IOC Report
PO3311926.exe

loading gif

Files

File Path
Type
Category
Malicious
PO3311926.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\nngqrvwq.xl
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\wrse\nngqrvwq.xl
data
dropped
malicious
C:\Users\user\wrse\sdadbtvsh.bin
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\wrse\sdadbtvsh.bin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\RarSFX0\aijs.docx
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\cqeg.bmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\ensfhqoc.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\oahtefaij.docx
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\oewmscssx.xl
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\oqrcndmig.mp3
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\pxxdqattof.bin
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\qcndm.jpg
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\qjjfc.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\qxvdwja.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\rdjajvacb.pdf
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\rskudssahm.mp2
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\thgwhgvgpb.jpg
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\waheeaq.pdf
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\wgsr.msc
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\xinhmbnh.mp2
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\RarSFX0\xjcp.hrp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\RegSvcs.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\temp\wgsr.msc
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\aijs.docx
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\cqeg.bmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\ensfhqoc.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\oahtefaij.docx
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\oewmscssx.xl
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\oqrcndmig.mp3
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\pxxdqattof.bin
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\qcndm.jpg
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\qjjfc.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\qxvdwja.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\rdjajvacb.pdf
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\rskudssahm.mp2
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\thgwhgvgpb.jpg
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\vjpj.vbe
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\wrse\waheeaq.pdf
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\wgsr.msc
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\xinhmbnh.mp2
ASCII text, with CRLF line terminators
dropped
C:\Users\user\wrse\xjcp.hrp
ASCII text, with very long lines (65536), with no line terminators
modified
Chrome Cache Entry: 107
ASCII text, with very long lines (3803)
downloaded
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO3311926.exe
"C:\Users\user\Desktop\PO3311926.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c sdadbtvsh.bin nngqrvwq.xl
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /release
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
sdadbtvsh.bin nngqrvwq.xl
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /renew
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
C:\Users\user\AppData\Roaming\RegSvcs.exe
malicious
C:\Users\user\wrse\sdadbtvsh.bin.exe
"C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
"C:\Users\user\AppData\Roaming\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
C:\Users\user\AppData\Roaming\RegSvcs.exe
malicious
C:\Users\user\wrse\sdadbtvsh.bin.exe
"C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
"C:\Users\user\AppData\Roaming\RegSvcs.exe"
malicious
C:\Users\user\wrse\sdadbtvsh.bin.exe
"C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
C:\Users\user\AppData\Roaming\RegSvcs.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,7789945920983853701,11701749339926702711,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 22 hidden processes, click here to show them.

URLs

Name
IP
Malicious
102.165.14.26
malicious
https://www.google.com/async/ddljson?async=ntp:2
142.250.191.196
http://www.autoitscript.com/autoit3/J
unknown
https://www.google.com/async/newtab_promos
142.250.191.196
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRRtT5aGKXUvbEGIjD-kgWdpW8hT-9hc2nj_b9H1bs6sOSvG1viHx2oR-H037B_HudVAHyts9ARK3nBSXsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.191.196
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.191.196
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.191.196
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtT5aGKXUvbEGIjDdp0aB_5C1gr2eixUtAMj4mBUQzkJ9vh0Q2d77njF6aqNILXZ84lvrwl1-Gwx1dfsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.191.196
https://www.autoitscript.com/autoit3/
unknown

Domains

Name
IP
Malicious
www.google.com
142.250.191.196

IPs

IP
Domain
Country
Malicious
102.165.14.26
unknown
South Africa
malicious
239.255.255.250
unknown
Reserved
192.168.2.8
unknown
unknown
142.250.191.196
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RegSvcs
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WindowsUpdate
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
WindowsUpdate

Memdumps

Base Address
Regiontype
Protect
Malicious
1832000
heap
page read and write
malicious
182A000
heap
page read and write
malicious
1595000
heap
page read and write
malicious
17C4000
heap
page read and write
malicious
DA4000
heap
page read and write
malicious
4046000
heap
page read and write
malicious
17FE000
heap
page read and write
malicious
1682000
heap
page read and write
malicious
17FE000
heap
page read and write
malicious
502000
remote allocation
page execute and read and write
malicious
41ED000
heap
page read and write
malicious
1866000
heap
page read and write
malicious
E83000
heap
page read and write
malicious
37D0000
heap
page read and write
malicious
D94000
heap
page read and write
malicious
4098000
heap
page read and write
malicious
16B7000
heap
page read and write
malicious
1757000
heap
page read and write
malicious
E7B000
heap
page read and write
malicious
16B7000
heap
page read and write
malicious
EB8000
heap
page read and write
malicious
1754000
heap
page read and write
malicious
1744000
heap
page read and write
malicious
17AC000
heap
page read and write
malicious
1866000
heap
page read and write
malicious
EB8000
heap
page read and write
malicious
1665000
heap
page read and write
malicious
1814000
heap
page read and write
malicious
167B000
heap
page read and write
malicious
E66000
heap
page read and write
malicious
DEA000
heap
page read and write
577000
heap
page read and write
4041000
trusted library allocation
page read and write
11B7C000
stack
page read and write
590000
unkown
page readonly
B0C0000
trusted library allocation
page read and write
587000
heap
page read and write
DE6000
heap
page read and write
CEB0000
heap
page read and write
4090000
trusted library allocation
page read and write
1826000
heap
page read and write
DE6000
heap
page read and write
1704000
heap
page read and write
8D12000
heap
page read and write
33C0000
heap
page read and write
1826000
heap
page read and write
182F000
heap
page read and write
182F000
heap
page read and write
1300000
remote allocation
page execute and read and write
17CB000
heap
page read and write
1397000
heap
page read and write
B2D000
unkown
page write copy
15BE000
heap
page read and write
4090000
trusted library allocation
page read and write
3403000
heap
page read and write
17BA000
heap
page read and write
B23000
unkown
page readonly
B35000
unkown
page readonly
A8BE000
stack
page read and write
1770000
trusted library allocation
page read and write
E81000
heap
page read and write
58B0000
heap
page read and write
16A0000
trusted library allocation
page execute and read and write
119BE000
stack
page read and write
D137000
trusted library allocation
page execute and read and write
158F000
stack
page read and write
55AE000
stack
page read and write
1590000
heap
page read and write
33C0000
heap
page read and write
1323000
trusted library allocation
page execute and read and write
16FE000
heap
page read and write
BD3000
unkown
page readonly
4040000
trusted library allocation
page read and write
16E4000
heap
page read and write
2064000
heap
page read and write
620000
heap
page read and write
AAB8000
heap
page read and write
168D000
heap
page read and write
5F8F000
stack
page read and write
37C0000
trusted library allocation
page read and write
8DC6000
heap
page read and write
1757000
heap
page read and write
16F5000
heap
page read and write
1857000
heap
page read and write
A61000
unkown
page execute read
4ADC000
stack
page read and write
4090000
trusted library allocation
page read and write
3DA000
stack
page read and write
142E000
stack
page read and write
5886000
heap
page read and write
4040000
trusted library allocation
page read and write
1772000
heap
page read and write
9347000
heap
page read and write
16F7000
heap
page read and write
51DD000
stack
page read and write
15B4000
heap
page read and write
C03000
unkown
page readonly
58B0000
heap
page read and write
5826000
heap
page read and write
16FB000
heap
page read and write
AB0000
trusted library allocation
page execute and read and write
575000
heap
page read and write
D51E000
stack
page read and write
47DA000
trusted library allocation
page read and write
16FE000
heap
page read and write
DA8000
heap
page read and write
C03000
unkown
page write copy
130B000
remote allocation
page execute and read and write
AAA4000
trusted library allocation
page read and write
A87E000
stack
page read and write
1846000
heap
page read and write
15AE000
heap
page read and write
DA1000
heap
page read and write
40E1000
heap
page read and write
DE3000
heap
page read and write
1827000
heap
page read and write
DAB000
heap
page read and write
36CE000
stack
page read and write
1E6000
stack
page read and write
93E000
heap
page read and write
1733000
heap
page read and write
37C0000
trusted library allocation
page read and write
16B0000
heap
page read and write
37C0000
trusted library allocation
page read and write
1773000
heap
page read and write
620000
heap
page read and write
DDC000
stack
page read and write
8D53000
heap
page read and write
5FCB000
stack
page read and write
D10D000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
BE5000
unkown
page read and write
8D4E000
heap
page read and write
4040000
trusted library allocation
page read and write
1767000
heap
page read and write
A760000
heap
page read and write
C101000
trusted library allocation
page read and write
58E2000
heap
page read and write
1744000
heap
page read and write
1E7E000
stack
page read and write
B2D000
unkown
page write copy
33DB000
heap
page read and write
1665000
heap
page read and write
17A8000
heap
page read and write
1660000
trusted library allocation
page read and write
B31000
unkown
page write copy
4040000
trusted library allocation
page read and write
577000
heap
page read and write
8C44000
heap
page read and write
16EE000
heap
page read and write
178B000
heap
page read and write
1656000
heap
page read and write
49BE000
stack
page read and write
41E0000
trusted library allocation
page read and write
F13000
trusted library allocation
page execute and read and write
4090000
trusted library allocation
page read and write
10B000
stack
page read and write
13B3000
heap
page read and write
4090000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
DBD000
heap
page read and write
13DE000
stack
page read and write
DE3000
heap
page read and write
45C000
stack
page read and write
D7D0000
heap
page read and write
A9C000
stack
page read and write
1142E000
stack
page read and write
183C000
heap
page read and write
4EB000
stack
page read and write
33DB000
heap
page read and write
4090000
trusted library allocation
page read and write
E55000
heap
page read and write
15B4000
heap
page read and write
2AA1000
trusted library allocation
page read and write
159D000
heap
page read and write
DA0000
remote allocation
page execute and read and write
3375000
heap
page read and write
BDE000
unkown
page read and write
34B6000
heap
page read and write
DF5000
heap
page read and write
8CC0000
trusted library allocation
page execute and read and write
1140000
heap
page read and write
3330000
heap
page read and write
10A0000
trusted library allocation
page read and write
1708000
heap
page read and write
620000
heap
page read and write
D29E000
stack
page read and write
58A2000
heap
page read and write
58B0000
heap
page read and write
179E000
heap
page read and write
49A0000
heap
page read and write
17C9000
heap
page read and write
590000
unkown
page readonly
E01000
heap
page read and write
4D2E000
stack
page read and write
EBF5000
trusted library allocation
page read and write
10FA000
stack
page read and write
F20000
trusted library allocation
page read and write
1280000
heap
page read and write
17C8000
heap
page read and write
620000
heap
page read and write
381C000
heap
page read and write
17C0000
heap
page read and write
56E0000
heap
page execute and read and write
F14000
trusted library allocation
page read and write
33C0000
heap
page read and write
1070000
trusted library allocation
page read and write
33D2000
heap
page read and write
3398000
heap
page read and write
58E2000
heap
page read and write
5F0000
heap
page read and write
4040000
trusted library allocation
page read and write
340C000
heap
page read and write
15BE000
heap
page read and write
16FD000
heap
page read and write
2A9E000
stack
page read and write
AB32000
heap
page read and write
17E8000
heap
page read and write
AD70000
trusted library allocation
page read and write
7CC000
stack
page read and write
123B000
stack
page read and write
1733000
heap
page read and write
17AC000
heap
page read and write
37CF000
stack
page read and write
3357000
heap
page read and write
1578000
heap
page read and write
6B79000
heap
page read and write
589000
heap
page read and write
AFD000
unkown
page readonly
14D0000
heap
page read and write
7ED000
trusted library allocation
page execute and read and write
8DBB000
heap
page read and write
949000
heap
page read and write
1697000
heap
page read and write
91F000
heap
page read and write
ACAF000
stack
page read and write
1857000
heap
page read and write
15C1000
heap
page read and write
EFEE000
stack
page read and write
16C8000
heap
page read and write
4040000
trusted library allocation
page read and write
1786000
heap
page read and write
A8F9000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
AADE000
heap
page read and write
AFD000
unkown
page readonly
113A6000
trusted library allocation
page read and write
1680000
heap
page read and write
1748000
heap
page read and write
661000
unkown
page write copy
1644000
heap
page read and write
A8CD000
stack
page read and write
A8E4000
trusted library allocation
page read and write
17C3000
heap
page read and write
17AC000
heap
page read and write
16F4000
heap
page read and write
41E0000
trusted library allocation
page read and write
8D67000
heap
page read and write
307C000
stack
page read and write
910000
trusted library allocation
page read and write
33EE000
heap
page read and write
37C0000
trusted library allocation
page read and write
C34000
heap
page read and write
8DB9000
heap
page read and write
1735000
heap
page read and write
1805000
heap
page read and write
B0E0000
heap
page execute and read and write
8C81000
heap
page read and write
894000
trusted library allocation
page read and write
16B7000
heap
page read and write
95CF000
stack
page read and write
8E3000
heap
page read and write
1357000
trusted library allocation
page execute and read and write
AAB0000
heap
page read and write
A60000
unkown
page readonly
4B1E000
heap
page read and write
15DF000
stack
page read and write
EE94000
trusted library allocation
page read and write
183C000
heap
page read and write
EBC4000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
87E000
stack
page read and write
63A000
stack
page read and write
1762000
heap
page read and write
C34000
heap
page read and write
B2D000
unkown
page write copy
4090000
trusted library allocation
page read and write
8BCA000
heap
page read and write
175A000
heap
page read and write
EB8000
heap
page read and write
E81000
heap
page read and write
8C43000
heap
page read and write
15B4000
heap
page read and write
15FE000
stack
page read and write
175C000
heap
page read and write
4040000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
58E2000
heap
page read and write
1697000
heap
page read and write
340C000
heap
page read and write
1510000
trusted library allocation
page read and write
113A9000
trusted library allocation
page read and write
1767000
heap
page read and write
16F4000
heap
page read and write
EFAE000
stack
page read and write
840000
heap
page read and write
170E000
heap
page read and write
1523000
trusted library allocation
page execute and read and write
16F8000
heap
page read and write
9EE000
stack
page read and write
4C0000
stack
page read and write
1660000
heap
page read and write
545000
heap
page read and write
176B000
heap
page read and write
179A000
heap
page read and write
4096000
heap
page read and write
17C9000
heap
page read and write
E80E000
stack
page read and write
620000
heap
page read and write
340C000
heap
page read and write
381A000
heap
page read and write
17C7000
heap
page read and write
611000
heap
page read and write
161D000
heap
page read and write
D59E000
stack
page read and write
83F000
stack
page read and write
9396000
heap
page read and write
2571000
trusted library allocation
page read and write
1793000
heap
page read and write
1762000
heap
page read and write
590000
heap
page read and write
EE80000
heap
page execute and read and write
4040000
trusted library allocation
page read and write
670000
heap
page read and write
16FE000
stack
page read and write
33DC000
heap
page read and write
AD2D000
stack
page read and write
6C44000
heap
page read and write
457E000
stack
page read and write
8C4A000
trusted library allocation
page execute and read and write
302F000
stack
page read and write
33BC000
heap
page read and write
4090000
trusted library allocation
page read and write
E66000
heap
page read and write
1338000
stack
page read and write
8CBE000
stack
page read and write
5BF000
heap
page read and write
4090000
trusted library allocation
page read and write
4C20000
heap
page execute and read and write
33E7000
heap
page read and write
1866000
heap
page read and write
AFD000
unkown
page readonly
E38000
heap
page read and write
1080000
trusted library allocation
page execute and read and write
16E4000
heap
page read and write
15AB000
heap
page read and write
EE90000
trusted library allocation
page read and write
970A000
trusted library allocation
page execute and read and write
DF8000
heap
page read and write
587A000
heap
page read and write
DF9000
heap
page read and write
1514000
heap
page read and write
C34000
heap
page read and write
1607000
heap
page read and write
62D000
unkown
page readonly
17C9000
heap
page read and write
1680000
trusted library allocation
page read and write
E26000
heap
page read and write
17C9000
heap
page read and write
5842000
heap
page read and write
381E000
heap
page read and write
15C3000
heap
page read and write
1644000
heap
page read and write
A876000
trusted library allocation
page read and write
93D7000
heap
page read and write
DB7000
heap
page read and write
33CD000
heap
page read and write
D870000
heap
page execute and read and write
37C0000
trusted library allocation
page read and write
17DE000
heap
page read and write
640000
heap
page read and write
D12A000
trusted library allocation
page execute and read and write
557000
heap
page read and write
186A000
heap
page read and write
650000
heap
page read and write
58B0000
heap
page read and write
EBD4000
trusted library allocation
page read and write
340C000
heap
page read and write
3AA1000
trusted library allocation
page read and write
1665000
heap
page read and write
1767000
heap
page read and write
37C0000
trusted library allocation
page read and write
1857000
heap
page read and write
AA3A000
trusted library allocation
page execute and read and write
B23000
unkown
page readonly
1644000
heap
page read and write
14AE000
stack
page read and write
4191000
trusted library allocation
page read and write
2370000
trusted library allocation
page execute and read and write
AFD000
unkown
page readonly
1750000
trusted library allocation
page read and write
8D12000
heap
page read and write
588D000
heap
page read and write
E31000
heap
page read and write
41E0000
trusted library allocation
page read and write
8D20000
heap
page read and write
15B0000
heap
page read and write
1665000
heap
page read and write
7DD000
trusted library allocation
page execute and read and write
582E000
heap
page read and write
1768000
heap
page read and write
1790000
heap
page read and write
6CE000
stack
page read and write
665000
unkown
page readonly
167B000
heap
page read and write
145F000
stack
page read and write
16FE000
heap
page read and write
AB61000
heap
page read and write
CFA0000
heap
page read and write
589000
heap
page read and write
33BD000
heap
page read and write
4040000
trusted library allocation
page read and write
E81000
heap
page read and write
3403000
heap
page read and write
4040000
trusted library allocation
page read and write
3403000
heap
page read and write
1254C000
stack
page read and write
15E7000
heap
page read and write
41E0000
trusted library allocation
page read and write
1796000
heap
page read and write
C671000
trusted library allocation
page read and write
D61E000
stack
page read and write
15C3000
heap
page read and write
4040000
trusted library allocation
page read and write
15B4000
heap
page read and write
1660000
trusted library allocation
page read and write
2F74000
heap
page read and write
1644000
heap
page read and write
1846000
heap
page read and write
8BFE000
stack
page read and write
660000
heap
page read and write
529E000
stack
page read and write
167F000
stack
page read and write
17AC000
heap
page read and write
8BCA000
heap
page read and write
1857000
heap
page read and write
1510000
heap
page read and write
182F000
heap
page read and write
54D0000
trusted library allocation
page read and write
D60000
heap
page read and write
17DE000
heap
page read and write
1665000
heap
page read and write
1644000
heap
page read and write
41E0000
trusted library allocation
page read and write
8C8000
heap
page read and write
B0B0000
trusted library allocation
page read and write
174C000
heap
page read and write
570E000
stack
page read and write
924E000
stack
page read and write
3350000
heap
page read and write
1733000
heap
page read and write
3571000
trusted library allocation
page read and write
15BC000
heap
page read and write
16AE000
stack
page read and write
1663000
heap
page read and write
1767000
heap
page read and write
DBC000
heap
page read and write
97F0000
heap
page read and write
4040000
trusted library allocation
page read and write
1380000
trusted library allocation
page execute and read and write
DAB000
remote allocation
page execute and read and write
176D000
heap
page read and write
1825000
heap
page read and write
928000
heap
page read and write
1734000
heap
page read and write
50FE000
stack
page read and write
33E7000
heap
page read and write
161E000
heap
page read and write
92C0000
heap
page read and write
C10000
heap
page read and write
1805000
heap
page read and write
37C0000
trusted library allocation
page read and write
D7CE000
stack
page read and write
8D7000
trusted library allocation
page execute and read and write
1733000
heap
page read and write
1182E000
stack
page read and write
D177000
heap
page read and write
1330000
trusted library allocation
page read and write
E64000
heap
page read and write
16E3000
heap
page read and write
E4B000
heap
page read and write
A5E000
stack
page read and write
183E000
heap
page read and write
4040000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
B35000
unkown
page readonly
591000
heap
page read and write
18A6000
heap
page read and write
17E8000
heap
page read and write
AAA0000
trusted library allocation
page read and write
33E1000
heap
page read and write
3F91000
heap
page read and write
4090000
trusted library allocation
page read and write
16C0000
heap
page read and write
D216000
heap
page read and write
D113000
trusted library allocation
page read and write
3403000
heap
page read and write
B23000
unkown
page readonly
15FA000
heap
page read and write
B35000
unkown
page readonly
188B000
heap
page read and write
588A000
heap
page read and write
D76000
heap
page read and write
58A000
heap
page read and write
1644000
heap
page read and write
17AC000
heap
page read and write
4A6E000
stack
page read and write
8D12000
heap
page read and write
9A4000
heap
page read and write
340C000
heap
page read and write
10B0000
heap
page execute and read and write
5816000
heap
page read and write
17AC000
heap
page read and write
C30000
heap
page read and write
1680000
heap
page read and write
3383000
heap
page read and write
15FC000
heap
page read and write
613000
heap
page read and write
C34000
heap
page read and write
10045000
trusted library allocation
page read and write
33C9000
heap
page read and write
E61000
heap
page read and write
239F000
stack
page read and write
4040000
trusted library allocation
page read and write
D1B8000
heap
page read and write
1700000
heap
page read and write
17C9000
heap
page read and write
17CB000
heap
page read and write
1514000
heap
page read and write
58B0000
heap
page read and write
1747000
heap
page read and write
BA0000
unkown
page readonly
17FE000
heap
page read and write
A60000
unkown
page readonly
F069000
trusted library allocation
page read and write
182F000
heap
page read and write
4044000
heap
page read and write
1828000
heap
page read and write
95D3000
trusted library allocation
page execute and read and write
3030000
heap
page read and write
15E9000
heap
page read and write
BD3000
unkown
page readonly
3351000
heap
page read and write
1644000
heap
page read and write
A7BF000
stack
page read and write
182F000
heap
page read and write
8D12000
heap
page read and write
D5A0000
heap
page read and write
1866000
heap
page read and write
177B000
heap
page read and write
1776000
heap
page read and write
3F40000
heap
page read and write
36C1000
heap
page read and write
AA47000
trusted library allocation
page execute and read and write
583E000
stack
page read and write
E38000
heap
page read and write
3378000
heap
page read and write
D94000
heap
page read and write
A8C0000
heap
page read and write
36C1000
heap
page read and write
800000
heap
page read and write
4E2E000
stack
page read and write
AFD000
unkown
page readonly
33C5000
heap
page read and write
1747000
heap
page read and write
D09E000
stack
page read and write
16E5000
heap
page read and write
33D8000
heap
page read and write
F24000
trusted library allocation
page read and write
17FE000
heap
page read and write
1772000
heap
page read and write
5831000
heap
page read and write
8C13000
heap
page read and write
1632000
heap
page read and write
15B5000
heap
page read and write
1514000
heap
page read and write
1665000
heap
page read and write
4FA000
stack
page read and write
6274000
heap
page read and write
DA6000
heap
page read and write
15B4000
heap
page read and write
6A70000
heap
page read and write
17E8000
heap
page read and write
173E000
heap
page read and write
4040000
trusted library allocation
page read and write
6C36000
heap
page read and write
88D000
stack
page read and write
5110000
heap
page read and write
E55000
heap
page read and write
154D000
stack
page read and write
B2D000
unkown
page read and write
1700000
heap
page read and write
1245000
heap
page read and write
EE60000
trusted library allocation
page read and write
D104000
trusted library allocation
page read and write
4C1E000
stack
page read and write
15B4000
heap
page read and write
AA60000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
177D000
heap
page read and write
E7C000
heap
page read and write
17E0000
heap
page read and write
DEA000
heap
page read and write
B23000
unkown
page readonly
1728000
heap
page read and write
16F6000
heap
page read and write
16CE000
stack
page read and write
4BAE000
stack
page read and write
8CB1000
heap
page read and write
8C13000
trusted library allocation
page execute and read and write
2E90000
trusted library allocation
page read and write
AD74000
trusted library allocation
page read and write
E8E000
heap
page read and write
AD80000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
6BAE000
stack
page read and write
41E0000
trusted library allocation
page read and write
8AD000
trusted library allocation
page execute and read and write
920000
heap
page read and write
F47000
trusted library allocation
page execute and read and write
33DB000
heap
page read and write
AA70000
trusted library allocation
page execute and read and write
1601000
heap
page read and write
AC0000
heap
page execute and read and write
8CE0000
heap
page read and write
1827000
heap
page read and write
ED6E000
stack
page read and write
B35000
unkown
page readonly
1765000
heap
page read and write
60CC000
stack
page read and write
17C9000
heap
page read and write
55DE000
stack
page read and write
37C0000
trusted library allocation
page read and write
1608000
heap
page read and write
549E000
stack
page read and write
17FB000
heap
page read and write
176D000
heap
page read and write
DE9000
heap
page read and write
168D000
heap
page read and write
58B0000
heap
page read and write
1225C000
heap
page read and write
173F000
heap
page read and write
37C0000
trusted library allocation
page read and write
1796000
heap
page read and write
EBE9000
trusted library allocation
page read and write
EE70000
trusted library allocation
page read and write
EE40000
heap
page read and write
6CEC000
stack
page read and write
EB8000
heap
page read and write
3403000
heap
page read and write
134B000
remote allocation
page execute and read and write
33E1000
heap
page read and write
41E0000
trusted library allocation
page read and write
D70000
heap
page read and write
DEC000
heap
page read and write
582F000
stack
page read and write
B23000
unkown
page readonly
1762000
heap
page read and write
152D000
trusted library allocation
page execute and read and write
89D000
trusted library allocation
page execute and read and write
96F4000
trusted library allocation
page read and write
15AC000
heap
page read and write
41E0000
trusted library allocation
page read and write
17FE000
heap
page read and write
DB7000
heap
page read and write
16DC000
heap
page read and write
D05E000
stack
page read and write
BA1000
unkown
page execute read
5856000
heap
page read and write
1823000
heap
page read and write
17DE000
heap
page read and write
1739000
heap
page read and write
15E3000
heap
page read and write
17D4000
heap
page read and write
92F0000
trusted library allocation
page read and write
1793000
heap
page read and write
41E0000
trusted library allocation
page read and write
9FE000
stack
page read and write
8C24000
trusted library allocation
page read and write
15AE000
stack
page read and write
DE3000
heap
page read and write
17F0000
heap
page read and write
A880000
heap
page execute and read and write
996000
heap
page read and write
E81000
heap
page read and write
8C74000
heap
page read and write
4090000
trusted library allocation
page read and write
AAF7000
heap
page read and write
17B1000
heap
page read and write
584A000
heap
page read and write
A0E000
stack
page read and write
15B4000
heap
page read and write
15E3000
heap
page read and write
928E000
stack
page read and write
1514000
heap
page read and write
6F0000
heap
page read and write
1334000
trusted library allocation
page read and write
16FE000
heap
page read and write
5A6000
heap
page read and write
BA0000
unkown
page readonly
623000
heap
page read and write
8B80000
heap
page read and write
6DEC000
stack
page read and write
33DD000
heap
page read and write
1250000
heap
page read and write
17B0000
heap
page read and write
2B4F000
stack
page read and write
15A5000
heap
page read and write
611000
heap
page read and write
EBE6000
trusted library allocation
page read and write
8C50000
trusted library allocation
page read and write
17E8000
heap
page read and write
33DD000
heap
page read and write
15B1000
heap
page read and write
1660000
trusted library allocation
page read and write
D8A000
heap
page read and write
106F000
stack
page read and write
8C40000
trusted library allocation
page read and write
D671000
trusted library allocation
page read and write
1595000
heap
page read and write
1524000
trusted library allocation
page read and write
96EF000
stack
page read and write
5831000
heap
page read and write
1678000
heap
page read and write
1660000
heap
page read and write
1640000
heap
page read and write
A3E000
stack
page read and write
611000
heap
page read and write
56DE000
stack
page read and write
610000
heap
page read and write
D39000
heap
page read and write
168D000
heap
page read and write
F010000
heap
page execute and read and write
EDD000
heap
page read and write
8F1F000
stack
page read and write
15B4000
heap
page read and write
116EE000
stack
page read and write
5A0000
heap
page read and write
D97000
heap
page read and write
A914000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
D103000
trusted library allocation
page execute and read and write
33E2000
heap
page read and write
F11E000
stack
page read and write
F06F000
trusted library allocation
page read and write
16F2000
heap
page read and write
C34000
heap
page read and write
3815000
heap
page read and write
1762000
heap
page read and write
AB1C000
heap
page read and write
5BAE000
stack
page read and write
3F41000
heap
page read and write
8CA9000
heap
page read and write
13BA000
heap
page read and write
517E000
stack
page read and write
13EF000
stack
page read and write
4040000
trusted library allocation
page read and write
EC30000
heap
page read and write
1744000
heap
page read and write
33C0000
heap
page read and write
A61000
unkown
page execute read
DB1E000
stack
page read and write
17D6000
heap
page read and write
B31000
unkown
page write copy
178B000
heap
page read and write
1614000
heap
page read and write
11D0000
trusted library allocation
page execute and read and write
6F5000
heap
page read and write
AAE9000
heap
page read and write
4D9E000
stack
page read and write
15F1000
heap
page read and write
611000
heap
page read and write
7D3000
trusted library allocation
page execute and read and write
8BE1000
heap
page read and write
23D0000
heap
page read and write
58B0000
heap
page read and write
D94000
heap
page read and write
E8E000
heap
page read and write
57F000
heap
page read and write
1770000
heap
page read and write
1570000
heap
page read and write
2560000
heap
page read and write
33EC000
heap
page read and write
E8E000
heap
page read and write
C63E000
stack
page read and write
DC0000
heap
page read and write
164A000
heap
page read and write
14E0000
heap
page read and write
AD30000
heap
page read and write
DF0000
heap
page read and write
971B000
trusted library allocation
page execute and read and write
1514000
heap
page read and write
1340000
remote allocation
page execute and read and write
943000
heap
page read and write
15EF000
stack
page read and write
58A000
heap
page read and write
1430000
heap
page read and write
4F36000
heap
page read and write
2060000
heap
page read and write
1639000
heap
page read and write
C34000
heap
page read and write
33E7000
heap
page read and write
DC2000
heap
page read and write
176C000
heap
page read and write
D224000
heap
page read and write
E55000
heap
page read and write
9200000
heap
page read and write
1740000
trusted library allocation
page read and write
15FA000
heap
page read and write
3814000
heap
page read and write
8C00000
trusted library allocation
page read and write
4FDF000
stack
page read and write
1776000
heap
page read and write
DA1F000
stack
page read and write
33E5000
heap
page read and write
8C5B000
trusted library allocation
page execute and read and write
E66000
heap
page read and write
5B0000
heap
page read and write
1793000
heap
page read and write
D3DE000
stack
page read and write
17AC000
heap
page read and write
1639000
heap
page read and write
A925000
heap
page read and write
E81000
heap
page read and write
1799000
heap
page read and write
1514000
heap
page read and write
182F000
heap
page read and write
580F000
stack
page read and write
4980000
heap
page read and write
153D000
trusted library allocation
page execute and read and write
36C0000
heap
page read and write
735000
heap
page read and write
95D4000
trusted library allocation
page read and write
D754000
trusted library allocation
page read and write
3320000
heap
page read and write
D10000
heap
page read and write
12CE000
stack
page read and write
4090000
trusted library allocation
page read and write
317D000
stack
page read and write
A910000
trusted library allocation
page read and write
1627000
heap
page read and write
33E2000
heap
page read and write
B31000
unkown
page write copy
13AE000
stack
page read and write
D18000
heap
page read and write
81B000
trusted library allocation
page execute and read and write
17CB000
heap
page read and write
4090000
trusted library allocation
page read and write
93B5000
heap
page read and write
33D2000
heap
page read and write
4040000
trusted library allocation
page read and write
8BE1000
heap
page read and write
249E000
stack
page read and write
170B000
heap
page read and write
4F7000
stack
page read and write
E08000
heap
page read and write
8C30000
heap
page read and write
1754000
heap
page read and write
F030000
heap
page execute and read and write
EC20000
heap
page read and write
33C5000
heap
page read and write
1324000
trusted library allocation
page read and write
6BE000
stack
page read and write
340C000
heap
page read and write
1846000
heap
page read and write
F4B000
trusted library allocation
page execute and read and write
1706000
heap
page read and write
12250000
heap
page read and write
3383000
heap
page read and write
7E0000
trusted library allocation
page read and write
B23000
unkown
page readonly
1350000
trusted library allocation
page read and write
16B7000
heap
page read and write
8044000
heap
page read and write
141E000
stack
page read and write
33ED000
heap
page read and write
3403000
heap
page read and write
E97000
heap
page read and write
DAD000
heap
page read and write
65D000
unkown
page write copy
DA1000
heap
page read and write
182B000
heap
page read and write
1598000
heap
page read and write
E81000
heap
page read and write
B09F000
stack
page read and write
17A8000
heap
page read and write
1814000
heap
page read and write
179D000
heap
page read and write
DC9000
stack
page read and write
CF7E000
stack
page read and write
E97000
heap
page read and write
1814000
heap
page read and write
1858000
heap
page read and write
17D4000
heap
page read and write
E79000
heap
page read and write
56AF000
stack
page read and write
A61000
unkown
page execute read
8C57000
trusted library allocation
page execute and read and write
D132000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
3815000
heap
page read and write
C34000
heap
page read and write
16A9000
heap
page read and write
41E0000
trusted library allocation
page read and write
AA30000
trusted library allocation
page read and write
58B0000
heap
page read and write
A61000
unkown
page execute read
17C8000
heap
page read and write
4EDE000
stack
page read and write
146E000
stack
page read and write
33E7000
heap
page read and write
57E000
heap
page read and write
AB9E000
heap
page read and write
8CE2000
heap
page read and write
8DAF000
heap
page read and write
37CE000
heap
page read and write
5190000
heap
page execute and read and write
33D9000
heap
page read and write
16E4000
heap
page read and write
33C1000
heap
page read and write
1590000
heap
page read and write
591000
unkown
page execute read
D97000
heap
page read and write
33E7000
heap
page read and write
17A9000
heap
page read and write
23E1000
trusted library allocation
page read and write
23C0000
trusted library allocation
page execute and read and write
DF9000
heap
page read and write
1644000
heap
page read and write
1793000
heap
page read and write
A97000
heap
page read and write
1240000
heap
page read and write
183E000
heap
page read and write
DB5000
heap
page read and write
880000
trusted library allocation
page read and write
2360000
heap
page execute and read and write
2B0E000
stack
page read and write
1514000
heap
page read and write
653000
unkown
page readonly
118E000
stack
page read and write
409D000
heap
page read and write
597F000
stack
page read and write
1514000
heap
page read and write
C6B000
stack
page read and write
17C9000
heap
page read and write
170000
heap
page read and write
CF80000
heap
page read and write
170F000
heap
page read and write
3191000
trusted library allocation
page read and write
540000
heap
page read and write
1680000
heap
page read and write
41E0000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
15FA000
heap
page read and write
2E90000
trusted library allocation
page read and write
D4E000
stack
page read and write
1826000
heap
page read and write
E66000
heap
page read and write
8C74000
heap
page read and write
15CE000
stack
page read and write
E38000
heap
page read and write
8B81000
heap
page read and write
167D000
heap
page read and write
1742000
heap
page read and write
E77000
heap
page read and write
B30000
heap
page read and write
E81000
heap
page read and write
15B4000
heap
page read and write
179A000
heap
page read and write
41E0000
trusted library allocation
page read and write
586000
heap
page read and write
33C0000
heap
page read and write
41E0000
trusted library allocation
page read and write
1514000
heap
page read and write
1D0000
heap
page read and write
1814000
heap
page read and write
5E8E000
stack
page read and write
17A8000
heap
page read and write
5812000
heap
page read and write
AF0000
heap
page read and write
1733000
heap
page read and write
5550000
heap
page read and write
1514000
heap
page read and write
DE3000
heap
page read and write
15B4000
heap
page read and write
D00000
trusted library allocation
page read and write
5811000
heap
page read and write
6C32000
heap
page read and write
F1D000
trusted library allocation
page execute and read and write
1650000
heap
page read and write
8CD0000
trusted library allocation
page read and write
AFA000
stack
page read and write
A8D4000
trusted library allocation
page read and write
340C000
heap
page read and write
573E000
stack
page read and write
15B0000
heap
page read and write
1631000
heap
page read and write
F06D000
trusted library allocation
page read and write
17CD000
heap
page read and write
159B000
heap
page read and write
1793000
heap
page read and write
41E0000
trusted library allocation
page read and write
155B000
trusted library allocation
page execute and read and write
33DC000
heap
page read and write
DB8000
heap
page read and write
1697000
heap
page read and write
3B00000
heap
page read and write
A8F0000
trusted library allocation
page read and write
D25F000
stack
page read and write
92B5000
heap
page read and write
E30000
heap
page read and write
D92000
heap
page read and write
D110000
trusted library allocation
page read and write
158E000
stack
page read and write
17CB000
heap
page read and write
5580000
trusted library allocation
page execute and read and write
C105000
trusted library allocation
page read and write
381E000
heap
page read and write
16E0000
heap
page read and write
1514000
heap
page read and write
17D4000
heap
page read and write
AA90000
heap
page read and write
1767000
heap
page read and write
AA40000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
1680000
heap
page read and write
1E3E000
stack
page read and write
168F000
stack
page read and write
37C0000
trusted library allocation
page read and write
EF6E000
stack
page read and write
E81000
heap
page read and write
740000
heap
page readonly
D776000
trusted library allocation
page read and write
3BC4000
heap
page read and write
97D0000
trusted library allocation
page read and write
15B4000
heap
page read and write
16FF000
heap
page read and write
16F4000
heap
page read and write
AA71000
trusted library allocation
page read and write
37C0000
trusted library allocation
page read and write
DCC000
stack
page read and write
17E1000
heap
page read and write
174F000
heap
page read and write
3403000
heap
page read and write
4090000
trusted library allocation
page read and write
170B000
heap
page read and write
CF30000
heap
page read and write
3338000
heap
page read and write
15B4000
heap
page read and write
EE30000
trusted library allocation
page execute and read and write
4BEE000
stack
page read and write
1814000
heap
page read and write
15E3000
heap
page read and write
144F000
stack
page read and write
227F000
stack
page read and write
8C81000
heap
page read and write
ACEE000
stack
page read and write
D450000
trusted library allocation
page read and write
17C9000
heap
page read and write
1190000
heap
page read and write
591000
unkown
page execute read
11440000
heap
page read and write
8BB1000
heap
page read and write
22BF000
stack
page read and write
1795000
heap
page read and write
156F000
stack
page read and write
182C000
heap
page read and write
D208000
heap
page read and write
3F91000
heap
page read and write
173F000
heap
page read and write
D4DF000
stack
page read and write
A60000
unkown
page readonly
15B8000
heap
page read and write
590000
heap
page read and write
8BB0000
heap
page read and write
7E4000
trusted library allocation
page read and write
168D000
heap
page read and write
612000
heap
page read and write
11ABE000
stack
page read and write
AB59000
heap
page read and write
F60000
heap
page read and write
1680000
heap
page read and write
4040000
trusted library allocation
page read and write
17A0000
heap
page read and write
170F000
heap
page read and write
16B7000
heap
page read and write
A960000
heap
page read and write
6CAF000
stack
page read and write
D16B000
heap
page read and write
D3A000
unkown
page readonly
D785000
trusted library allocation
page read and write
9333000
heap
page read and write
DE3000
heap
page read and write
D120000
trusted library allocation
page read and write
DE5000
heap
page read and write
4090000
trusted library allocation
page read and write
13BE000
stack
page read and write
3398000
heap
page read and write
337E000
stack
page read and write
1766000
heap
page read and write
1769000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
202D000
stack
page read and write
15E6000
heap
page read and write
1FEE000
stack
page read and write
CBE000
stack
page read and write
4F2000
stack
page read and write
EF7000
heap
page read and write
E7D000
heap
page read and write
11E0000
heap
page read and write
BA1000
unkown
page execute read
23B0000
trusted library allocation
page read and write
B2D000
unkown
page read and write
11E8000
heap
page read and write
1746000
heap
page read and write
37C0000
trusted library allocation
page read and write
16F7000
heap
page read and write
2E90000
trusted library allocation
page read and write
E97000
heap
page read and write
E1D000
heap
page read and write
5896000
heap
page read and write
2FBB000
stack
page read and write
17C9000
heap
page read and write
303E000
stack
page read and write
1814000
heap
page read and write
4E9E000
stack
page read and write
1793000
heap
page read and write
F041000
trusted library allocation
page read and write
D81E000
stack
page read and write
15B9000
heap
page read and write
E1C000
heap
page read and write
A60000
unkown
page readonly
175B000
heap
page read and write
12292000
heap
page read and write
17AA000
heap
page read and write
E26000
heap
page read and write
D1CC000
heap
page read and write
936000
heap
page read and write
1550000
trusted library allocation
page read and write
DE3000
heap
page read and write
72E000
stack
page read and write
D96000
heap
page read and write
18A6000
heap
page read and write
B9F000
stack
page read and write
DA7000
heap
page read and write
8F5000
heap
page read and write
3376000
heap
page read and write
1206000
heap
page read and write
B35000
unkown
page readonly
5BF000
heap
page read and write
A870000
trusted library allocation
page read and write
3BC0000
heap
page read and write
E06000
heap
page read and write
113B5000
trusted library allocation
page read and write
A904000
trusted library allocation
page read and write
170A000
heap
page read and write
D85E000
stack
page read and write
3041000
trusted library allocation
page read and write
1690000
heap
page execute and read and write
4D5F000
stack
page read and write
1627000
heap
page read and write
AB3D000
heap
page read and write
539F000
stack
page read and write
183C000
heap
page read and write
A903000
trusted library allocation
page execute and read and write
8D14000
trusted library allocation
page read and write
1680000
heap
page read and write
5810000
heap
page read and write
15BB000
heap
page read and write
2DC000
stack
page read and write
235E000
stack
page read and write
1778000
heap
page read and write
4CE000
stack
page read and write
164B000
heap
page read and write
97E4000
trusted library allocation
page read and write
381A000
heap
page read and write
9300000
heap
page read and write
4090000
trusted library allocation
page read and write
16B0000
heap
page read and write
8A44000
heap
page read and write
58B1000
heap
page read and write
1780000
heap
page read and write
1656000
heap
page read and write
175F000
heap
page read and write
2030000
heap
page read and write
8BC9000
heap
page read and write
4D8000
stack
page read and write
170D000
heap
page read and write
E38000
heap
page read and write
8C0000
heap
page read and write
41EB000
heap
page read and write
8BE2000
heap
page read and write
62D000
unkown
page readonly
17AC000
heap
page read and write
AB35000
heap
page read and write
EE2C000
stack
page read and write
AA80000
trusted library allocation
page read and write
1709000
heap
page read and write
33E2000
heap
page read and write
1678000
heap
page read and write
4BDE000
stack
page read and write
3810000
heap
page read and write
B0B4000
trusted library allocation
page read and write
17A9000
heap
page read and write
33E6000
heap
page read and write
11B5000
heap
page read and write
1733000
heap
page read and write
500000
remote allocation
page execute and read and write
15E3000
heap
page read and write
4E5000
stack
page read and write
11384000
trusted library allocation
page read and write
5930000
heap
page read and write
16E4000
heap
page read and write
8BE1000
heap
page read and write
DBB000
heap
page read and write
630000
heap
page read and write
37C0000
trusted library allocation
page read and write
1720000
heap
page read and write
17C8000
heap
page read and write
11394000
trusted library allocation
page read and write
AAE3000
heap
page read and write
1636000
heap
page read and write
3180000
heap
page execute and read and write
D29E000
stack
page read and write
40E1000
heap
page read and write
37C0000
trusted library allocation
page read and write
1644000
heap
page read and write
33E7000
heap
page read and write
37C0000
trusted library allocation
page read and write
2170000
heap
page read and write
33C8000
heap
page read and write
1639000
heap
page read and write
106A000
stack
page read and write
4090000
trusted library allocation
page read and write
1665000
heap
page read and write
15A9000
heap
page read and write
665000
unkown
page readonly
55EE000
stack
page read and write
5832000
heap
page read and write
1660000
trusted library allocation
page read and write
EE75000
trusted library allocation
page read and write
1678000
heap
page read and write
6D0000
heap
page read and write
589000
heap
page read and write
9D0000
heap
page read and write
4090000
trusted library allocation
page read and write
15B9000
heap
page read and write
11451000
heap
page read and write
4810000
heap
page read and write
97BD000
stack
page read and write
4C9000
stack
page read and write
33BC000
heap
page read and write
1802000
heap
page read and write
6E0000
trusted library allocation
page read and write
183C000
heap
page read and write
1C0000
heap
page read and write
3AE0000
heap
page read and write
37C0000
trusted library allocation
page read and write
E79000
heap
page read and write
A2F000
stack
page read and write
58B0000
heap
page read and write
1805000
heap
page read and write
8C80000
heap
page read and write
33BD000
heap
page read and write
9CF000
stack
page read and write
15A5000
heap
page read and write
8CE000
stack
page read and write
C34000
heap
page read and write
D48000
heap
page read and write
63B000
heap
page read and write
92B0000
heap
page read and write
A61000
unkown
page execute read
65D000
unkown
page read and write
17C8000
heap
page read and write
5AAE000
stack
page read and write
1218000
heap
page read and write
158F000
heap
page read and write
DE3000
heap
page read and write
1763000
heap
page read and write
900000
trusted library allocation
page execute and read and write
3403000
heap
page read and write
4E9000
stack
page read and write
AD90000
heap
page read and write
1812000
heap
page read and write
A60000
unkown
page readonly
8BC000
stack
page read and write
4040000
trusted library allocation
page read and write
8C14000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
1805000
heap
page read and write
4D9E000
stack
page read and write
8E8000
heap
page read and write
168D000
heap
page read and write
22B0000
heap
page read and write
CFD0000
heap
page read and write
A60000
unkown
page readonly
D33E000
stack
page read and write
ABF000
stack
page read and write
78E000
stack
page read and write
9339000
heap
page read and write
15B4000
heap
page read and write
1793000
heap
page read and write
340C000
heap
page read and write
977E000
stack
page read and write
173F000
heap
page read and write
4040000
trusted library allocation
page read and write
589D000
heap
page read and write
C35000
heap
page read and write
A90000
heap
page read and write
15B5000
heap
page read and write
4B10000
trusted library allocation
page read and write
E81000
heap
page read and write
EF7000
heap
page read and write
583A000
heap
page read and write
FEA000
stack
page read and write
466E000
stack
page read and write
AA6E000
stack
page read and write
D675000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
17D4000
heap
page read and write
12F8000
stack
page read and write
8C20000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
F9B000
stack
page read and write
17E5000
heap
page read and write
653000
unkown
page readonly
A910000
trusted library allocation
page read and write
17D6000
heap
page read and write
17AF000
heap
page read and write
932E000
heap
page read and write
56EF000
stack
page read and write
10F9000
stack
page read and write
17AB000
heap
page read and write
C7E000
stack
page read and write
368F000
stack
page read and write
B35000
unkown
page readonly
B80000
heap
page read and write
340C000
heap
page read and write
8D59000
heap
page read and write
1680000
heap
page read and write
33C3000
heap
page read and write
9717000
trusted library allocation
page execute and read and write
58B0000
heap
page read and write
8C70000
trusted library allocation
page read and write
BD0000
heap
page read and write
4F20000
heap
page read and write
6C2E000
heap
page read and write
1779000
heap
page read and write
EAA000
heap
page read and write
182F000
heap
page read and write
D19E000
heap
page read and write
15B4000
heap
page read and write
8A0000
trusted library allocation
page read and write
4C5E000
stack
page read and write
9308000
heap
page read and write
E55000
heap
page read and write
16F7000
heap
page read and write
C04000
unkown
page readonly
34B0000
heap
page read and write
C34000
heap
page read and write
4040000
trusted library allocation
page read and write
8BE1000
heap
page read and write
1514000
heap
page read and write
33E1000
trusted library allocation
page read and write
1514000
heap
page read and write
1656000
heap
page read and write
176A000
heap
page read and write
133D000
trusted library allocation
page execute and read and write
1644000
heap
page read and write
41E0000
trusted library allocation
page read and write
93C9000
heap
page read and write
1514000
heap
page read and write
4040000
trusted library allocation
page read and write
13C7000
heap
page read and write
120B000
heap
page read and write
4B1E000
stack
page read and write
D0F0000
trusted library allocation
page read and write
47C1000
trusted library allocation
page read and write
8C74000
heap
page read and write
C660000
heap
page read and write
5570000
trusted library allocation
page execute and read and write
AA4B000
trusted library allocation
page execute and read and write
59A000
stack
page read and write
1644000
heap
page read and write
16F9000
heap
page read and write
4ABF000
stack
page read and write
17A5000
heap
page read and write
817000
trusted library allocation
page execute and read and write
59E000
heap
page read and write
97C0000
trusted library allocation
page execute and read and write
1644000
heap
page read and write
DC1F000
stack
page read and write
17B7000
heap
page read and write
1210000
heap
page read and write
95E0000
heap
page read and write
730000
heap
page read and write
8B84000
heap
page read and write
5862000
heap
page read and write
27EF000
unkown
page read and write
5852000
heap
page read and write
17C7000
heap
page read and write
175D000
heap
page read and write
15EA000
heap
page read and write
C34000
heap
page read and write
AFD000
unkown
page readonly
182F000
heap
page read and write
BCE000
stack
page read and write
11F0000
heap
page read and write
D140000
heap
page read and write
1570000
heap
page read and write
4B6E000
stack
page read and write
1130000
heap
page read and write
513E000
stack
page read and write
D175000
heap
page read and write
8CE1000
heap
page read and write
2BE0000
heap
page read and write
8DB000
trusted library allocation
page execute and read and write
56F0000
heap
page execute and read and write
EEA0000
heap
page read and write
4040000
trusted library allocation
page read and write
D78000
heap
page read and write
346E000
stack
page read and write
A920000
heap
page read and write
16F3000
heap
page read and write
1814000
heap
page read and write
5831000
heap
page read and write
8D81000
heap
page read and write
DBA000
heap
page read and write
41E0000
trusted library allocation
page read and write
17CC000
heap
page read and write
A905000
trusted library allocation
page read and write
8BE1000
heap
page read and write
CC0000
heap
page read and write
33E5000
heap
page read and write
3360000
heap
page read and write
1595000
heap
page read and write
170B000
heap
page read and write
15A8000
heap
page read and write
16F6000
heap
page read and write
EE96000
trusted library allocation
page read and write
1591000
heap
page read and write
33CE000
heap
page read and write
C34000
heap
page read and write
1828000
heap
page read and write
F21F000
stack
page read and write
17AC000
heap
page read and write
1751000
heap
page read and write
6270000
trusted library allocation
page read and write
15E3000
heap
page read and write
AD76000
trusted library allocation
page read and write
A61000
unkown
page execute read
14EE000
stack
page read and write
4090000
trusted library allocation
page read and write
D33000
heap
page read and write
1627000
heap
page read and write
3F90000
heap
page read and write
15B4000
heap
page read and write
581E000
heap
page read and write
55A000
stack
page read and write
E35000
heap
page read and write
DAA000
heap
page read and write
4A10000
heap
page read and write
EBB000
heap
page read and write
41E0000
trusted library allocation
page read and write
5910000
heap
page read and write
1610000
heap
page read and write
8BE1000
heap
page read and write
3F41000
heap
page read and write
16E7000
heap
page read and write
58B0000
heap
page read and write
1758000
heap
page read and write
589000
heap
page read and write
DA4000
heap
page read and write
5831000
heap
page read and write
1090000
trusted library allocation
page read and write
AA2E000
stack
page read and write
610000
heap
page read and write
33D4000
heap
page read and write
4830000
heap
page read and write
D2D0000
heap
page execute and read and write
8A4000
trusted library allocation
page read and write
C02000
unkown
page read and write
D13B000
trusted library allocation
page execute and read and write
1678000
heap
page read and write
1639000
heap
page read and write
ED58000
trusted library allocation
page read and write
A1E000
stack
page read and write
1172D000
stack
page read and write
17C9000
heap
page read and write
17B8000
heap
page read and write
97E0000
trusted library allocation
page read and write
E26000
heap
page read and write
13CE000
stack
page read and write
130E000
stack
page read and write
1751000
heap
page read and write
179C000
heap
page read and write
5831000
heap
page read and write
3815000
heap
page read and write
16FB000
heap
page read and write
550000
heap
page read and write
E77000
heap
page read and write
C34000
heap
page read and write
8C74000
heap
page read and write
F0F000
stack
page read and write
8C0000
heap
page read and write
D148000
heap
page read and write
1676000
heap
page read and write
17D4000
heap
page read and write
C34000
heap
page read and write
4040000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
596F000
stack
page read and write
1733000
heap
page read and write
41E0000
trusted library allocation
page read and write
6B75000
heap
page read and write
17C8000
heap
page read and write
33BC000
heap
page read and write
33E7000
heap
page read and write
179A000
heap
page read and write
1680000
heap
page read and write
1BE000
stack
page read and write
DFB000
heap
page read and write
3403000
heap
page read and write
9290000
heap
page read and write
32FB000
stack
page read and write
5831000
heap
page read and write
17A8000
heap
page read and write
893000
trusted library allocation
page execute and read and write
B2D000
unkown
page read and write
8C12000
heap
page read and write
B0F0000
heap
page read and write
923000
heap
page read and write
5CEE000
stack
page read and write
3470000
heap
page read and write
93A9000
heap
page read and write
D5E0000
heap
page read and write
37C0000
trusted library allocation
page read and write
BA75000
trusted library allocation
page read and write
17FA000
heap
page read and write
E66000
heap
page read and write
16F4000
heap
page read and write
E8E000
heap
page read and write
2380000
heap
page read and write
C34000
heap
page read and write
E4A000
heap
page read and write
EB8000
heap
page read and write
DBD000
heap
page read and write
15F9000
heap
page read and write
E8E000
heap
page read and write
7644000
heap
page read and write
572E000
stack
page read and write
2E90000
trusted library allocation
page read and write
DB6000
heap
page read and write
E75000
heap
page read and write
17BD000
heap
page read and write
BDE000
unkown
page write copy
143E000
stack
page read and write
155D000
stack
page read and write
15F6000
heap
page read and write
173F000
heap
page read and write
8D9F000
heap
page read and write
96F0000
trusted library allocation
page read and write
1390000
heap
page read and write
1534000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
17C9000
heap
page read and write
590000
heap
page read and write
3D1E000
stack
page read and write
112E000
stack
page read and write
586E000
stack
page read and write
C34000
heap
page read and write
17AC000
heap
page read and write
4090000
trusted library allocation
page read and write
1595000
heap
page read and write
381E000
heap
page read and write
A2E000
stack
page read and write
40E0000
heap
page read and write
2E90000
trusted library allocation
page read and write
15E9000
heap
page read and write
A8F6000
trusted library allocation
page read and write
AD50000
heap
page execute and read and write
17D0000
heap
page read and write
1557000
trusted library allocation
page execute and read and write
7D4000
trusted library allocation
page read and write
D68000
stack
page read and write
16BA000
heap
page read and write
55D000
stack
page read and write
A930000
heap
page read and write
17CB000
heap
page read and write
13FE000
stack
page read and write
D49E000
stack
page read and write
F31E000
stack
page read and write
1598000
heap
page read and write
587E000
stack
page read and write
16F5000
heap
page read and write
1656000
heap
page read and write
10041000
trusted library allocation
page read and write
15B4000
heap
page read and write
E00000
heap
page read and write
D32000
unkown
page readonly
A9B000
heap
page read and write
15C0000
heap
page read and write
15B4000
heap
page read and write
182F000
heap
page read and write
1644000
heap
page read and write
11C0000
heap
page read and write
1EBE000
stack
page read and write
D779000
trusted library allocation
page read and write
1680000
heap
page read and write
C30000
heap
page read and write
11B0000
heap
page read and write
589000
heap
page read and write
3B04000
heap
page read and write
D30000
unkown
page readonly
E13000
heap
page read and write
DF9000
heap
page read and write
17C9000
heap
page read and write
17A9000
heap
page read and write
183C000
heap
page read and write
586E000
heap
page read and write
15BE000
stack
page read and write
955000
heap
page read and write
17A8000
heap
page read and write
173C000
stack
page read and write
EDAE000
stack
page read and write
D8F000
heap
page read and write
8CF0000
heap
page read and write
D130000
trusted library allocation
page read and write
4E9E000
stack
page read and write
1602000
heap
page read and write
8BE1000
heap
page read and write
8D10000
trusted library allocation
page read and write
F2D000
trusted library allocation
page execute and read and write
5BD000
heap
page read and write
1772000
heap
page read and write
BA71000
trusted library allocation
page read and write
DEA000
heap
page read and write
17D6000
heap
page read and write
B101000
trusted library allocation
page read and write
DC2000
heap
page read and write
2F70000
heap
page read and write
EFAE000
stack
page read and write
1644000
heap
page read and write
1514000
heap
page read and write
DC2000
heap
page read and write
381A000
heap
page read and write
1866000
heap
page read and write
5BEE000
stack
page read and write
16FE000
heap
page read and write
D764000
trusted library allocation
page read and write
1756000
heap
page read and write
CB6E000
stack
page read and write
E66000
heap
page read and write
F020000
trusted library allocation
page read and write
23A0000
trusted library allocation
page read and write
983000
heap
page read and write
58B0000
heap
page read and write
33BC000
heap
page read and write
135B000
trusted library allocation
page execute and read and write
EC67000
heap
page read and write
E66000
heap
page read and write
37C0000
trusted library allocation
page read and write
8D28000
heap
page read and write
1644000
heap
page read and write
4970000
heap
page execute and read and write
B0B6000
trusted library allocation
page read and write
D127000
trusted library allocation
page execute and read and write
76E000
unkown
page read and write
4834000
heap
page read and write
611000
heap
page read and write
There are 1673 hidden memdumps, click here to show them.