IOC Report
JOB-in.line e.K. - New Order 56899707.exe

loading gif

Files

File Path
Type
Category
Malicious
JOB-in.line e.K. - New Order 56899707.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JOB-in.line e.K. - New Order 56899707.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\tmpF006.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\gATZIsOK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\gATZIsOK.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evf3gbiu.whq.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkbfubpc.mhm.ps1
very short file (no magic)
dropped
C:\Users\user\Documents\20220805\PowerShell_transcript.065367.PYT_AdW3.20220805104819.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JOB-in.line e.K. - New Order 56899707.exe
"C:\Users\user\Desktop\JOB-in.line e.K. - New Order 56899707.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gATZIsOK.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gATZIsOK" /XML "C:\Users\user\AppData\Local\Temp\tmpF006.tmp
malicious
C:\Users\user\Desktop\JOB-in.line e.K. - New Order 56899707.exe
C:\Users\user\Desktop\JOB-in.line e.K. - New Order 56899707.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
20.91.187.223
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.fontbureau.comldva
unknown
http://www.fontbureau.comm
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://github.com/syohex/java-simple-mine-sweeperC:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 21 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.91.187.223
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPer1_0Server
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPerServer
malicious
HKEY_CURRENT_USER\Software\Microsoft\ActiveMovie\devenum
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
C88000
heap
page read and write
malicious
C87000
heap
page read and write
malicious
54F000
remote allocation
page execute and read and write
malicious
C98000
heap
page read and write
malicious
414000
remote allocation
page execute and read and write
malicious
45C4000
trusted library allocation
page read and write
malicious
2D16000
trusted library allocation
page read and write
malicious
24C4304E000
heap
page read and write
53B0000
trusted library allocation
page read and write
2835446C000
heap
page read and write
1E531113000
heap
page read and write
31D8000
heap
page read and write
B080000
trusted library allocation
page read and write
1E5310EE000
heap
page read and write
FE19EFF000
stack
page read and write
17A2B118000
heap
page read and write
B34D77E000
stack
page read and write
53B0000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
CEC000
heap
page read and write
1E53199B000
heap
page read and write
15841777000
heap
page read and write
15841791000
heap
page read and write
4F34000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
3410000
heap
page read and write
1E53198E000
heap
page read and write
539B000
trusted library allocation
page read and write
1E531978000
heap
page read and write
53CE000
trusted library allocation
page read and write
7420000
trusted library section
page read and write
53B0000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
29CC000
stack
page read and write
5520000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
17A2FD50000
trusted library allocation
page read and write
28E0000
heap
page execute and read and write
53CE000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
B1E0000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
17A2A613000
heap
page read and write
2D6327A000
stack
page read and write
5501000
trusted library allocation
page read and write
17A2A69D000
heap
page read and write
6A50000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
1E5310B1000
heap
page read and write
17A2FD71000
trusted library allocation
page read and write
1E531956000
heap
page read and write
53CF000
trusted library allocation
page read and write
CDB000
heap
page read and write
BE0000
unkown
page readonly
2710000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
B370000
trusted library allocation
page read and write
17A3002B000
heap
page read and write
53CE000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
296FE700000
heap
page read and write
296FE902000
heap
page read and write
53A4000
trusted library allocation
page read and write
FE19BFB000
stack
page read and write
1E5319CF000
heap
page read and write
5395000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
5000000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
386467F000
stack
page read and write
24C43100000
heap
page read and write
5393000
trusted library allocation
page read and write
1E53199D000
heap
page read and write
5520000
trusted library section
page read and write
296FE908000
heap
page read and write
53A6000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
BC18DFB000
stack
page read and write
CEF000
heap
page read and write
4FA0000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
17A2B820000
trusted library section
page readonly
28AE000
stack
page read and write
53CB000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
53CF000
trusted library allocation
page read and write
28D0000
trusted library allocation
page execute and read and write
1C3E07E000
stack
page read and write
1E53199B000
heap
page read and write
20E77E8B000
heap
page read and write
20E77E89000
heap
page read and write
1D6D8C13000
heap
page read and write
539A000
trusted library allocation
page read and write
6D2000
unkown
page readonly
C8D000
heap
page read and write
17A2FEB0000
trusted library allocation
page read and write
17A2B015000
heap
page read and write
53A6000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
1E53103C000
heap
page read and write
17A30000000
heap
page read and write
DEB2E7F000
stack
page read and write
B4DE000
stack
page read and write
D1A000
heap
page read and write
B230000
trusted library allocation
page read and write
17A2FEA0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
296FE854000
heap
page read and write
53CF000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
1584179E000
heap
page read and write
53CE000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
284B000
trusted library allocation
page execute and read and write
1E531982000
heap
page read and write
53CF000
trusted library allocation
page read and write
20E77E02000
heap
page read and write
CAA000
heap
page read and write
5394000
trusted library allocation
page read and write
BC189BE000
stack
page read and write
283552E0000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
B101000
trusted library allocation
page read and write
B0DC000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
24C43000000
heap
page read and write
1E53191A000
heap
page read and write
5530000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
1E53197E000
heap
page read and write
53CD000
trusted library allocation
page read and write
1E5319BE000
heap
page read and write
5398000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
C85000
heap
page read and write
53B0000
trusted library allocation
page read and write
20E77DC0000
heap
page read and write
53A4000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
1E531990000
heap
page read and write
1E531E21000
heap
page read and write
53B1000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
C8D000
heap
page read and write
53B0000
trusted library allocation
page read and write
1E531982000
heap
page read and write
B0F0000
trusted library allocation
page read and write
2842000
trusted library allocation
page read and write
C20000
heap
page read and write
53CD000
trusted library allocation
page read and write
53C5000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
B75000
heap
page read and write
CEF000
heap
page read and write
B307000
trusted library allocation
page read and write
B34D6FF000
stack
page read and write
53CE000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
1E531980000
heap
page read and write
539D000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
CCE000
heap
page read and write
17A2FD74000
trusted library allocation
page read and write
1E531980000
heap
page read and write
24C43113000
heap
page read and write
B34D87B000
stack
page read and write
CEF000
heap
page read and write
B0F0000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
CD7000
heap
page read and write
53CF000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
BC1907F000
stack
page read and write
D04000
heap
page read and write
539C000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
24C43013000
heap
page read and write
1C3DE7B000
stack
page read and write
5395000
trusted library allocation
page read and write
C95000
heap
page read and write
1C3D9FE000
stack
page read and write
7420000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
17A2FC40000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
CEF000
heap
page read and write
53B0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
B350000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
B2E0000
trusted library allocation
page read and write
B110000
trusted library allocation
page read and write
1D6D8D00000
heap
page read and write
B230000
trusted library allocation
page read and write
296FE900000
heap
page read and write
53CB000
trusted library allocation
page read and write
1E531982000
heap
page read and write
CDF000
heap
page read and write
53B0000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
2AEE000
stack
page read and write
1E531802000
heap
page read and write
20E77D50000
heap
page read and write
1E531087000
heap
page read and write
28355090000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
1E531918000
heap
page read and write
CAA000
heap
page read and write
B0E3000
trusted library allocation
page read and write
1E531094000
heap
page read and write
53CE000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E531973000
heap
page read and write
53CF000
trusted library allocation
page read and write
17A2B102000
heap
page read and write
5391000
trusted library allocation
page read and write
17A30064000
heap
page read and write
53B5000
trusted library allocation
page read and write
B0D0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
24C4304C000
heap
page read and write
53CF000
trusted library allocation
page read and write
2835444D000
heap
page read and write
5500000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
B0E0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
CDB000
heap
page read and write
53CD000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
BC18F77000
stack
page read and write
1E53190C000
heap
page read and write
53A0000
trusted library allocation
page read and write
1E5310A4000
heap
page read and write
17A300F3000
heap
page read and write
4F80000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
386407F000
stack
page read and write
2814000
trusted library allocation
page read and write
B10E000
trusted library allocation
page read and write
B2F0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
D04000
heap
page read and write
C60000
heap
page read and write
5395000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
77E000
unkown
page readonly
1E531982000
heap
page read and write
539A000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
1E531974000
heap
page read and write
B090000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
8850879000
stack
page read and write
24C4304A000
heap
page read and write
20E77E5F000
heap
page read and write
53B0000
trusted library allocation
page read and write
AFF0000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
4BEC000
stack
page read and write
53CE000
trusted library allocation
page read and write
17A2FD5E000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
3AF9000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
15841791000
heap
page read and write
AE91000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
20E77F00000
heap
page read and write
53CE000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
296FE6A0000
heap
page read and write
53B0000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
1E5319CE000
heap
page read and write
1E531981000
heap
page read and write
5399000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
6E0000
heap
page read and write
53AD000
trusted library allocation
page read and write
885077F000
stack
page read and write
17A30100000
heap
page read and write
1E53199D000
heap
page read and write
1E531978000
heap
page read and write
1E531974000
heap
page read and write
5530000
trusted library allocation
page execute and read and write
1E531078000
heap
page read and write
CF6000
heap
page read and write
53A8000
trusted library allocation
page read and write
17A2A665000
heap
page read and write
53A2000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
B100000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
17A2FD50000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
74C000
stack
page read and write
53A0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
CA2000
heap
page read and write
53BD000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
3863BFC000
stack
page read and write
1D6D8C29000
heap
page read and write
B0C0000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
1E5319AD000
heap
page read and write
53B0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
20E77DF0000
trusted library allocation
page read and write
17A2A6AC000
heap
page read and write
E3D000
stack
page read and write
53CE000
trusted library allocation
page read and write
1E53194F000
heap
page read and write
5245000
heap
page read and write
53BB000
trusted library allocation
page read and write
2D6337F000
stack
page read and write
DEB2B0B000
stack
page read and write
4FD0000
trusted library allocation
page read and write
158417A5000
heap
page read and write
539B000
trusted library allocation
page read and write
17A2AFE0000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
1E530EA0000
heap
page read and write
DEB2B8E000
stack
page read and write
53CE000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
296FF002000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
1E531976000
heap
page read and write
5520000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
54D000
remote allocation
page execute and read and write
2770000
heap
page read and write
53CF000
trusted library allocation
page read and write
17A2A692000
heap
page read and write
1E53198E000
heap
page read and write
53A6000
trusted library allocation
page read and write
17A2B000000
heap
page read and write
28354443000
heap
page read and write
B0F0000
trusted library allocation
page read and write
28354260000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
BC1893E000
stack
page read and write
B2FC000
trusted library allocation
page read and write
FE197AB000
stack
page read and write
538B000
trusted library allocation
page read and write
1E53199B000
heap
page read and write
15841772000
heap
page read and write
1E53195A000
heap
page read and write
5396000
trusted library allocation
page read and write
C97000
heap
page read and write
538E000
trusted library allocation
page read and write
5250000
heap
page read and write
539D000
trusted library allocation
page read and write
20E77E5C000
heap
page read and write
521C000
stack
page read and write
53B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
B61E000
stack
page read and write
17A2A669000
heap
page read and write
C98000
heap
page read and write
1E53197A000
heap
page read and write
386417F000
stack
page read and write
B31E000
stack
page read and write
3863DFE000
stack
page read and write
5398000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
38642FA000
stack
page read and write
2860000
trusted library allocation
page read and write
2835444B000
heap
page read and write
17A2A63D000
heap
page read and write
17A2A702000
heap
page read and write
1E531029000
heap
page read and write
AF50000
trusted library allocation
page read and write
1E53197D000
heap
page read and write
B0C0000
trusted library allocation
page read and write
BD0000
unkown
page readonly
1E53199E000
heap
page read and write
1E531918000
heap
page read and write
53CE000
trusted library allocation
page read and write
1E531981000
heap
page read and write
53B0000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
20E77D60000
heap
page read and write
CE3000
heap
page read and write
5020000
trusted library allocation
page read and write
1E531071000
heap
page read and write
53A4000
trusted library allocation
page read and write
1E5319DC000
heap
page read and write
B220000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
FE19AFD000
stack
page read and write
53CE000
trusted library allocation
page read and write
1E53199B000
heap
page read and write
1E53107A000
heap
page read and write
B330000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
24C43050000
heap
page read and write
CE7000
heap
page read and write
1E531116000
heap
page read and write
538D000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
28F8000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
B0A0000
trusted library allocation
page read and write
FE19FFF000
stack
page read and write
1E531973000
heap
page read and write
B210000
trusted library allocation
page read and write
C68000
heap
page read and write
1E531978000
heap
page read and write
53D3000
trusted library allocation
page read and write
1E531982000
heap
page read and write
B0D0000
trusted library allocation
page read and write
1E531981000
heap
page read and write
53A6000
trusted library allocation
page read and write
38636FC000
stack
page read and write
17A2FEB0000
remote allocation
page read and write
1E531973000
heap
page read and write
53BA000
trusted library allocation
page read and write
C95000
heap
page read and write
28354390000
heap
page read and write
53AE000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
1E531E18000
heap
page read and write
20E77E00000
heap
page read and write
1E531980000
heap
page read and write
B380000
trusted library allocation
page read and write
1E531978000
heap
page read and write
17A300FB000
heap
page read and write
24C43029000
heap
page read and write
539A000
trusted library allocation
page read and write
CE5000
heap
page read and write
17A30013000
heap
page read and write
53AE000
trusted library allocation
page read and write
CD7000
heap
page read and write
B240000
trusted library allocation
page read and write
20E77E3C000
heap
page read and write
17A300AD000
heap
page read and write
53CE000
trusted library allocation
page read and write
17A300A5000
heap
page read and write
53A2000
trusted library allocation
page read and write
17A2FD80000
trusted library allocation
page read and write
B340000
trusted library allocation
page read and write
AFF0000
trusted library section
page read and write
539E000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
17A2B860000
trusted library section
page readonly
B1F0000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
17A2FD80000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
17A2A5B0000
heap
page read and write
53CE000
trusted library allocation
page read and write
1E53106E000
heap
page read and write
BE0000
unkown
page readonly
5540000
trusted library allocation
page read and write
1E53195A000
heap
page read and write
B090000
trusted library allocation
page read and write
24C43802000
trusted library allocation
page read and write
296FE853000
heap
page read and write
330F000
stack
page read and write
885037B000
stack
page read and write
1E53199B000
heap
page read and write
B250000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
C0D000
heap
page read and write
15841760000
heap
page read and write
B309000
trusted library allocation
page read and write
17A2A68B000
heap
page read and write
1E531980000
heap
page read and write
53AD000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
C70000
heap
page read and write
DEB2FFF000
stack
page read and write
2D633FF000
stack
page read and write
53B0000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
CBE000
heap
page read and write
5500000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
B090000
trusted library allocation
page execute and read and write
31D0000
heap
page read and write
3863CFA000
stack
page read and write
53CB000
trusted library allocation
page read and write
B270000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
283546B5000
heap
page read and write
B23E000
stack
page read and write
5500000
trusted library allocation
page read and write
17A2FD94000
trusted library allocation
page read and write
283543B0000
heap
page read and write
B108000
trusted library allocation
page read and write
1E531971000
heap
page read and write
51C0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
1E531076000
heap
page read and write
B090000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
C0D000
heap
page read and write
17A30102000
heap
page read and write
72B8000
trusted library allocation
page read and write
2D632FE000
stack
page read and write
17A2BBC0000
trusted library allocation
page read and write
88BF000
stack
page read and write
B320000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
296FE851000
heap
page read and write
C8D000
heap
page read and write
1E53199B000
heap
page read and write
B37000
stack
page read and write
5500000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
1E531982000
heap
page read and write
B0B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
FE19DF7000
stack
page read and write
B1EE000
trusted library allocation
page read and write
FE19A7E000
stack
page read and write
53B5000
trusted library allocation
page read and write
1E531980000
heap
page read and write
C8D000
heap
page read and write
1E531980000
heap
page read and write
24C43057000
heap
page read and write
17A2AFF0000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1D6D8C55000
heap
page read and write
5396000
trusted library allocation
page read and write
B0B0000
trusted library allocation
page execute and read and write
38641FF000
stack
page read and write
15841700000
heap
page read and write
386447A000
stack
page read and write
D45000
heap
page read and write
53A5000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
BC1917D000
stack
page read and write
17A2A540000
heap
page read and write
1E530E40000
heap
page read and write
53CF000
trusted library allocation
page read and write
BD0000
unkown
page readonly
53A3000
trusted library allocation
page read and write
B3A0000
trusted library allocation
page read and write
DEB31F7000
stack
page read and write
17A2FE80000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
17A2FD58000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
20E77E13000
heap
page read and write
539A000
trusted library allocation
page read and write
CF0000
heap
page read and write
5393000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
17A2A660000
heap
page read and write
15841791000
heap
page read and write
17A2AFC1000
trusted library allocation
page read and write
2835444B000
heap
page read and write
15841670000
heap
page read and write
17A2B840000
trusted library section
page readonly
296FE870000
heap
page read and write
53B1000
trusted library allocation
page read and write
15841650000
heap
page read and write
1E53198E000
heap
page read and write
53CE000
trusted library allocation
page read and write
BA0000
heap
page read and write
5393000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
C07000
heap
page read and write
539F000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
C9C000
heap
page read and write
1E5310E4000
heap
page read and write
53CF000
trusted library allocation
page read and write
1E531979000
heap
page read and write
B0A0000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
DEB33F8000
stack
page read and write
C85000
heap
page read and write
53B0000
trusted library allocation
page read and write
CBE000
heap
page read and write
53CC000
trusted library allocation
page read and write
B300000
trusted library allocation
page read and write
20E77E62000
heap
page read and write
5396000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
CF3000
heap
page read and write
1E53197D000
heap
page read and write
53A2000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
17A31000000
heap
page read and write
C95000
heap
page read and write
4F4D000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
283550A0000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
1D6D8C64000
heap
page read and write
51C0000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
D44000
heap
page read and write
5396000
trusted library allocation
page read and write
B0E0000
trusted library allocation
page read and write
2D634FF000
stack
page read and write
53B0000
trusted library allocation
page read and write
3863AF7000
stack
page read and write
2813000
trusted library allocation
page execute and read and write
5398000
trusted library allocation
page read and write
5031000
trusted library allocation
page read and write
CAE000
heap
page read and write
53B2000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
17A2B830000
trusted library section
page readonly
5520000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
1E531973000
heap
page read and write
D46000
heap
page read and write
1E531982000
heap
page read and write
B1C0000
trusted library allocation
page read and write
105F000
stack
page read and write
1E531E02000
heap
page read and write
885067F000
stack
page read and write
B0D0000
trusted library section
page read and write
53B0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
C95000
heap
page read and write
296FE813000
heap
page read and write
1E531963000
heap
page read and write
53A6000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
BB2E000
stack
page read and write
B200000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
20E77F02000
heap
page read and write
C97000
heap
page read and write
4F8E000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
B85F000
stack
page read and write
5540000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
B89E000
stack
page read and write
1E531993000
heap
page read and write
53B1000
trusted library allocation
page read and write
1E531973000
heap
page read and write
538D000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
B34DAF7000
stack
page read and write
53CD000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
CF6000
heap
page read and write
B260000
trusted library allocation
page execute and read and write
15841786000
heap
page read and write
5530000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
BD2E000
stack
page read and write
51C0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
1E531979000
heap
page read and write
17A2FEB0000
remote allocation
page read and write
28B0000
heap
page read and write
CBD000
heap
page read and write
5391000
trusted library allocation
page read and write
B3B0000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
1E5310EE000
heap
page read and write
158417A4000
heap
page read and write
539C000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
72B6000
trusted library allocation
page read and write
C0D000
heap
page read and write
53B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
386437E000
stack
page read and write
17A300EB000
heap
page read and write
320E000
stack
page read and write
B1D0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E531000000
heap
page read and write
5384000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
B0DA000
trusted library allocation
page read and write
D04000
heap
page read and write
5520000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
BEE000
stack
page read and write
53A2000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
CE4000
heap
page read and write
296FE83C000
heap
page read and write
CE3000
heap
page read and write
17A2A713000
heap
page read and write
1E5310C7000
heap
page read and write
53A4000
trusted library allocation
page read and write
24C43052000
heap
page read and write
CBD000
heap
page read and write
53B3000
trusted library allocation
page read and write
283546B9000
heap
page read and write
539C000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
536E000
stack
page read and write
53A6000
trusted library allocation
page read and write
B0AF000
trusted library allocation
page read and write
296FE800000
heap
page read and write
1E531E02000
heap
page read and write
53CF000
trusted library allocation
page read and write
1E53199B000
heap
page read and write
28355310000
trusted library allocation
page read and write
DEB3578000
stack
page read and write
53A3000
trusted library allocation
page read and write
1E530E30000
heap
page read and write
4F50000
trusted library allocation
page read and write
F50000
heap
page read and write
1D6D8C6F000
heap
page read and write
53B0000
trusted library allocation
page read and write
17A2A726000
heap
page read and write
53CF000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
5510000
trusted library allocation
page execute and read and write
B10B000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
1584179F000
heap
page read and write
53CE000
trusted library allocation
page read and write
B360000
trusted library allocation
page read and write
1E531982000
heap
page read and write
1E5310B5000
heap
page read and write
24C4307D000
heap
page read and write
539F000
trusted library allocation
page read and write
15841777000
heap
page read and write
1E53199B000
heap
page read and write
53AD000
trusted library allocation
page read and write
1E531087000
heap
page read and write
B300000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
B1FE000
stack
page read and write
53CF000
trusted library allocation
page read and write
CE3000
heap
page read and write
4FC0000
trusted library allocation
page read and write
B5DE000
stack
page read and write
5393000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
1E531981000
heap
page read and write
53CE000
trusted library allocation
page read and write
2933000
heap
page read and write
72B1000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E531979000
heap
page read and write
1E531973000
heap
page read and write
20E77F08000
heap
page read and write
4FF0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
A3B000
stack
page read and write
100E000
stack
page read and write
5399000
trusted library allocation
page read and write
CDB000
heap
page read and write
51C0000
trusted library allocation
page read and write
BF0000
unkown
page read and write
53B0000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
1E531980000
heap
page read and write
51D0000
trusted library allocation
page read and write
2740000
heap
page read and write
53CF000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
24C43054000
heap
page read and write
C7B000
heap
page read and write
1E531973000
heap
page read and write
53B0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
1D6D8C00000
heap
page read and write
53CE000
trusted library allocation
page read and write
1E5319AE000
heap
page read and write
53AB000
trusted library allocation
page read and write
5260000
heap
page execute and read and write
51E0000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
1E531981000
heap
page read and write
1E531982000
heap
page read and write
B0A0000
trusted library allocation
page read and write
17A2AFE3000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
17A2B100000
heap
page read and write
538F000
trusted library allocation
page read and write
1E5319C1000
heap
page read and write
53BD000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
B34DDFF000
stack
page read and write
20E77E52000
heap
page read and write
1D6D8A30000
heap
page read and write
53B0000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
17A2B870000
trusted library section
page readonly
6B50000
trusted library allocation
page read and write
C0D000
heap
page read and write
5500000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
24C42E10000
heap
page read and write
1D6D9402000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
28355360000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
B1ED000
trusted library allocation
page read and write
B0D0000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
1E5319BD000
heap
page read and write
1E53195A000
heap
page read and write
3AFD000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
28354250000
heap
page read and write
296FE849000
heap
page read and write
B34DCFF000
stack
page read and write
5397000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
2D6357C000
stack
page read and write
2B6E000
trusted library allocation
page read and write
F3F000
stack
page read and write
28354400000
heap
page read and write
88503FF000
stack
page read and write
5397000
trusted library allocation
page read and write
CFC000
heap
page read and write
B2E3000
trusted library allocation
page read and write
17A2FD90000
trusted library allocation
page read and write
CA1000
heap
page read and write
53A8000
trusted library allocation
page read and write
B0E0000
trusted library allocation
page read and write
CBD000
heap
page read and write
53CD000
trusted library allocation
page read and write
17A2FD70000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
6A5E000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E531974000
heap
page read and write
108F000
stack
page read and write
5500000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
BC18CFB000
stack
page read and write
24C4303C000
heap
page read and write
53AD000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
B34D9FB000
stack
page read and write
17A2A688000
heap
page read and write
C95000
heap
page read and write
B0C0000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
B0A0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
296FEFA0000
trusted library allocation
page read and write
1E53106F000
heap
page read and write
B2E6000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
1E531995000
heap
page read and write
1E531E02000
heap
page read and write
1D6D8C40000
heap
page read and write
24C43108000
heap
page read and write
17A2B201000
trusted library allocation
page read and write
FBE000
stack
page read and write
5396000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
B1F0000
trusted library allocation
page read and write
6B72000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
283A000
trusted library allocation
page execute and read and write
53CF000
trusted library allocation
page read and write
401000
remote allocation
page execute and read and write
5397000
trusted library allocation
page read and write
24C42F10000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
C6E000
stack
page read and write
1E531981000
heap
page read and write
5393000
trusted library allocation
page read and write
348E000
stack
page read and write
E79000
stack
page read and write
53CE000
trusted library allocation
page read and write
1C3D97C000
stack
page read and write
17A2B850000
trusted library section
page readonly
1E531D40000
remote allocation
page read and write
5394000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
1E531920000
heap
page read and write
B1C0000
trusted library allocation
page read and write
1E531057000
heap
page read and write
539B000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
CFB000
heap
page read and write
296FE856000
heap
page read and write
53AE000
trusted library allocation
page read and write
B34D8FF000
stack
page read and write
B99E000
stack
page read and write
7F0000
trusted library allocation
page read and write
28355300000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
1E53199D000
heap
page read and write
5390000
trusted library allocation
page read and write
17A2FBC0000
trusted library allocation
page read and write
28354410000
heap
page read and write
539F000
trusted library allocation
page read and write
1E531979000
heap
page read and write
538D000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
2847000
trusted library allocation
page execute and read and write
53B1000
trusted library allocation
page read and write
1E531E02000
heap
page read and write
51C0000
trusted library allocation
page read and write
B0B0000
trusted library allocation
page read and write
5240000
heap
page read and write
4F90000
trusted library allocation
page read and write
B390000
trusted library allocation
page read and write
17A2A68D000
heap
page read and write
1E531981000
heap
page read and write
53DF000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
88507FE000
stack
page read and write
5500000
trusted library allocation
page read and write
553000
remote allocation
page execute and read and write
1E5319AC000
heap
page read and write
1C3DF7B000
stack
page read and write
1E5319BE000
heap
page read and write
B090000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
B070000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
17A2B740000
trusted library allocation
page read and write
B0E6000
trusted library allocation
page read and write
B0F0000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
B0C9000
trusted library allocation
page read and write
28354408000
heap
page read and write
53A6000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
1E5310C1000
heap
page read and write
BC2C000
stack
page read and write
6D0000
unkown
page readonly
17A2FE20000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
B06D000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
FC0000
heap
page read and write
2800000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
B110000
trusted library allocation
page read and write
1E531974000
heap
page read and write
1C3E17E000
stack
page read and write
53A0000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
1584176B000
heap
page read and write
5000000
trusted library allocation
page read and write
296FE84B000
heap
page read and write
5043000
heap
page read and write
20E77E7B000
heap
page read and write
359C000
trusted library allocation
page read and write
5040000
heap
page read and write
CDF000
heap
page read and write
53A6000
trusted library allocation
page read and write
BC18E7F000
stack
page read and write
1E5319BE000
heap
page read and write
1E53190D000
heap
page read and write
1E531971000
heap
page read and write
5390000
trusted library allocation
page read and write
296FE690000
heap
page read and write
C92000
heap
page read and write
1E531973000
heap
page read and write
B0F0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
770000
remote allocation
page read and write
5520000
trusted library allocation
page read and write
15841787000
heap
page read and write
CEA000
heap
page read and write
1E531E02000
heap
page read and write
53CE000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
17A2A5F0000
trusted library section
page read and write
539C000
trusted library allocation
page read and write
17A2A629000
heap
page read and write
1E5310EB000
heap
page read and write
53CE000
trusted library allocation
page read and write
296FE88E000
heap
page read and write
1E53199B000
heap
page read and write
C97000
heap
page read and write
B0B0000
trusted library allocation
page read and write
B210000
trusted library allocation
page read and write
B320000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
4301000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E531E1A000
heap
page read and write
DEB367F000
stack
page read and write
53AE000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
1E5319BD000
heap
page read and write
1E5310FC000
heap
page read and write
53A2000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
17A300A1000
heap
page read and write
17A300E2000
heap
page read and write
4F55000
trusted library allocation
page read and write
1E5319B7000
heap
page read and write
296FE913000
heap
page read and write
B090000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
283546C0000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
1D6D8C02000
heap
page read and write
53A7000
trusted library allocation
page read and write
BF0000
unkown
page read and write
1D6D8D02000
heap
page read and write
1E531981000
heap
page read and write
5394000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
15841520000
heap
page read and write
17A2FC30000
trusted library allocation
page read and write
1D6D8C63000
heap
page read and write
B1E0000
trusted library allocation
page read and write
78E000
unkown
page readonly
24C43049000
heap
page read and write
28355020000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
17A2FE60000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
17A2B113000
heap
page read and write
1E531981000
heap
page read and write
1E531973000
heap
page read and write
1E5319AC000
heap
page read and write
53CD000
trusted library allocation
page read and write
5521000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
B71E000
stack
page read and write
414000
remote allocation
page execute and read and write
5395000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
B200000
trusted library allocation
page read and write
24C43102000
heap
page read and write
4F5C000
trusted library allocation
page read and write
17A2B002000
heap
page read and write
1E531E00000
heap
page read and write
24C42DA0000
heap
page read and write
5520000
trusted library allocation
page read and write
552000
remote allocation
page execute and read and write
53CE000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
1E531102000
heap
page read and write
C8D000
heap
page read and write
5500000
trusted library allocation
page read and write
1E531D40000
remote allocation
page read and write
B060000
trusted library allocation
page read and write
104E000
stack
page read and write
539B000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
B0A0000
trusted library allocation
page read and write
B0A5000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
C00000
heap
page read and write
419000
remote allocation
page execute and read and write
1E5319AC000
heap
page read and write
53B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E5319AE000
heap
page read and write
53A0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
17A2A550000
heap
page read and write
24C42DB0000
heap
page read and write
1E531108000
heap
page read and write
27B0000
heap
page read and write
B0B0000
trusted library allocation
page read and write
C8D000
heap
page read and write
B0C0000
trusted library allocation
page read and write
3863FFF000
stack
page read and write
53CF000
trusted library allocation
page read and write
17A3002D000
heap
page read and write
3863F7E000
stack
page read and write
5397000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
BF0000
unkown
page read and write
296FE829000
heap
page read and write
1E531993000
heap
page read and write
B34D67B000
stack
page read and write
53B0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
1E531E18000
heap
page read and write
53BA000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
344F000
stack
page read and write
53A6000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
17A2B118000
heap
page read and write
1E5319BE000
heap
page read and write
BC188BC000
stack
page read and write
281D000
trusted library allocation
page execute and read and write
5380000
trusted library allocation
page read and write
28355030000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
20E77E24000
heap
page read and write
53CB000
trusted library allocation
page read and write
B0A0000
trusted library allocation
page read and write
D16000
heap
page read and write
539F000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
4F47000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
CBE000
heap
page read and write
53B0000
trusted library allocation
page read and write
17A2FEB0000
remote allocation
page read and write
53CF000
trusted library allocation
page read and write
1E53106D000
heap
page read and write
5030000
trusted library allocation
page read and write
FE19CFB000
stack
page read and write
B70000
heap
page read and write
53A7000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
CFF000
heap
page read and write
5391000
trusted library allocation
page read and write
1D6D8B30000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
1D6D89C0000
heap
page read and write
53B4000
trusted library allocation
page read and write
CD9000
heap
page read and write
17A2A5E0000
trusted library allocation
page read and write
4FD1000
trusted library allocation
page read and write
282D000
trusted library allocation
page execute and read and write
539D000
trusted library allocation
page read and write
17A2A626000
heap
page read and write
5390000
trusted library allocation
page read and write
B34DBFD000
stack
page read and write
B2E0000
trusted library allocation
page read and write
296FE888000
heap
page read and write
1E531978000
heap
page read and write
539D000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
DEB347F000
unkown
page read and write
AEB000
stack
page read and write
53CE000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
1E531996000
heap
page read and write
DEB30F7000
stack
page read and write
BE0000
unkown
page readonly
53A5000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
C8A000
heap
page read and write
53A8000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E53199B000
heap
page read and write
53CE000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
15841782000
heap
page read and write
296FE87C000
heap
page read and write
3863EFB000
stack
page read and write
53CE000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
2930000
heap
page read and write
CCE000
heap
page read and write
D45000
heap
page read and write
53A4000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
CE6000
heap
page read and write
BD0000
unkown
page readonly
283552F0000
heap
page readonly
53B0000
trusted library allocation
page read and write
5525000
trusted library allocation
page read and write
1E53191A000
heap
page read and write
17A3004A000
heap
page read and write
53A8000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
1E531E21000
heap
page read and write
1E531900000
heap
page read and write
53A6000
trusted library allocation
page read and write
1E530FA0000
trusted library allocation
page read and write
1E53199B000
heap
page read and write
5500000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
1E5310AB000
heap
page read and write
87BE000
stack
page read and write
53CF000
trusted library allocation
page read and write
1E531013000
heap
page read and write
53AA000
trusted library allocation
page read and write
1E53198D000
heap
page read and write
296FE84E000
heap
page read and write
5000000
trusted library allocation
page execute and read and write
CE3000
heap
page read and write
53A5000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
24C4306D000
heap
page read and write
4F95000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
1E531D40000
remote allocation
page read and write
53CD000
trusted library allocation
page read and write
2D63478000
stack
page read and write
1E531E1A000
heap
page read and write
20E77F13000
heap
page read and write
5380000
trusted library allocation
page read and write
C25000
heap
page read and write
2830000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
1E531978000
heap
page read and write
53CF000
trusted library allocation
page read and write
4F3B000
trusted library allocation
page read and write
CDC000
heap
page read and write
C97000
heap
page read and write
17A300DD000
heap
page read and write
B240000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
20E78802000
trusted library allocation
page read and write
17A2A6FA000
heap
page read and write
539F000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
334E000
stack
page read and write
1D6D8D13000
heap
page read and write
1E53107C000
heap
page read and write
53B0000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
7D0000
heap
page read and write
B0C7000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
1E531980000
heap
page read and write
B0F0000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
707000
unkown
page readonly
1E53197C000
heap
page read and write
29E0000
heap
page read and write
5393000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
1E531952000
heap
page read and write
B1D0000
trusted library allocation
page read and write
CE7000
heap
page read and write
53A6000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
24C43088000
heap
page read and write
53CE000
trusted library allocation
page read and write
AFF000
stack
page read and write
24C43099000
heap
page read and write
5395000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
1E531075000
heap
page read and write
358F000
stack
page read and write
1E53199B000
heap
page read and write
5540000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
17A3003D000
heap
page read and write
CA1000
heap
page read and write
53CF000
trusted library allocation
page read and write
B75E000
stack
page read and write
5397000
trusted library allocation
page read and write
B0C0000
trusted library allocation
page read and write
DEB32FF000
stack
page read and write
1E53199B000
heap
page read and write
539F000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
15841705000
heap
page read and write
C95000
heap
page read and write
2836000
trusted library allocation
page execute and read and write
53CF000
trusted library allocation
page read and write
1E53195E000
heap
page read and write
5393000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
1E531E02000
heap
page read and write
17A2FE90000
trusted library allocation
page read and write
2835444B000
heap
page read and write
CE8000
heap
page read and write
B220000
trusted library allocation
page read and write
1E53197C000
heap
page read and write
15841784000
heap
page read and write
B310000
trusted library allocation
page read and write
5220000
trusted library section
page readonly
53CE000
trusted library allocation
page read and write
419000
remote allocation
page execute and read and write
53CF000
trusted library allocation
page read and write
51CD000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
283546B0000
heap
page read and write
CD9000
heap
page read and write
C95000
heap
page read and write
539C000
trusted library allocation
page read and write
C97000
heap
page read and write
B2F0000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
72B1000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1E531973000
heap
page read and write
1D6D89D0000
heap
page read and write
B090000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
1E53199B000
heap
page read and write
88506F9000
stack
page read and write
17A2A600000
heap
page read and write
53AE000
trusted library allocation
page read and write
17A2FE70000
trusted library allocation
page read and write
There are 1469 hidden memdumps, click here to show them.