and write
638000
stack
page read and write
1BDF1730000
heap
page read and write
3370000
trusted library allocation
page read and write
18D2543C000
heap
page read and write
1BDF2382000
heap
page read and write
3220000
remote allocation
page read and write
4BA0000
heap
page read and write
3370000
trusted library allocation
page read and write
18D25508000
heap
page read and write
46A0000
remote allocation
page read and write
1080000
heap
page read and write
5600000
trusted library allocation
page read and write
207E7C40000
heap
page read and write
B00000
heap
page read and write
8E2F47F000
stack
page read and write
5600000
trusted library allocation
page read and write
1B2F4613000
heap
page read and write
1C337C13000
heap
page read and write
1C6CF530000
remote allocation
page read and write
1BDF237E000
heap
page read and write
237627B000
stack
page read and write
3370000
trusted library allocation
page read and write
33C0000
heap
page read and write
374F000
stack
page read and write
20306920000
remote allocation
page read and write
EDF000
stack
page read and write
5600000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
2D64000
heap
page read and write
20306910000
trusted library allocation
page read and write
954000
heap
page read and write
18D2544F000
heap
page read and write
3220000
remote allocation
page read and write
2C00000
trusted library allocation
page read and write
207E7C69000
heap
page read and write
1BDF1800000
heap
page read and write
1BDF18E9000
heap
page read and write
1BDF1850000
heap
page read and write
20301290000
heap
page read and write
147B6864000
heap
page read and write
20306AE4000
heap
page read and write
4380000
trusted library allocation
page read and write
67B000
stack
page read and write
20301314000
heap
page read and write
1BDF239E000
heap
page read and write
4380000
trusted library allocation
page read and write
20302620000
trusted library allocation
page read and write
18D25513000
heap
page read and write
3370000
trusted library allocation
page read and write
2030123F000
heap
page read and write
464D000
stack
page read and write
2FA0000
remote allocation
page read and write
1BDF2802000
heap
page read and write
1BA13002000
heap
page read and write
32F0000
trusted library allocation
page read and write
207E7C7E000
heap
page read and write
1C337C4A000
heap
page read and write
18D25458000
heap
page read and write
16CC9FC000
stack
page read and write
18D252C0000
heap
page read and write
2640000
heap
page read and write
3C0000
unkown
page read and write
1C1A7ADF000
heap
page read and write
3370000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
D314CFE000
stack
page read and write
203067C8000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
1BE5BC60000
heap
page read and write
2F0000
unkown
page readonly
1BA13013000
heap
page read and write
4E81000
heap
page read and write
1C1A7ADD000
heap
page read and write
18D25500000
heap
page read and write
1BDF2387000
heap
page read and write
1C337C00000
heap
page read and write
4CCE000
stack
page read and write
5434AF7000
stack
page read and write
3370000
trusted library allocation
page read and write
147B6868000
heap
page read and write
2CAF000
heap
page read and write
3370000
trusted library allocation
page read and write
10A0000
heap
page read and write
20306B02000
heap
page read and write
147B6879000
heap
page read and write
638000
stack
page read and write
F60000
heap
page read and write
20306A62000
heap
page read and write
29172F90000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
20301B18000
heap
page read and write
3BEA6FE000
stack
page read and write
2D64000
heap
page read and write
C598CFC000
stack
page read and write
There are 1269 hidden memdumps, click here to show them.