IOC Report
SecuriteInfo.com.W32.AIDetectNet.01.19566.31995

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.AIDetectNet.01.19566.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.AIDetectNet.01.19566.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.19566.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.19566.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
malicious

URLs

Name
IP
Malicious
https://api.telegram.org/bot5446953292:AAFkDq-HVam91vjV2SXkAWjbhfkBnxaPoa4/sendDocument?chat_id=1269002131&caption=credentials.txt:::computer\user
149.154.167.220
https://api.telegram.org/bot5446953292:AAFkDq-HVam91vjV2SXkAWjbhfkBnxaPoa4/sendDocument?chat_id=1269
unknown
https://api.telegram.org/Qv
unknown
https://api.telegram.org/bot
unknown
http://james.newtonking.com/projects/json
unknown
https://api.telegram.org/
unknown

Domains

Name
IP
Malicious
dual-a-0001.a-msedge.net
204.79.197.200
api.telegram.org
149.154.167.220
windowsupdatebg.s.llnwi.net
95.140.236.128

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\Settings
GetCOOKIESreg

Memdumps

Base Address
Regiontype
Protect
Malicious
5B80000
trusted library section
page read and write
malicious
6E41000
trusted library allocation
page read and write
malicious
5450000
trusted library allocation
page read and write
183C4A13000
heap
page read and write
F7B000
heap
page read and write
16B16102000
heap
page read and write
1CA54300000
heap
page read and write
6340000
trusted library allocation
page read and write
6EC5000
trusted library allocation
page read and write
1F4B2D02000
heap
page read and write
1CA55150000
unkown
page read and write
3A811FF000
stack
page read and write
9310000
trusted library allocation
page read and write
22D16613000
heap
page read and write
3A815FE000
stack
page read and write
2F8627F000
stack
page read and write
6380000
trusted library allocation
page read and write
1CA59C14000
unkown
page read and write
1708F674000
heap
page read and write
6340000
trusted library allocation
page read and write
6340000
trusted library allocation
page read and write
1BC0000
trusted library allocation
page execute and read and write
183C4820000
trusted library allocation
page read and write
1CA53A6C000
heap
page read and write
63C0000
trusted library allocation
page read and write
1CA545FA000
heap
page read and write
9230000
trusted library allocation
page read and write
8F22000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
2A6F1402000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
2A6F0C84000
heap
page read and write
1C1E000
stack
page read and write
6320000
trusted library allocation
page read and write
6380000
trusted library allocation
page execute and read and write
2A6F0C55000
heap
page read and write
9310000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
1CA53A29000
heap
page read and write
91E0000
trusted library allocation
page read and write
2A6F0C3C000
heap
page read and write
339D000
stack
page read and write
6320000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
1AC2FFC000
stack
page read and write
183C46D0000
trusted library allocation
page read and write
23A76049000
heap
page read and write
183BF010000
heap
page read and write
6310000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
183BF295000
heap
page read and write
9312000
trusted library allocation
page read and write
90ECDFA000
stack
page read and write
1CA54150000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
1CA59D08000
unkown
page read and write
1DDB5030000
heap
page read and write
1CA59270000
unkown
page read and write
1DF46600000
heap
page read and write
6370000
trusted library allocation
page read and write
1DF46913000
heap
page read and write
22D16480000
heap
page read and write
50F0000
trusted library allocation
page read and write
23A7604E000
heap
page read and write
82190FF000
stack
page read and write
183BF2A0000
heap
page read and write
980000
trusted library allocation
page readonly
5470000
trusted library allocation
page read and write
694E000
stack
page read and write
1708F631000
heap
page read and write
F4E000
heap
page read and write
93B0000
trusted library allocation
page read and write
D560000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
8218A7C000
stack
page read and write
183C46D8000
trusted library allocation
page read and write
183C4AF7000
heap
page read and write
4190000
remote allocation
page read and write
1CA54573000
heap
page read and write
1CA59B7D000
unkown
page read and write
1CA545EC000
heap
page read and write
5160000
heap
page read and write
90EC97B000
stack
page read and write
183BFB02000
heap
page read and write
340B000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
4BC0000
heap
page read and write
2252443C000
heap
page read and write
17D1000
heap
page read and write
23A76108000
heap
page read and write
F1B000
heap
page read and write
9180000
trusted library allocation
page read and write
183C47E0000
trusted library allocation
page read and write
1CA53B13000
heap
page read and write
6360000
trusted library allocation
page read and write
9EEC2FE000
stack
page read and write
5910000
trusted library allocation
page read and write
1CA595D0000
unkown
page read and write
22524C02000
trusted library allocation
page read and write
59BF000
trusted library allocation
page read and write
2A90000
heap
page read and write
AD6F377000
stack
page read and write
93A0000
trusted library allocation
page read and write
1F4B2C66000
heap
page read and write
2A6F0D08000
heap
page read and write
1F4B2A80000
heap
page read and write
6320000
trusted library allocation
page read and write
46C000
remote allocation
page execute and read and write
183C47A0000
trusted library allocation
page read and write
1CA59D13000
unkown
page read and write
17E1000
heap
page read and write
16DE000
stack
page read and write
533F000
stack
page read and write
1CA59B00000
unkown
page read and write
1708F659000
heap
page read and write
2F8607E000
stack
page read and write
C46B000
trusted library allocation
page read and write
4F40000
heap
page read and write
1708F640000
heap
page read and write
91C0000
trusted library allocation
page read and write
6340000
trusted library allocation
page read and write
1AC289C000
stack
page read and write
5130000
trusted library allocation
page execute and read and write
6340000
trusted library allocation
page read and write
C311D8E000
stack
page read and write
1CA54592000
heap
page read and write
91A0000
trusted library allocation
page read and write
1DF47002000
trusted library allocation
page read and write
6ECB000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
6340000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
1CA59C17000
unkown
page read and write
1CA59C1F000
unkown
page read and write
760000
remote allocation
page read and write
3A814FE000
stack
page read and write
33FB000
trusted library allocation
page read and write
22D16644000
heap
page read and write
20948067000
heap
page read and write
6350000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
15C4000
heap
page read and write
6325000
trusted library allocation
page read and write
960E000
stack
page read and write
2A6F0C4E000
heap
page read and write
F22000
heap
page read and write
974E000
stack
page read and write
98C000
stack
page read and write
1CA59C51000
unkown
page read and write
1708F629000
heap
page read and write
1714000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
56E9F7E000
stack
page read and write
6380000
trusted library allocation
page read and write
20948059000
heap
page read and write
17A3000
heap
page read and write
9B73CFE000
stack
page read and write
F5F000
heap
page read and write
183BF070000
heap
page read and write
1ABF000
stack
page read and write
17A1000
heap
page read and write
1CA59C49000
unkown
page read and write
9310000
trusted library allocation
page read and write
16B16075000
heap
page read and write
17B3000
heap
page read and write
1CA59B8A000
unkown
page read and write
9310000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
172D000
trusted library allocation
page execute and read and write
2A6F0B50000
heap
page read and write
6370000
trusted library allocation
page read and write
46D000
remote allocation
page execute and read and write
1CA59650000
unkown
page read and write
6350000
trusted library allocation
page read and write
1708F530000
heap
page read and write
6350000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
1F4B3402000
heap
page read and write
183C4AE0000
heap
page read and write
9250000
trusted library section
page read and write
93AC000
trusted library allocation
page read and write
9260000
trusted library allocation
page read and write
183BF28B000
heap
page read and write
6400000
trusted library allocation
page read and write
1CA59A00000
unkown
page read and write
1DDB5202000
heap
page read and write
1CA543F3000
heap
page read and write
59C8000
trusted library allocation
page read and write
183C4AA7000
heap
page read and write
6320000
trusted library allocation
page read and write
1CA59A4F000
unkown
page read and write
6361000
trusted library allocation
page read and write
8218D7A000
stack
page read and write
20948028000
heap
page read and write
1710000
trusted library allocation
page read and write
F68000
heap
page read and write
59B0000
trusted library allocation
page read and write
1CA59BCD000
unkown
page read and write
22524350000
trusted library allocation
page read and write
1F4B2A10000
heap
page read and write
6380000
trusted library allocation
page read and write
1CA54564000
heap
page read and write
1CA59B3C000
unkown
page read and write
15C0000
heap
page read and write
1CA5455C000
heap
page read and write
5960000
trusted library allocation
page read and write
22D1662E000
heap
page read and write
17A6000
heap
page read and write
183BF272000
heap
page read and write
1CA545A0000
heap
page read and write
9310000
trusted library allocation
page read and write
16B16029000
heap
page read and write
6320000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
2A6F0D13000
heap
page read and write
173B000
heap
page read and write
5980000
trusted library allocation
page read and write
32AECFE000
stack
page read and write
19B0000
heap
page read and write
183C4710000
trusted library allocation
page read and write
9378000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
16B1603D000
heap
page read and write
1CA59BF4000
unkown
page read and write
1CA53A53000
heap
page read and write
59B0000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
1F4B2C29000
heap
page read and write
CECE0FB000
stack
page read and write
183BFB00000
heap
page read and write
EAA000
heap
page read and write
2252444A000
heap
page read and write
1CA59B28000
unkown
page read and write
9B7357E000
stack
page read and write
3340000
heap
page read and write
6390000
trusted library allocation
page read and write
9200000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
638B000
trusted library allocation
page read and write
56EA4FF000
stack
page read and write
90EC6FF000
stack
page read and write
1CA59B4F000
unkown
page read and write
22D16602000
heap
page read and write
637A000
trusted library allocation
page read and write
C31257F000
stack
page read and write
5470000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
3A80FFD000
stack
page read and write
6320000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
1BD0000
heap
page execute and read and write
1CA59B31000
unkown
page read and write
1F4B2C23000
heap
page read and write
183BF258000
heap
page read and write
998E000
stack
page read and write
E90000
heap
page read and write
5960000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
9390000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
63B7000
trusted library allocation
page read and write
1CA59B79000
unkown
page read and write
23A76051000
heap
page read and write
183BF2AD000
heap
page read and write
1DF46770000
trusted library allocation
page read and write
1CA53A86000
heap
page read and write
63A0000
trusted library allocation
page read and write
401000
remote allocation
page execute and read and write
16B15FA0000
heap
page read and write
183BFB18000
heap
page read and write
50FA000
trusted library allocation
page execute and read and write
988E000
stack
page read and write
6320000
trusted library allocation
page read and write
1CA596A0000
unkown
page read and write
5920000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
23A76002000
heap
page read and write
9187000
trusted library allocation
page read and write
1F4B2C13000
heap
page read and write
AD6ED4B000
stack
page read and write
6320000
trusted library allocation
page read and write
1708F65E000
heap
page read and write
1CA53A90000
heap
page read and write
9310000
trusted library allocation
page read and write
46DC000
trusted library allocation
page read and write
176E000
heap
page read and write
1708F613000
heap
page read and write
1708F658000
heap
page read and write
93D0000
trusted library allocation
page read and write
1F4B2C00000
heap
page read and write
4BF0000
trusted library allocation
page read and write
23A76113000
heap
page read and write
6320000
trusted library allocation
page read and write
6327000
trusted library allocation
page read and write
6340000
trusted library allocation
page read and write
1F4B3500000
heap
page read and write
2F85EFE000
stack
page read and write
6320000
trusted library allocation
page read and write
931B000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
183C45C0000
trusted library allocation
page read and write
1F4B2D13000
heap
page read and write
9310000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
22D1663C000
heap
page read and write
183C46F1000
trusted library allocation
page read and write
1708F4D0000
heap
page read and write
1CA59BD0000
unkown
page read and write
1CA54391000
heap
page read and write
33B0000
heap
page read and write
5107000
trusted library allocation
page execute and read and write
9310000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
16B16065000
heap
page read and write
183C4A63000
heap
page read and write
2094803C000
heap
page read and write
1CA59420000
unkown
page read and write
93B0000
trusted library allocation
page read and write
2A6F0C13000
heap
page read and write
6351000
trusted library allocation
page read and write
1CA5445A000
heap
page read and write
183C4A3D000
heap
page read and write
5460000
trusted library allocation
page read and write
17A1000
heap
page read and write
93A0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
821927F000
stack
page read and write
6390000
trusted library allocation
page read and write
1F4B2CBA000
heap
page read and write
59C0000
trusted library allocation
page read and write
1708F65C000
heap
page read and write
1CA543E2000
heap
page read and write
1CA55010000
unkown
page readonly
1CA53A57000
heap
page read and write
1CA5440A000
heap
page read and write
1CA59620000
unkown
page read and write
9340000
trusted library allocation
page read and write
821907B000
stack
page read and write
2A6F0D26000
heap
page read and write
1CA53A3C000
heap
page read and write
20948100000
heap
page read and write
1CA5459B000
heap
page read and write
6320000
trusted library allocation
page read and write
9EEC4FD000
stack
page read and write
179E000
heap
page read and write
6390000
trusted library allocation
page read and write
CECDBEC000
stack
page read and write
1CA54302000
heap
page read and write
1CA59BBC000
unkown
page read and write
9EEC57F000
stack
page read and write
1560000
trusted library allocation
page read and write
95CF000
stack
page read and write
1DF46851000
heap
page read and write
920000
trusted library allocation
page read and write
6343000
trusted library allocation
page read and write
9360000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
AD6F47E000
stack
page read and write
225241E0000
heap
page read and write
2A6F0C3A000
heap
page read and write
F55000
heap
page read and write
1DDB57C0000
remote allocation
page read and write
3A80CFF000
stack
page read and write
23A7603C000
heap
page read and write
6330000
trusted library allocation
page read and write
1708F65A000
heap
page read and write
4BA0000
trusted library allocation
page read and write
91D0000
heap
page read and write
9360000
trusted library allocation
page read and write
4190000
remote allocation
page read and write
62D1000
trusted library allocation
page read and write
35FF000
stack
page read and write
23A76082000
heap
page read and write
16B16802000
trusted library allocation
page read and write
183C4714000
trusted library allocation
page read and write
2252444E000
heap
page read and write
8521000
trusted library allocation
page read and write
CECE2FE000
stack
page read and write
1CA545C5000
heap
page read and write
1CA53A91000
heap
page read and write
5990000
trusted library allocation
page read and write
1CA5458D000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
F13000
heap
page read and write
3A80BFB000
stack
page read and write
1AC317B000
stack
page read and write
183BFA00000
heap
page read and write
1CA595E0000
unkown
page read and write
3F3E000
stack
page read and write
1708F666000
heap
page read and write
6320000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
93A0000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
1708F600000
heap
page read and write
5460000
trusted library allocation
page read and write
93B0000
trusted library allocation
page read and write
510B000
trusted library allocation
page execute and read and write
821967E000
stack
page read and write
9360000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
6EB4000
trusted library allocation
page read and write
9B739FB000
stack
page read and write
1CA543C8000
heap
page read and write
9370000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
1CA59670000
unkown
page read and write
22524429000
heap
page read and write
5470000
trusted library allocation
page read and write
183C46DE000
trusted library allocation
page read and write
183BF200000
heap
page read and write
5480000
trusted library allocation
page execute and read and write
16B1605A000
heap
page read and write
6320000
trusted library allocation
page read and write
1DF46856000
heap
page read and write
16B15F30000
heap
page read and write
9390000
trusted library allocation
page read and write
6324000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
9360000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
1DF46902000
heap
page read and write
9310000
trusted library allocation
page read and write
3A80DFD000
stack
page read and write
910000
heap
page read and write
20948013000
heap
page read and write
477C000
trusted library allocation
page read and write
1DDB5257000
heap
page read and write
5460000
trusted library allocation
page read and write
1DF46670000
heap
page read and write
183C46F0000
trusted library allocation
page read and write
32AEFFF000
stack
page read and write
6320000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
8218F7E000
stack
page read and write
59C0000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
17E1000
heap
page read and write
1AC337F000
stack
page read and write
6390000
trusted library allocation
page read and write
F73000
heap
page read and write
9310000
trusted library allocation
page read and write
183C4810000
trusted library allocation
page read and write
1CA59C2F000
unkown
page read and write
5A80000
heap
page read and write
940D000
stack
page read and write
5140000
heap
page read and write
6320000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
34BA000
stack
page read and write
58D5000
trusted library allocation
page read and write
1CA54458000
heap
page read and write
6340000
trusted library allocation
page read and write
1DF4684B000
heap
page read and write
1CA59660000
unkown
page read and write
6320000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
1713000
trusted library allocation
page execute and read and write
1CA55231000
unkown
page read and write
1CA55020000
unkown
page readonly
59B0000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
183C4AA3000
heap
page read and write
1708F667000
heap
page read and write
4E00000
remote allocation
page execute and read and write
1CA55260000
unkown
page read and write
5A81000
heap
page read and write
20947F30000
heap
page read and write
1CA59A53000
unkown
page read and write
9320000
trusted library allocation
page read and write
1DF4688C000
heap
page read and write
1CA54170000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
22524455000
heap
page read and write
59A0000
trusted library allocation
page read and write
2A6F0D02000
heap
page read and write
23A7604F000
heap
page read and write
59A0000
trusted library allocation
page read and write
3A813FF000
stack
page read and write
91B0000
trusted library allocation
page read and write
183BFA02000
heap
page read and write
183BF241000
heap
page read and write
183BF229000
heap
page read and write
183BF28E000
heap
page read and write
2A6F0C76000
heap
page read and write
56E9E7B000
stack
page read and write
183C4830000
remote allocation
page read and write
183C01E0000
trusted library section
page readonly
2A6F0AE0000
heap
page read and write
14F7000
stack
page read and write
183C01D0000
trusted library section
page readonly
59A0000
trusted library allocation
page read and write
F6A000
heap
page read and write
9360000
trusted library allocation
page read and write
183C45B0000
trusted library allocation
page read and write
50F7000
trusted library allocation
page execute and read and write
1CA54215000
heap
page read and write
59B0000
trusted library allocation
page read and write
9B734FB000
stack
page read and write
63B0000
trusted library allocation
page read and write
63D5000
trusted library allocation
page read and write
1CA59C59000
unkown
page read and write
59A0000
trusted library allocation
page execute and read and write
5450000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
22524502000
heap
page read and write
F10000
unkown
page readonly
59D0000
trusted library allocation
page read and write
2A80000
heap
page read and write
AE9000
stack
page read and write
5970000
trusted library allocation
page read and write
4F8E000
stack
page read and write
5470000
trusted library allocation
page read and write
1CA59B68000
unkown
page read and write
6ED6000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
20948002000
heap
page read and write
225241F0000
heap
page read and write
9310000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
1942000
trusted library allocation
page read and write
3EFF000
stack
page read and write
F64000
heap
page read and write
5470000
trusted library allocation
page read and write
4190000
remote allocation
page read and write
59D0000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
F12000
unkown
page readonly
20948802000
trusted library allocation
page read and write
183BF9C3000
trusted library allocation
page read and write
16B16077000
heap
page read and write
6325000
trusted library allocation
page read and write
1708F679000
heap
page read and write
1CA5457B000
heap
page read and write
23A76029000
heap
page read and write
59A0000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
6EAE000
trusted library allocation
page read and write
1C20000
trusted library allocation
page read and write
1DF46800000
heap
page read and write
1726000
trusted library allocation
page read and write
1CA53BC2000
heap
page read and write
6360000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
183BF2FD000
heap
page read and write
1DDB523D000
heap
page read and write
1700000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
20948113000
heap
page read and write
1CA59A13000
unkown
page read and write
1DDB5302000
heap
page read and write
6340000
trusted library allocation
page read and write
183C46F4000
trusted library allocation
page read and write
1DF46610000
heap
page read and write
59B1000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
1CA59CF2000
unkown
page read and write
91A0000
trusted library allocation
page read and write
1CA596B0000
unkown
page read and write
821917E000
stack
page read and write
6320000
trusted library allocation
page read and write
F11000
heap
page read and write
62E0000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
15C4000
heap
page read and write
C3120FB000
stack
page read and write
183BF170000
trusted library allocation
page read and write
17CF000
heap
page read and write
1F4B2C6E000
heap
page read and write
72D1000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
183BF278000
heap
page read and write
59CC000
trusted library allocation
page read and write
9380000
heap
page execute and read and write
1DDB57C0000
remote allocation
page read and write
183C01F0000
trusted library section
page readonly
1CA59880000
unkown
page read and write
15C4000
heap
page read and write
31E0000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
32AE8CB000
stack
page read and write
23A7604C000
heap
page read and write
6360000
trusted library allocation
page read and write
9B73AF7000
stack
page read and write
90ECAFA000
stack
page read and write
2F8637F000
stack
page read and write
183BF213000
heap
page read and write
5420000
trusted library allocation
page read and write
1DDB5229000
heap
page read and write
B10000
remote allocation
page read and write
1708F645000
heap
page read and write
22D164E0000
heap
page read and write
90EC9F9000
stack
page read and write
22524402000
heap
page read and write
1AC2E7F000
stack
page read and write
6380000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
15AE000
stack
page read and write
6350000
trusted library allocation
page read and write
183C0210000
trusted library section
page readonly
20948000000
heap
page read and write
1CA59BDE000
unkown
page read and write
931F000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
6326000
trusted library allocation
page read and write
32AEDFE000
stack
page read and write
1CA59BE8000
unkown
page read and write
183BF313000
heap
page read and write
9330000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
1CA5455E000
heap
page read and write
6325000
trusted library allocation
page read and write
1F4B2CC2000
heap
page read and write
6380000
trusted library allocation
page read and write
1DDB5200000
heap
page read and write
63B0000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
9B738FB000
stack
page read and write
8522000
trusted library allocation
page read and write
34FE000
stack
page read and write
22D165E0000
trusted library allocation
page read and write
1932000
trusted library allocation
page read and write
9EEC67D000
stack
page read and write
63B0000
trusted library allocation
page read and write
5402000
trusted library allocation
page read and write
1CA53B8E000
heap
page read and write
56EA1FB000
stack
page read and write
59C0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
D35000
heap
page read and write
821937F000
stack
page read and write
6388000
trusted library allocation
page read and write
22524500000
heap
page read and write
5470000
trusted library allocation
page read and write
1708F642000
heap
page read and write
6382000
trusted library allocation
page read and write
183C4A2C000
heap
page read and write
1CA55040000
unkown
page readonly
6320000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
1F4B2A20000
heap
page read and write
9370000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
1CA59A37000
unkown
page read and write
56E9EFD000
stack
page read and write
1708F66A000
heap
page read and write
6380000
trusted library allocation
page read and write
1AC347F000
stack
page read and write
1CA53A00000
heap
page read and write
3DFE000
stack
page read and write
1DF46829000
heap
page read and write
23A7608D000
heap
page read and write
1AC357F000
stack
page read and write
56EA2F7000
stack
page read and write
401000
remote allocation
page execute and read and write
43F1000
trusted library allocation
page read and write
6CD2000
trusted library allocation
page read and write
22D16702000
heap
page read and write
2970000
trusted library allocation
page read and write
17A8000
heap
page read and write
6330000
trusted library allocation
page execute and read and write
636C000
trusted library allocation
page read and write
17A4000
heap
page read and write
1CA59CEF000
unkown
page read and write
6C80000
heap
page read and write
F16000
heap
page read and write
8218E79000
stack
page read and write
22524400000
heap
page read and write
1CA54C30000
unkown
page read and write
AD6F07E000
stack
page read and write
63B0000
trusted library allocation
page read and write
20947F40000
heap
page read and write
6320000
trusted library allocation
page read and write
90ECCFF000
stack
page read and write
1770000
heap
page read and write
62E0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
1CA59BAB000
unkown
page read and write
118E000
stack
page read and write
1CA59300000
unkown
page read and write
1708F661000
heap
page read and write
15C4000
heap
page read and write
9370000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
1708F560000
trusted library allocation
page read and write
1708F66C000
heap
page read and write
6350000
trusted library allocation
page read and write
22524513000
heap
page read and write
1DF46870000
heap
page read and write
F5F000
heap
page read and write
93D0000
trusted library allocation
page read and write
1CA54202000
heap
page read and write
9310000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
4E02000
remote allocation
page execute and read and write
6380000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
1F4B3512000
heap
page read and write
6320000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
183C4830000
remote allocation
page read and write
9330000
trusted library allocation
page read and write
6377000
trusted library allocation
page read and write
1708F602000
heap
page read and write
1708F662000
heap
page read and write
1DF46882000
heap
page read and write
1CA54400000
heap
page read and write
1708F664000
heap
page read and write
F66000
heap
page read and write
CECE3FE000
stack
page read and write
20947FD0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
22524490000
heap
page read and write
1CA54554000
heap
page read and write
ECE000
heap
page read and write
58F0000
trusted library allocation
page read and write
3487000
trusted library allocation
page read and write
6351000
trusted library allocation
page read and write
9EEC3FE000
stack
page read and write
C311D0E000
stack
page read and write
63A0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
821947A000
stack
page read and write
93B0000
trusted library allocation
page read and write
407E000
stack
page read and write
9310000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
1708F678000
heap
page read and write
22D16636000
heap
page read and write
1CA59A02000
unkown
page read and write
22D16E02000
trusted library allocation
page read and write
1CA53A13000
heap
page read and write
1947000
trusted library allocation
page execute and read and write
1708F64E000
heap
page read and write
63C0000
trusted library allocation
page read and write
6A8E000
stack
page read and write
1CA59630000
unkown
page read and write
1708F641000
heap
page read and write
17AD000
heap
page read and write
5950000
trusted library allocation
page read and write
1CA545BD000
heap
page read and write
1708F660000
heap
page read and write
53F0000
trusted library allocation
page read and write
183C4AF1000
heap
page read and write
6440000
trusted library allocation
page read and write
EB4000
heap
page read and write
108E000
stack
page read and write
1CA5441B000
heap
page read and write
91A0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
20947FA0000
heap
page read and write
6325000
trusted library allocation
page read and write
17A2000
heap
page read and write
58E1000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
1CA59A5F000
unkown
page read and write
23A75FC0000
heap
page read and write
23A7604B000
heap
page read and write
9310000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
183C5000000
heap
page read and write
6C6E000
stack
page read and write
6340000
trusted library allocation
page read and write
C31247F000
stack
page read and write
E4E000
stack
page read and write
19AE000
stack
page read and write
6320000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
34B6000
trusted library allocation
page read and write
183BF27B000
heap
page read and write
22524450000
heap
page read and write
6398000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
984E000
stack
page read and write
1CA543B0000
heap
page read and write
9270000
trusted library allocation
page read and write
62D2000
trusted library allocation
page read and write
1F4B2C40000
heap
page read and write
56EA07C000
stack
page read and write
F8E000
heap
page read and write
1CA545FE000
heap
page read and write
22D16490000
heap
page read and write
9310000
trusted library allocation
page read and write
183C4700000
trusted library allocation
page read and write
7562000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
1CA53980000
heap
page read and write
F28000
heap
page read and write
11FC000
stack
page read and write
1CA54EB0000
unkown
page read and write
63EE000
stack
page read and write
183BF180000
trusted library section
page read and write
5A81000
heap
page read and write
1CA59C00000
unkown
page read and write
6321000
trusted library allocation
page read and write
1CA543CB000
heap
page read and write
1CA55070000
unkown
page read and write
2252446F000
heap
page read and write
970F000
stack
page read and write
63E0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
22D1661F000
heap
page read and write
BA6B000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
A521000
trusted library allocation
page read and write
9320000
trusted library allocation
page read and write
1CA55060000
unkown
page readonly
183C4ADB000
heap
page read and write
1CA59D02000
unkown
page read and write
9390000
trusted library allocation
page read and write
1DDB4FC0000
heap
page read and write
17CF000
heap
page read and write
1940000
trusted library allocation
page read and write
23A76802000
trusted library allocation
page read and write
1CA53A43000
heap
page read and write
183BF9C0000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
2A6F0C4B000
heap
page read and write
2A60000
heap
page read and write
1AC327C000
stack
page read and write
9EC000
stack
page read and write
1730000
heap
page read and write
90ECBFF000
stack
page read and write
6370000
trusted library allocation
page read and write
1CA53990000
heap
page read and write
1CA54200000
heap
page read and write
6380000
trusted library allocation
page read and write
23A76000000
heap
page read and write
192F000
stack
page read and write
6360000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
3A812FF000
stack
page read and write
23A76080000
heap
page read and write
5450000
trusted library allocation
page read and write
1CA53A88000
heap
page read and write
183BFA15000
heap
page read and write
7E66000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
1CA5456D000
heap
page read and write
183BFC01000
trusted library allocation
page read and write
E8E000
stack
page read and write
9390000
trusted library allocation
page read and write
9B735FE000
stack
page read and write
5450000
trusted library allocation
page read and write
1AC2F7F000
stack
page read and write
23A76089000
heap
page read and write
1CA59CD1000
unkown
page read and write
1CA59C60000
unkown
page read and write
5176000
heap
page read and write
22D16629000
heap
page read and write
4E62000
remote allocation
page execute and read and write
1CA5436D000
heap
page read and write
90EC87E000
stack
page read and write
5A9B000
heap
page read and write
1708F67D000
heap
page read and write
1CA5BAB0000
unkown
page read and write
1CA53A43000
heap
page read and write
6370000
trusted library allocation
page read and write
2A6F0C00000
heap
page read and write
7E41000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
1BBF000
stack
page read and write
558D000
stack
page read and write
63D0000
trusted library allocation
page read and write
183C46D0000
trusted library allocation
page read and write
AD6F57F000
stack
page read and write
5947000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
1708F4C0000
heap
page read and write
9922000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
1CA59890000
unkown
page read and write
9B73BFD000
stack
page read and write
2252448C000
heap
page read and write
2F85BFB000
stack
page read and write
91C0000
trusted library allocation
page read and write
1708F644000
heap
page read and write
1CA59B3E000
unkown
page read and write
183BF302000
heap
page read and write
1DF4687B000
heap
page read and write
5151000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
C31227E000
stack
page read and write
1F4B2CE1000
heap
page read and write
91A0000
heap
page read and write
1DDB5213000
heap
page read and write
1708F646000
heap
page read and write
22D16653000
heap
page read and write
42CF000
stack
page read and write
6320000
trusted library allocation
page read and write
3DBE000
stack
page read and write
514A000
heap
page read and write
183C0560000
trusted library allocation
page read and write
3A807AB000
stack
page read and write
9EEBDAB000
stack
page read and write
F6D000
heap
page read and write
1CA5431D000
heap
page read and write
50CE000
stack
page read and write
91C0000
trusted library allocation
page read and write
E98000
heap
page read and write
1CA54423000
heap
page read and write
D30000
heap
page read and write
50D4000
trusted library allocation
page read and write
50DD000
trusted library allocation
page execute and read and write
1724000
trusted library allocation
page read and write
2A89000
heap
page read and write
6325000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
22D16600000
heap
page read and write
1DF46813000
heap
page read and write
1CA59C1B000
unkown
page read and write
9310000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
56EA0FE000
stack
page read and write
63D0000
trusted library allocation
page read and write
17E1000
heap
page read and write
6330000
trusted library allocation
page read and write
17A9000
heap
page read and write
6ED3000
trusted library allocation
page read and write
1708F63D000
heap
page read and write
1CA55050000
unkown
page readonly
AD6F27B000
stack
page read and write
193A000
trusted library allocation
page execute and read and write
6325000
trusted library allocation
page read and write
1C30000
heap
page read and write
1CA59430000
unkown
page read and write
470F000
trusted library allocation
page read and write
2A6F0C50000
heap
page read and write
6390000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
403F000
stack
page read and write
9350000
trusted library allocation
page read and write
179D000
heap
page read and write
82192FF000
stack
page read and write
1CA59B2D000
unkown
page read and write
9310000
trusted library allocation
page read and write
1CA55250000
unkown
page read and write
5472000
trusted library allocation
page read and write
1CA5431D000
heap
page read and write
9350000
trusted library allocation
page read and write
1CA59C42000
unkown
page read and write
53C0000
heap
page read and write
2F85E7E000
stack
page read and write
17A4000
heap
page read and write
CF9000
stack
page read and write
EE7000
heap
page read and write
1960000
trusted library allocation
page read and write
1708F676000
heap
page read and write
1CA55030000
unkown
page readonly
6340000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
32AEEF9000
stack
page read and write
9310000
trusted library allocation
page read and write
1C40000
heap
page read and write
3A810FD000
stack
page read and write
9310000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
1CA59C47000
unkown
page read and write
1C36000
heap
page read and write
1CA539F0000
heap
page read and write
6450000
trusted library allocation
page read and write
183C0200000
trusted library section
page readonly
1DDB57C0000
remote allocation
page read and write
2094807C000
heap
page read and write
1CA59D18000
unkown
page read and write
183BF9E0000
trusted library allocation
page read and write
90EC35C000
stack
page read and write
23A7604A000
heap
page read and write
4597000
trusted library allocation
page read and write
1708FE02000
trusted library allocation
page read and write
1CA595F0000
unkown
page read and write
1DF4684F000
heap
page read and write
5470000
trusted library allocation
page read and write
1CA59B13000
unkown
page read and write
9210000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
23A75F60000
heap
page read and write
2094806B000
heap
page read and write
9EEC17E000
stack
page read and write
22524413000
heap
page read and write
1CA53A6E000
heap
page read and write
2A6F0B80000
trusted library allocation
page read and write
1AC30FC000
stack
page read and write
1DF4683C000
heap
page read and write
2F8617E000
stack
page read and write
1DDB4FD0000
heap
page read and write
194B000
trusted library allocation
page execute and read and write
1CA543C4000
heap
page read and write
17A6000
heap
page read and write
1CA59BF7000
unkown
page read and write
91C3000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
1708F673000
heap
page read and write
9310000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
1DDB5802000
trusted library allocation
page read and write
1CA59570000
unkown
page read and write
1CA54543000
heap
page read and write
1DF46802000
heap
page read and write
1CA53A66000
heap
page read and write
183C00E0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
23A76102000
heap
page read and write
1CA594A0000
unkown
page read and write
5460000
trusted library allocation
page execute and read and write
371D000
stack
page read and write
43F7000
trusted library allocation
page read and write
183C4800000
trusted library allocation
page read and write
1F4B2B80000
trusted library allocation
page read and write
698E000
stack
page read and write
183BF290000
heap
page read and write
1CA54566000
heap
page read and write
1720000
trusted library allocation
page read and write
5A81000
heap
page read and write
1CA54354000
heap
page read and write
59B4000
trusted library allocation
page read and write
6E30000
heap
page execute and read and write
6320000
trusted library allocation
page read and write
1CA59BEF000
unkown
page read and write
1CA59C56000
unkown
page read and write
56EA3FF000
stack
page read and write
22524480000
heap
page read and write
6350000
trusted library allocation
page read and write
50D3000
trusted library allocation
page execute and read and write
2A6F0AF0000
heap
page read and write
6350000
trusted library allocation
page read and write
22524508000
heap
page read and write
CECE1FB000
stack
page read and write
183BFB18000
heap
page read and write
23A75FF0000
trusted library allocation
page read and write
16B16000000
heap
page read and write
183BFB13000
heap
page read and write
924C000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
508E000
stack
page read and write
1CA59260000
unkown
page read and write
5464000
trusted library allocation
page read and write
9185000
trusted library allocation
page read and write
1F4B2C87000
heap
page read and write
63C0000
trusted library allocation
page read and write
4F45000
heap
page read and write
2A6F0D00000
heap
page read and write
C3121FB000
stack
page read and write
1930000
trusted library allocation
page read and write
1DDB5790000
trusted library allocation
page read and write
1CA59C5C000
unkown
page read and write
C311C8B000
stack
page read and write
5450000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
41CE000
stack
page read and write
183BF1E1000
trusted library allocation
page read and write
1708F647000
heap
page read and write
9EEC77D000
stack
page read and write
1DF46908000
heap
page read and write
63B0000
trusted library allocation
page read and write
1CA54327000
heap
page read and write
1CA54562000
heap
page read and write
6300000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
15C4000
heap
page read and write
9310000
trusted library allocation
page read and write
1CA5432E000
heap
page read and write
1936000
trusted library allocation
page execute and read and write
63E0000
trusted library allocation
page read and write
23A7606F000
heap
page read and write
6380000
trusted library allocation
page read and write
2990000
heap
page read and write
6350000
trusted library allocation
page read and write
183C4830000
trusted library allocation
page read and write
16B16113000
heap
page read and write
C312377000
stack
page read and write
5060000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
AD6EDCE000
stack
page read and write
6390000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
91C0000
trusted library allocation
page read and write
1CA59BB6000
unkown
page read and write
183BF326000
heap
page read and write
9180000
trusted library allocation
page read and write
23A76100000
heap
page read and write
183C4A4A000
heap
page read and write
9310000
trusted library allocation
page read and write
1CA59BA1000
unkown
page read and write
5916000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
1DF46900000
heap
page read and write
1CA59D0D000
unkown
page read and write
1CA54402000
heap
page read and write
417E000
stack
page read and write
59C0000
trusted library allocation
page read and write
1708F67A000
heap
page read and write
5149000
trusted library allocation
page read and write
183C4700000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
63F0000
heap
page execute and read and write
23A76013000
heap
page read and write
5904000
trusted library allocation
page read and write
16B16013000
heap
page read and write
1708F657000
heap
page read and write
183C01C0000
trusted library section
page readonly
9310000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
2940000
trusted library allocation
page execute read
91F0000
trusted library allocation
page read and write
1708F65F000
heap
page read and write
6320000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
9220000
trusted library allocation
page read and write
ED6000
heap
page read and write
17AC000
heap
page read and write
183C4A00000
heap
page read and write
63C0000
trusted library allocation
page read and write
58ED000
trusted library allocation
page read and write
183C4AFB000
heap
page read and write
6320000
trusted library allocation
page read and write
F57000
heap
page read and write
183C4830000
remote allocation
page read and write
2A6F0C29000
heap
page read and write
6325000
trusted library allocation
page read and write
16B16002000
heap
page read and write
3A80EFF000
stack
page read and write
6350000
trusted library allocation
page read and write
9350000
trusted library allocation
page read and write
1CA592F0000
unkown
page read and write
1CA543CF000
heap
page read and write
16B1606F000
heap
page read and write
1AC2CFC000
stack
page read and write
183C4A56000
heap
page read and write
53BE000
stack
page read and write
1CA592E0000
unkown
page read and write
16B15F40000
heap
page read and write
90ECE7F000
stack
page read and write
22524250000
heap
page read and write
82191FE000
stack
page read and write
9351000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
1F4B2CCB000
heap
page read and write
1CA53A8D000
heap
page read and write
F50000
heap
page read and write
9370000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
8218C77000
stack
page read and write
1708F702000
heap
page read and write
1708F663000
heap
page read and write
6370000
trusted library allocation
page read and write
183C4AFB000
heap
page read and write
1CA545A3000
heap
page read and write
9310000
trusted library allocation
page read and write
93C0000
trusted library allocation
page execute and read and write
1CA59C34000
unkown
page read and write
183BF9D0000
trusted library allocation
page read and write
6E2E000
stack
page read and write
183C4A2E000
heap
page read and write
1708F63A000
heap
page read and write
17A6000
heap
page read and write
F2E000
heap
page read and write
9EEC27E000
stack
page read and write
6370000
trusted library allocation
page read and write
16B15FD0000
trusted library allocation
page read and write
1708F683000
heap
page read and write
970000
heap
page read and write
9250000
trusted library allocation
page read and write
20948102000
heap
page read and write
2AA0000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
1708F669000
heap
page read and write
6350000
trusted library allocation
page execute and read and write
17AD000
heap
page read and write
1CA543AE000
heap
page read and write
1CA54500000
heap
page read and write
9360000
trusted library allocation
page read and write
1190000
heap
page read and write
6390000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
2A6F0C70000
heap
page read and write
9310000
trusted library allocation
page read and write
93C0000
trusted library allocation
page read and write
183C47F0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
91B0000
trusted library allocation
page read and write
183BF000000
heap
page read and write
6320000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
1945000
trusted library allocation
page execute and read and write
1CA53BEB000
heap
page read and write
62F0000
trusted library allocation
page read and write
9190000
trusted library allocation
page read and write
537E000
stack
page read and write
5440000
trusted library allocation
page read and write
23A75F50000
heap
page read and write
6EB9000
trusted library allocation
page read and write
There are 1223 hidden memdumps, click here to show them.