IOC Report
psIFSn7VLi

loading gif

Files

File Path
Type
Category
Malicious
psIFSn7VLi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xa177ce27, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\psIFSn7VLi.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\psIFSn7VLi.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\psIFSn7VLi.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\psIFSn7VLi.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Arwhu\ttgk.pdy"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -s W32Time
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\psIFSn7VLi.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\psIFSn7VLi.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://51.91.76.89:8080/WUUUrykRKzQgKnGAgOWXwbTPpbZjnbjXYyUgItVQHAlMtltf
unknown
malicious
https://51.91.7.5/
unknown
malicious
https://206.188.212.92:8080/WvwiYegTHwVudezOCrWPjYKhpMeUQep
unknown
malicious
https://46.55.222.11/TBwKHjQjVeCWIQFS
46.55.222.11
malicious
https://79.172.212.216:8080/VNwOftDFidReElfWGyCwgb
unknown
malicious
https://192.99.251.50/njigQUBviBvfjJoFmpOFCcuxzCMjisKOYgnAJJuZGrOYExdzIkjfPaaGvSwrlp
unknown
malicious
https://46.55.222.11/.50.40.183:80/YQXxdxwQWLyBEVjMOlgty
unknown
malicious
https://120.50.40.183/rosoft
unknown
malicious
https://51.91.7.5:8080/EEsdElRrfqZScZWLqBhRqLSt
unknown
malicious
https://103.221.221.247:8080/
unknown
malicious
https://131.100.24.231:80/MIMNtRZxLqGHZoTXVDtaMauEeLlGAjcyCUbpgyHmvtdbZTHIDbPoaw
unknown
malicious
https://192.99.251.50/:
unknown
malicious
https://192.99.251.50/F
unknown
malicious
https://192.99.251.50/
unknown
malicious
https://131.100.24.231/
unknown
malicious
https://103.221.221.247:8080/PosEzINMiHgCPAexqpnbXngfJaZeCEEsiTgLE3062332-1002
unknown
malicious
https://46.55.222.11/TBwKHjQjVeCWIQFSz
unknown
malicious
https://149.56.128.192/SSYKvnZUOEUlRtjgPVsscjkUTaNTgTQQvJUHkyX-
unknown
malicious
https://149.56.128.192/SSYKvnZUOEUlRtjgPVsscjkUTaNTgTQQvJUHkyX
149.56.128.192
malicious
https://79.172.212.216:8080/VNwOftDFidReElfWGyCwg(
unknown
malicious
https://185.157.82.211/
unknown
malicious
https://79.172.212.216:8080/nes
unknown
malicious
https://51.91.76.89/
unknown
malicious
https://79.172.212.216:8080/.
unknown
malicious
https://79.172.212.216/
unknown
malicious
https://46.55.222.11/TBwKHjQjVeCWIQFSi
unknown
malicious
https://206.188.212.92/X
unknown
malicious
https://160.16.218.63:8080/lksHycwarnaSRJQsEAZwtocdkTVZGajE
unknown
malicious
https://120.50.40.183/
unknown
malicious
https://159.8.59.82/
unknown
malicious
https://131.100.24.231:80/MIMNtRZxLqGHZoTXVDtaMauEeLlGAjcyCUbpgyHmvtdbZTHIDbPoawrlp
unknown
malicious
https://192.99.251.50/27.42.236/h
unknown
malicious
https://79.172.212.216:8080/VNwOftDFidReElfWGyCwg$v6/
unknown
malicious
https://46.55.222.11/TBwKHjQjVeCWIQFSN
unknown
malicious
https://103.221.221.247/Certificates
unknown
malicious
https://173.254.208.91:8080/iqyyOTGODIozOxlzJCOa
unknown
malicious
https://206.188.212.92/7
unknown
malicious
https://173.254.208.91:8080/iqyyOTGODIozOxlzJCOT
unknown
malicious
https://185.157.82.211:8080/cal
unknown
malicious
https://120.50.40.183:80/$v6/
unknown
malicious
https://185.157.82.211:8080/r
unknown
malicious
https://206.188.212.92/
unknown
malicious
https://173.254.208.91/
unknown
malicious
https://160.16.218.63/
unknown
malicious
https://149.56.128.192/
unknown
malicious
https://159.8.59.82:8080/AgctwBgxIsTEnzPyqHwVtfcFB
unknown
malicious
https://103.221.221.247/Global
unknown
malicious
https://120.50.40.183:80/za
unknown
malicious
https://46.55.222.11/
unknown
malicious
https://46.55.222.11/TBwKHjQjVeCWIQFS)
unknown
malicious
https://120.50.40.183/d
unknown
malicious
https://160.16.218.63:8080/5
unknown
malicious
https://103.221.221.247:8080/PosEzINMiHgCPAexqpnbXngfJaZeCEEsiTgLEr
unknown
malicious
https://103.221.221.247/
unknown
malicious
https://103.221.221.247:8080/PosEzINMiHgCPAexqpnbXngfJaZeCEEsiTgLE
unknown
malicious
https://120.50.40.183/m
unknown
malicious
https://103.221.221.247:8080/i
unknown
malicious
https://79.172.212.216:8080/
unknown
malicious
https://185.157.82.211:8080/
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://58.227.42.236/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://58.227.42.236:80/CBvqXjPjXUGuuflNLuZWkXecSmHukPuGWkGWJXlIStqkcdnP
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://58.227.42.236:80/CBvqXjPjXUGuuflNLuZWkXecSmHukPuGWkGWJXlIStqkcdnPK
unknown
http://www.bingmapsportal.com
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
http://crl.ver)
unknown
https://58.227.42.236/N
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://58.227.42.236/c4
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://58.227.42.236:80/$v6/
unknown
https://58.227.42.236:80/D
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://58.227.42.236:80/:
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://58.227.42.236:80/-
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://www.tiktok.com/legal/report
unknown
https://79.172.212.2167:8080/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://58.227.42.236:80/
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
79.172.212.216
unknown
Hungary
malicious
151.106.112.196
unknown
Germany
malicious
110.232.117.186
unknown
Australia
malicious
51.254.140.238
unknown
France
malicious
173.254.208.91
unknown
United States
malicious
206.188.212.92
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
209.126.98.206
unknown
United States
malicious
1.234.21.73
unknown
Korea Republic of
malicious
149.56.128.192
unknown
Canada
malicious
176.56.128.118
unknown
Switzerland
malicious
45.118.135.203
unknown
Japan
malicious
167.99.115.35
unknown
United States
malicious
185.8.212.130
unknown
Uzbekistan
malicious
197.242.150.244
unknown
South Africa
malicious
51.91.76.89
unknown
France
malicious
178.79.147.66
unknown
United Kingdom
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
189.126.111.200
unknown
Brazil
malicious
146.59.226.45
unknown
Norway
malicious
120.50.40.183
unknown
Singapore
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
196.218.30.83
unknown
Egypt
malicious
101.50.0.91
unknown
Indonesia
malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
103.43.46.182
unknown
Indonesia
malicious
212.237.17.99
unknown
Italy
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
103.75.201.4
unknown
Thailand
malicious
51.91.7.5
unknown
France
malicious
5.9.116.246
unknown
Germany
malicious
188.44.20.25
unknown
Macedonia
malicious
72.15.201.15
unknown
United States
malicious
209.250.246.206
unknown
European Union
malicious
82.165.152.127
unknown
Germany
malicious
107.182.225.142
unknown
United States
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
173.212.193.249
unknown
Germany
malicious
160.16.218.63
unknown
Japan
malicious
192.99.251.50
unknown
Canada
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
1.234.2.232
unknown
Korea Republic of
malicious
119.193.124.41
unknown
Korea Republic of
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
103.221.221.247
unknown
Viet Nam
malicious
127.0.0.1
unknown
unknown
There are 47 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4231000
direct allocation
page execute read
malicious
2940000
direct allocation
page execute and read and write
malicious
4591000
direct allocation
page execute read
malicious
3530000
direct allocation
page execute and read and write
malicious
9C0000
direct allocation
page execute and read and write
malicious
4DF1000
direct allocation
page execute read
malicious
4DC0000
direct allocation
page execute and read and write
malicious
4F11000
direct allocation
page execute read
malicious
4E8F000
trusted library allocation
page read and write
600000
trusted library allocation
page read and write
1F917453000
heap
page read and write
B0B000
heap
page read and write
55E0000
trusted library allocation
page read and write
9F4000
heap
page read and write
1E986F7000
stack
page read and write
10095000
unkown
page write copy
10095000
unkown
page write copy
1697E83D000
heap
page read and write
16904121000
trusted library allocation
page read and write
1F91744C000
heap
page read and write
136BAA02000
trusted library allocation
page read and write
EEDDDFB000
stack
page read and write
2BDF000
heap
page read and write
1697E8AE000
heap
page read and write
5000000
heap
page read and write
4B6D000
stack
page read and write
2C0B000
heap
page read and write
20E58229000
heap
page read and write
10015000
unkown
page execute read
549D000
stack
page read and write
2720645A000
heap
page read and write
18D579D0000
trusted library allocation
page read and write
15C8A789000
heap
page read and write
45F1000
heap
page read and write
15C8A602000
heap
page read and write
293F000
stack
page read and write
3400000
heap
page read and write
175FBDE000
stack
page read and write
1697F202000
heap
page read and write
9F4000
heap
page read and write
A195000
trusted library allocation
page read and write
15C8A7B4000
heap
page read and write
1EB1FE81000
heap
page read and write
18D579B0000
trusted library allocation
page read and write
45F1000
heap
page read and write
1EB1FE5F000
heap
page read and write
16904370000
trusted library allocation
page read and write
B00000
heap
page read and write
1763D7E000
stack
page read and write
4E60000
trusted library allocation
page read and write
9F4000
heap
page read and write
16904108000
trusted library allocation
page read and write
54B000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
15C8A747000
heap
page read and write
1ECDFA5F000
heap
page read and write
18D57C00000
trusted library allocation
page read and write
25B78F40000
heap
page read and write
16904100000
trusted library allocation
page read and write
27206413000
heap
page read and write
1697FED6000
heap
page read and write
7E3957C000
stack
page read and write
914A4FC000
stack
page read and write
2F10000
heap
page read and write
1AAEBF10000
trusted library allocation
page read and write
1F917500000
heap
page read and write
15C8A76F000
heap
page read and write
350F000
stack
page read and write
2C1F000
heap
page read and write
F5AF07F000
stack
page read and write
15C8A78B000
heap
page read and write
961A67B000
stack
page read and write
4ED2000
trusted library allocation
page read and write
1697FE3E000
heap
page read and write
15C8A7A3000
heap
page read and write
276B2E44000
heap
page read and write
34FF000
stack
page read and write
630000
heap
page read and write
F5AE9FB000
stack
page read and write
15C8AC02000
heap
page read and write
15C89E4B000
heap
page read and write
15C8AC03000
heap
page read and write
15C89CF0000
heap
page read and write
6BC000
heap
page read and write
9F4000
heap
page read and write
10001000
unkown
page execute read
1F917413000
heap
page read and write
1ECDFA5C000
heap
page read and write
15C8A795000
heap
page read and write
9F4000
heap
page read and write
643E29B000
stack
page read and write
18D56048000
heap
page read and write
7E39CFF000
stack
page read and write
506E000
stack
page read and write
276B3700000
heap
page read and write
2BEA000
heap
page read and write
2C6D000
heap
page read and write
1EB1FD50000
heap
page read and write
914A77E000
stack
page read and write
7E399FE000
stack
page read and write
1EB20802000
trusted library allocation
page read and write
545F000
stack
page read and write
45F1000
heap
page read and write
2C31000
heap
page read and write
1F917427000
heap
page read and write
15C8A792000
heap
page read and write
9F4000
heap
page read and write
4252000
direct allocation
page read and write
276B2DC0000
trusted library allocation
page read and write
15C8A777000
heap
page read and write
65C0000
heap
page read and write
3330000
trusted library allocation
page read and write
276B2C60000
heap
page read and write
3521000
heap
page read and write
1697E878000
heap
page read and write
18D55F10000
heap
page read and write
15C89E4A000
heap
page read and write
1697F215000
heap
page read and write
276B3602000
heap
page read and write
1ECDFA74000
heap
page read and write
2C64000
heap
page read and write
15C89E53000
heap
page read and write
643EAFB000
stack
page read and write
45F1000
heap
page read and write
18D56062000
heap
page read and write
1ECDFA55000
heap
page read and write
45F1000
heap
page read and write
850D5F9000
stack
page read and write
1F91743C000
heap
page read and write
16904124000
trusted library allocation
page read and write
100CE000
unkown
page readonly
1F91742D000
heap
page read and write
609097E000
stack
page read and write
3520000
heap
page read and write
4D60000
remote allocation
page read and write
15C8A777000
heap
page read and write
1ECDFA7B000
heap
page read and write
1763C7E000
stack
page read and write
20E580A0000
heap
page read and write
9F4000
heap
page read and write
9F4000
heap
page read and write
45C0000
heap
page read and write
16904260000
remote allocation
page read and write
24B7A870000
heap
page read and write
1007D000
unkown
page execute read
25B79146000
heap
page read and write
15C8A773000
heap
page read and write
552E000
stack
page read and write
1697E829000
heap
page read and write
45F1000
heap
page read and write
15C89EFA000
heap
page read and write
15C8A792000
heap
page read and write
136BA1D0000
remote allocation
page read and write
136BA229000
heap
page read and write
15C89E6D000
heap
page read and write
15C8A7C4000
heap
page read and write
1ECDFB02000
heap
page read and write
334E000
stack
page read and write
2C1F000
heap
page read and write
16904240000
trusted library allocation
page read and write
1009F000
unkown
page write copy
4BAA000
stack
page read and write
15C8AB90000
remote allocation
page read and write
534F000
stack
page read and write
10057000
unkown
page execute read
136BA040000
heap
page read and write
276B2E13000
heap
page read and write
15C8A7B4000
heap
page read and write
100A2000
unkown
page readonly
9F4000
heap
page read and write
175FE7E000
stack
page read and write
15C89E82000
heap
page read and write
1EB1FE76000
heap
page read and write
15C8A781000
heap
page read and write
15C8A786000
heap
page read and write
2C2E000
heap
page read and write
33C0000
heap
page read and write
15C8AC02000
heap
page read and write
914A7FC000
stack
page read and write
15C8AC02000
heap
page read and write
25B79144000
heap
page read and write
18D56118000
heap
page read and write
1AAEC05A000
heap
page read and write
1FFE77F000
stack
page read and write
3534000
heap
page read and write
1697FEF5000
heap
page read and write
65C4000
heap
page read and write
15C8A792000
heap
page read and write
136BA202000
heap
page read and write
33EA000
heap
page read and write
15C89EEA000
heap
page read and write
3537000
heap
page read and write
355A77C000
stack
page read and write
10095000
unkown
page write copy
276B2E00000
heap
page read and write
25B79136000
heap
page read and write
1697E6F0000
heap
page read and write
1ECDFA84000
heap
page read and write
15C89E70000
heap
page read and write
45B2000
direct allocation
page read and write
690000
heap
page read and write
9F4000
heap
page read and write
355A9FE000
stack
page read and write
15C89E55000
heap
page read and write
20E58257000
heap
page read and write
15C89E4E000
heap
page read and write
4B2C000
stack
page read and write
18D55EB0000
heap
page read and write
15C8A783000
heap
page read and write
1F917310000
trusted library allocation
page read and write
20E589D0000
remote allocation
page read and write
15C8A781000
heap
page read and write
4E9D000
trusted library allocation
page read and write
9F4000
heap
page read and write
1D38E3C0000
trusted library allocation
page read and write
9F4000
heap
page read and write
25B79090000
heap
page read and write
20E589A0000
trusted library allocation
page read and write
1EB1FE13000
heap
page read and write
2BEC000
heap
page read and write
2BE0000
heap
page read and write
4E12000
direct allocation
page read and write
1ECDFA5A000
heap
page read and write
4EEC000
trusted library allocation
page read and write
1697FEEC000
heap
page read and write
45F1000
heap
page read and write
9F0000
trusted library allocation
page read and write
1697FE00000
heap
page read and write
3377000
heap
page read and write
4EEC000
trusted library allocation
page read and write
1697E8AE000
heap
page read and write
51A0000
heap
page read and write
1FFE87E000
stack
page read and write
9F4000
heap
page read and write
1AAEBDB0000
heap
page read and write
1D38E345000
heap
page read and write
45F1000
heap
page read and write
2EEB000
stack
page read and write
276B2EE2000
heap
page read and write
2C1D000
heap
page read and write
570000
remote allocation
page read and write
1F917477000
heap
page read and write
15C8AC02000
heap
page read and write
850D579000
stack
page read and write
15C8AC02000
heap
page read and write
1E9857B000
stack
page read and write
1ECDFA65000
heap
page read and write
1ECDFA57000
heap
page read and write
914AB7E000
stack
page read and write
50E0000
trusted library allocation
page read and write
27206E02000
trusted library allocation
page read and write
9F4000
heap
page read and write
ADFB000
trusted library allocation
page read and write
1697E85A000
heap
page read and write
136BA24A000
heap
page read and write
15C8A77E000
heap
page read and write
48C000
stack
page read and write
1EB1FF00000
heap
page read and write
1763A7C000
stack
page read and write
9F4000
heap
page read and write
33B0000
heap
page read and write
15C8AC02000
heap
page read and write
9F4000
heap
page read and write
3363000
heap
page read and write
1ECDFA3D000
heap
page read and write
4EB2000
trusted library allocation
page read and write
1763FFF000
stack
page read and write
45F1000
heap
page read and write
175FF7B000
stack
page read and write
4EB8000
trusted library allocation
page read and write
18D56013000
heap
page read and write
4350000
heap
page read and write
15C8A795000
heap
page read and write
9F4000
heap
page read and write
1ECDFA4D000
heap
page read and write
272063E0000
trusted library allocation
page read and write
15C8A77E000
heap
page read and write
F5AEE7D000
stack
page read and write
25B79142000
heap
page read and write
352E000
heap
page read and write
1FFEC7F000
stack
page read and write
45F1000
heap
page read and write
15C89C90000
heap
page read and write
20E58202000
heap
page read and write
15C89EC6000
heap
page read and write
15C8A792000
heap
page read and write
15C8A784000
heap
page read and write
15C8AC03000
heap
page read and write
EEDE1FF000
stack
page read and write
4F32000
direct allocation
page read and write
1D38F280000
trusted library allocation
page read and write
10057000
unkown
page execute read
477E000
stack
page read and write
1FFE34B000
stack
page read and write
4E13000
direct allocation
page read and write
9F4000
heap
page read and write
10086000
unkown
page readonly
1ECDF9A0000
trusted library allocation
page read and write
55AD000
stack
page read and write
9F4000
heap
page read and write
1ECDFA3B000
heap
page read and write
15C8A791000
heap
page read and write
961A57C000
stack
page read and write
352D000
heap
page read and write
1EB1FE00000
heap
page read and write
15C8AC02000
heap
page read and write
3500000
heap
page read and write
15C8A7B9000
heap
page read and write
1697FE4B000
heap
page read and write
4120000
trusted library allocation
page read and write
1ECDFA6B000
heap
page read and write
4E80000
trusted library allocation
page read and write
15C8A76F000
heap
page read and write
513E000
stack
page read and write
4CA000
stack
page read and write
1EB1FCE0000
heap
page read and write
3542000
heap
page read and write
4DF0000
direct allocation
page read and write
2ED8000
stack
page read and write
9F4000
heap
page read and write
276B2EBA000
heap
page read and write
4EB2000
trusted library allocation
page read and write
7E39BFE000
stack
page read and write
1F917400000
heap
page read and write
1EB1FE29000
heap
page read and write
9F4000
heap
page read and write
15C8A71B000
heap
page read and write
1D38E3B0000
trusted library allocation
page read and write
1763CFC000
stack
page read and write
9F4000
heap
page read and write
2C2A000
heap
page read and write
15C89C80000
heap
page read and write
15C8A792000
heap
page read and write
A555000
trusted library allocation
page read and write
15C8A75F000
heap
page read and write
276B2ECB000
heap
page read and write
1E982FE000
stack
page read and write
272063B0000
heap
page read and write
F5AF17E000
stack
page read and write
15C89EA2000
heap
page read and write
3525000
heap
page read and write
1697E88C000
heap
page read and write
9F4000
heap
page read and write
961A8FE000
stack
page read and write
9F4000
heap
page read and write
18D5603D000
heap
page read and write
961A7F7000
stack
page read and write
1E988FF000
stack
page read and write
1ECDFA60000
heap
page read and write
1D38E446000
heap
page read and write
609015B000
stack
page read and write
4EC6000
trusted library allocation
page read and write
1ECDFA75000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
2C98000
heap
page read and write
4ED5000
trusted library allocation
page read and write
27206513000
heap
page read and write
4EEC000
trusted library allocation
page read and write
1ECDFA67000
heap
page read and write
33BF000
stack
page read and write
136BA25A000
heap
page read and write
18D56025000
heap
page read and write
4590000
direct allocation
page read and write
4230000
direct allocation
page read and write
20E58100000
heap
page read and write
1697E7F3000
trusted library allocation
page read and write
10001000
unkown
page execute read
1760578000
stack
page read and write
2C63000
heap
page read and write
25B79160000
heap
page read and write
10080000
unkown
page execute read
18D56058000
heap
page read and write
4E53279000
stack
page read and write
45F1000
heap
page read and write
100CE000
unkown
page readonly
15C89EA9000
heap
page read and write
1006C000
unkown
page execute read
1007D000
unkown
page execute read
1ECDFA56000
heap
page read and write
1AAEBDA0000
heap
page read and write
635000
heap
page read and write
50AF000
stack
page read and write
10015000
unkown
page execute read
1007D000
unkown
page execute read
4EBF000
trusted library allocation
page read and write
1697E902000
heap
page read and write
1EB1FE60000
heap
page read and write
24B7A800000
heap
page read and write
15C8A792000
heap
page read and write
1697E914000
heap
page read and write
10000000
unkown
page readonly
15C8AC19000
heap
page read and write
2C73000
heap
page read and write
352A000
heap
page read and write
17603FF000
stack
page read and write
9F4000
heap
page read and write
2BEA000
heap
page read and write
16905000000
heap
page read and write
1760077000
stack
page read and write
1AAEC100000
heap
page read and write
9F4000
heap
page read and write
4E52EAB000
stack
page read and write
16904260000
remote allocation
page read and write
15C8A7B9000
heap
page read and write
4E90000
trusted library allocation
page read and write
1FFE97A000
stack
page read and write
15C8A77E000
heap
page read and write
45F1000
heap
page read and write
EEDE0FF000
stack
page read and write
16904140000
trusted library allocation
page read and write
3360000
heap
page read and write
4E5337E000
stack
page read and write
1AAEC05E000
heap
page read and write
330E000
stack
page read and write
1AAEC029000
heap
page read and write
476F000
stack
page read and write
24B7AA40000
heap
page read and write
3528000
heap
page read and write
276B2CC0000
heap
page read and write
136BA302000
heap
page read and write
1D38F270000
trusted library allocation
page read and write
850D47E000
stack
page read and write
136BA1D0000
remote allocation
page read and write
420000
heap
page read and write
24B7AB13000
heap
page read and write
100A2000
unkown
page readonly
69A000
heap
page read and write
20E58090000
heap
page read and write
27206429000
heap
page read and write
15C8A792000
heap
page read and write
9F4000
heap
page read and write
10000000
unkown
page readonly
9F5000
heap
page read and write
1EB1FE5B000
heap
page read and write
15C8A7A3000
heap
page read and write
9F4000
heap
page read and write
9F4000
heap
page read and write
961A6FE000
stack
page read and write
18D56057000
heap
page read and write
337E000
stack
page read and write
2F40000
trusted library allocation
page read and write
9F4000
heap
page read and write
5101000
trusted library allocation
page read and write
15C89E4D000
heap
page read and write
643E6F8000
stack
page read and write
1F917482000
heap
page read and write
9F4000
heap
page read and write
176027F000
stack
page read and write
15C8A77E000
heap
page read and write
1697F200000
heap
page read and write
276B2E6D000
heap
page read and write
15C89F16000
heap
page read and write
15C8A7D3000
heap
page read and write
15C8A722000
heap
page read and write
3445000
heap
page read and write
18D57C40000
trusted library allocation
page read and write
1006C000
unkown
page execute read
33AF000
stack
page read and write
4CEE000
stack
page read and write
609087B000
stack
page read and write
1697FE2C000
heap
page read and write
46DE000
stack
page read and write
9F4000
heap
page read and write
1AAEC07F000
heap
page read and write
2C0B000
heap
page read and write
15C89E48000
heap
page read and write
1EB1FE8E000
heap
page read and write
1EB1FF13000
heap
page read and write
1697FE63000
heap
page read and write
27206475000
heap
page read and write
27206502000
heap
page read and write
1ECDFA58000
heap
page read and write
16904350000
trusted library allocation
page read and write
2FBD000
stack
page read and write
45F1000
heap
page read and write
350A000
heap
page read and write
25B79150000
heap
page read and write
20E58302000
heap
page read and write
10000000
unkown
page readonly
10095000
unkown
page write copy
169041D0000
trusted library allocation
page read and write
136BA251000
heap
page read and write
5100000
trusted library allocation
page read and write
1697E88E000
heap
page read and write
45F1000
heap
page read and write
15C8A771000
heap
page read and write
45F1000
heap
page read and write
4D60000
remote allocation
page read and write
1697F318000
heap
page read and write
961A1BE000
stack
page read and write
3432000
heap
page read and write
18D58000000
remote allocation
page read and write
15C8A77A000
heap
page read and write
1697E89F000
heap
page read and write
32F0000
trusted library allocation
page read and write
1D38E1C0000
heap
page read and write
2C99000
heap
page read and write
1D38F040000
trusted library allocation
page read and write
9F4000
heap
page read and write
1697FDD0000
trusted library allocation
page read and write
2E30000
heap
page read and write
18D58000000
remote allocation
page read and write
4E5F000
stack
page read and write
1ECDF840000
heap
page read and write
1EB1FF08000
heap
page read and write
10080000
unkown
page execute read
1697E87A000
heap
page read and write
4EEC000
trusted library allocation
page read and write
1F917502000
heap
page read and write
27206350000
heap
page read and write
1F917456000
heap
page read and write
15C89E49000
heap
page read and write
136BA23F000
heap
page read and write
15C89F02000
heap
page read and write
27206402000
heap
page read and write
45F1000
heap
page read and write
1D38E349000
heap
page read and write
1697F313000
heap
page read and write
15C8A783000
heap
page read and write
1ECDF830000
heap
page read and write
1ECDFA00000
heap
page read and write
2C2A000
heap
page read and write
24B7AA02000
heap
page read and write
1697FDF0000
trusted library allocation
page read and write
18D56000000
heap
page read and write
15C8A7A4000
heap
page read and write
550000
heap
page read and write
1F9171B0000
heap
page read and write
1ECDFA32000
heap
page read and write
276B2EE8000
heap
page read and write
4F10000
direct allocation
page read and write
4F33000
direct allocation
page read and write
45F1000
heap
page read and write
15C8A775000
heap
page read and write
15C8A7B5000
heap
page read and write
1ECE0202000
trusted library allocation
page read and write
9F4000
heap
page read and write
15C89E7C000
heap
page read and write
7CF000
stack
page read and write
9F4000
heap
page read and write
15C89E13000
heap
page read and write
4E10000
trusted library allocation
page read and write
471F000
stack
page read and write
15C89F13000
heap
page read and write
15C8A792000
heap
page read and write
352D000
heap
page read and write
4253000
direct allocation
page read and write
2C1F000
heap
page read and write
15C8A7B4000
heap
page read and write
45F1000
heap
page read and write
33E0000
heap
page read and write
276B2F13000
heap
page read and write
15C8A7B6000
heap
page read and write
1AAEC108000
heap
page read and write
15C8AB90000
remote allocation
page read and write
2BEA000
heap
page read and write
9F4000
heap
page read and write
4E1E000
stack
page read and write
9F4000
heap
page read and write
1697E858000
heap
page read and write
15C8A790000
heap
page read and write
4AED000
stack
page read and write
1009F000
unkown
page write copy
9F4000
heap
page read and write
25B79145000
heap
page read and write
4EB1000
trusted library allocation
page read and write
978000
heap
page read and write
1D38E400000
heap
page read and write
1AAEBE10000
heap
page read and write
1FFEB7A000
stack
page read and write
136BA200000
heap
page read and write
24B7AA28000
heap
page read and write
24B7AB00000
heap
page read and write
4BEE000
stack
page read and write
2C2A000
heap
page read and write
1ECDFA77000
heap
page read and write
355AAFF000
stack
page read and write
1D38F2D0000
trusted library allocation
page read and write
25B79120000
heap
page read and write
10080000
unkown
page execute read
20E589D0000
remote allocation
page read and write
357A000
heap
page read and write
45F1000
heap
page read and write
18D56102000
heap
page read and write
914AD7F000
stack
page read and write
15C8A773000
heap
page read and write
33B7000
heap
page read and write
EEDDEFB000
stack
page read and write
850D4FE000
stack
page read and write
1697FE10000
heap
page read and write
24B7AA68000
heap
page read and write
355ABFD000
stack
page read and write
136BA213000
heap
page read and write
1697FEA5000
heap
page read and write
18D57A02000
trusted library allocation
page read and write
24B7AA13000
heap
page read and write
25B79390000
heap
page read and write
344E000
heap
page read and write
276B2E87000
heap
page read and write
1697F300000
heap
page read and write
15C8A77F000
heap
page read and write
45F1000
heap
page read and write
18D56047000
heap
page read and write
4EBF000
trusted library allocation
page read and write
169041D0000
trusted library allocation
page read and write
15C8A7A3000
heap
page read and write
4EB8000
trusted library allocation
page read and write
1006C000
unkown
page execute read
1EB1FE5A000
heap
page read and write
1697E8A9000
heap
page read and write
45F1000
heap
page read and write
53CD000
stack
page read and write
2C0B000
heap
page read and write
4EEC000
trusted library allocation
page read and write
1D38E300000
heap
page read and write
136BA0B0000
heap
page read and write
1007D000
unkown
page execute read
15C89EE7000
heap
page read and write
15C89EEC000
heap
page read and write
15C8A7B4000
heap
page read and write
15C8A761000
heap
page read and write
45F1000
heap
page read and write
136BA1B0000
trusted library allocation
page read and write
15C8A7B3000
heap
page read and write
970000
heap
page read and write
2BEA000
heap
page read and write
15C8A786000
heap
page read and write
136BA1D0000
remote allocation
page read and write
2880000
trusted library allocation
page read and write
1697E8A6000
heap
page read and write
9F4000
heap
page read and write
9F4000
heap
page read and write
16904230000
trusted library allocation
page read and write
169041D0000
trusted library allocation
page read and write
9F0000
heap
page read and write
3549000
heap
page read and write
943000
heap
page read and write
914AC7D000
stack
page read and write
850000
heap
page read and write
1AAEC102000
heap
page read and write
2F7C000
stack
page read and write
4F4B000
trusted library allocation
page read and write
10015000
unkown
page execute read
1AAEC05C000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
9F4000
heap
page read and write
930000
trusted library allocation
page read and write
3405000
heap
page read and write
1FFEA7E000
stack
page read and write
914AA7D000
stack
page read and write
136BA223000
heap
page read and write
1763BFE000
stack
page read and write
10057000
unkown
page execute read
176047F000
unkown
page read and write
9F4000
heap
page read and write
2C2A000
heap
page read and write
16904130000
trusted library allocation
page read and write
1AAEC000000
heap
page read and write
45F1000
heap
page read and write
15C8A772000
heap
page read and write
1ECDFA40000
heap
page read and write
1697E813000
heap
page read and write
136BA255000
heap
page read and write
8FD000
stack
page read and write
9F4000
heap
page read and write
2C1F000
heap
page read and write
15C8A77E000
heap
page read and write
1EB1FE56000
heap
page read and write
850D1CA000
stack
page read and write
45F1000
heap
page read and write
15C8A77E000
heap
page read and write
15C89EBF000
heap
page read and write
100CE000
unkown
page readonly
1AAEC013000
heap
page read and write
25B79161000
heap
page read and write
1697FEA9000
heap
page read and write
4D2F000
stack
page read and write
9F4000
heap
page read and write
4D60000
remote allocation
page read and write
15C8AB90000
remote allocation
page read and write
1E9827B000
stack
page read and write
3330000
heap
page read and write
4F4B000
trusted library allocation
page read and write
2C2A000
heap
page read and write
1AAEC066000
heap
page read and write
16904250000
trusted library allocation
page read and write
F5AF27F000
stack
page read and write
1697F1F0000
trusted library allocation
page read and write
2FCE000
stack
page read and write
1697FEDB000
heap
page read and write
F5AEB7C000
stack
page read and write
850D67E000
stack
page read and write
15C8A792000
heap
page read and write
136BA24F000
heap
page read and write
15C8A774000
heap
page read and write
1D38E44D000
heap
page read and write
7E395FE000
stack
page read and write
1ECDF8A0000
heap
page read and write
15C8A792000
heap
page read and write
4E80000
heap
page read and write
1697F8E0000
trusted library allocation
page read and write
15C89E29000
heap
page read and write
3469000
heap
page read and write
50C000
stack
page read and write
2BB0000
heap
page read and write
3370000
heap
page read and write
50FF000
stack
page read and write
15C89E3C000
heap
page read and write
1D38E445000
heap
page read and write
570000
remote allocation
page read and write
9F4000
heap
page read and write
15C8A795000
heap
page read and write
1D38E44D000
heap
page read and write
355ACFC000
stack
page read and write
3340000
trusted library allocation
page read and write
1E987FE000
stack
page read and write
100CE000
unkown
page readonly
15C8A792000
heap
page read and write
3525000
heap
page read and write
20E5825C000
heap
page read and write
1697E8FE000
heap
page read and write
9F4000
heap
page read and write
9F4000
heap
page read and write
15C89F08000
heap
page read and write
9F4000
heap
page read and write
2FC5000
heap
page read and write
15C8A792000
heap
page read and write
4330000
heap
page read and write
9F4000
heap
page read and write
136BA270000
heap
page read and write
F5AE5FB000
stack
page read and write
5BC000
stack
page read and write
643F17F000
stack
page read and write
1D38F260000
heap
page readonly
1F9171A0000
heap
page read and write
4C2E000
stack
page read and write
940000
heap
page read and write
1E9837E000
stack
page read and write
2FC0000
heap
page read and write
55EC000
stack
page read and write
16904210000
trusted library allocation
page read and write
1F917508000
heap
page read and write
25B79070000
heap
page read and write
45F1000
heap
page read and write
1ECDFA47000
heap
page read and write
517E000
stack
page read and write
2BE0000
heap
page read and write
10086000
unkown
page readonly
1D38F250000
trusted library allocation
page read and write
1F917452000
heap
page read and write
9F4000
heap
page read and write
15C8AC44000
heap
page read and write
337A000
heap
page read and write
18D5611C000
heap
page read and write
EEDDCFE000
stack
page read and write
4220000
heap
page read and write
1697E907000
heap
page read and write
15C89E50000
heap
page read and write
15C89E47000
heap
page read and write
EEDD9FB000
stack
page read and write
1697FEF4000
heap
page read and write
10001000
unkown
page execute read
1697E8FE000
heap
page read and write
1D38E465000
heap
page read and write
4EB8000
trusted library allocation
page read and write
EEDDC7E000
stack
page read and write
9F4000
heap
page read and write
15C8A773000
heap
page read and write
18D56048000
heap
page read and write
15C8A7B3000
heap
page read and write
15C8A780000
heap
page read and write
1F917429000
heap
page read and write
15C8A7A3000
heap
page read and write
15C8A700000
heap
page read and write
10086000
unkown
page readonly
4EBF000
trusted library allocation
page read and write
9F4000
heap
page read and write
1ECDFA6A000
heap
page read and write
15C8A778000
heap
page read and write
10001000
unkown
page execute read
9F4000
heap
page read and write
3592000
heap
page read and write
1ECDFA29000
heap
page read and write
24B7AA00000
heap
page read and write
136BA050000
heap
page read and write
136BA252000
heap
page read and write
1006C000
unkown
page execute read
1697E800000
heap
page read and write
2C75000
heap
page read and write
15C89E51000
heap
page read and write
1F91746F000
heap
page read and write
4EEC000
trusted library allocation
page read and write
4A0000
heap
page read and write
9F4000
heap
page read and write
45F1000
heap
page read and write
643E8F9000
stack
page read and write
1ECDFA6D000
heap
page read and write
25B79131000
heap
page read and write
2E40000
heap
page read and write
9F4000
heap
page read and write
45F1000
heap
page read and write
100A2000
unkown
page readonly
45F1000
heap
page read and write
1ECDFA7E000
heap
page read and write
2C9B000
heap
page read and write
175FB5B000
stack
page read and write
16904130000
trusted library allocation
page read and write
20E589D0000
remote allocation
page read and write
1F917C02000
trusted library allocation
page read and write
1ECDFA42000
heap
page read and write
15C8A7A3000
heap
page read and write
4E30000
heap
page read and write
1009F000
unkown
page write copy
17640FD000
stack
page read and write
27206400000
heap
page read and write
9F4000
heap
page read and write
961A47F000
stack
page read and write
18D56058000
heap
page read and write
15C89E56000
heap
page read and write
9F4000
heap
page read and write
24B7AA52000
heap
page read and write
9F4000
heap
page read and write
2C1D000
heap
page read and write
15C89E00000
heap
page read and write
1AAEC002000
heap
page read and write
5101000
trusted library allocation
page read and write
341E000
heap
page read and write
24B7AB02000
heap
page read and write
16904220000
trusted library allocation
page read and write
AF77000
trusted library allocation
page read and write
2FB9000
stack
page read and write
1EB1FE5E000
heap
page read and write
2BDF000
heap
page read and write
15C8A781000
heap
page read and write
1AAEC051000
heap
page read and write
541E000
stack
page read and write
914A97B000
stack
page read and write
25B79150000
heap
page read and write
1697E870000
heap
page read and write
18D56113000
heap
page read and write
1697F302000
heap
page read and write
643E7FA000
stack
page read and write
24B7AA79000
heap
page read and write
9F4000
heap
page read and write
609067B000
stack
page read and write
352D000
heap
page read and write
1697FD60000
trusted library allocation
page read and write
1697E8AC000
heap
page read and write
538C000
stack
page read and write
9F4000
heap
page read and write
1697E875000
heap
page read and write
1D38E407000
heap
page read and write
9F4000
heap
page read and write
1697FEEE000
heap
page read and write
27206465000
heap
page read and write
27206340000
heap
page read and write
54DC000
stack
page read and write
15C89DF0000
trusted library allocation
page read and write
45F1000
heap
page read and write
3350000
trusted library allocation
page read and write
1AAEC03C000
heap
page read and write
45F7000
trusted library allocation
page read and write
9F4000
heap
page read and write
1ECDFA7A000
heap
page read and write
4E532F9000
stack
page read and write
10080000
unkown
page execute read
1697E780000
trusted library allocation
page read and write
10000000
unkown
page readonly
1697E7F0000
trusted library allocation
page read and write
1AAEC08A000
heap
page read and write
18D55EA0000
heap
page read and write
355A8FF000
stack
page read and write
914A67F000
stack
page read and write
18D56089000
heap
page read and write
18D56002000
heap
page read and write
9F4000
heap
page read and write
1697E6E0000
heap
page read and write
15C8A7A4000
heap
page read and write
15C89EAF000
heap
page read and write
4EB8000
trusted library allocation
page read and write
1697F304000
heap
page read and write
1EB1FE62000
heap
page read and write
2AF0000
trusted library allocation
page read and write
530D000
stack
page read and write
9F4000
heap
page read and write
2720646B000
heap
page read and write
9F4000
heap
page read and write
1FFE67F000
stack
page read and write
1EB1FE5C000
heap
page read and write
45F1000
heap
page read and write
3549000
heap
page read and write
EEDDFF7000
stack
page read and write
1763F7D000
stack
page read and write
9F4000
heap
page read and write
1E985FF000
stack
page read and write
15C8AC02000
heap
page read and write
9F4000
heap
page read and write
4E534F9000
stack
page read and write
7E39AFE000
stack
page read and write
1760177000
stack
page read and write
1697FE56000
heap
page read and write
1697E750000
heap
page read and write
2720643D000
heap
page read and write
961A9FE000
stack
page read and write
2F50000
trusted library allocation
page read and write
643EF7C000
stack
page read and write
24B7B202000
trusted library allocation
page read and write
1EB1FD80000
trusted library allocation
page read and write
1D38E1D0000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
609077E000
stack
page read and write
914A0BB000
stack
page read and write
16904140000
trusted library allocation
page read and write
276B2E29000
heap
page read and write
15C8A7A3000
heap
page read and write
9F4000
heap
page read and write
9F4000
heap
page read and write
4EB1000
trusted library allocation
page read and write
355A31B000
stack
page read and write
1EB1FCF0000
heap
page read and write
3410000
trusted library allocation
page read and write
570000
remote allocation
page read and write
15C8AC00000
heap
page read and write
1690410E000
trusted library allocation
page read and write
2BBA000
heap
page read and write
10086000
unkown
page readonly
45B3000
direct allocation
page read and write
5010000
heap
page read and write
1ECDFA62000
heap
page read and write
15C89E6D000
heap
page read and write
18D58000000
remote allocation
page read and write
16904144000
trusted library allocation
page read and write
45F1000
heap
page read and write
F5AEC7F000
stack
page read and write
6CB000
heap
page read and write
15C8A719000
heap
page read and write
4ECE000
trusted library allocation
page read and write
1EB1FF02000
heap
page read and write
25B79136000
heap
page read and write
15C8A792000
heap
page read and write
4EBF000
trusted library allocation
page read and write
2BEA000
heap
page read and write
3570000
heap
page read and write
10096000
unkown
page read and write
16904260000
remote allocation
page read and write
2C73000
heap
page read and write
1EB1FE3C000
heap
page read and write
15C89EB3000
heap
page read and write
9F4000
heap
page read and write
34CE000
stack
page read and write
6C0000
heap
page read and write
1D38E3A0000
trusted library allocation
page read and write
850D6FC000
stack
page read and write
2C1D000
heap
page read and write
176037A000
stack
page read and write
4490000
trusted library allocation
page read and write
16904100000
trusted library allocation
page read and write
16900000000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
169041F0000
trusted library allocation
page read and write
9F4000
heap
page read and write
20E5823D000
heap
page read and write
4601000
heap
page read and write
2C0B000
heap
page read and write
45E0000
heap
page read and write
1ECDFA13000
heap
page read and write
45F1000
heap
page read and write
A10000
heap
page read and write
24B7A810000
heap
page read and write
5101000
trusted library allocation
page read and write
35C0000
heap
page read and write
4E81000
trusted library allocation
page read and write
25B79150000
heap
page read and write
15C8A773000
heap
page read and write
20E58200000
heap
page read and write
355AEFE000
stack
page read and write
15C8AC20000
heap
page read and write
9F4000
heap
page read and write
9F4000
heap
page read and write
15C8A750000
heap
page read and write
1F917210000
heap
page read and write
9F4000
heap
page read and write
1AAEC061000
heap
page read and write
9F4000
heap
page read and write
2970000
heap
page read and write
556F000
stack
page read and write
1697FDE0000
trusted library allocation
page read and write
18D56100000
heap
page read and write
7E3987E000
stack
page read and write
45F0000
heap
page read and write
18D5602A000
heap
page read and write
9F4000
heap
page read and write
914A8FC000
stack
page read and write
1FFE3CF000
stack
page read and write
1AAEC802000
trusted library allocation
page read and write
25B79395000
heap
page read and write
1D38E320000
heap
page read and write
F5AF37E000
stack
page read and write
82E000
stack
page read and write
330E000
stack
page read and write
18D56073000
heap
page read and write
1D38E44D000
heap
page read and write
15C8A779000
heap
page read and write
4E5347C000
stack
page read and write
9F4000
heap
page read and write
68E000
stack
page read and write
5101000
trusted library allocation
page read and write
15C8A775000
heap
page read and write
9F4000
heap
page read and write
1697FE1E000
heap
page read and write
1697E902000
heap
page read and write
100A2000
unkown
page readonly
15C8A771000
heap
page read and write
2EAA000
stack
page read and write
276B2C50000
heap
page read and write
15C8A779000
heap
page read and write
15C89EE1000
heap
page read and write
5019000
trusted library allocation
page read and write
10096000
unkown
page read and write
10096000
unkown
page read and write
2C1F000
heap
page read and write
1697F318000
heap
page read and write
643E9FE000
stack
page read and write
4D40000
trusted library allocation
page read and write
20E58213000
heap
page read and write
2C2A000
heap
page read and write
50BE000
stack
page read and write
2E9C000
stack
page read and write
15C8A792000
heap
page read and write
1F917513000
heap
page read and write
16904120000
trusted library allocation
page read and write
45F1000
heap
page read and write
2C1D000
heap
page read and write
1697E825000
heap
page read and write
1009F000
unkown
page write copy
15C8A77A000
heap
page read and write
2720646F000
heap
page read and write
45F1000
heap
page read and write
3445000
heap
page read and write
276B2F02000
heap
page read and write
20E58A02000
trusted library allocation
page read and write
1697E892000
heap
page read and write
1697FEFA000
heap
page read and write
6B2000
heap
page read and write
1AAEC113000
heap
page read and write
10057000
unkown
page execute read
507F000
stack
page read and write
961A13B000
stack
page read and write
472D000
stack
page read and write
1697FEF9000
heap
page read and write
2C1D000
heap
page read and write
10096000
unkown
page read and write
47BE000
stack
page read and write
33BE000
stack
page read and write
276B2EC4000
heap
page read and write
1697E926000
heap
page read and write
24B7A970000
trusted library allocation
page read and write
27206487000
heap
page read and write
15C8A77E000
heap
page read and write
65D0000
trusted library allocation
page read and write
15C8A774000
heap
page read and write
1ECDFA63000
heap
page read and write
4237000
trusted library allocation
page read and write
F5AEF7E000
stack
page read and write
15C8A792000
heap
page read and write
9F4000
heap
page read and write
45F1000
heap
page read and write
9F4000
heap
page read and write
1F91744F000
heap
page read and write
9F4000
heap
page read and write
1D38E473000
heap
page read and write
24B7AA64000
heap
page read and write
352D000
heap
page read and write
1D38E340000
heap
page read and write
503E000
stack
page read and write
1D38E500000
trusted library allocation
page read and write
276B3712000
heap
page read and write
4EEC000
trusted library allocation
page read and write
10015000
unkown
page execute read
There are 1073 hidden memdumps, click here to show them.