IOC Report
Uhy4TvdjRw.exe

loading gif

Files

File Path
Type
Category
Malicious
Uhy4TvdjRw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Uhy4TvdjRw.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Uhy4TvdjRw.exe
"C:\Users\user\Desktop\Uhy4TvdjRw.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp93E6.tmp.bat""
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 3
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
95.140.230.192

IPs

IP
Domain
Country
Malicious
61.14.233.88
unknown
Viet Nam
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6D2000
unkown
page readonly
malicious
29A4000
trusted library allocation
page read and write
malicious
2B00000
trusted library allocation
page read and write
malicious
221771E2000
heap
page read and write
22175AB4000
trusted library allocation
page read and write
AA2000
trusted library allocation
page read and write
1AD5571E000
heap
page read and write
29EA000
trusted library allocation
page read and write
22175E69000
heap
page read and write
22175F33000
heap
page read and write
1AD557AE000
heap
page read and write
CAA000
heap
page read and write
22170BC7000
heap
page read and write
22171180000
trusted library allocation
page read and write
4F12000
trusted library allocation
page read and write
22175FD4000
heap
page read and write
1AD5578F000
heap
page read and write
A9E727C000
stack
page read and write
22170BF0000
heap
page read and write
261F1E00000
heap
page read and write
BD3000
trusted library allocation
page execute and read and write
22170A5A000
heap
page read and write
261F1B51000
trusted library allocation
page read and write
1AD54EE2000
heap
page read and write
A7A000
trusted library allocation
page read and write
25FB106E000
heap
page read and write
AC3000
trusted library allocation
page read and write
2AF7379000
stack
page read and write
22177026000
heap
page read and write
2217700D000
heap
page read and write
4F88000
trusted library allocation
page read and write
22175E61000
heap
page read and write
2CBEDE7E000
heap
page read and write
2217718A000
heap
page read and write
22175E61000
heap
page read and write
5C6F000
stack
page read and write
A9E787F000
stack
page read and write
2217701F000
heap
page read and write
22170076000
heap
page read and write
22177023000
heap
page read and write
5880000
trusted library allocation
page read and write
22130CE4000
heap
page read and write
261ECF02000
heap
page read and write
22175A80000
trusted library allocation
page read and write
A12000
trusted library allocation
page read and write
E41FB7E000
stack
page read and write
22177011000
heap
page read and write
261EC690000
heap
page read and write
2AF70FB000
stack
page read and write
FEF000
stack
page read and write
22175940000
trusted library allocation
page read and write
221770E6000
heap
page read and write
2217718C000
heap
page read and write
14B4000
trusted library allocation
page read and write
5CE86FF000
stack
page read and write
2CBEDE45000
heap
page read and write
66FE000
stack
page read and write
2217701F000
heap
page read and write
221770A7000
heap
page read and write
E41F5CE000
stack
page read and write
1F421F13000
heap
page read and write
2217595C000
trusted library allocation
page read and write
22175956000
trusted library allocation
page read and write
22175E5F000
heap
page read and write
2830000
trusted library allocation
page read and write
22177193000
heap
page read and write
51E9000
trusted library allocation
page read and write
261ED983000
trusted library allocation
page read and write
22175FDF000
heap
page read and write
22175956000
trusted library allocation
page read and write
22177161000
heap
page read and write
1AFDB840000
heap
page read and write
29FA000
trusted library allocation
page read and write
22130CBF000
heap
page read and write
2AF6CAC000
stack
page read and write
22175AB4000
trusted library allocation
page read and write
18A79C45000
heap
page read and write
1AD557AE000
heap
page read and write
22177077000
heap
page read and write
22130CC0000
heap
page read and write
22177051000
heap
page read and write
858EE7F000
stack
page read and write
1F421F00000
heap
page read and write
1BD85B80000
heap
page read and write
221709D8000
heap
page read and write
5130000
heap
page read and write
22175FE4000
heap
page read and write
22175E2D000
heap
page read and write
22175E55000
heap
page read and write
3ABB27E000
stack
page read and write
22170BE6000
heap
page read and write
1AFDB913000
heap
page read and write
D6FFE7F000
stack
page read and write
2A6BBBE0000
heap
page read and write
AB6000
trusted library allocation
page read and write
22175E2D000
heap
page read and write
ADC000
trusted library allocation
page read and write
2217593C000
trusted library allocation
page read and write
2C80000
unkown
page read and write
1BD85C00000
heap
page read and write
2536BC35000
heap
page read and write
2536BB20000
heap
page read and write
221709E0000
heap
page read and write
22175960000
trusted library allocation
page read and write
22170A1B000
heap
page read and write
E41F4CB000
stack
page read and write
22130CD0000
heap
page read and write
4F12000
trusted library allocation
page read and write
5AFF000
stack
page read and write
1F421F08000
heap
page read and write
1AD557AD000
heap
page read and write
4ECC000
trusted library allocation
page read and write
22175AB0000
trusted library allocation
page read and write
2CBEDE61000
heap
page read and write
25FB10E3000
heap
page read and write
22177047000
heap
page read and write
22175F33000
heap
page read and write
4EB8000
trusted library allocation
page read and write
221770B5000
heap
page read and write
2217704F000
heap
page read and write
22170902000
heap
page read and write
2AF7D77000
stack
page read and write
1AD55728000
heap
page read and write
22177188000
heap
page read and write
32AF000
stack
page read and write
29EE000
stack
page read and write
22175E34000
heap
page read and write
4B6E000
stack
page read and write
6E00000
trusted library allocation
page read and write
22175F8A000
heap
page read and write
22177179000
heap
page read and write
22175FA5000
heap
page read and write
22177065000
heap
page read and write
18A79C56000
heap
page read and write
22175E2D000
heap
page read and write
22175ABC000
trusted library allocation
page read and write
22170A02000
heap
page read and write
22170069000
heap
page read and write
2217598E000
trusted library allocation
page read and write
221771BA000
heap
page read and write
22130CC6000
heap
page read and write
57D0000
trusted library allocation
page read and write
2AF76FF000
stack
page read and write
4EF0000
heap
page execute and read and write
221707B1000
trusted library allocation
page read and write
22177002000
heap
page read and write
5A01000
trusted library allocation
page execute and read and write
22175FAB000
heap
page read and write
22177065000
heap
page read and write
22177074000
heap
page read and write
512E000
trusted library allocation
page read and write
2216FF10000
heap
page read and write
C00000
unkown
page readonly
28C0000
heap
page read and write
22175E13000
heap
page read and write
22170BF1000
heap
page read and write
BE0000
trusted library allocation
page read and write
18A79C57000
heap
page read and write
E41F54E000
stack
page read and write
22175E2D000
heap
page read and write
261F1EE0000
heap
page read and write
1461000
trusted library allocation
page read and write
22175ABC000
trusted library allocation
page read and write
1F421F02000
heap
page read and write
FF6000
trusted library allocation
page execute and read and write
549B000
stack
page read and write
E41F97E000
stack
page read and write
22175952000
trusted library allocation
page read and write
221770A9000
heap
page read and write
22175940000
trusted library allocation
page read and write
22170815000
heap
page read and write
221709CD000
heap
page read and write
261EC460000
heap
page read and write
22170BC8000
heap
page read and write
2CBEDE58000
heap
page read and write
22175950000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
261ED5D0000
trusted library section
page readonly
55F527F000
stack
page read and write
BD4000
trusted library allocation
page read and write
261F1EF1000
heap
page read and write
4EE0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
22177157000
heap
page read and write
22175FAA000
heap
page read and write
289E000
stack
page read and write
AF9000
stack
page read and write
221771CB000
heap
page read and write
22170BD4000
heap
page read and write
2217712A000
heap
page read and write
18A79C52000
heap
page read and write
5100000
trusted library allocation
page read and write
1F421E51000
heap
page read and write
1F421E00000
heap
page read and write
22177103000
heap
page read and write
85B4B7E000
stack
page read and write
3327000
heap
page read and write
22175E61000
heap
page read and write
CFE000
stack
page read and write
A9E777E000
stack
page read and write
85B50FF000
stack
page read and write
261F1B30000
trusted library allocation
page read and write
B903E7D000
stack
page read and write
5CE887F000
stack
page read and write
221770D4000
heap
page read and write
A6B000
trusted library allocation
page read and write
221759E0000
trusted library allocation
page read and write
22177072000
heap
page read and write
22170BF0000
heap
page read and write
1AD55C02000
heap
page read and write
22175E43000
heap
page read and write
858EC7B000
stack
page read and write
1AD557A3000
heap
page read and write
22175E2F000
heap
page read and write
22177132000
heap
page read and write
22177090000
heap
page read and write
1AD55778000
heap
page read and write
22177087000
heap
page read and write
18A79C3C000
heap
page read and write
1AD54E86000
heap
page read and write
22175E2D000
heap
page read and write
22177044000
heap
page read and write
22177086000
heap
page read and write
221771A9000
heap
page read and write
1BD86402000
trusted library allocation
page read and write
2CBEDE44000
heap
page read and write
22175E3F000
heap
page read and write
A9E7C7E000
stack
page read and write
3E0000
heap
page read and write
22130CE4000
heap
page read and write
99155FF000
stack
page read and write
1AD54EFC000
heap
page read and write
2A6BBD80000
remote allocation
page read and write
22177100000
heap
page read and write
22175A90000
trusted library allocation
page read and write
5CE8A77000
stack
page read and write
4EB1000
trusted library allocation
page read and write
22175E26000
heap
page read and write
261F1C70000
trusted library allocation
page read and write
1AD55C44000
heap
page read and write
2AF817C000
stack
page read and write
261ED001000
trusted library allocation
page read and write
2850000
heap
page execute and read and write
25FB1040000
heap
page read and write
55F4F6A000
stack
page read and write
2A14000
trusted library allocation
page read and write
22175E62000
heap
page read and write
A63000
trusted library allocation
page read and write
221770CB000
heap
page read and write
2217714F000
heap
page read and write
2217593C000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
1AFDB85A000
heap
page read and write
858F47E000
stack
page read and write
22170094000
heap
page read and write
2217709E000
heap
page read and write
221771BB000
heap
page read and write
4F00000
trusted library allocation
page read and write
2AF7F7E000
stack
page read and write
1AD54F02000
heap
page read and write
1AD54E49000
heap
page read and write
57D0000
trusted library allocation
page read and write
2536BC02000
heap
page read and write
2217008B000
heap
page read and write
ADB000
trusted library allocation
page read and write
1AD557B1000
heap
page read and write
2A3E000
trusted library allocation
page read and write
22175B10000
trusted library allocation
page read and write
A9E757F000
stack
page read and write
22177003000
heap
page read and write
57D0000
trusted library allocation
page read and write
22175E2F000
heap
page read and write
1AD55C02000
heap
page read and write
22175F1D000
heap
page read and write
FD3000
trusted library allocation
page execute and read and write
C81000
heap
page read and write
1AD54E58000
heap
page read and write
22175F8A000
heap
page read and write
22170092000
heap
page read and write
6A7E000
stack
page read and write
1AD55C03000
heap
page read and write
22175945000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
2217716C000
heap
page read and write
34EF000
stack
page read and write
22175FE4000
heap
page read and write
261F1F00000
heap
page read and write
C40000
heap
page read and write
22177149000
heap
page read and write
22175E34000
heap
page read and write
22177086000
heap
page read and write
1BD85B70000
heap
page read and write
2217707D000
heap
page read and write
22175D80000
trusted library allocation
page read and write
261EC4D0000
heap
page read and write
1BD85D00000
heap
page read and write
221770D7000
heap
page read and write
5B00000
trusted library allocation
page read and write
2AF767E000
stack
page read and write
C8B000
heap
page read and write
858E877000
stack
page read and write
22170BD4000
heap
page read and write
22177002000
heap
page read and write
261F1A20000
trusted library allocation
page read and write
22177173000
heap
page read and write
261F1B70000
trusted library allocation
page read and write
22170802000
heap
page read and write
22177135000
heap
page read and write
A9E7B7E000
stack
page read and write
A00000
trusted library allocation
page read and write
261F1E62000
heap
page read and write
5F6E000
stack
page read and write
22177158000
heap
page read and write
5FED000
stack
page read and write
2A06000
trusted library allocation
page read and write
22175E2F000
heap
page read and write
4F12000
trusted library allocation
page read and write
22170B00000
heap
page read and write
85B4EF7000
stack
page read and write
2A50000
trusted library allocation
page read and write
1473000
trusted library allocation
page read and write
D6FF8FE000
stack
page read and write
57D0000
trusted library allocation
page execute and read and write
221709C8000
heap
page read and write
57E0000
trusted library allocation
page read and write
6D0000
unkown
page readonly
A9E767C000
stack
page read and write
261EC6A3000
heap
page read and write
1F422602000
trusted library allocation
page read and write
5163000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
22175E3C000
heap
page read and write
5B4F97E000
stack
page read and write
A29000
trusted library allocation
page read and write
22175E39000
heap
page read and write
5B4F47C000
stack
page read and write
E41FA7E000
stack
page read and write
AAD000
trusted library allocation
page read and write
22175948000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
1473000
trusted library allocation
page read and write
1101000
trusted library allocation
page read and write
261EC470000
heap
page read and write
2217091D000
heap
page read and write
56C5000
trusted library allocation
page read and write
1AD54EC9000
heap
page read and write
221771D4000
heap
page read and write
22177139000
heap
page read and write
22177065000
heap
page read and write
25FB1013000
heap
page read and write
22170BDB000
heap
page read and write
330E000
stack
page read and write
B903AFE000
stack
page read and write
2217700F000
heap
page read and write
1AD54E00000
heap
page read and write
22175E38000
heap
page read and write
22170BD8000
heap
page read and write
22175FE4000
heap
page read and write
22177022000
heap
page read and write
22177074000
heap
page read and write
2217715A000
heap
page read and write
C07000
trusted library allocation
page execute and read and write
22175E37000
heap
page read and write
2A2C000
trusted library allocation
page read and write
18A79C70000
heap
page read and write
5B39000
trusted library allocation
page read and write
261F1B74000
trusted library allocation
page read and write
C93000
heap
page read and write
C0B000
trusted library allocation
page execute and read and write
221770DE000
heap
page read and write
4F92000
trusted library allocation
page read and write
22170BD9000
heap
page read and write
31A0000
heap
page read and write
22177088000
heap
page read and write
539F000
stack
page read and write
1F421DD0000
trusted library allocation
page read and write
22171770000
trusted library section
page readonly
AE5000
trusted library allocation
page read and write
22175F64000
heap
page read and write
22130C70000
heap
page read and write
1AD5577F000
heap
page read and write
4F05000
trusted library allocation
page read and write
261ED5C0000
trusted library section
page readonly
22175B40000
trusted library allocation
page read and write
22175945000
trusted library allocation
page read and write
858E67B000
stack
page read and write
22130CC7000
heap
page read and write
2CBEDE60000
heap
page read and write
261F1C90000
remote allocation
page read and write
56A4000
trusted library allocation
page read and write
22177102000
heap
page read and write
85B4DFB000
stack
page read and write
2217595A000
trusted library allocation
page read and write
578E000
stack
page read and write
2A6BBE29000
heap
page read and write
18A79C55000
heap
page read and write
5801000
trusted library allocation
page read and write
1AD5577D000
heap
page read and write
51E6000
trusted library allocation
page read and write
3ABB87F000
stack
page read and write
4ECC000
trusted library allocation
page read and write
22175FD2000
heap
page read and write
22177065000
heap
page read and write
261F1EA3000
heap
page read and write
16FE000
stack
page read and write
5750000
trusted library allocation
page read and write
22175FD8000
heap
page read and write
22175F34000
heap
page read and write
67FD000
stack
page read and write
22170BF3000
heap
page read and write
1BD85C02000
heap
page read and write
1AD55795000
heap
page read and write
22175FF3000
heap
page read and write
B903BFF000
stack
page read and write
25FB1802000
heap
page read and write
2CBEDE65000
heap
page read and write
22175F34000
heap
page read and write
A50000
trusted library allocation
page read and write
2217704F000
heap
page read and write
39A1000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
270BF680000
heap
page read and write
2CBEDE00000
heap
page read and write
22170B64000
heap
page read and write
3095000
heap
page read and write
22175FF2000
heap
page read and write
1F421E02000
heap
page read and write
2217710A000
heap
page read and write
2536BC00000
heap
page read and write
2217700B000
heap
page read and write
940B9FE000
stack
page read and write
25FB0F90000
heap
page read and write
25FB1029000
heap
page read and write
22177086000
heap
page read and write
22175E26000
heap
page read and write
1AD54E4D000
heap
page read and write
A95000
trusted library allocation
page read and write
22175E62000
heap
page read and write
261ECE00000
heap
page read and write
4F20000
trusted library allocation
page read and write
1AD55778000
heap
page read and write
1436000
trusted library allocation
page read and write
221771D4000
heap
page read and write
AAF000
trusted library allocation
page read and write
22170A58000
heap
page read and write
22177137000
heap
page read and write
3A95000
trusted library allocation
page read and write
858EDFF000
stack
page read and write
118E000
stack
page read and write
1AD54CF0000
heap
page read and write
2A6BBBF0000
heap
page read and write
22177081000
heap
page read and write
57E0000
trusted library allocation
page read and write
2AF7D75000
stack
page read and write
1AD54E48000
heap
page read and write
2217705C000
heap
page read and write
22175E2F000
heap
page read and write
22177065000
heap
page read and write
B12000
trusted library allocation
page read and write
22175E26000
heap
page read and write
1496000
trusted library allocation
page read and write
221701C2000
heap
page read and write
18A79C4E000
heap
page read and write
4F20000
trusted library allocation
page read and write
261F1A10000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
C20000
heap
page read and write
18A79C58000
heap
page read and write
2CBEDE7A000
heap
page read and write
22175AB0000
trusted library allocation
page read and write
2217701A000
heap
page read and write
1AD54EED000
heap
page read and write
22177002000
heap
page read and write
22177065000
heap
page read and write
261ECE15000
heap
page read and write
4F12000
trusted library allocation
page read and write
4F20000
remote allocation
page read and write
221707D0000
trusted library allocation
page read and write
1BD85C26000
heap
page read and write
221770E0000
heap
page read and write
2A6BBE3D000
heap
page read and write
22177002000
heap
page read and write
22177127000
heap
page read and write
221717A0000
trusted library section
page readonly
22175E2F000
heap
page read and write
99154FC000
stack
page read and write
2536BC45000
heap
page read and write
22175E2F000
heap
page read and write
4A7D000
stack
page read and write
5CE8B7C000
stack
page read and write
22130CE5000
heap
page read and write
22177099000
heap
page read and write
DA9000
stack
page read and write
22170B98000
heap
page read and write
270BF902000
heap
page read and write
22170670000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
270BF7F0000
trusted library allocation
page read and write
AA7000
trusted library allocation
page read and write
1AD5577D000
heap
page read and write
2AF7E7E000
stack
page read and write
A2F000
trusted library allocation
page read and write
22170B45000
heap
page read and write
261EC69B000
heap
page read and write
22175ABC000
trusted library allocation
page read and write
221771AE000
heap
page read and write
99156F9000
stack
page read and write
1AD54EB3000
heap
page read and write
22175E62000
heap
page read and write
551E000
stack
page read and write
22177086000
heap
page read and write
11D0000
trusted library allocation
page read and write
22175F33000
heap
page read and write
22175F33000
heap
page read and write
B3E000
stack
page read and write
22175E69000
heap
page read and write
31BB000
trusted library allocation
page execute and read and write
11E4000
trusted library allocation
page read and write
22170BDA000
heap
page read and write
22175F90000
heap
page read and write
2A60000
heap
page execute and read and write
22130CC2000
heap
page read and write
57D0000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
22170086000
heap
page read and write
57E0000
trusted library allocation
page read and write
22175FFE000
heap
page read and write
2AF757B000
stack
page read and write
32B0000
trusted library allocation
page read and write
22130CAB000
heap
page read and write
22177171000
heap
page read and write
2EEC000
stack
page read and write
5B14000
trusted library allocation
page read and write
1AD5578B000
heap
page read and write
4F88000
trusted library allocation
page read and write
5CE8C7E000
stack
page read and write
31B0000
trusted library allocation
page read and write
221709AD000
heap
page read and write
22175940000
trusted library allocation
page read and write
1BD85BE0000
heap
page read and write
221771B4000
heap
page read and write
32C1000
trusted library allocation
page read and write
22177125000
heap
page read and write
33E6000
heap
page read and write
22177018000
heap
page read and write
22175AA0000
trusted library allocation
page read and write
261F1C50000
trusted library allocation
page read and write
85B4AFE000
stack
page read and write
1AD5577B000
heap
page read and write
22175F33000
heap
page read and write
2CBEDF02000
heap
page read and write
1040000
trusted library allocation
page execute and read and write
AAA000
trusted library allocation
page read and write
22175FAA000
heap
page read and write
22170BC8000
heap
page read and write
31A0000
trusted library allocation
page read and write
1AD55789000
heap
page read and write
A74000
trusted library allocation
page read and write
2217595E000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
22177005000
heap
page read and write
261F1E15000
heap
page read and write
22170926000
heap
page read and write
1801000
trusted library allocation
page read and write
22170BDB000
heap
page read and write
22175AA0000
trusted library allocation
page read and write
22175C00000
remote allocation
page read and write
22177192000
heap
page read and write
2AF79FF000
stack
page read and write
3ABB777000
stack
page read and write
22175FAA000
heap
page read and write
2217715D000
heap
page read and write
AC9000
trusted library allocation
page read and write
FE8000
trusted library allocation
page read and write
940B37C000
stack
page read and write
22170B60000
heap
page read and write
57D0000
trusted library allocation
page read and write
1AD54C80000
heap
page read and write
29F6000
trusted library allocation
page read and write
14BF000
trusted library allocation
page read and write
261EC658000
heap
page read and write
1AD54E4E000
heap
page read and write
22175FD1000
heap
page read and write
5809000
trusted library allocation
page read and write
22175E53000
heap
page read and write
1F421E13000
heap
page read and write
2217717F000
heap
page read and write
22170079000
heap
page read and write
270BF813000
heap
page read and write
1AD55790000
heap
page read and write
270BF86F000
heap
page read and write
CC1000
heap
page read and write
270BF800000
heap
page read and write
2AF6D2E000
stack
page read and write
22177117000
heap
page read and write
22177044000
heap
page read and write
22175FF6000
heap
page read and write
2CBEE602000
trusted library allocation
page read and write
2CBEDE41000
heap
page read and write
22130CE0000
heap
page read and write
22175E38000
heap
page read and write
2F8E000
stack
page read and write
2A28000
trusted library allocation
page read and write
1AD55753000
heap
page read and write
2CBEDE6C000
heap
page read and write
1AFDB802000
heap
page read and write
261ECF18000
heap
page read and write
370000
heap
page read and write
22177095000
heap
page read and write
22175958000
trusted library allocation
page read and write
22175FD1000
heap
page read and write
270BF841000
heap
page read and write
2DCE000
stack
page read and write
1AD55773000
heap
page read and write
506E000
stack
page read and write
2A2D000
stack
page read and write
22177033000
heap
page read and write
22175E2F000
heap
page read and write
1AD54E55000
heap
page read and write
11F0000
trusted library allocation
page read and write
22175FAA000
heap
page read and write
58A0000
trusted library allocation
page read and write
22177118000
heap
page read and write
22175E2D000
heap
page read and write
2A71000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
2217707F000
heap
page read and write
57F0000
trusted library allocation
page read and write
22177108000
heap
page read and write
4F88000
trusted library allocation
page read and write
22170000000
heap
page read and write
1AD54E47000
heap
page read and write
2A30000
trusted library allocation
page read and write
D6FF87E000
stack
page read and write
22175E34000
heap
page read and write
22177086000
heap
page read and write
261ED961000
trusted library allocation
page read and write
ADB000
trusted library allocation
page read and write
22177002000
heap
page read and write
22177065000
heap
page read and write
22175E69000
heap
page read and write
1F421E7F000
heap
page read and write
22175F45000
heap
page read and write
22177002000
heap
page read and write
22170BDB000
heap
page read and write
555D000
stack
page read and write
514D000
heap
page read and write
5B5D000
stack
page read and write
5869000
trusted library allocation
page read and write
22170068000
heap
page read and write
22170BA9000
heap
page read and write
57D0000
trusted library allocation
page read and write
D6FFD7F000
stack
page read and write
22177002000
heap
page read and write
22175F04000
heap
page read and write
1484000
trusted library allocation
page read and write
1AD5579D000
heap
page read and write
4EB8000
trusted library allocation
page read and write
22170BD4000
heap
page read and write
2AF77FF000
stack
page read and write
CA5000
heap
page read and write
221770E4000
heap
page read and write
22175F33000
heap
page read and write
31B7000
trusted library allocation
page execute and read and write
3ABB47E000
stack
page read and write
AD7000
trusted library allocation
page read and write
29D8000
trusted library allocation
page read and write
270BF802000
heap
page read and write
270BF6F0000
heap
page read and write
4F12000
trusted library allocation
page read and write
3060000
heap
page read and write
22177086000
heap
page read and write
2CBEDE42000
heap
page read and write
2AF72FB000
stack
page read and write
1400000
trusted library allocation
page read and write
22175E69000
heap
page read and write
1AD5578B000
heap
page read and write
2A1C000
trusted library allocation
page read and write
1AD54E70000
heap
page read and write
22130CB6000
heap
page read and write
22175940000
trusted library allocation
page read and write
1AD54F16000
heap
page read and write
1472000
trusted library allocation
page read and write
22170BCA000
heap
page read and write
4F5E000
stack
page read and write
1AFDB868000
heap
page read and write
22175E2F000
heap
page read and write
55F53FE000
stack
page read and write
4EB0000
trusted library allocation
page read and write
22170013000
heap
page read and write
A63000
trusted library allocation
page read and write
221770EB000
heap
page read and write
22177117000
heap
page read and write
940B7FB000
stack
page read and write
57D0000
trusted library allocation
page read and write
3DE000
stack
page read and write
22175E4F000
heap
page read and write
5CAD000
stack
page read and write
2A6BBC50000
heap
page read and write
22175AA0000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
22175BC0000
trusted library allocation
page read and write
22170BD8000
heap
page read and write
57D0000
trusted library allocation
page read and write
4ECC000
trusted library allocation
page read and write
2A6BBE02000
heap
page read and write
29E0000
trusted library allocation
page read and write
14FE000
trusted library allocation
page read and write
C86000
heap
page read and write
22170BD5000
heap
page read and write
1AD54F08000
heap
page read and write
1AD54E4A000
heap
page read and write
2217595C000
trusted library allocation
page read and write
221770D8000
heap
page read and write
A9E7A7E000
stack
page read and write
22170090000
heap
page read and write
29DE000
trusted library allocation
page read and write
22175952000
trusted library allocation
page read and write
261F1C40000
trusted library allocation
page read and write
221759A5000
trusted library allocation
page read and write
221709CB000
heap
page read and write
22175AB4000
trusted library allocation
page read and write
2217704D000
heap
page read and write
22177182000
heap
page read and write
CA1000
heap
page read and write
18A79C88000
heap
page read and write
5750000
trusted library allocation
page read and write
2CBEDE75000
heap
page read and write
261F1C90000
trusted library allocation
page read and write
11ED000
trusted library allocation
page execute and read and write
2217704B000
heap
page read and write
B70000
heap
page read and write
4F90000
trusted library allocation
page read and write
1AD55C02000
heap
page read and write
E3E000
stack
page read and write
22175E69000
heap
page read and write
55A0000
heap
page read and write
22175F55000
heap
page read and write
AC2000
trusted library allocation
page read and write
22175FC8000
heap
page read and write
1AD5578F000
heap
page read and write
261F1EF7000
heap
page read and write
22170BF1000
heap
page read and write
B903D7E000
stack
page read and write
22177002000
heap
page read and write
22175F00000
heap
page read and write
A90000
heap
page read and write
149A000
trusted library allocation
page read and write
22175FE4000
heap
page read and write
221770FF000
heap
page read and write
1F421E66000
heap
page read and write
22130B40000
heap
page read and write
5B01000
trusted library allocation
page read and write
C10000
unkown
page readonly
99150BC000
stack
page read and write
2217706A000
heap
page read and write
5DEE000
stack
page read and write
57D0000
trusted library allocation
page read and write
22177003000
heap
page read and write
11E3000
trusted library allocation
page execute and read and write
ADC000
trusted library allocation
page read and write
EEF000
stack
page read and write
22177091000
heap
page read and write
2217702B000
heap
page read and write
18A7A402000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
261F1E8A000
heap
page read and write
4EE0000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
22130CC4000
heap
page read and write
261EC600000
heap
page read and write
221717B0000
trusted library allocation
page read and write
22177177000
heap
page read and write
2A6BBE58000
heap
page read and write
22175E2C000
heap
page read and write
221770BA000
heap
page read and write
22177063000
heap
page read and write
25FB1113000
heap
page read and write
22177099000
heap
page read and write
858F17A000
stack
page read and write
22130DA0000
heap
page read and write
5890000
heap
page execute and read and write
22175E61000
heap
page read and write
270BF690000
heap
page read and write
2CBEDDB0000
heap
page read and write
25FB10BB000
heap
page read and write
2A6BC602000
trusted library allocation
page read and write
22175E69000
heap
page read and write
1AD55C21000
heap
page read and write
22175948000
trusted library allocation
page read and write
261F19A0000
trusted library allocation
page read and write
A7C000
trusted library allocation
page read and write
22177002000
heap
page read and write
2CBEDE47000
heap
page read and write
270BF829000
heap
page read and write
22177185000
heap
page read and write
221709C4000
heap
page read and write
1AD55757000
heap
page read and write
2216FEA0000
heap
page read and write
22177086000
heap
page read and write
ADE000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
22170A00000
heap
page read and write
22175E55000
heap
page read and write
22177002000
heap
page read and write
22175E34000
heap
page read and write
221770E9000
heap
page read and write
22175E26000
heap
page read and write
1F421E3C000
heap
page read and write
1050000
trusted library allocation
page read and write
4F12000
trusted library allocation
page read and write
C55000
heap
page read and write
AB8000
trusted library allocation
page read and write
14B7000
trusted library allocation
page read and write
A68000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
2AF7C7D000
stack
page read and write
22177065000
heap
page read and write
4ED4000
trusted library allocation
page read and write
2AF797F000
stack
page read and write
22177086000
heap
page read and write
22175E26000
heap
page read and write
1901000
trusted library allocation
page read and write
5F2D000
stack
page read and write
22177005000
heap
page read and write
22175E55000
heap
page read and write
22175FAA000
heap
page read and write
2CBEDE7B000
heap
page read and write
18A79C29000
heap
page read and write
22175E38000
heap
page read and write
4F30000
trusted library allocation
page read and write
221707F0000
trusted library allocation
page read and write
5131000
heap
page read and write
2217716B000
heap
page read and write
1AD557D1000
heap
page read and write
1AFDB650000
heap
page read and write
22175F33000
heap
page read and write
22175AB0000
trusted library allocation
page read and write
2217707D000
heap
page read and write
221770C6000
heap
page read and write
22175E26000
heap
page read and write
22177002000
heap
page read and write
1AD54EB0000
heap
page read and write
22175E5C000
heap
page read and write
22177009000
heap
page read and write
22175AB4000
trusted library allocation
page read and write
22177168000
heap
page read and write
31D0000
trusted library allocation
page read and write
22170113000
heap
page read and write
2217707B000
heap
page read and write
5138000
trusted library allocation
page read and write
22175F90000
heap
page read and write
4EDF000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
22175E2F000
heap
page read and write
2CBEDE31000
heap
page read and write
22170B43000
heap
page read and write
4F9D000
stack
page read and write
22175FD2000
heap
page read and write
22177034000
heap
page read and write
22177195000
heap
page read and write
22175958000
trusted library allocation
page read and write
22177097000
heap
page read and write
57E0000
trusted library allocation
page read and write
22175A90000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
28E0000
heap
page read and write
22175FAF000
heap
page read and write
18A79C48000
heap
page read and write
22170BF0000
heap
page read and write
C10000
unkown
page readonly
221709B0000
heap
page read and write
4F92000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
940B2FF000
stack
page read and write
2217018E000
heap
page read and write
D6FFAFB000
stack
page read and write
221770DA000
heap
page read and write
261EC689000
heap
page read and write
22175810000
trusted library allocation
page read and write
221770A1000
heap
page read and write
22177147000
heap
page read and write
858EB7E000
stack
page read and write
221701EB000
heap
page read and write
5101000
trusted library allocation
page read and write
22130F90000
heap
page read and write
22175AA0000
trusted library allocation
page read and write
559E000
stack
page read and write
22177002000
heap
page read and write
2217709C000
heap
page read and write
5FAD000
stack
page read and write
22130CDF000
heap
page read and write
22177100000
heap
page read and write
1AD54EC2000
heap
page read and write
299F000
stack
page read and write
261F1EE6000
heap
page read and write
2217701F000
heap
page read and write
58A0000
trusted library allocation
page read and write
49A8000
trusted library allocation
page read and write
2217598E000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
22175E61000
heap
page read and write
147A000
trusted library allocation
page read and write
25FB1102000
heap
page read and write
261F1B38000
trusted library allocation
page read and write
1AD54E56000
heap
page read and write
22175E69000
heap
page read and write
1020000
heap
page read and write
22175FCD000
heap
page read and write
4ECF000
trusted library allocation
page read and write
22170BF4000
heap
page read and write
FDD000
trusted library allocation
page execute and read and write
1AFDB87B000
heap
page read and write
221759A5000
trusted library allocation
page read and write
A3A000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
25FB1000000
heap
page read and write
22177066000
heap
page read and write
261F1C90000
remote allocation
page read and write
22171480000
trusted library allocation
page read and write
22175F33000
heap
page read and write
1AD5577B000
heap
page read and write
22170053000
heap
page read and write
4EC0000
trusted library allocation
page execute and read and write
303E000
stack
page read and write
4F92000
trusted library allocation
page read and write
4F12000
trusted library allocation
page read and write
2CBEDE5C000
heap
page read and write
22175FC5000
heap
page read and write
B60000
trusted library allocation
page read and write
22175950000
trusted library allocation
page read and write
C00000
unkown
page readonly
1AD55602000
heap
page read and write
57E0000
trusted library allocation
page read and write
1BD85C58000
heap
page read and write
5B4F77B000
stack
page read and write
1202000
heap
page read and write
31A7000
trusted library allocation
page execute and read and write
22175BE0000
trusted library allocation
page read and write
51DA000
trusted library allocation
page read and write
18A79D02000
heap
page read and write
2217594E000
trusted library allocation
page read and write
22175E69000
heap
page read and write
22175E48000
heap
page read and write
57F0000
trusted library allocation
page read and write
2CBEDE74000
heap
page read and write
572E000
stack
page read and write
22170BD8000
heap
page read and write
22130CE1000
heap
page read and write
221770D7000
heap
page read and write
2CBEDE3A000
heap
page read and write
22170BD4000
heap
page read and write
BFA000
trusted library allocation
page execute and read and write
4F96000
trusted library allocation
page read and write
30C000
stack
page read and write
22175950000
trusted library allocation
page read and write
14FA000
trusted library allocation
page read and write
5001000
trusted library allocation
page execute and read and write
22171780000
trusted library section
page readonly
22130CDF000
heap
page read and write
22175F19000
heap
page read and write
270C0002000
trusted library allocation
page read and write
AFD000
stack
page read and write
22175F28000
heap
page read and write
221770FF000
heap
page read and write
22177065000
heap
page read and write
57A0000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
261F1E4A000
heap
page read and write
5750000
trusted library allocation
page read and write
18A79D13000
heap
page read and write
33E6000
heap
page read and write
1412000
trusted library allocation
page read and write
1AD55789000
heap
page read and write
5CE897B000
stack
page read and write
2CBEDE3B000
heap
page read and write
1060000
heap
page read and write
22175E2D000
heap
page read and write
22170BDA000
heap
page read and write
4F92000
trusted library allocation
page read and write
1F421E76000
heap
page read and write
C93000
heap
page read and write
57A0000
trusted library allocation
page read and write
221770FF000
heap
page read and write
22175E34000
heap
page read and write
142E000
trusted library allocation
page read and write
1F421E89000
heap
page read and write
261F1C00000
trusted library allocation
page read and write
22175F6C000
heap
page read and write
1AD5578B000
heap
page read and write
1AD557A1000
heap
page read and write
1AD5577B000
heap
page read and write
221770FF000
heap
page read and write
25FB0FC0000
trusted library allocation
page read and write
390000
heap
page read and write
2817000
trusted library allocation
page execute and read and write
940B57C000
stack
page read and write
22177020000
heap
page read and write
A8A000
trusted library allocation
page read and write
22175E10000
heap
page read and write
22175E2D000
heap
page read and write
22177013000
heap
page read and write
1AFDB750000
trusted library allocation
page read and write
2A38000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
1AD54EEC000
heap
page read and write
4F00000
trusted library allocation
page read and write
22177055000
heap
page read and write
22175E5B000
heap
page read and write
2536BC4A000
heap
page read and write
CAD000
stack
page read and write
2217706C000
heap
page read and write
BF7000
trusted library allocation
page execute and read and write
1BD85D13000
heap
page read and write
4ECC000
trusted library allocation
page read and write
940B77D000
stack
page read and write
22175FAE000
heap
page read and write
1AD54EE9000
heap
page read and write
4F12000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
2536BC3D000
heap
page read and write
57AF000
stack
page read and write
22175FAD000
heap
page read and write
22175AB0000
trusted library allocation
page read and write
22177045000
heap
page read and write
22175E26000
heap
page read and write
1AD55C00000
heap
page read and write
2CBEDE40000
heap
page read and write
1AFDB828000
heap
page read and write
4F12000
trusted library allocation
page read and write
221770DC000
heap
page read and write
1AD54DF0000
trusted library allocation
page read and write
221770FF000
heap
page read and write
1AFDB800000
heap
page read and write
858F27D000
stack
page read and write
1AD55C21000
heap
page read and write
22175B90000
trusted library allocation
page read and write
22170BCA000
heap
page read and write
261F1E88000
heap
page read and write
1F421DA0000
heap
page read and write
2217005B000
heap
page read and write
1AD55C02000
heap
page read and write
22175ABC000
trusted library allocation
page read and write
2536BC29000
heap
page read and write
2536BBA0000
trusted library allocation
page read and write
22175FD1000
heap
page read and write
1AD54E50000
heap
page read and write
14B2000
trusted library allocation
page read and write
2CBEDE13000
heap
page read and write
22177067000
heap
page read and write
22175954000
trusted library allocation
page read and write
4CC0000
heap
page read and write
22177076000
heap
page read and write
2217595E000
trusted library allocation
page read and write
1AD55773000
heap
page read and write
144F000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
2217700D000
heap
page read and write
4ED4000
trusted library allocation
page read and write
A9E7D7F000
stack
page read and write
5900000
trusted library allocation
page read and write
22177009000
heap
page read and write
261ED5F0000
trusted library section
page readonly
22170BDA000
heap
page read and write
1BD86340000
trusted library allocation
page read and write
261EC656000
heap
page read and write
261EC629000
heap
page read and write
5801000
trusted library allocation
page read and write
221771D4000
heap
page read and write
2CBEDE83000
heap
page read and write
22175FA1000
heap
page read and write
22177002000
heap
page read and write
55F52F8000
stack
page read and write
B9035FB000
stack
page read and write
221770FF000
heap
page read and write
A9E7E7E000
stack
page read and write
1AD55777000
heap
page read and write
1AD557AD000
heap
page read and write
68FE000
stack
page read and write
22170BE0000
heap
page read and write
1F421D40000
heap
page read and write
4EE0000
trusted library allocation
page read and write
1BD85C4D000
heap
page read and write
1F421E5E000
heap
page read and write
2A6BBD50000
trusted library allocation
page read and write
5131000
heap
page read and write
A62000
trusted library allocation
page read and write
C00000
unkown
page readonly
1001000
trusted library allocation
page read and write
261ECF13000
heap
page read and write
3ABAFFB000
stack
page read and write
858ED7F000
stack
page read and write
261F1C60000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
22175F55000
heap
page read and write
221770B3000
heap
page read and write
114E000
stack
page read and write
2217702E000
heap
page read and write
1AD55C02000
heap
page read and write
141D000
trusted library allocation
page read and write
2217713C000
heap
page read and write
22175FE0000
heap
page read and write
22170BD8000
heap
page read and write
22177000000
heap
page read and write
22175E26000
heap
page read and write
22175F13000
heap
page read and write
C98000
heap
page read and write
1AD55C02000
heap
page read and write
4EB8000
trusted library allocation
page read and write
1AD54F13000
heap
page read and write
2DE0000
trusted library allocation
page read and write
2A0000
heap
page read and write
28B0000
trusted library allocation
page read and write
22175E56000
heap
page read and write
1AD54E13000
heap
page read and write
2CBEDE29000
heap
page read and write
22171200000
trusted library allocation
page read and write
22177016000
heap
page read and write
A1E000
trusted library allocation
page read and write
3ABB57A000
stack
page read and write
2536C402000
trusted library allocation
page read and write
148D000
trusted library allocation
page read and write
22171750000
trusted library section
page readonly
261ED4E0000
trusted library allocation
page read and write
3ABBAFF000
stack
page read and write
1AD54E57000
heap
page read and write
22170B96000
heap
page read and write
1AD5578B000
heap
page read and write
1AD54EA9000
heap
page read and write
22175E34000
heap
page read and write
C10000
unkown
page readonly
858F07F000
stack
page read and write
22177020000
heap
page read and write
22177142000
heap
page read and write
22170043000
heap
page read and write
2217598A000
trusted library allocation
page read and write
1AD55784000
heap
page read and write
2CBEDE57000
heap
page read and write
22175B80000
trusted library allocation
page read and write
22175E26000
heap
page read and write
18A79D00000
heap
page read and write
22175FFE000
heap
page read and write
22175C40000
remote allocation
page read and write
22175ABC000
trusted library allocation
page read and write
22177098000
heap
page read and write
18A79C4C000
heap
page read and write
BC0000
heap
page read and write
5FF0000
trusted library allocation
page read and write
270BF855000
heap
page read and write
261F1EFD000
heap
page read and write
55F537C000
stack
page read and write
22175960000
trusted library allocation
page read and write
4FDD000
stack
page read and write
261F1F03000
heap
page read and write
2CBEDE77000
heap
page read and write
1AD54E3C000
heap
page read and write
2217714B000
heap
page read and write
261EC713000
heap
page read and write
5115000
trusted library allocation
page read and write
261EC673000
heap
page read and write
323E000
stack
page read and write
65FD000
stack
page read and write
E41FC7E000
stack
page read and write
22175E69000
heap
page read and write
261EC5D0000
trusted library allocation
page read and write
858E97B000
stack
page read and write
2217096F000
heap
page read and write
14EF000
trusted library allocation
page read and write
261EC702000
heap
page read and write
261ED610000
trusted library section
page readonly
3ABB677000
stack
page read and write
2AF78FA000
stack
page read and write
22130CE4000
heap
page read and write
1AD557A0000
heap
page read and write
2217700F000
heap
page read and write
1BD85C90000
heap
page read and write
2CBEDE5A000
heap
page read and write
4F92000
trusted library allocation
page read and write
2CBEDE4E000
heap
page read and write
AD6000
trusted library allocation
page read and write
261F1B60000
trusted library allocation
page read and write
22177065000
heap
page read and write
940BAFC000
stack
page read and write
858ECFE000
stack
page read and write
22175E2F000
heap
page read and write
2C80000
unkown
page read and write
22177053000
heap
page read and write
28B0000
trusted library allocation
page read and write
22177002000
heap
page read and write
BF2000
trusted library allocation
page read and write
2840000
heap
page read and write
33E0000
heap
page read and write
6B7E000
stack
page read and write
56B4000
trusted library allocation
page read and write
22175E58000
heap
page read and write
270BF87E000
heap
page read and write
22175E34000
heap
page read and write
2A34000
trusted library allocation
page read and write
5CE8D7F000
stack
page read and write
858EA79000
stack
page read and write
22177146000
heap
page read and write
18A79C00000
heap
page read and write
2A6BBD80000
remote allocation
page read and write
1BD85C8A000
heap
page read and write
1100000
heap
page read and write
5B4F87E000
stack
page read and write
221759C0000
trusted library allocation
page read and write
22177084000
heap
page read and write
18A79C8E000
heap
page read and write
1AFDC002000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
22175FFD000
heap
page read and write
3A71000
trusted library allocation
page read and write
2CBEDE63000
heap
page read and write
1AD5578E000
heap
page read and write
2536BC53000
heap
page read and write
1AD55510000
remote allocation
page read and write
1AD55777000
heap
page read and write
22175954000
trusted library allocation
page read and write
22175E2F000
heap
page read and write
2A6BBF02000
heap
page read and write
5860000
trusted library allocation
page execute and read and write
221770E8000
heap
page read and write
1BD85C71000
heap
page read and write
22175E2F000
heap
page read and write
57D0000
trusted library allocation
page read and write
4F20000
remote allocation
page read and write
B90397E000
stack
page read and write
2DD0000
trusted library allocation
page read and write
693E000
stack
page read and write
22170954000
heap
page read and write
1BD85C39000
heap
page read and write
22171670000
trusted library allocation
page read and write
2536BB10000
heap
page read and write
261EC641000
heap
page read and write
2FD0000
trusted library allocation
page read and write
A9E797D000
stack
page read and write
1486000
trusted library allocation
page read and write
3095000
heap
page read and write
5880000
trusted library allocation
page read and write
2217702B000
heap
page read and write
261EC613000
heap
page read and write
22175FF9000
heap
page read and write
940BBFF000
stack
page read and write
1AD5577F000
heap
page read and write
22175E34000
heap
page read and write
2217717C000
heap
page read and write
77C000
stack
page read and write
1F421D30000
heap
page read and write
57D0000
trusted library allocation
page read and write
261ECF18000
heap
page read and write
3086000
heap
page read and write
5133000
trusted library allocation
page read and write
1012000
trusted library allocation
page read and write
5CE87FC000
stack
page read and write
22175920000
trusted library allocation
page read and write
22177065000
heap
page read and write
22130CD0000
heap
page read and write
22175FF4000
heap
page read and write
22177041000
heap
page read and write
22170B54000
heap
page read and write
7FD50000
trusted library allocation
page execute and read and write
2CBEDD50000
heap
page read and write
2CBEDE3D000
heap
page read and write
261F1B30000
trusted library allocation
page read and write
1AD54E4B000
heap
page read and write
22177049000
heap
page read and write
1AFDB5F0000
heap
page read and write
22175FCA000
heap
page read and write
18A79C53000
heap
page read and write
261F1B3E000
trusted library allocation
page read and write
25FB10C3000
heap
page read and write
2217705F000
heap
page read and write
22175E3C000
heap
page read and write
22170900000
heap
page read and write
22175F34000
heap
page read and write
22170BD4000
heap
page read and write
22175FC5000
heap
page read and write
1F421E76000
heap
page read and write
22170BBE000
heap
page read and write
1AD54E29000
heap
page read and write
C96000
heap
page read and write
4EB8000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
2AF7A7E000
stack
page read and write
22130CB6000
heap
page read and write
5CE867E000
stack
page read and write
51E6000
trusted library allocation
page read and write
AF5000
trusted library allocation
page read and write
18A79C13000
heap
page read and write
2AF747A000
stack
page read and write
D6FFC77000
stack
page read and write
22175F33000
heap
page read and write
22177124000
heap
page read and write
2536BC2E000
heap
page read and write
22170BE0000
heap
page read and write
18A79C7E000
heap
page read and write
2A6BBD80000
remote allocation
page read and write
261ECE02000
heap
page read and write
1AD54E51000
heap
page read and write
1489000
trusted library allocation
page read and write
261F1C90000
remote allocation
page read and write
2217595C000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
333E000
stack
page read and write
A9E747A000
stack
page read and write
22175E38000
heap
page read and write
22175E2D000
heap
page read and write
22175FE4000
heap
page read and write
22177153000
heap
page read and write
FFA000
trusted library allocation
page execute and read and write
541D000
stack
page read and write
1AD55700000
heap
page read and write
261F1E2C000
heap
page read and write
221771AC000
heap
page read and write
710000
heap
page read and write
261F1E3D000
heap
page read and write
18A79B10000
heap
page read and write
1BD85C80000
heap
page read and write
2217705A000
heap
page read and write
14E9000
trusted library allocation
page read and write
22175F33000
heap
page read and write
22175FD1000
heap
page read and write
4F92000
trusted library allocation
page read and write
22175E4D000
heap
page read and write
1AFDB902000
heap
page read and write
2217705C000
heap
page read and write
2217091D000
heap
page read and write
2216FEB0000
heap
page read and write
22170BDC000
heap
page read and write
22177030000
heap
page read and write
22177190000
heap
page read and write
858EFFE000
stack
page read and write
1AD55C19000
heap
page read and write
22175E61000
heap
page read and write
1BD85C3C000
heap
page read and write
22175FFB000
heap
page read and write
22177151000
heap
page read and write
22175940000
trusted library allocation
page read and write
22175E2D000
heap
page read and write
22175E26000
heap
page read and write
221771B2000
heap
page read and write
22170B8D000
heap
page read and write
22175FE4000
heap
page read and write
3085000
heap
page read and write
B903F7D000
stack
page read and write
22175C80000
trusted library allocation
page read and write
1F421E5B000
heap
page read and write
22170A0A000
heap
page read and write
261EC5E0000
trusted library section
page read and write
2AF71FE000
stack
page read and write
1AD55779000
heap
page read and write
22170BAC000
heap
page read and write
51F1000
trusted library allocation
page read and write
22175E34000
heap
page read and write
2217709F000
heap
page read and write
22175F3F000
heap
page read and write
7F0000
trusted library allocation
page read and write
22130CDF000
heap
page read and write
2812000
trusted library allocation
page read and write
4ECC000
trusted library allocation
page read and write
2FCE000
stack
page read and write
57D0000
trusted library allocation
page read and write
22177018000
heap
page read and write
57D0000
trusted library allocation
page read and write
261EC676000
heap
page read and write
5CE83DC000
stack
page read and write
51DA000
trusted library allocation
page read and write
1AD557A6000
heap
page read and write
22175AF0000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
1AFDB863000
heap
page read and write
55F4FEE000
stack
page read and write
221707E0000
trusted library allocation
page read and write
22170B77000
heap
page read and write
22170BD6000
heap
page read and write
1AD557A6000
heap
page read and write
22170BD4000
heap
page read and write
2CBEDE26000
heap
page read and write
5131000
heap
page read and write
5160000
trusted library allocation
page read and write
1501000
trusted library allocation
page read and write
2217710B000
heap
page read and write
4EB8000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
22175800000
trusted library allocation
page read and write
A9E000
trusted library allocation
page read and write
2217701F000
heap
page read and write
57E0000
trusted library allocation
page read and write
22175E34000
heap
page read and write
18A79AA0000
heap
page read and write
57E0000
trusted library allocation
page read and write
22176010000
heap
page read and write
4EB8000
trusted library allocation
page read and write
BFB000
stack
page read and write
584A000
trusted library allocation
page read and write
1BD85C13000
heap
page read and write
221770F9000
heap
page read and write
5B01000
trusted library allocation
page read and write
C52000
heap
page read and write
22175FC6000
heap
page read and write
22130CD0000
heap
page read and write
5750000
trusted library allocation
page read and write
18A79D08000
heap
page read and write
586B000
trusted library allocation
page read and write
CA1000
heap
page read and write
1AD55768000
heap
page read and write
4F12000
trusted library allocation
page read and write
261F1E2E000
heap
page read and write
1AD557AD000
heap
page read and write
AE7000
trusted library allocation
page read and write
261EC6FA000
heap
page read and write
221770E2000
heap
page read and write
6F9000
stack
page read and write
345F000
stack
page read and write
1BD85C53000
heap
page read and write
31E0000
heap
page read and write
2A6BBE00000
heap
page read and write
22170029000
heap
page read and write
5DAE000
stack
page read and write
22175920000
trusted library allocation
page read and write
BDD000
trusted library allocation
page execute and read and write
22175B50000
trusted library allocation
page read and write
14D2000
trusted library allocation
page read and write
22177089000
heap
page read and write
22175E50000
heap
page read and write
4ED4000
trusted library allocation
page read and write
22130CB1000
heap
page read and write
2217700B000
heap
page read and write
22175F64000
heap
page read and write
11F4000
trusted library allocation
page read and write
281B000
trusted library allocation
page execute and read and write
22177068000
heap
page read and write
1F421E61000
heap
page read and write
4EB1000
trusted library allocation
page read and write
22175962000
trusted library allocation
page read and write
221770F0000
heap
page read and write
22175E26000
heap
page read and write
270BF875000
heap
page read and write
2A36000
trusted library allocation
page read and write
14A5000
trusted library allocation
page read and write
22130CE6000
heap
page read and write
2217594C000
trusted library allocation
page read and write
22130F95000
heap
page read and write
2217092B000
heap
page read and write
22175E3C000
heap
page read and write
AF1000
trusted library allocation
page read and write
22175954000
trusted library allocation
page read and write
22177007000
heap
page read and write
22175E2D000
heap
page read and write
5139000
trusted library allocation
page read and write
1AD55789000
heap
page read and write
14F5000
trusted library allocation
page read and write
261EC678000
heap
page read and write
2217598A000
trusted library allocation
page read and write
5B27000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
1AD5579C000
heap
page read and write
1AD54E53000
heap
page read and write
221770FF000
heap
page read and write
25FB1900000
heap
page read and write
22170065000
heap
page read and write
2AF7B7B000
stack
page read and write
85B4FFF000
stack
page read and write
1BD85D08000
heap
page read and write
22175E00000
heap
page read and write
3085000
heap
page read and write
22175E26000
heap
page read and write
3ABB9FF000
unkown
page read and write
22175B00000
trusted library allocation
page read and write
2217716F000
heap
page read and write
22170BC8000
heap
page read and write
FF2000
trusted library allocation
page read and write
1AFDB5E0000
heap
page read and write
261F1EA7000
heap
page read and write
22130CA0000
heap
page read and write
380000
heap
page read and write
18A79C4B000
heap
page read and write
5EED000
stack
page read and write
99157FF000
stack
page read and write
2FF0000
heap
page read and write
221770A6000
heap
page read and write
2217706E000
heap
page read and write
B903A7E000
stack
page read and write
4F20000
remote allocation
page read and write
2B12000
trusted library allocation
page read and write
22175962000
trusted library allocation
page read and write
22177083000
heap
page read and write
22175AA0000
trusted library allocation
page read and write
22170BD0000
heap
page read and write
2810000
trusted library allocation
page read and write
58AF000
stack
page read and write
221770FF000
heap
page read and write
FD4000
trusted library allocation
page read and write
22175FE4000
heap
page read and write
270BF913000
heap
page read and write
2EAC000
stack
page read and write
22177057000
heap
page read and write
22171760000
trusted library section
page readonly
1190000
heap
page read and write
22177014000
heap
page read and write
C2A000
heap
page read and write
22175E61000
heap
page read and write
103E000
stack
page read and write
559D000
stack
page read and write
FE0000
trusted library allocation
page read and write
22177011000
heap
page read and write
1AD5579C000
heap
page read and write
221770FF000
heap
page read and write
3320000
heap
page read and write
22175E61000
heap
page read and write
2217003C000
heap
page read and write
261F1B54000
trusted library allocation
page read and write
22175AC0000
trusted library allocation
page read and write
1F421E2A000
heap
page read and write
25FB0F30000
heap
page read and write
940B8FD000
stack
page read and write
261F1B60000
trusted library allocation
page read and write
1AD55C02000
heap
page read and write
57D0000
trusted library allocation
page read and write
22177065000
heap
page read and write
142C000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
22175E53000
heap
page read and write
2217712E000
heap
page read and write
270BF85B000
heap
page read and write
22170072000
heap
page read and write
22130CE4000
heap
page read and write
51EE000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
2536BC40000
heap
page read and write
1AD5577B000
heap
page read and write
261ED980000
trusted library allocation
page read and write
3085000
heap
page read and write
A76000
trusted library allocation
page read and write
22170690000
trusted library allocation
page read and write
1439000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
18A7A270000
trusted library allocation
page read and write
2536BC13000
heap
page read and write
221770A1000
heap
page read and write
57C0000
trusted library allocation
page read and write
221757C0000
trusted library allocation
page read and write
22177075000
heap
page read and write
57F0000
trusted library allocation
page read and write
22177117000
heap
page read and write
5A5E000
stack
page read and write
2536BD02000
heap
page read and write
22175FE4000
heap
page read and write
AD2000
trusted library allocation
page read and write
22175FAF000
heap
page read and write
1BD85C29000
heap
page read and write
221709F3000
heap
page read and write
3ABB97A000
stack
page read and write
22175940000
trusted library allocation
page read and write
55F547E000
stack
page read and write
2217092E000
heap
page read and write
FF0000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
221759CC000
trusted library allocation
page read and write
221770AA000
heap
page read and write
57E0000
trusted library allocation
page read and write
2217595A000
trusted library allocation
page read and write
D6FFB7E000
stack
page read and write
22175F8A000
heap
page read and write
5870000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
306B000
heap
page read and write
1AD54E80000
heap
page read and write
22175C40000
remote allocation
page read and write
57B0000
trusted library allocation
page read and write
18A79AB0000
heap
page read and write
22177057000
heap
page read and write
14AE000
trusted library allocation
page read and write
4ECC000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
1AD55510000
remote allocation
page read and write
22177052000
heap
page read and write
22175B70000
trusted library allocation
page read and write
22170BD4000
heap
page read and write
29F8000
trusted library allocation
page read and write
22175FCC000
heap
page read and write
4ECC000
trusted library allocation
page read and write
2217713A000
heap
page read and write
261ED990000
trusted library allocation
page read and write
221771AA000
heap
page read and write
33E6000
heap
page read and write
56D4000
trusted library allocation
page read and write
4341000
trusted library allocation
page read and write
261ED5E0000
trusted library section
page readonly
2217701F000
heap
page read and write
22170B6B000
heap
page read and write
28B0000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
3ABB3FB000
stack
page read and write
22170BDA000
heap
page read and write
BBE000
stack
page read and write
22175AB0000
trusted library allocation
page read and write
2A3A000
trusted library allocation
page read and write
2217717A000
heap
page read and write
261F1E5F000
heap
page read and write
261ECF00000
heap
page read and write
7E0000
trusted library allocation
page read and write
D3E000
stack
page read and write
22175FAA000
heap
page read and write
1AD54C90000
heap
page read and write
940AF0B000
stack
page read and write
221770D7000
heap
page read and write
D6FF9FC000
stack
page read and write
22177065000
heap
page read and write
1AFDB900000
heap
page read and write
1AFDB813000
heap
page read and write
22175940000
trusted library allocation
page read and write
22175FD8000
heap
page read and write
2217702C000
heap
page read and write
22175A70000
trusted library allocation
page read and write
31F0000
heap
page execute and read and write
22170800000
heap
page read and write
22175E2D000
heap
page read and write
22175AB4000
trusted library allocation
page read and write
2E40000
heap
page read and write
4EB8000
trusted library allocation
page read and write
18A79C4F000
heap
page read and write
22175E69000
heap
page read and write
22176010000
heap
page read and write
4F26000
trusted library allocation
page read and write
CA6000
heap
page read and write
2536BB70000
heap
page read and write
57D6000
trusted library allocation
page read and write
18A79C49000
heap
page read and write
2CBEDE46000
heap
page read and write
22177070000
heap
page read and write
22175ABC000
trusted library allocation
page read and write
22175E55000
heap
page read and write
858EF7A000
stack
page read and write
22175E34000
heap
page read and write
22177065000
heap
page read and write
22175FFE000
heap
page read and write
C8E000
heap
page read and write
4B7D000
stack
page read and write
4EB8000
trusted library allocation
page read and write
18A79C51000
heap
page read and write
57D0000
trusted library allocation
page read and write
17FE000
stack
page read and write
22175E69000
heap
page read and write
DF0000
heap
page read and write
57D0000
trusted library allocation
page read and write
25FB10CC000
heap
page read and write
D6FF5DB000
stack
page read and write
85B4A7B000
stack
page read and write
22175D70000
trusted library allocation
page read and write
22177085000
heap
page read and write
A83000
trusted library allocation
page read and write
ACB000
trusted library allocation
page read and write
2C80000
unkown
page read and write
2217594C000
trusted library allocation
page read and write
1AD55510000
remote allocation
page read and write
5113000
trusted library allocation
page read and write
CC2000
heap
page read and write
3085000
heap
page read and write
AE0000
trusted library allocation
page read and write
AA4000
trusted library allocation
page read and write
270BF837000
heap
page read and write
5136000
trusted library allocation
page read and write
22175E69000
heap
page read and write
22175950000
trusted library allocation
page read and write
B01000
trusted library allocation
page read and write
1AD55777000
heap
page read and write
22175FBF000
heap
page read and write
2CBEDDE0000
trusted library allocation
page read and write
940B67E000
stack
page read and write
22175FD5000
heap
page read and write
A37000
trusted library allocation
page read and write
22175920000
trusted library allocation
page read and write
22175AB4000
trusted library allocation
page read and write
BC5000
heap
page read and write
29A1000
trusted library allocation
page read and write
2A6BBE13000
heap
page read and write
AE5000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
29EC000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
2CBEDE68000
heap
page read and write
2217713E000
heap
page read and write
22170BD5000
heap
page read and write
58BA000
trusted library allocation
page read and write
22175F35000
heap
page read and write
2A2A000
trusted library allocation
page read and write
1AD54EA2000
heap
page read and write
22175B40000
trusted library allocation
page read and write
270BF865000
heap
page read and write
2CBEDE59000
heap
page read and write
22170993000
heap
page read and write
25FB0F20000
heap
page read and write
3095000
heap
page read and write
261EC66E000
heap
page read and write
1BD85D02000
heap
page read and write
2217594E000
trusted library allocation
page read and write
22170A23000
heap
page read and write
1AD55777000
heap
page read and write
22175E62000
heap
page read and write
A76000
trusted library allocation
page read and write
22175E34000
heap
page read and write
56AE000
stack
page read and write
22175950000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
261F1B50000
trusted library allocation
page read and write
B903CFE000
stack
page read and write
2CBEDE5F000
heap
page read and write
22175E02000
heap
page read and write
22175AA0000
trusted library allocation
page read and write
221771B0000
heap
page read and write
22171790000
trusted library section
page readonly
22175E26000
heap
page read and write
22175AB0000
trusted library allocation
page read and write
22175FD1000
heap
page read and write
261F2000000
heap
page read and write
5149000
heap
page read and write
261F1990000
trusted library allocation
page read and write
802000
heap
page read and write
261F1C80000
trusted library allocation
page read and write
22177167000
heap
page read and write
584A000
trusted library allocation
page read and write
22177079000
heap
page read and write
22175B20000
trusted library allocation
page read and write
2CBEDD40000
heap
page read and write
22170BDB000
heap
page read and write
31AA000
trusted library allocation
page execute and read and write
261ED600000
trusted library section
page readonly
6A3D000
stack
page read and write
85B4CFE000
stack
page read and write
22170BB2000
heap
page read and write
There are 1728 hidden memdumps, click here to show them.