IOC Report
dh58NtARpk.exe

loading gif

Files

File Path
Type
Category
Malicious
dh58NtARpk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\l91ip55.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6381.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\iycPo61.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba7464.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f6228Ih.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h27pP32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\f6228Ih.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\h27pP32.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dh58NtARpk.exe
C:\Users\user\Desktop\dh58NtARpk.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\niba6381.exe
C:\Users\user~1\AppData\Local\Temp\IXP000.TMP\niba6381.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\niba7464.exe
C:\Users\user~1\AppData\Local\Temp\IXP001.TMP\niba7464.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\f6228Ih.exe
C:\Users\user~1\AppData\Local\Temp\IXP002.TMP\f6228Ih.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\h27pP32.exe
C:\Users\user~1\AppData\Local\Temp\IXP002.TMP\h27pP32.exe
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP000.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP001.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP002.TMP\

URLs

Name
IP
Malicious
193.233.20.28:4125
malicious
https://api.ip.sb/ip
unknown

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
95.140.230.128

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features
TamperProtection
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
51A1000
heap
page read and write
malicious
44E0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
4530000
direct allocation
page read and write
malicious
4BE2000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
1BD14F34000
heap
page read and write
1BD14F7A000
heap
page read and write
24291E56000
heap
page read and write
4E3000
heap
page read and write
1BD154C2000
heap
page read and write
3445000
heap
page read and write
26E23FF000
stack
page read and write
5E5000
heap
page read and write
1CB1DFAC000
heap
page read and write
241AED00000
heap
page read and write
6AE0000
heap
page read and write
A5B67C000
stack
page read and write
1BD15489000
heap
page read and write
1D63903D000
heap
page read and write
1BD1549F000
heap
page read and write
1BD14F29000
heap
page read and write
1A174D00000
heap
page read and write
1BD14F33000
heap
page read and write
1B948E7A000
heap
page read and write
1BD14F2E000
heap
page read and write
1F0000
heap
page read and write
1EDED002000
heap
page read and write
20961C00000
heap
page read and write
1CB1E418000
heap
page read and write
1BD14F75000
heap
page read and write
1D638FC5000
heap
page read and write
160000
unkown
page readonly
1EDEBB61000
heap
page read and write
34D2000
heap
page read and write
1D639000000
heap
page read and write
1EDEB043000
heap
page read and write
4BCF000
trusted library allocation
page read and write
1BD154AC000
heap
page read and write
1BD14F08000
heap
page read and write
241AEAB0000
heap
page read and write
1BD14F5A000
heap
page read and write
1BD14F32000
heap
page read and write
1D638DE0000
heap
page read and write
71344FC000
stack
page read and write
1BD154DA000
heap
page read and write
1BD14F9D000
heap
page read and write
1BD14F63000
heap
page read and write
1BD15499000
heap
page read and write
1BD14F9D000
heap
page read and write
4860000
heap
page read and write
1BD14F2E000
heap
page read and write
1BD144A1000
heap
page read and write
528D000
heap
page read and write
2A89E913000
heap
page read and write
1BD14F2A000
heap
page read and write
1BD14F68000
heap
page read and write
22318DF0000
remote allocation
page read and write
26E1EFD000
stack
page read and write
1E0DC25A000
heap
page read and write
1A174D02000
heap
page read and write
CC0000
unkown
page readonly
1BD14F33000
heap
page read and write
1CB1D6E0000
heap
page read and write
1BD1547F000
heap
page read and write
1BD14F74000
heap
page read and write
1BD144A7000
heap
page read and write
1BD154E0000
heap
page read and write
34D5000
heap
page read and write
BE0000
unkown
page readonly
255F1451000
heap
page read and write
4B95000
trusted library allocation
page read and write
73F000
stack
page read and write
1BD14F6D000
heap
page read and write
35D5000
heap
page read and write
1CB1DF8E000
heap
page read and write
D7A6DFF000
stack
page read and write
1CB1E403000
heap
page read and write
1BD14F6E000
heap
page read and write
4BBF000
trusted library allocation
page read and write
255F1502000
heap
page read and write
1BD14F7F000
heap
page read and write
1BD14F75000
heap
page read and write
1BD14F6D000
heap
page read and write
1B948E7B000
heap
page read and write
7FFDC431D000
trusted library allocation
page execute and read and write
1F9B37F000
stack
page read and write
1BD154D3000
heap
page read and write
1CB1DF89000
heap
page read and write
3880000
heap
page read and write
7070000
trusted library allocation
page read and write
1BD15441000
heap
page read and write
1BD14F6F000
heap
page read and write
1A174C88000
heap
page read and write
1CB1DFA4000
heap
page read and write
959E5FC000
stack
page read and write
8180000
trusted library allocation
page read and write
45A0000
heap
page read and write
1CB1DF83000
heap
page read and write
1BD154C5000
heap
page read and write
20961AA0000
heap
page read and write
1BD144A7000
heap
page read and write
1BD14F31000
heap
page read and write
430000
unkown
page read and write
A4B3378000
stack
page read and write
1BD14F30000
heap
page read and write
7090000
trusted library section
page read and write
1BD15487000
heap
page read and write
12587000
trusted library allocation
page read and write
1BD14F52000
heap
page read and write
1BD14F84000
heap
page read and write
1BD14F5C000
heap
page read and write
4BC1000
trusted library allocation
page read and write
CC1000
unkown
page execute read
1CB1DF92000
heap
page read and write
35CE000
heap
page read and write
35C9000
heap
page read and write
5B2000
heap
page read and write
5B79000
trusted library allocation
page read and write
1BD144A1000
heap
page read and write
1BD14F5B000
heap
page read and write
7730000
trusted library allocation
page read and write
1BD14491000
heap
page read and write
D7A72FD000
stack
page read and write
959DC7C000
stack
page read and write
4374000
heap
page read and write
1BD14F58000
heap
page read and write
71345FA000
stack
page read and write
1BD14F63000
heap
page read and write
1BD14F32000
heap
page read and write
1CB1E400000
heap
page read and write
1BD14F86000
heap
page read and write
1CB1D716000
heap
page read and write
1BD14F07000
heap
page read and write
1BD144A7000
heap
page read and write
1BD14549000
heap
page read and write
34C4000
heap
page read and write
241AED08000
heap
page read and write
7A0000
trusted library allocation
page read and write
1BD14F6D000
heap
page read and write
1B948E59000
heap
page read and write
4BEA000
trusted library allocation
page read and write
6AE4000
heap
page read and write
4BB0000
trusted library allocation
page read and write
35FC000
heap
page read and write
1ECCF780000
trusted library allocation
page read and write
7FFDC4302000
trusted library allocation
page read and write
1BD14F29000
heap
page read and write
35D7000
heap
page read and write
456E000
stack
page read and write
1ECCF750000
heap
page read and write
2A89E83C000
heap
page read and write
1BD1545D000
heap
page read and write
1A174C47000
heap
page read and write
1CB1DF85000
heap
page read and write
1CB1DF92000
heap
page read and write
1BD14F7A000
heap
page read and write
1BD14475000
heap
page read and write
1BD14F34000
heap
page read and write
24291E7C000
heap
page read and write
1BD14538000
heap
page read and write
1BD14491000
heap
page read and write
1B948F02000
heap
page read and write
2A89E852000
heap
page read and write
1EDEBB7D000
heap
page read and write
1BD14F8E000
heap
page read and write
72528FE000
stack
page read and write
1EDEBB6D000
heap
page read and write
1BD14F52000
heap
page read and write
1BD14F62000
heap
page read and write
33EE000
stack
page read and write
241AEAA0000
heap
page read and write
24291F00000
heap
page read and write
1BD14479000
heap
page read and write
1BD14F6E000
heap
page read and write
26E1AFB000
stack
page read and write
35E0000
heap
page read and write
1EDEB102000
heap
page read and write
35D1000
heap
page read and write
A4B30FB000
stack
page read and write
1CB1DF8D000
heap
page read and write
430000
unkown
page write copy
1BD144E8000
heap
page read and write
ABF317F000
stack
page read and write
7FFDC42F4000
trusted library allocation
page read and write
2C65000
heap
page read and write
1A176710000
trusted library allocation
page read and write
72529FF000
stack
page read and write
F9D8B1E000
stack
page read and write
22318613000
heap
page read and write
1BD154C8000
heap
page read and write
1EDEBBA0000
heap
page read and write
1BD14F29000
heap
page read and write
8FEADF9000
stack
page read and write
1A174C47000
heap
page read and write
219F000
stack
page read and write
CC0000
unkown
page readonly
6FDE07F000
stack
page read and write
1CB1DF8E000
heap
page read and write
1CB1D500000
trusted library allocation
page read and write
1BD14F86000
heap
page read and write
3490000
heap
page read and write
1BD14F6F000
heap
page read and write
1CB1D6F7000
heap
page read and write
1CB1DF9C000
heap
page read and write
BA0BD7F000
stack
page read and write
784000
trusted library allocation
page read and write
8FEA7CC000
stack
page read and write
20961CCA000
heap
page read and write
1CB1E421000
heap
page read and write
1EDEBB5A000
heap
page read and write
1BD14F72000
heap
page read and write
34AA000
heap
page read and write
770000
trusted library allocation
page read and write
4B93000
trusted library allocation
page read and write
1CB1DFA3000
heap
page read and write
1B948E26000
heap
page read and write
1BD15500000
heap
page read and write
1EDEB029000
heap
page read and write
2A89E900000
heap
page read and write
1BD15457000
heap
page read and write
1BD154B2000
heap
page read and write
1BD14F99000
heap
page read and write
7B0000
trusted library allocation
page read and write
1BD14F6D000
heap
page read and write
959E6FF000
stack
page read and write
1CB1DFAB000
heap
page read and write
1BD144AF000
heap
page read and write
1B948E58000
heap
page read and write
1E0000
heap
page read and write
76B0000
trusted library allocation
page read and write
1BD14F13000
heap
page read and write
1BD14F80000
heap
page read and write
34CE000
stack
page read and write
7C0000
trusted library allocation
page read and write
1BD14F84000
heap
page read and write
1BD14F6D000
heap
page read and write
35C9000
heap
page read and write
1ECCF802000
heap
page read and write
1E0DC1B0000
trusted library allocation
page read and write
341E000
stack
page read and write
34C6000
heap
page read and write
6BC4000
heap
page read and write
2AE0000
unkown
page readonly
1CB1E42B000
heap
page read and write
1BD14F6D000
heap
page read and write
1BD15481000
heap
page read and write
4BEF000
trusted library allocation
page read and write
1BD143A0000
trusted library allocation
page read and write
170000
heap
page read and write
F6C497E000
stack
page read and write
1B948E47000
heap
page read and write
1BD14429000
heap
page read and write
4BD2000
trusted library allocation
page read and write
1BD154D1000
heap
page read and write
451D000
trusted library allocation
page execute and read and write
1BD14F2A000
heap
page read and write
195000
stack
page read and write
CCC000
unkown
page readonly
7FFDC4310000
trusted library allocation
page read and write
2A89E813000
heap
page read and write
4E5000
heap
page read and write
1BD14F6F000
heap
page read and write
1BD154E5000
heap
page read and write
2A89E886000
heap
page read and write
1D639017000
heap
page read and write
255F143C000
heap
page read and write
1B948E62000
heap
page read and write
1CB1DF8E000
heap
page read and write
1BD14F80000
heap
page read and write
B17C377000
stack
page read and write
35CC000
heap
page read and write
1CB1D5C0000
remote allocation
page read and write
530000
heap
page read and write
1EDEB000000
heap
page read and write
1BD15502000
heap
page read and write
1CB1DF81000
heap
page read and write
76A0000
trusted library allocation
page read and write
4A40000
heap
page execute and read and write
12581000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
A5BA7C000
stack
page read and write
1B948DA0000
trusted library allocation
page read and write
1BD14F68000
heap
page read and write
1BD144A1000
heap
page read and write
1BD15457000
heap
page read and write
1BD14F32000
heap
page read and write
7640000
trusted library allocation
page read and write
1BD154D5000
heap
page read and write
1BD154BE000
heap
page read and write
17C35690000
heap
page read and write
53F7000
heap
page read and write
1D639027000
heap
page read and write
1EDEBB7D000
heap
page read and write
20962402000
heap
page read and write
1BD14F29000
heap
page read and write
1CB1DF75000
heap
page read and write
4597000
trusted library allocation
page execute and read and write
1EEDD72F000
heap
page read and write
28EF27E0000
heap
page read and write
1BD14F62000
heap
page read and write
2A89E88C000
heap
page read and write
175BDC07000
heap
page read and write
1BD14E15000
heap
page read and write
17C35A60000
heap
page read and write
1A174C62000
heap
page read and write
1BD14F76000
heap
page read and write
1BD14F7A000
heap
page read and write
781F000
stack
page read and write
1BD14F7F000
heap
page read and write
2A89E84C000
heap
page read and write
1BD14F63000
heap
page read and write
1BD14F2B000
heap
page read and write
1D638FC0000
heap
page read and write
1BD14F5A000
heap
page read and write
1CB1DF8E000
heap
page read and write
1BD14F88000
heap
page read and write
530E000
stack
page read and write
241AEC51000
heap
page read and write
1BD14F68000
heap
page read and write
1BD14F56000
heap
page read and write
790000
trusted library allocation
page read and write
1BD14F6F000
heap
page read and write
1BD1456A000
heap
page read and write
7710000
trusted library allocation
page read and write
426000
unkown
page execute and read and write
1BD14F2A000
heap
page read and write
1BD14491000
heap
page read and write
1BD154AC000
heap
page read and write
1BD154D8000
heap
page read and write
1EEDD681000
heap
page read and write
7A0000
trusted library allocation
page read and write
26E16EB000
stack
page read and write
1BD14F6D000
heap
page read and write
1BD14F5A000
heap
page read and write
1BD14F93000
heap
page read and write
2A89E84D000
heap
page read and write
1BD14F7E000
heap
page read and write
3440000
heap
page read and write
1CB1D390000
heap
page read and write
1BD154EC000
heap
page read and write
1A1766D0000
trusted library allocation
page read and write
4590000
trusted library allocation
page read and write
BA0BCFA000
stack
page read and write
1B948E64000
heap
page read and write
2A89F002000
trusted library allocation
page read and write
1BD14F4D000
heap
page read and write
1EEDD63D000
heap
page read and write
42F000
unkown
page execute and read and write
1E0DC202000
heap
page read and write
1BD14F31000
heap
page read and write
1EDEAFD0000
trusted library allocation
page read and write
1D638F30000
heap
page read and write
1BD14517000
heap
page read and write
1BD14F5A000
heap
page read and write
D7A71FF000
stack
page read and write
7080000
trusted library allocation
page read and write
1E0DC110000
heap
page read and write
1BD14F9F000
heap
page read and write
1EEDDE02000
trusted library allocation
page read and write
1CB1D6B0000
heap
page read and write
160000
unkown
page readonly
483F000
stack
page read and write
7ADF000
stack
page read and write
1B948E00000
heap
page read and write
1F9B17F000
stack
page read and write
241AEC5F000
heap
page read and write
1CB1DFAD000
heap
page read and write
7A0000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
1CB1DFB6000
heap
page read and write
4BCD000
trusted library allocation
page read and write
4BAA000
trusted library allocation
page read and write
1BD1548D000
heap
page read and write
1B948E6B000
heap
page read and write
1EEDD550000
trusted library allocation
page read and write
1BD14F4D000
heap
page read and write
1CB1DF92000
heap
page read and write
1BD154E9000
heap
page read and write
4BA6000
trusted library allocation
page read and write
24291E5F000
heap
page read and write
1BD14F4D000
heap
page read and write
4630000
heap
page read and write
5A1000
heap
page read and write
1EEDD675000
heap
page read and write
1BD14F2A000
heap
page read and write
241AF402000
trusted library allocation
page read and write
1EDEBA02000
heap
page read and write
1B948CA0000
heap
page read and write
1BD1447B000
heap
page read and write
1BD14F2F000
heap
page read and write
790000
trusted library allocation
page read and write
28EF2870000
heap
page read and write
1EDEBB00000
heap
page read and write
2A89E650000
heap
page read and write
6FDDD2F000
stack
page read and write
241AF3B0000
trusted library allocation
page read and write
20962513000
heap
page read and write
7064000
trusted library allocation
page read and write
1ECCF913000
heap
page read and write
2FC0000
heap
page read and write
1EDEBA00000
heap
page read and write
255F1468000
heap
page read and write
75E0000
heap
page read and write
1BD14F5F000
heap
page read and write
22318DC0000
trusted library allocation
page read and write
1BD14F83000
heap
page read and write
BEA000
unkown
page readonly
1BD14491000
heap
page read and write
1BD14F88000
heap
page read and write
BE1000
unkown
page execute read
76E0000
trusted library allocation
page read and write
1BD14370000
heap
page read and write
1BD14F84000
heap
page read and write
24291F13000
heap
page read and write
1BD14F2C000
heap
page read and write
348E000
stack
page read and write
1BD14F53000
heap
page read and write
24291BB0000
heap
page read and write
241AED13000
heap
page read and write
241AEC61000
heap
page read and write
790000
trusted library allocation
page read and write
1A174C57000
heap
page read and write
1BD14300000
heap
page read and write
F6C4E7F000
stack
page read and write
34C9000
heap
page read and write
1CB1D5C0000
remote allocation
page read and write
1CB1DF8F000
heap
page read and write
1BD14F84000
heap
page read and write
1BD14F32000
heap
page read and write
A5B97B000
stack
page read and write
1BD14F77000
heap
page read and write
209E000
stack
page read and write
1BD15467000
heap
page read and write
4BA000
heap
page read and write
F9D8B9E000
stack
page read and write
75E0000
trusted library allocation
page read and write
1BD15485000
heap
page read and write
33AE000
stack
page read and write
1BD14F62000
heap
page read and write
1BD14F34000
heap
page read and write
1EDEB084000
heap
page read and write
2A89E6B0000
heap
page read and write
175BDC00000
heap
page read and write
1BD154C8000
heap
page read and write
1CB1DF92000
heap
page read and write
1BD14F2B000
heap
page read and write
1CB1DFAF000
heap
page read and write
1BD14F69000
heap
page read and write
1EDEBB8A000
heap
page read and write
2BE5000
heap
page read and write
790000
trusted library allocation
page read and write
3340000
heap
page read and write
1BD14F2A000
heap
page read and write
959E4FF000
stack
page read and write
1BD14F6F000
heap
page read and write
4B8B000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
1BD14F74000
heap
page read and write
24291E3C000
heap
page read and write
1BD154CF000
heap
page read and write
55366FD000
stack
page read and write
22318602000
heap
page read and write
1CB1DFA3000
heap
page read and write
1CB1DF81000
heap
page read and write
3DC957F000
stack
page read and write
241AEC3C000
heap
page read and write
1EEDD450000
heap
page read and write
255F11B0000
heap
page read and write
255F1400000
heap
page read and write
2BCF000
heap
page read and write
1D63900B000
heap
page read and write
1BD14F2C000
heap
page read and write
A4B2C7E000
stack
page read and write
D7A6C7B000
stack
page read and write
55359DC000
stack
page read and write
22318E02000
trusted library allocation
page read and write
1CB1D64D000
heap
page read and write
1BD14F6F000
heap
page read and write
7076000
trusted library allocation
page read and write
500000
heap
page read and write
1BD154CF000
heap
page read and write
7780000
trusted library allocation
page read and write
BA0B92F000
stack
page read and write
1BD15512000
heap
page read and write
1BD14F7A000
heap
page read and write
1CB1DF00000
heap
page read and write
1CB1DF22000
heap
page read and write
1EDEBB7B000
heap
page read and write
7F0000
heap
page read and write
1BD14F81000
heap
page read and write
57C000
heap
page read and write
2A89E87C000
heap
page read and write
1BD14F81000
heap
page read and write
1BD154D7000
heap
page read and write
1CB1DF71000
heap
page read and write
6FE000
stack
page read and write
ABF2C7C000
stack
page read and write
175BDD85000
heap
page read and write
34CD000
heap
page read and write
3899000
heap
page read and write
A4B34F9000
stack
page read and write
1BD14F75000
heap
page read and write
1E0DC120000
heap
page read and write
241AEC29000
heap
page read and write
1BD14F88000
heap
page read and write
1CB1DFBD000
heap
page read and write
26E1CFD000
stack
page read and write
1BD14F71000
heap
page read and write
BCC000
unkown
page readonly
1BD14F6F000
heap
page read and write
A4B327E000
stack
page read and write
1BD14F35000
heap
page read and write
7FFDC430D000
trusted library allocation
page execute and read and write
1BD14F6E000
heap
page read and write
2B86000
heap
page read and write
1BD154BA000
heap
page read and write
1BD14F6A000
heap
page read and write
1BD154E9000
heap
page read and write
1EEDD702000
heap
page read and write
1CB1D400000
heap
page read and write
1BD14F33000
heap
page read and write
A5B77E000
stack
page read and write
2A89E84B000
heap
page read and write
1BD14F53000
heap
page read and write
1BD14F2D000
heap
page read and write
1BD14F2A000
heap
page read and write
1CB1E402000
heap
page read and write
34A0000
heap
page read and write
36B9000
heap
page read and write
791000
trusted library allocation
page read and write
1BD154CA000
heap
page read and write
2A89E848000
heap
page read and write
1BD154E9000
heap
page read and write
1BD14F85000
heap
page read and write
7690000
trusted library allocation
page read and write
1EEDD602000
heap
page read and write
1B948E6F000
heap
page read and write
4F6000
stack
page read and write
1A174C57000
heap
page read and write
1BD14F34000
heap
page read and write
1BD14F77000
heap
page read and write
2A89E850000
heap
page read and write
35E9000
heap
page read and write
17C356D7000
heap
page read and write
5B55000
trusted library allocation
page read and write
1BD14F74000
heap
page read and write
35A0000
heap
page read and write
790000
trusted library allocation
page read and write
48B0000
heap
page read and write
7630000
trusted library allocation
page read and write
1CB1DF9E000
heap
page read and write
1BD14F4E000
heap
page read and write
4BA8000
trusted library allocation
page read and write
20962500000
heap
page read and write
1BD15513000
heap
page read and write
1BD1544D000
heap
page read and write
1EEDD3E0000
heap
page read and write
175BDBE0000
heap
page read and write
CCC000
unkown
page readonly
B17C27F000
stack
page read and write
55361FF000
stack
page read and write
1BD14F6D000
heap
page read and write
1BD14F74000
heap
page read and write
1BD14F3B000
heap
page read and write
1BD14F29000
heap
page read and write
20961D13000
heap
page read and write
1CB1DFB6000
heap
page read and write
1BD14F00000
heap
page read and write
24291E5B000
heap
page read and write
1A174C13000
heap
page read and write
1BD15499000
heap
page read and write
22318635000
heap
page read and write
1BD14F72000
heap
page read and write
1F9AFFC000
stack
page read and write
7074000
trusted library allocation
page read and write
45E0000
heap
page read and write
1B948E65000
heap
page read and write
4570000
trusted library allocation
page read and write
1BD15406000
heap
page read and write
35F4000
heap
page read and write
255F1464000
heap
page read and write
1BD14F5C000
heap
page read and write
20961C29000
heap
page read and write
1BD144AF000
heap
page read and write
1A174C57000
heap
page read and write
1BD14482000
heap
page read and write
1BD14F80000
heap
page read and write
1BD14F7E000
heap
page read and write
1BD14F27000
heap
page read and write
1BD154BE000
heap
page read and write
1EDEBB5A000
heap
page read and write
A5B57A000
stack
page read and write
1BD14F89000
heap
page read and write
1CB1DF96000
heap
page read and write
1BD14F7A000
heap
page read and write
5535EFF000
stack
page read and write
F9D8A9C000
stack
page read and write
BC1000
unkown
page execute read
1BD154E2000
heap
page read and write
1BD14F79000
heap
page read and write
24291E00000
heap
page read and write
1BD14F68000
heap
page read and write
4B8F000
trusted library allocation
page read and write
1BD14486000
heap
page read and write
1BD1547C000
heap
page read and write
1BD144D9000
heap
page read and write
1BD154A8000
heap
page read and write
4573000
trusted library allocation
page read and write
7FFDC4492000
trusted library allocation
page read and write
1BD14F2C000
heap
page read and write
35FB000
heap
page read and write
1BD14549000
heap
page read and write
1BD14549000
heap
page read and write
1A174C47000
heap
page read and write
1ECCF85D000
heap
page read and write
1BD14F75000
heap
page read and write
175BDBC0000
heap
page read and write
1BD14F82000
heap
page read and write
4BC7000
trusted library allocation
page read and write
34DA000
heap
page read and write
1BD14F2C000
heap
page read and write
1CB1DF61000
heap
page read and write
1B948E84000
heap
page read and write
2BAD000
heap
page read and write
2B40000
heap
page read and write
22318640000
heap
page read and write
1BD14F7C000
heap
page read and write
1CB1D6DB000
heap
page read and write
4BC9000
trusted library allocation
page read and write
2A89E7B0000
trusted library allocation
page read and write
F6C48FE000
stack
page read and write
1A174B70000
heap
page read and write
2A89E902000
heap
page read and write
1BD14F74000
heap
page read and write
345E000
stack
page read and write
1BD14F2E000
heap
page read and write
175BDD50000
heap
page read and write
35D1000
heap
page read and write
34CD000
heap
page read and write
1BD154C1000
heap
page read and write
34F5000
heap
page read and write
1A174C00000
heap
page read and write
1CB1DF81000
heap
page read and write
1B948E56000
heap
page read and write
1EDEBB6B000
heap
page read and write
458A000
trusted library allocation
page execute and read and write
A4B2CFF000
stack
page read and write
1BD154E1000
heap
page read and write
1B948E7E000
heap
page read and write
241AEB10000
heap
page read and write
1BD144DF000
heap
page read and write
1BD14F77000
heap
page read and write
1BD154E1000
heap
page read and write
1BD154DF000
heap
page read and write
36B0000
heap
page read and write
B17C1FB000
stack
page read and write
4BAC000
trusted library allocation
page read and write
33C0000
heap
page read and write
5535DFA000
stack
page read and write
20961C6F000
heap
page read and write
1BD14F6D000
heap
page read and write
1BD154BE000
heap
page read and write
A4B33FE000
stack
page read and write
4510000
trusted library allocation
page read and write
1BD14F97000
heap
page read and write
1BD14F7A000
heap
page read and write
8FEAFFA000
stack
page read and write
1BD14F6D000
heap
page read and write
1B949602000
trusted library allocation
page read and write
1CB1DF87000
heap
page read and write
1BD14F2C000
heap
page read and write
F6C487C000
stack
page read and write
1BD14F71000
heap
page read and write
1CB1D653000
heap
page read and write
4B87000
trusted library allocation
page read and write
1BD14F30000
heap
page read and write
1BD14549000
heap
page read and write
1A174C3D000
heap
page read and write
1B948E60000
heap
page read and write
3DC94FE000
stack
page read and write
7680000
trusted library allocation
page read and write
1BD14F30000
heap
page read and write
1BD154DB000
heap
page read and write
1E0DC213000
heap
page read and write
1A176680000
trusted library allocation
page read and write
1CB1D687000
heap
page read and write
1BD14DC0000
remote allocation
page read and write
1BD154C8000
heap
page read and write
1BD14F0E000
heap
page read and write
77D0000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
1BD15483000
heap
page read and write
1BD1443F000
heap
page read and write
1A174C2A000
heap
page read and write
4640000
heap
page read and write
255F1479000
heap
page read and write
33A0000
heap
page read and write
1B948C30000
heap
page read and write
1EDEB03D000
heap
page read and write
BCA000
unkown
page readonly
4574000
heap
page read and write
1EDEBB88000
heap
page read and write
A4B29BB000
stack
page read and write
1BD14F82000
heap
page read and write
BC8000
unkown
page read and write
1BD14F69000
heap
page read and write
2A89E640000
heap
page read and write
1B948E61000
heap
page read and write
4B7C000
trusted library allocation
page read and write
8FEACFA000
stack
page read and write
28EF2910000
heap
page read and write
1BD14538000
heap
page read and write
1EDEBB5A000
heap
page read and write
1F9B47C000
stack
page read and write
1A9ED000
stack
page read and write
1BD14F55000
heap
page read and write
1BD14F32000
heap
page read and write
959E17C000
stack
page read and write
239E000
stack
page read and write
1F9B57D000
stack
page read and write
1BD14549000
heap
page read and write
1CB1DF81000
heap
page read and write
1BD14F52000
heap
page read and write
1BD1542D000
heap
page read and write
7700000
trusted library allocation
page read and write
1BD15502000
heap
page read and write
BE1000
unkown
page execute read
4BB9000
trusted library allocation
page read and write
1BD154E5000
heap
page read and write
327B000
stack
page read and write
1BD14F86000
heap
page read and write
2400000
heap
page read and write
A4B2EF8000
stack
page read and write
1D639030000
heap
page read and write
7720000
trusted library allocation
page read and write
1BD14F0E000
heap
page read and write
34E8000
heap
page read and write
4B91000
trusted library allocation
page read and write
603000
heap
page read and write
1BD14F6E000
heap
page read and write
1CB1DF89000
heap
page read and write
1EDEBB71000
heap
page read and write
1CB1E402000
heap
page read and write
35D1000
heap
page read and write
CCA000
unkown
page readonly
75C0000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
2BA0000
heap
page read and write
241AEC66000
heap
page read and write
1ECCF83D000
heap
page read and write
1CB1D702000
heap
page read and write
2A89E849000
heap
page read and write
1BD14F9A000
heap
page read and write
1CB1D613000
heap
page read and write
7FFDC4300000
trusted library allocation
page read and write
26E1FFF000
stack
page read and write
F6C4D7F000
stack
page read and write
1BD1443D000
heap
page read and write
1BD14F72000
heap
page read and write
53A1000
heap
page read and write
175BDA80000
heap
page read and write
BE0000
unkown
page readonly
1BD15502000
heap
page read and write
2C60000
heap
page read and write
1BD14F83000
heap
page read and write
1B948E29000
heap
page read and write
1BD14F77000
heap
page read and write
1BD14F71000
heap
page read and write
1F9B27F000
stack
page read and write
BC1000
unkown
page execute read
2BE8000
heap
page read and write
1EEDD613000
heap
page read and write
1BD154DB000
heap
page read and write
1BD14F2A000
heap
page read and write
1BD1447E000
heap
page read and write
1BD14F80000
heap
page read and write
1BD14F2A000
heap
page read and write
1BD154A8000
heap
page read and write
540000
heap
page read and write
1F9B77C000
stack
page read and write
1B948E4D000
heap
page read and write
1BD14F74000
heap
page read and write
1E0DC200000
heap
page read and write
9C000
stack
page read and write
1BD14F83000
heap
page read and write
2AE0000
unkown
page readonly
799E000
stack
page read and write
790000
trusted library allocation
page read and write
401000
unkown
page execute read
2B10000
heap
page read and write
2A89E870000
heap
page read and write
1BD1453B000
heap
page read and write
1BD14F86000
heap
page read and write
1BD14F2A000
heap
page read and write
1BD154D7000
heap
page read and write
432000
unkown
page read and write
1BD14F62000
heap
page read and write
1CB1DF89000
heap
page read and write
4BAE000
trusted library allocation
page read and write
1BD15499000
heap
page read and write
3895000
heap
page read and write
2BC6000
heap
page read and write
9586D6C000
stack
page read and write
1BD1547F000
heap
page read and write
1B948E5F000
heap
page read and write
2B4A000
heap
page read and write
4520000
heap
page read and write
1BD14F4E000
heap
page read and write
ABF307C000
stack
page read and write
1CB1DF9A000
heap
page read and write
1BD14DE0000
remote allocation
page read and write
55363FA000
stack
page read and write
7B0000
trusted library allocation
page read and write
6BC0000
heap
page read and write
7670000
trusted library allocation
page read and write
1B948E7D000
heap
page read and write
1D63903C000
heap
page read and write
20961CB9000
heap
page read and write
BC8000
unkown
page write copy
55362FA000
stack
page read and write
1BD14F75000
heap
page read and write
1CB1DF85000
heap
page read and write
1CB1D6E8000
heap
page read and write
255F1423000
heap
page read and write
1BD14F7A000
heap
page read and write
1A176790000
remote allocation
page read and write
1CB1D629000
heap
page read and write
1BD144B3000
heap
page read and write
1BD14F83000
heap
page read and write
34D2000
heap
page read and write
6FDDDAE000
stack
page read and write
7FFDC434C000
trusted library allocation
page execute and read and write
17C35670000
heap
page read and write
A4B35FF000
stack
page read and write
1BD154DB000
heap
page read and write
781000
trusted library allocation
page read and write
7FFDC43D6000
trusted library allocation
page execute and read and write
1BD14F5C000
heap
page read and write
34C9000
heap
page read and write
1BD14F71000
heap
page read and write
1CB1DF86000
heap
page read and write
1CB1D6BF000
heap
page read and write
55360FA000
stack
page read and write
1B948E6A000
heap
page read and write
34E0000
heap
page read and write
1BD14F07000
heap
page read and write
1BD144AF000
heap
page read and write
255F1210000
heap
page read and write
1EEDD713000
heap
page read and write
1BD14F52000
heap
page read and write
1BD14F29000
heap
page read and write
1BD154BE000
heap
page read and write
3890000
heap
page read and write
1BD14F62000
heap
page read and write
1B948E40000
heap
page read and write
1EDEC010000
heap
page read and write
1BD1548F000
heap
page read and write
17C35A70000
heap
page read and write
34C4000
heap
page read and write
5535FFA000
stack
page read and write
1BD154C8000
heap
page read and write
1EDEBB81000
heap
page read and write
D7A6EFC000
stack
page read and write
1EDEBB57000
heap
page read and write
1BD14F69000
heap
page read and write
7FFDC42FD000
trusted library allocation
page execute and read and write
28EF26EB000
heap
page read and write
462E000
stack
page read and write
1BD1447E000
heap
page read and write
7650000
trusted library allocation
page read and write
1BD154E4000
heap
page read and write
1CB1DF81000
heap
page read and write
1BD14F6F000
heap
page read and write
1BD15452000
heap
page read and write
2A89E800000
heap
page read and write
B17BD4E000
stack
page read and write
28EF2570000
heap
page read and write
1BD14F7F000
heap
page read and write
1D639030000
heap
page read and write
BA0B9AF000
stack
page read and write
1BD15486000
heap
page read and write
1EDEC120000
heap
page read and write
1BD14F62000
heap
page read and write
958757E000
stack
page read and write
26E1BFF000
stack
page read and write
1BD14F72000
heap
page read and write
4BCB000
trusted library allocation
page read and write
36B5000
heap
page read and write
1BD14F4D000
heap
page read and write
1BD14F30000
heap
page read and write
24291F08000
heap
page read and write
1BD14F52000
heap
page read and write
1EDEBB71000
heap
page read and write
1ECCF813000
heap
page read and write
1CB1D6D7000
heap
page read and write
7D0000
trusted library allocation
page read and write
30000
heap
page read and write
785E000
stack
page read and write
35B0000
heap
page read and write
A4B2FF7000
stack
page read and write
959E27E000
stack
page read and write
1CB1D6C6000
heap
page read and write
D7A6F7C000
stack
page read and write
24291C10000
heap
page read and write
1A176790000
remote allocation
page read and write
4840000
trusted library section
page read and write
1BD14F84000
heap
page read and write
1CB1DE02000
heap
page read and write
6CEE000
stack
page read and write
1BD14476000
heap
page read and write
26E22FF000
stack
page read and write
459B000
trusted library allocation
page execute and read and write
255F1402000
heap
page read and write
1BD154E8000
heap
page read and write
1CB1DF16000
heap
page read and write
1BD14F91000
heap
page read and write
1BD14DC0000
remote allocation
page read and write
1CB1D708000
heap
page read and write
1BD14F6F000
heap
page read and write
1BD14F74000
heap
page read and write
1A174C78000
heap
page read and write
20961CC8000
heap
page read and write
7BDF000
stack
page read and write
1BD14F32000
heap
page read and write
1BD14F32000
heap
page read and write
241AEC7F000
heap
page read and write
255F1C02000
trusted library allocation
page read and write
1CB1E403000
heap
page read and write
1BD1548D000
heap
page read and write
72524FE000
stack
page read and write
35D2000
heap
page read and write
1BD14F53000
heap
page read and write
8260000
trusted library allocation
page read and write
255F1428000
heap
page read and write
1BD154B3000
heap
page read and write
1BD14F6D000
heap
page read and write
1BD14549000
heap
page read and write
76F0000
trusted library allocation
page read and write
1CB1DFA3000
heap
page read and write
1BD1545D000
heap
page read and write
1BD1549B000
heap
page read and write
4D7000
heap
page read and write
1BD14F75000
heap
page read and write
4B8D000
trusted library allocation
page read and write
1BD14491000
heap
page read and write
1B948E32000
heap
page read and write
24291E87000
heap
page read and write
ABF2AFE000
stack
page read and write
790000
trusted library allocation
page read and write
1ECCF800000
heap
page read and write
1BD14310000
heap
page read and write
72526FE000
stack
page read and write
1CB1DF83000
heap
page read and write
1BD14F75000
heap
page read and write
241AEC13000
heap
page read and write
1EDEBB7B000
heap
page read and write
1B948E72000
heap
page read and write
4BE6000
trusted library allocation
page read and write
1BD14F62000
heap
page read and write
7719000
trusted library allocation
page read and write
241AEC00000
heap
page read and write
24291E29000
heap
page read and write
BCC000
unkown
page readonly
241AEC8A000
heap
page read and write
1B948E75000
heap
page read and write
1BD154D5000
heap
page read and write
20961C65000
heap
page read and write
20961BA0000
trusted library allocation
page read and write
2A89E829000
heap
page read and write
1BD154E2000
heap
page read and write
1CB1D6E9000
heap
page read and write
CC1000
unkown
page execute read
223184C0000
heap
page read and write
1BD1447E000
heap
page read and write
1EEDD66A000
heap
page read and write
1BD14F52000
heap
page read and write
1BD14F40000
heap
page read and write
1BD14F0E000
heap
page read and write
34D7000
heap
page read and write
1BD14F71000
heap
page read and write
4BC5000
trusted library allocation
page read and write
1BD14F0E000
heap
page read and write
223184B0000
heap
page read and write
5B6000
heap
page read and write
1D638F10000
heap
page read and write
1ECCF902000
heap
page read and write
1BD14F91000
heap
page read and write
229F000
stack
page read and write
535000
heap
page read and write
1EEDD700000
heap
page read and write
17C356D0000
heap
page read and write
2A89E908000
heap
page read and write
5FD000
heap
page read and write
1BD14F7C000
heap
page read and write
1CB1DF87000
heap
page read and write
1CB1DFB2000
heap
page read and write
2F60000
heap
page read and write
1EDED002000
heap
page read and write
4513000
trusted library allocation
page execute and read and write
1BD14F0E000
heap
page read and write
1BD14549000
heap
page read and write
1B948E79000
heap
page read and write
1BD15474000
heap
page read and write
1BD14F52000
heap
page read and write
24291D10000
trusted library allocation
page read and write
1B948E5A000
heap
page read and write
1A174B80000
heap
page read and write
1BD14F6F000
heap
page read and write
1BD144AF000
heap
page read and write
1BD154DD000
heap
page read and write
1BD154D7000
heap
page read and write
959E3FD000
stack
page read and write
7133FDC000
stack
page read and write
1EDED002000
heap
page read and write
1BD14F2A000
heap
page read and write
77E0000
trusted library allocation
page read and write
1BD14479000
heap
page read and write
BE8000
unkown
page read and write
75D0000
trusted library allocation
page read and write
1EDEB06B000
heap
page read and write
959DFFF000
stack
page read and write
1BD1456A000
heap
page read and write
D0000
heap
page read and write
34E1000
heap
page read and write
1E0000
heap
page read and write
BEA000
unkown
page readonly
48AE000
stack
page read and write
1BD14E00000
heap
page read and write
24291BA0000
heap
page read and write
1EEDD600000
heap
page read and write
A5B27C000
stack
page read and write
1CB1DF47000
heap
page read and write
4BC3000
trusted library allocation
page read and write
1EDEBB95000
heap
page read and write
1EDEB0F8000
heap
page read and write
1BD14F6F000
heap
page read and write
4A1E000
stack
page read and write
1BD14F4D000
heap
page read and write
52CE000
stack
page read and write
4BB4000
trusted library allocation
page read and write
4BF5000
trusted library allocation
page read and write
1BD15400000
heap
page read and write
1BD14549000
heap
page read and write
4A30000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
1BD154D9000
heap
page read and write
323A000
stack
page read and write
1BD14F32000
heap
page read and write
1BD14F2C000
heap
page read and write
52E0000
heap
page read and write
1F9ABFB000
stack
page read and write
7609000
trusted library allocation
page read and write
1ADD0000
heap
page execute and read and write
20961A40000
heap
page read and write
1BD14413000
heap
page read and write
7090000
trusted library allocation
page read and write
BC0000
unkown
page readonly
1BD154DB000
heap
page read and write
1EDEBB02000
heap
page read and write
255F1500000
heap
page read and write
1BD14549000
heap
page read and write
4580000
trusted library allocation
page read and write
1BD14F37000
heap
page read and write
1BD14513000
heap
page read and write
7FFDC43A0000
trusted library allocation
page read and write
1CB1E402000
heap
page read and write
24291E5A000
heap
page read and write
4B89000
trusted library allocation
page read and write
771E000
stack
page read and write
1BD154BA000
heap
page read and write
F9D8E7E000
stack
page read and write
24291F02000
heap
page read and write
48D0000
heap
page read and write
1BD14F7F000
heap
page read and write
1BD154D5000
heap
page read and write
1BD14F2B000
heap
page read and write
1CB1E421000
heap
page read and write
790000
trusted library allocation
page read and write
2096253A000
heap
page read and write
400000
unkown
page readonly
1EDEBB7D000
heap
page read and write
A4B31FE000
stack
page read and write
166000
unkown
page readonly
76D0000
trusted library allocation
page read and write
255F1310000
trusted library allocation
page read and write
1BD154B0000
heap
page read and write
1BD154DB000
heap
page read and write
B17C47F000
stack
page read and write
255F1513000
heap
page read and write
1BD14F9F000
heap
page read and write
1B948E57000
heap
page read and write
4B97000
trusted library allocation
page read and write
750000
trusted library allocation
page read and write
2570000
heap
page execute and read and write
1CB1D671000
heap
page read and write
1CB1DF8D000
heap
page read and write
1BD14486000
heap
page read and write
1BD14549000
heap
page read and write
1BD14F5B000
heap
page read and write
35D1000
heap
page read and write
1BD14F75000
heap
page read and write
790000
trusted library allocation
page read and write
1B948C40000
heap
page read and write
1EDEBB64000
heap
page read and write
1BD14F6D000
heap
page read and write
24292602000
trusted library allocation
page read and write
1A174D18000
heap
page read and write
BC0000
unkown
page readonly
1BD14F5A000
heap
page read and write
49DF000
stack
page read and write
3430000
heap
page read and write
4B81000
trusted library allocation
page read and write
1BD14F30000
heap
page read and write
2231865C000
heap
page read and write
1EDEAF50000
heap
page read and write
2A89E84F000
heap
page read and write
1E0DC302000
heap
page read and write
1EDEBB70000
heap
page read and write
1BD14F2A000
heap
page read and write
76E0000
trusted library allocation
page read and write
1ECCF854000
heap
page read and write
1BD154D5000
heap
page read and write
B17BDCE000
stack
page read and write
959E0FF000
stack
page read and write
35CD000
heap
page read and write
BEC000
unkown
page readonly
1BD14F71000
heap
page read and write
1BD14F8C000
heap
page read and write
71343FF000
stack
page read and write
1BD154DE000
heap
page read and write
1E0DC313000
heap
page read and write
17C35600000
heap
page read and write
ABF2A7B000
stack
page read and write
1BD154DE000
heap
page read and write
1BD14F2A000
heap
page read and write
1EEDD3F0000
heap
page read and write
12589000
trusted library allocation
page read and write
1EDEBB31000
heap
page read and write
ABF2E77000
stack
page read and write
1BD14F86000
heap
page read and write
2B66000
heap
page execute and read and write
1BD14F86000
heap
page read and write
A5B87B000
stack
page read and write
1BD14F6E000
heap
page read and write
1CB1E402000
heap
page read and write
1BD1548F000
heap
page read and write
F6C4B7B000
stack
page read and write
1BD154C2000
heap
page read and write
1B948E6D000
heap
page read and write
1BD14F7A000
heap
page read and write
77C0000
trusted library allocation
page read and write
1BD14F5A000
heap
page read and write
1BD14F66000
heap
page read and write
1ECCF6E0000
heap
page read and write
1CB1DF8E000
heap
page read and write
1CB1DF96000
heap
page read and write
4B4F000
stack
page read and write
1BD154DF000
heap
page read and write
34FC000
heap
page read and write
17C356DB000
heap
page read and write
1BD14DC0000
remote allocation
page read and write
24291E5C000
heap
page read and write
1BD14F69000
heap
page read and write
4BB2000
trusted library allocation
page read and write
791000
trusted library allocation
page read and write
1A174D13000
heap
page read and write
1BD14549000
heap
page read and write
1CB1D650000
heap
page read and write
1BD14F62000
heap
page read and write
792000
trusted library allocation
page read and write
1BD154AC000
heap
page read and write
1BD14F5D000
heap
page read and write
22318DF0000
remote allocation
page read and write
1BD14F30000
heap
page read and write
7A9F000
stack
page read and write
162000
unkown
page readonly
241AED02000
heap
page read and write
1BD14F74000
heap
page read and write
1B948E42000
heap
page read and write
792000
trusted library allocation
page read and write
1BD14F53000
heap
page read and write
6FDDCAC000
stack
page read and write
1B948E73000
heap
page read and write
1BD1544C000
heap
page read and write
1D639028000
heap
page read and write
22318702000
heap
page read and write
43A8000
heap
page read and write
7600000
trusted library allocation
page read and write
4587000
trusted library allocation
page execute and read and write
798000
trusted library allocation
page read and write
1B948E5C000
heap
page read and write
175BDD80000
heap
page read and write
1BD14486000
heap
page read and write
1BD15454000
heap
page read and write
1EDEB013000
heap
page read and write
20961C13000
heap
page read and write
1EEDD656000
heap
page read and write
1A174BE0000
heap
page read and write
1BD14F2C000
heap
page read and write
1CB1D3A0000
heap
page read and write
1CB1D63C000
heap
page read and write
1BD14F77000
heap
page read and write
7FFDC43B0000
trusted library allocation
page execute and read and write
1BD14F5A000
heap
page read and write
1B948E63000
heap
page read and write
24291E5E000
heap
page read and write
1CB1D6E6000
heap
page read and write
1BD154F1000
heap
page read and write
7FF42DE10000
trusted library allocation
page execute and read and write
4B51000
trusted library allocation
page read and write
28EF26B0000
heap
page read and write
1BD14502000
heap
page read and write
1BD14F95000
heap
page read and write
8FEABFB000
stack
page read and write
1EDEBB75000
heap
page read and write
1EDEAF40000
heap
page read and write
1ECCF6F0000
heap
page read and write
1BD14F55000
heap
page read and write
1D639012000
heap
page read and write
22318520000
heap
page read and write
1EDEBB78000
heap
page read and write
1BD14F62000
heap
page read and write
1CB1DF8D000
heap
page read and write
4A20000
trusted library allocation
page execute and read and write
1CB1DFA7000
heap
page read and write
1CB1D627000
heap
page read and write
725247C000
stack
page read and write
1BD154E5000
heap
page read and write
5A7000
heap
page read and write
1CB1E402000
heap
page read and write
55368FC000
stack
page read and write
1CB1DF88000
heap
page read and write
35AA000
heap
page read and write
1EDEBB81000
heap
page read and write
959E2FC000
stack
page read and write
1BD14F75000
heap
page read and write
1EEDD629000
heap
page read and write
1BD14F8F000
heap
page read and write
1BD14F2E000
heap
page read and write
1BD154AA000
heap
page read and write
1B948E41000
heap
page read and write
959DE7B000
stack
page read and write
7030000
trusted library allocation
page read and write
1BD15512000
heap
page read and write
1BD14F75000
heap
page read and write
24291E13000
heap
page read and write
CC8000
unkown
page read and write
1EDEBB71000
heap
page read and write
1E0DC277000
heap
page read and write
1BD14F34000
heap
page read and write
1BD154D8000
heap
page read and write
1EDEBB7D000
heap
page read and write
1CB1D68D000
heap
page read and write
1BD144F4000
heap
page read and write
1BD144F9000
heap
page read and write
1BD15512000
heap
page read and write
1BD14432000
heap
page read and write
1A176790000
remote allocation
page read and write
28EF2915000
heap
page read and write
1CB1D600000
heap
page read and write
1BD14F53000
heap
page read and write
1BD144A1000
heap
page read and write
790000
heap
page read and write
1CB1DFA7000
heap
page read and write
1BD14F9D000
heap
page read and write
1BD14F32000
heap
page read and write
1CB1DFAB000
heap
page read and write
BCA000
unkown
page readonly
1A176802000
trusted library allocation
page read and write
1CB1DF85000
heap
page read and write
1BD1546A000
heap
page read and write
35C3000
heap
page read and write
1EDEBB42000
heap
page read and write
1BD14F32000
heap
page read and write
1B948E68000
heap
page read and write
1BD14F52000
heap
page read and write
1BD15465000
heap
page read and write
4D7000
heap
page read and write
1BD15471000
heap
page read and write
1CB1DF82000
heap
page read and write
20961D02000
heap
page read and write
BEC000
unkown
page readonly
22318629000
heap
page read and write
13D000
stack
page read and write
1CB1DF9A000
heap
page read and write
1BD14F7B000
heap
page read and write
323B000
stack
page read and write
1BD14E02000
heap
page read and write
1BD14F81000
heap
page read and write
77B0000
trusted library allocation
page read and write
480000
heap
page read and write
4BEC000
trusted library allocation
page read and write
1BD14F68000
heap
page read and write
1CB1DF5A000
heap
page read and write
1BD14F8D000
heap
page read and write
7660000
trusted library allocation
page read and write
1A174C02000
heap
page read and write
1EDEBA15000
heap
page read and write
1ECCF829000
heap
page read and write
34D7000
heap
page read and write
1E0DC180000
heap
page read and write
1A1766A0000
trusted library allocation
page read and write
1B948E55000
heap
page read and write
B17C57F000
stack
page read and write
241AEC5B000
heap
page read and write
958727B000
stack
page read and write
4B0000
heap
page read and write
1BD14F57000
heap
page read and write
12583000
trusted library allocation
page read and write
1CB1DF85000
heap
page read and write
1ECD0202000
trusted library allocation
page read and write
20961C43000
heap
page read and write
22318600000
heap
page read and write
28EF26E0000
heap
page read and write
1BD14F8D000
heap
page read and write
1BD14F7A000
heap
page read and write
ABF2B7E000
stack
page read and write
1CB1DF85000
heap
page read and write
725257E000
stack
page read and write
1BD14F80000
heap
page read and write
1D639030000
heap
page read and write
2FCA000
stack
page read and write
4BE8000
trusted library allocation
page read and write
77B5000
trusted library allocation
page read and write
570000
heap
page read and write
1CB1DF50000
heap
page read and write
2581000
trusted library allocation
page read and write
1CB1DF8E000
heap
page read and write
34E0000
heap
page read and write
CC8000
unkown
page write copy
26E21FF000
stack
page read and write
1CB1DF18000
heap
page read and write
1BD154C8000
heap
page read and write
BE8000
unkown
page write copy
4BE4000
trusted library allocation
page read and write
1BD14F2C000
heap
page read and write
1BD14F72000
heap
page read and write
77F0000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
BA0B8AA000
stack
page read and write
1BD14F83000
heap
page read and write
55367FD000
stack
page read and write
1BD14F7C000
heap
page read and write
70B0000
heap
page execute and read and write
1BD14F34000
heap
page read and write
2BE5000
heap
page read and write
1BD14F97000
heap
page read and write
1CB1D5C0000
remote allocation
page read and write
175BDC0B000
heap
page read and write
1BD14F62000
heap
page read and write
1BD14400000
heap
page read and write
7760000
trusted library allocation
page read and write
72527FE000
stack
page read and write
1B948E13000
heap
page read and write
75F0000
trusted library allocation
page read and write
ABF2D7B000
stack
page read and write
7FFDC4410000
trusted library allocation
page execute and read and write
1BD14F53000
heap
page read and write
7FFDC42F3000
trusted library allocation
page execute and read and write
ABF2F7E000
stack
page read and write
1EDEBB12000
heap
page read and write
1CB1DF8D000
heap
page read and write
1BD14F34000
heap
page read and write
1B948E74000
heap
page read and write
958737B000
stack
page read and write
4D5000
heap
page read and write
255F11A0000
heap
page read and write
D7A717D000
stack
page read and write
1EDEAFA0000
heap
page read and write
1BD14486000
heap
page read and write
BA0BDFC000
stack
page read and write
76C0000
trusted library allocation
page read and write
1BD14F32000
heap
page read and write
1BD14F55000
heap
page read and write
B17BCCB000
stack
page read and write
1CB1D713000
heap
page read and write
1E0DC224000
heap
page read and write
1BD14F2C000
heap
page read and write
1BD14F32000
heap
page read and write
4BE0000
trusted library allocation
page read and write
795F000
stack
page read and write
35D9000
heap
page read and write
F6C4C77000
stack
page read and write
1CB1E418000
heap
page read and write
35D4000
heap
page read and write
17C35A75000
heap
page read and write
790000
trusted library allocation
page read and write
26E20FF000
stack
page read and write
1BD14F55000
heap
page read and write
1BD14F68000
heap
page read and write
1B948E3D000
heap
page read and write
1BD1445D000
heap
page read and write
255F1413000
heap
page read and write
1BD154B3000
heap
page read and write
1BD14473000
heap
page read and write
1BD14F76000
heap
page read and write
1E0DC23F000
heap
page read and write
1CB1DF98000
heap
page read and write
1BD14F53000
heap
page read and write
28EF26EE000
heap
page read and write
1BD14549000
heap
page read and write
1E0DCC02000
trusted library allocation
page read and write
2BD3000
heap
page read and write
1BD14549000
heap
page read and write
3DC947C000
stack
page read and write
1BD144A7000
heap
page read and write
35FC000
heap
page read and write
CCA000
unkown
page readonly
20961C68000
heap
page read and write
45D0000
trusted library allocation
page read and write
1BD154EF000
heap
page read and write
1B948E3B000
heap
page read and write
20961A30000
heap
page read and write
4514000
trusted library allocation
page read and write
1E0DC275000
heap
page read and write
51F7000
heap
page read and write
BA0BC79000
stack
page read and write
1CB1DF81000
heap
page read and write
7750000
trusted library allocation
page read and write
1BD14F95000
heap
page read and write
7620000
trusted library allocation
page read and write
958747E000
stack
page read and write
1CB1DF9B000
heap
page read and write
17B000
stack
page read and write
1CB1E414000
heap
page read and write
22318DF0000
remote allocation
page read and write
241AEC02000
heap
page read and write
There are 1419 hidden memdumps, click here to show them.