IOC Report
2024_04_005.exe

loading gif

Files

File Path
Type
Category
Malicious
2024_04_005.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Foremasthand.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\nspE03E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\vinduers\languages\Dentinen\Uengageredes.Raa169
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\Templates\scramasaxe.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\ProgramData\Skattetryk.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\545Ni1I
SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 7, database pages 59, cookie 0x52, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\Foremasthand.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2as3ofi5.au3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dcctn0um.3y2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\vinduers\languages\Odometer\Zodiacs\himlene.pin
data
dropped
C:\Users\user\AppData\Local\vinduers\languages\Udryddet.Hel
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\scramasaxe.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\Skattetryk.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Music\papirvgts.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\peniblere.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\papirvgts.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2024_04_005.exe
"C:\Users\user\Desktop\2024_04_005.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Gummigeds=Get-Content 'C:\Users\user\AppData\Local\vinduers\languages\Dentinen\Uengageredes.Raa169';$Ensrettendes=$Gummigeds.SubString(26864,3);.$Ensrettendes($Gummigeds)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Users\user\AppData\Local\Temp\Foremasthand.exe
"C:\Users\user\AppData\Local\Temp\Foremasthand.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Mesenterical" /t REG_EXPAND_SZ /d "%Minimisers% -windowstyle minimized $Emissionsspektrernes=(Get-ItemProperty -Path 'HKCU:\Sportily\').Vibse33;%Minimisers% ($Emissionsspektrernes)"
malicious
C:\Program Files (x86)\MthvkClINKDUcOgFiLOhtZcSTIXhiWiJAevGLytry\EsRWTuoxmxUO.exe
"C:\Program Files (x86)\MthvkClINKDUcOgFiLOhtZcSTIXhiWiJAevGLytry\EsRWTuoxmxUO.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe"
malicious
C:\Program Files (x86)\MthvkClINKDUcOgFiLOhtZcSTIXhiWiJAevGLytry\EsRWTuoxmxUO.exe
"C:\Program Files (x86)\MthvkClINKDUcOgFiLOhtZcSTIXhiWiJAevGLytry\EsRWTuoxmxUO.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Mesenterical" /t REG_EXPAND_SZ /d "%Minimisers% -windowstyle minimized $Emissionsspektrernes=(Get-ItemProperty -Path 'HKCU:\Sportily\').Vibse33;%Minimisers% ($Emissionsspektrernes)"
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.avolci.com/9pdo/?dzzh=OxSxCH&QtQ=z4EbQ/0+Z2zPU4/RVXslSAEzGqGuOzSPEXVlRRq2m+qj0dJnOgaQ/GbsoFonwncJq2LQE08kULao6+1QBSZUGJAxywljr6IstyX2fx3+/D27y0FPpkXVVLM=
91.195.240.19
http://localhost/wsman:Microsoft.PowerShell.Workflow
unknown
http://pesterbdd.com/images/Pester.png4
unknown
http://www.electra-airways.info/9pdo/?dzzh=OxSxCH&QtQ=3VEjKqPjJRFd1LEr7ftl6AeEjohVN1gCDcT03q/HcmbmUvzHTf5Gj5hvcK/QqTejry7alcBNCY2t4H+vJZJIHp8tocbCa9LgYeFrT1dxHygs+eIMLFxUj+8=
91.195.240.19
http://www.eternalsunrise.xyz/9pdo/?dzzh=OxSxCH&QtQ=/vSyP1yVbm8RGq0e2H3CzkNsaOHJl/3MYALL4DCZeeN+d5B22Kt3zVmvOtiuNe7fMoA4lcLFRPd10Vr4k50RXoBd/BdrO+PNRq+sm2OxhUPGBDukAmwFGJM=
66.29.135.159
http://www.avolci.com/9pdo/
91.195.240.19
http://pesterbdd.com/images/Pester.png
unknown
http://www.klingerlumberltd.com/9pdo/
109.70.148.57
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.huatihui2.com/9pdo/
160.124.21.234
http://www.aneiina.top/9pdo/
172.67.206.253
http://www.huatihui2.com/9pdo/?QtQ=yWfXl3cQ7AE/v0p5ToAuwZLyk9Lhh0mNZnY0Fx87Qovx7+j0M2U0eDvKbOG4Eg1byXAdYPqGQWGzsH9rY6evN1VfPnxdp8WTE2/W4NT8KnWPJn/Hhe+jCJU=&dzzh=OxSxCH
160.124.21.234
http://www.jt-berger.store/9pdo/
217.160.0.183
http://www.scwspark.com/9pdo/?QtQ=exLCvVI2E5RJM8xtzs0Xap+s8OiVQ9Xf+6d2cWgRCMmdoFVcUWazUq00e3zK6s54E+NAVH76kqhd1uh4f2sE6XSWR+uNBmxDzZmQYEOmQjbtsHV8VYB5rTQ=&dzzh=OxSxCH
81.88.63.46
http://www.roundhaygardenscene.com/9pdo/
91.195.240.19
http://www.klingerlumberltd.com/9pdo/?dzzh=OxSxCH&QtQ=75RROWlFumYQQsRs+uDtc9uO+AXAqD8lv3fdL7/s35lj/OH9yxtYyj6nA6/7e2iXtS5R0Es4/LmqSDkvv7i6GZpCVVRFzb5vAOsXkTj5IR3tGpdpZrpWv9I=
109.70.148.57
http://www.n-benriya002.com/9pdo/
219.94.128.41
https://aka.ms/pscore6
unknown
http://www.roundhaygardenscene.com/9pdo/?QtQ=J74hxHnGBH885BsW/8LXuNayyRNuPuSw4YspDnAEOKjh6WzTsbZVB7IKidTzlzfz/fWZ1zjvjb/XglRuOdKt4pl2brCljwyM4WC3fqBpCAw3lcb8459c8o0=&dzzh=OxSxCH
91.195.240.19
http://nsis.sf.net/NSIS_Error...
unknown
http://www.ejbodyart.com/9pdo/?dzzh=OxSxCH&QtQ=DnYaRovP48GzkkJrYMb+2fT4Pkhg/GvwuVP/6iFiedv+ORSC+0oTk/Gl1D7Kx2hOtjeczUyzMCTs4BuiBiMVlNIM74EOcC0w4I/7Krg2VTUnK1jygYdG7TE=
112.175.50.218
https://aka.ms/pscore6lBqq
unknown
http://www.apache.org/licenses/LICENSE-2.0.html4
unknown
https://github.com/Pester/Pester
unknown
http://www.n-benriya002.com/9pdo/?dzzh=OxSxCH&QtQ=REEnkW6M+TEq7R0RTFMUOKmG2dqiBXhD8cCdAclTZkEAO29Celit1EFdRt8L6G9Xd5xqtutsMklg2OrtOvYk99njtWVeRq/fD9R4HBgWh9ZRW3T/b1Zn0KY=
219.94.128.41
https://github.com/Pester/Pester4
unknown
http://www.fraternize.org/9pdo/?QtQ=VHiI6b/PPIA+OuARKaswq4b959D7SkxlZx7zpnglo7qdO2KXbQcQ9KuRFrEQ+F9C9sgTMWbLOSxIFzstzFciu1MPjvyftGkFxn6hWuyxlTlwRkGEMIrwXeI=&dzzh=OxSxCH
217.70.184.50
https://nobel.rs/FaZfCetBYix205.bin
37.48.104.133
http://www.huatihui2.com/9pdo/?QtQ=yWfXl3cQ7AE/v0p5ToAuwZLyk9Lhh0mNZnY0Fx87Qovx7+j0M2U0eDvKbOG4Eg1byXAdYPqGQWGzsH9rY6evN1VfPnxdp8WTE2/W4NT8KnWPJn/Hhe+jCJU=&FJ0pD=Txf0EHJ0JZ
160.124.21.234
http://www.fraternize.org/9pdo/
217.70.184.50
http://www.stevethatcher.com/9pdo/
91.195.240.19
http://www.jt-berger.store/9pdo/?QtQ=9/X38tn9qLO2xSF02XBR/rEx8jnqUAkCRmtcXfkuabXCkgKRDBhcw5/s5NSemU/1fww/nV1egvBpaCqwFnie4syGBvlnyI6Zu2K3XALMlG8T/sDwKknxjFA=&dzzh=OxSxCH
217.160.0.183
http://www.scwspark.com/9pdo/
81.88.63.46
http://www.xmlspy.com)
unknown
http://www.electra-airways.info/9pdo/
91.195.240.19
http://www.microsoft.c
unknown
http://www.aneiina.top/9pdo/?QtQ=0DGTuA6y7M/wLSr0kneg8YEAwW66+S1tR7phNjB1U9UE4xiz+PGigUaE1dFUhjL1hYKynwQR5zkXwRTBrBJI0vMFkq8Tbe7pIeNuz9jCCKB2fjNWkoH785s=&dzzh=OxSxCH
172.67.206.253
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.eternalsunrise.xyz/9pdo/
66.29.135.159
http://n-benriya002.com/9pdo/?dzzh=OxSxCH&QtQ=REEnkW6M
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.eternalsunrise.xyz
66.29.135.159
malicious
www.n-benriya002.com
unknown
malicious
www.maaltijdkado.com
unknown
malicious
www.roundhaygardenscene.com
unknown
malicious
www.mirkogrigolettoshop.com
unknown
malicious
www.ejbodyart.com
unknown
malicious
www.electra-airways.info
unknown
malicious
www.sallielareine.com
unknown
malicious
www.jroblox.com
unknown
malicious
www.stevethatcher.com
unknown
malicious
www.klingerlumberltd.com
unknown
malicious
www.fraternize.org
unknown
malicious
www.avolci.com
unknown
malicious
webredir.vip.gandi.net
217.70.184.50
ejbodyart.com
112.175.50.218
n-benriya002.com
219.94.128.41
www.huatihui2.com
160.124.21.234
www.thegochettway.com
104.21.36.104
parkingpage.namecheap.com
91.195.240.19
www.scwspark.com
81.88.63.46
www.jt-berger.store
217.160.0.183
klingerlumberltd.com
109.70.148.57
www.aneiina.top
172.67.206.253
nobel.rs
37.48.104.133
parking-exp.regery.net
138.201.79.103
www.huahuas.pics
20.150.194.188
www.raymondj.online
66.96.162.148
www.gattosat.icu
109.123.121.243
There are 18 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
66.29.135.159
www.eternalsunrise.xyz
United States
malicious
160.124.21.234
www.huatihui2.com
South Africa
219.94.128.41
n-benriya002.com
Japan
172.67.206.253
www.aneiina.top
United States
217.70.184.50
webredir.vip.gandi.net
France
37.48.104.133
nobel.rs
Netherlands
81.88.63.46
www.scwspark.com
Italy
217.160.0.183
www.jt-berger.store
Germany
91.195.240.19
parkingpage.namecheap.com
Germany
109.70.148.57
klingerlumberltd.com
United Kingdom
112.175.50.218
ejbodyart.com
Korea Republic of
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\falcade\encashing
desulphurising
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Forvirringernes\Uninstall\tick\detouring
asclepiadaceae
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Tolypeutes\Uninstall\succumbed\brevformatets
compromised
HKEY_CURRENT_USER\SOFTWARE\Poorly
feoffing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\genvejstekst
interminister
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\horeungers\Uninstall\pregustic\Derning
ase
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\safari
Restocks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Spejlgspandens\antaphroditic
dyrlgers
HKEY_CURRENT_USER\SOFTWARE\Drip
helminthic
HKEY_CURRENT_USER\SOFTWARE\Bulmerne
indvendige
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\enspndernaturer\mothproofed
tergiversated
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Befogged39\klirrendes
whilly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Skibindingen\Uninstall\vrangens\kontokorterne
emigrator
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\lsbarhedens\Uninstall\sugningers\Strigillose
Persistently36
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Billedfilformaternes\articulators
straale
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\godtens\rederne
Bygningskonduktrs
HKEY_CURRENT_USER\SOFTWARE\food
lytterne
HKEY_CURRENT_USER\SOFTWARE\bescreened
nitrogelatine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\anthrasilicosis
nedgaaende
HKEY_CURRENT_USER\Sportily
Vibse33
HKEY_CURRENT_USER\Environment
Minimisers
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Mesenterical
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21170000
unclassified section
page execute and read and write
malicious
38B0000
trusted library allocation
page read and write
malicious
6160000
unkown
page execute and read and write
malicious
1370000
system
page execute and read and write
malicious
3A90000
trusted library allocation
page read and write
malicious
2F50000
system
page execute and read and write
malicious
91DC000
direct allocation
page execute and read and write
malicious
6A8CC000
unkown
page read and write
6BFD2000
unkown
page execute read
3921000
heap
page read and write
5499000
heap
page read and write
BE1000
unkown
page readonly
54DC000
heap
page read and write
39C8000
unkown
page read and write
6A0B7000
unkown
page execute read
6F64000
heap
page read and write
3921000
heap
page read and write
4FD3000
trusted library allocation
page read and write
70000
heap
page read and write
4658000
unkown
page read and write
890000
heap
page read and write
A40000
heap
page read and write
6BE000
stack
page read and write
AE0000
unkown
page readonly
3921000
heap
page read and write
3920000
heap
page read and write
6A5F0000
unkown
page read and write
2FD0000
heap
page read and write
400000
unkown
page readonly
2B6C000
remote allocation
page execute and read and write
68675000
unkown
page write copy
3921000
heap
page read and write
6A89B000
unkown
page write copy
6BC2E000
unkown
page execute read
3B5A000
unkown
page read and write
10D8000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
8DC000
heap
page read and write
8E5000
heap
page read and write
6A732000
unkown
page write copy
54AB000
heap
page read and write
8E2000
heap
page read and write
3300000
heap
page read and write
3460000
heap
page read and write
8D2000
heap
page read and write
54AA000
heap
page read and write
3921000
heap
page read and write
69A0000
direct allocation
page read and write
90C000
heap
page read and write
718000
heap
page read and write
2D54000
heap
page read and write
6F0A000
heap
page read and write
6A9FF000
unkown
page read and write
3921000
heap
page read and write
1260000
unkown
page read and write
547B000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
6AA7F000
unkown
page read and write
545F000
heap
page read and write
541B000
heap
page read and write
875000
unkown
page read and write
204D0000
direct allocation
page read and write
55A0000
direct allocation
page read and write
6A914000
unkown
page write copy
5489000
heap
page read and write
825D000
stack
page read and write
89D000
heap
page read and write
3921000
heap
page read and write
8140000
trusted library allocation
page execute and read and write
698AB000
unkown
page read and write
694D9000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
68693000
unkown
page read and write
DFC000
stack
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
8871000
heap
page read and write
3921000
heap
page read and write
6A8FA000
unkown
page read and write
6936F000
unkown
page execute read
3921000
heap
page read and write
3921000
heap
page read and write
6AA1B000
unkown
page read and write
80C000
heap
page read and write
6AA19000
unkown
page read and write
6A9F8000
unkown
page read and write
342E000
unkown
page read and write
3921000
heap
page read and write
686B3000
unkown
page read and write
4B4A000
unclassified section
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
957000
heap
page read and write
867C000
stack
page read and write
691EF000
unkown
page read and write
6A668000
unkown
page write copy
5492000
heap
page read and write
3921000
heap
page read and write
8B2000
heap
page read and write
C80000
unkown
page readonly
2175C000
direct allocation
page execute and read and write
6951E000
unkown
page readonly
3921000
heap
page read and write
92FF000
stack
page read and write
5F0000
unkown
page execute read
6AA89000
unkown
page write copy
88A000
heap
page read and write
2BF0000
heap
page read and write
972000
trusted library allocation
page read and write
A6E000
stack
page read and write
3921000
heap
page read and write
81F0000
heap
page read and write
877000
unkown
page readonly
6AA1C000
unkown
page write copy
215B9000
direct allocation
page execute and read and write
3CEC000
unkown
page read and write
6DEE000
stack
page read and write
AA0000
heap
page read and write
67FF000
stack
page read and write
2E20000
unkown
page readonly
3921000
heap
page read and write
6A181000
unkown
page read and write
3DAD000
direct allocation
page execute and read and write
2B1D000
stack
page read and write
5AB000
unkown
page readonly
3921000
heap
page read and write
6A29D000
unkown
page readonly
698CF000
unkown
page read and write
3921000
heap
page read and write
3C10000
trusted library allocation
page read and write
20EF1000
heap
page read and write
15DE000
stack
page read and write
33C4000
heap
page read and write
3921000
heap
page read and write
68775000
unkown
page read and write
691B1000
unkown
page read and write
860000
unkown
page readonly
71D0000
trusted library allocation
page execute and read and write
5781000
trusted library allocation
page read and write
77AB000
stack
page read and write
B9DC000
direct allocation
page execute and read and write
6A059000
unkown
page readonly
3921000
heap
page read and write
10E0000
unkown
page readonly
5570000
direct allocation
page read and write
6A87B000
unkown
page write copy
8D2000
heap
page read and write
3921000
heap
page read and write
33B8000
heap
page read and write
3921000
heap
page read and write
471E000
stack
page read and write
877000
unkown
page readonly
5260000
heap
page read and write
3921000
heap
page read and write
6E8B000
heap
page read and write
13DA000
system
page execute and read and write
3B70000
trusted library allocation
page execute and read and write
2D60000
unkown
page readonly
3921000
heap
page read and write
6920000
direct allocation
page read and write
4334000
unkown
page read and write
6867A000
unkown
page read and write
6AA83000
unkown
page write copy
920000
trusted library allocation
page read and write
432000
unkown
page read and write
904000
heap
page read and write
215BD000
direct allocation
page execute and read and write
1260000
unkown
page read and write
6971000
unkown
page execute and read and write
3921000
heap
page read and write
5192000
unclassified section
page read and write
3921000
heap
page read and write
2D4D000
heap
page read and write
6A2CA000
unkown
page write copy
6A928000
unkown
page read and write
11D0000
unkown
page read and write
A90000
trusted library allocation
page execute and read and write
691E9000
unkown
page read and write
3921000
heap
page read and write
6AA5B000
unkown
page write copy
3921000
heap
page read and write
5AB000
unkown
page readonly
371F000
unkown
page read and write
DF0000
heap
page read and write
2F90000
heap
page read and write
27F76E03000
system
page execute and read and write
6B80000
heap
page read and write
3921000
heap
page read and write
8D2000
heap
page read and write
3921000
heap
page read and write
76F0000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
27F78B00000
trusted library allocation
page read and write
88BD000
heap
page read and write
6E10000
heap
page read and write
10A0000
unkown
page readonly
348B000
heap
page read and write
8FE000
heap
page read and write
20C4D000
stack
page read and write
86E000
unkown
page readonly
69415000
unkown
page read and write
54DC000
heap
page read and write
33B9000
heap
page read and write
6EFD000
heap
page read and write
2A3F000
stack
page read and write
6A903000
unkown
page read and write
6A2B1000
unkown
page read and write
209AD000
stack
page read and write
2C80000
unkown
page readonly
3921000
heap
page read and write
6930000
direct allocation
page read and write
7730000
trusted library allocation
page read and write
27F76F20000
heap
page read and write
3921000
heap
page read and write
124C000
unkown
page read and write
6865A000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
686AF000
unkown
page read and write
27F78A00000
trusted library allocation
page read and write
36D12000
system
page read and write
88E8000
heap
page read and write
820000
heap
page read and write
54DC000
heap
page read and write
20D3F000
stack
page read and write
6B4B7000
unkown
page execute read
10A0000
unkown
page readonly
6950000
heap
page execute and read and write
8F7000
heap
page read and write
4694000
unclassified section
page read and write
11D0000
unkown
page read and write
3390000
heap
page read and write
21130000
direct allocation
page read and write
3921000
heap
page read and write
71CD000
stack
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
8B1000
heap
page read and write
20E20000
remote allocation
page read and write
27F77030000
heap
page read and write
6AA0C000
unkown
page write copy
5492000
heap
page read and write
129E000
heap
page read and write
33A0000
heap
page read and write
204C0000
direct allocation
page read and write
860000
unkown
page readonly
344E000
stack
page read and write
216C000
remote allocation
page execute and read and write
8FA000
heap
page read and write
352C000
heap
page read and write
1F0000
heap
page read and write
8397000
heap
page read and write
2D54000
heap
page read and write
342A000
heap
page read and write
40B000
unkown
page read and write
6E84000
heap
page read and write
6A877000
unkown
page write copy
8F7000
heap
page read and write
5929000
trusted library allocation
page read and write
2BF6000
heap
page read and write
69225000
unkown
page execute read
860000
unkown
page readonly
1A01000
unkown
page readonly
10D8000
heap
page read and write
6866C000
unkown
page write copy
88B8000
heap
page read and write
221E0000
unclassified section
page execute and read and write
6E6A000
heap
page read and write
3394000
heap
page read and write
5760000
unkown
page execute and read and write
C90000
heap
page read and write
698D0000
unkown
page write copy
6AA0B000
unkown
page read and write
694D0000
unkown
page readonly
3921000
heap
page read and write
3921000
heap
page read and write
909000
heap
page read and write
877000
unkown
page readonly
86E000
unkown
page readonly
6867B000
unkown
page write copy
8DC000
heap
page read and write
6A931000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
4B9000
stack
page read and write
3E7E000
unkown
page read and write
33B4000
heap
page read and write
6AA09000
unkown
page write copy
B1E000
stack
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
6EA8000
heap
page read and write
27F77150000
heap
page read and write
3921000
heap
page read and write
3351000
heap
page read and write
6A75F000
unkown
page read and write
6CD0000
trusted library allocation
page read and write
3921000
heap
page read and write
1050000
heap
page read and write
4CDC000
unclassified section
page read and write
6AA84000
unkown
page read and write
3921000
heap
page read and write
69416000
unkown
page write copy
6A9EF000
unkown
page write copy
6A2B0000
unkown
page readonly
3921000
heap
page read and write
33E9000
heap
page read and write
6AA1D000
unkown
page read and write
694D4000
unkown
page write copy
2F94000
heap
page read and write
8C4000
heap
page read and write
3921000
heap
page read and write
5475000
heap
page read and write
20C0C000
stack
page read and write
904000
heap
page read and write
3921000
heap
page read and write
32F8000
stack
page read and write
8BD000
heap
page read and write
376E000
stack
page read and write
5000000
unclassified section
page read and write
54AE000
heap
page read and write
8BD000
heap
page read and write
69981000
unkown
page read and write
6866B000
unkown
page read and write
6A9C8000
unkown
page read and write
3921000
heap
page read and write
3098000
unkown
page read and write
6AA14000
unkown
page write copy
22BE0000
unclassified section
page execute and read and write
32FD000
stack
page read and write
691E0000
unkown
page readonly
3921000
heap
page read and write
3921000
heap
page read and write
710000
heap
page read and write
23FE0000
unclassified section
page execute and read and write
3C10000
trusted library allocation
page read and write
6A789000
unkown
page write copy
6BDE6000
unkown
page readonly
8B70000
heap
page read and write
904000
heap
page read and write
8F7000
heap
page read and write
6A5D0000
unkown
page readonly
6A918000
unkown
page read and write
8137000
stack
page read and write
30A2000
unkown
page read and write
B90000
unkown
page readonly
40B000
unkown
page write copy
6A734000
unkown
page read and write
2092D000
stack
page read and write
6A0F5000
unkown
page readonly
20470000
direct allocation
page read and write
3921000
heap
page read and write
30000
heap
page read and write
204B0000
direct allocation
page read and write
7090000
heap
page execute and read and write
830F000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
6A626000
unkown
page write copy
3921000
heap
page read and write
6A9FB000
unkown
page read and write
8E4000
heap
page read and write
8DF000
heap
page read and write
691E3000
unkown
page write copy
6A764000
unkown
page write copy
41A2000
unkown
page read and write
27F76F28000
heap
page read and write
3921000
heap
page read and write
3417000
heap
page read and write
2F54000
heap
page read and write
9B9000
heap
page read and write
6A2D0000
unkown
page execute read
687B4000
unkown
page execute read
54AA000
heap
page read and write
6940000
direct allocation
page read and write
930000
trusted library allocation
page read and write
10F0000
heap
page read and write
20EA0000
heap
page read and write
20500000
direct allocation
page read and write
1277000
heap
page read and write
5487000
heap
page read and write
341E000
heap
page read and write
27F76D80000
system
page execute and read and write
401000
unkown
page execute read
3921000
heap
page read and write
6872A000
unkown
page write copy
5AB000
unkown
page readonly
6A99F000
unkown
page read and write
3921000
heap
page read and write
86E000
unkown
page readonly
5E22000
unclassified section
page read and write
54AA000
heap
page read and write
209EE000
stack
page read and write
10E0000
unkown
page readonly
10C0000
unkown
page read and write
2DF0000
heap
page read and write
2D4D000
heap
page read and write
69219000
unkown
page write copy
6A721000
unkown
page write copy
909000
heap
page read and write
6A915000
unkown
page read and write
401000
unkown
page execute read
340F000
stack
page read and write
89D000
heap
page read and write
33BE000
heap
page read and write
4770000
heap
page execute and read and write
5492000
heap
page read and write
3921000
heap
page read and write
10C0000
unkown
page read and write
990000
trusted library allocation
page read and write
20EF3000
heap
page read and write
683E000
stack
page read and write
887A000
heap
page read and write
3921000
heap
page read and write
55B0000
heap
page read and write
33B8000
heap
page read and write
39D6000
heap
page read and write
33BE000
heap
page read and write
3921000
heap
page read and write
5489000
heap
page read and write
1660000
remote allocation
page execute and read and write
3921000
heap
page read and write
6A869000
unkown
page read and write
861000
unkown
page execute read
2C90000
unkown
page read and write
2F50000
heap
page read and write
698D6000
unkown
page write copy
3921000
heap
page read and write
3921000
heap
page read and write
313E000
stack
page read and write
5EA000
unkown
page execute read
2E20000
unkown
page readonly
116E000
unkown
page read and write
1860000
unkown
page readonly
917000
heap
page read and write
6AA1A000
unkown
page write copy
409000
unkown
page readonly
2D3E000
heap
page read and write
3921000
heap
page read and write
6A879000
unkown
page read and write
4781000
trusted library allocation
page read and write
863D000
stack
page read and write
2102C000
stack
page read and write
687B3000
unkown
page read and write
690CF000
unkown
page execute read
6A627000
unkown
page read and write
909000
heap
page read and write
4092000
unclassified section
page read and write
698AC000
unkown
page write copy
81E0000
trusted library allocation
page read and write
13F6000
system
page execute and read and write
8870000
heap
page read and write
3F6C000
remote allocation
page execute and read and write
861000
unkown
page execute read
6A948000
unkown
page write copy
5789000
trusted library allocation
page read and write
6869B000
unkown
page write copy
708E000
stack
page read and write
2F60000
unkown
page execute and read and write
3921000
heap
page read and write
3921000
heap
page read and write
1040000
unkown
page read and write
68721000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
68777000
unkown
page write copy
8E4000
heap
page read and write
5580000
direct allocation
page read and write
3921000
heap
page read and write
4360000
unkown
page execute and read and write
2F10000
unkown
page readonly
30000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
88DD000
heap
page read and write
6A763000
unkown
page read and write
6A3CF000
unkown
page readonly
6970000
direct allocation
page read and write
3921000
heap
page read and write
409000
unkown
page readonly
6A920000
unkown
page read and write
88A3000
heap
page read and write
EFC000
stack
page read and write
68663000
unkown
page write copy
5489000
heap
page read and write
128F000
heap
page read and write
3921000
heap
page read and write
2410000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
793000
heap
page read and write
340A000
heap
page read and write
1250000
unkown
page readonly
694DB000
unkown
page read and write
8FE000
heap
page read and write
900000
trusted library section
page read and write
3921000
heap
page read and write
49B8000
unclassified section
page read and write
3921000
heap
page read and write
B90000
unkown
page readonly
877000
unkown
page readonly
342A000
heap
page read and write
8680000
trusted library allocation
page read and write
5530000
direct allocation
page read and write
2580000
heap
page read and write
6BFC1000
unkown
page read and write
6A902000
unkown
page write copy
C1F000
stack
page read and write
6AA88000
unkown
page read and write
82EE000
heap
page read and write
2F30000
heap
page read and write
A78000
trusted library allocation
page read and write
3921000
heap
page read and write
6A89A000
unkown
page read and write
3921000
heap
page read and write
24F0000
heap
page read and write
27F78A09000
trusted library allocation
page read and write
33B2000
heap
page read and write
6B70000
heap
page read and write
691E1000
unkown
page read and write
2D42000
heap
page read and write
348F000
stack
page read and write
32D0000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
4E32000
unkown
page read and write
8871000
heap
page read and write
6EEC000
heap
page read and write
913000
heap
page read and write
2D4D000
heap
page read and write
3921000
heap
page read and write
6A182000
unkown
page write copy
2B8E000
unkown
page read and write
20DCF000
stack
page read and write
52EF000
stack
page read and write
3A49000
heap
page read and write
2B90000
heap
page read and write
3921000
heap
page read and write
3F50000
direct allocation
page execute and read and write
6A6CD000
unkown
page write copy
84E000
heap
page read and write
144D000
system
page execute and read and write
3921000
heap
page read and write
2BF6000
heap
page read and write
86A0000
trusted library allocation
page read and write
53F8000
heap
page read and write
217E0000
unclassified section
page execute and read and write
3921000
heap
page read and write
6BFC0000
unkown
page readonly
6A824000
unkown
page write copy
2F20000
unkown
page read and write
39D6000
heap
page read and write
54AE000
heap
page read and write
686A1000
unkown
page read and write
69206000
unkown
page read and write
6AA00000
unkown
page write copy
33F9000
heap
page read and write
6980000
direct allocation
page read and write
940000
trusted library allocation
page read and write
20EF5000
heap
page read and write
1277000
heap
page read and write
6A82B000
unkown
page read and write
6904000
unkown
page execute and read and write
6A760000
unkown
page write copy
68F0000
direct allocation
page read and write
2FD0000
heap
page read and write
27F78BB4000
trusted library allocation
page read and write
6A0B1000
unkown
page read and write
7D71000
unkown
page execute and read and write
6955000
heap
page execute and read and write
86B0000
direct allocation
page execute and read and write
33AD000
heap
page read and write
3351000
heap
page read and write
33AD000
heap
page read and write
54AB000
heap
page read and write
6A8F9000
unkown
page write copy
20C90000
direct allocation
page read and write
69410000
unkown
page readonly
5560000
direct allocation
page read and write
86C0000
trusted library allocation
page execute and read and write
1050000
heap
page read and write
5499000
heap
page read and write
6A9AD000
unkown
page read and write
3921000
heap
page read and write
69217000
unkown
page read and write
204A0000
direct allocation
page read and write
5918000
trusted library allocation
page read and write
39F1000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
39D0000
heap
page read and write
4B0E000
unkown
page read and write
27F78900000
trusted library allocation
page read and write
2F90000
heap
page read and write
8FA000
heap
page read and write
6A688000
unkown
page read and write
6A9C9000
unkown
page write copy
69891000
unkown
page read and write
3921000
heap
page read and write
686B9000
unkown
page write copy
5477000
heap
page read and write
3921000
heap
page read and write
27F76F50000
heap
page read and write
933000
trusted library allocation
page execute and read and write
3921000
heap
page read and write
75F0000
heap
page read and write
2C30000
heap
page read and write
440000
unkown
page read and write
76E0000
trusted library allocation
page read and write
875000
unkown
page read and write
6A187000
unkown
page read and write
496C000
remote allocation
page execute and read and write
3C03000
heap
page read and write
6960000
direct allocation
page read and write
6A0B2000
unkown
page write copy
8FA000
heap
page read and write
3405000
heap
page read and write
6A9B1000
unkown
page read and write
3921000
heap
page read and write
909000
heap
page read and write
3921000
heap
page read and write
3546000
heap
page read and write
3921000
heap
page read and write
6A0B6000
unkown
page read and write
5EC000
unkown
page execute read
8FA000
heap
page read and write
20A2E000
stack
page read and write
A5DC000
direct allocation
page execute and read and write
875000
unkown
page read and write
A8EE7FE000
stack
page read and write
20EF1000
heap
page read and write
CFA000
stack
page read and write
3446000
heap
page read and write
687E000
stack
page read and write
3921000
heap
page read and write
1250000
unkown
page readonly
2BDE000
stack
page read and write
2EFD000
stack
page read and write
2140E000
heap
page read and write
409000
unkown
page readonly
53AE000
stack
page read and write
6868C000
unkown
page write copy
10B0000
unkown
page readonly
6AAB7000
unkown
page execute read
47C000
stack
page read and write
20BCF000
stack
page read and write
714F000
stack
page read and write
3394000
heap
page read and write
27F78A19000
trusted library allocation
page read and write
9A0000
heap
page readonly
730000
heap
page read and write
391F000
stack
page read and write
27F76F57000
heap
page read and write
3921000
heap
page read and write
91B000
heap
page read and write
20F74000
heap
page read and write
3921000
heap
page read and write
57A9000
trusted library allocation
page read and write
6A99B000
unkown
page read and write
159C000
unkown
page read and write
6A71F000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
2F10000
unkown
page readonly
3921000
heap
page read and write
6913B000
unkown
page readonly
694DD000
unkown
page execute read
10F0000
heap
page read and write
3394000
heap
page read and write
32D8000
heap
page read and write
DEE000
stack
page read and write
6AA20000
unkown
page write copy
547B000
heap
page read and write
69224000
unkown
page read and write
6A822000
unkown
page write copy
3921000
heap
page read and write
20B8E000
stack
page read and write
887F000
heap
page read and write
6A868000
unkown
page write copy
83D000
heap
page read and write
5550000
direct allocation
page read and write
88B3000
heap
page read and write
710E000
stack
page read and write
436000
unkown
page read and write
5648000
unclassified section
page read and write
2D60000
unkown
page readonly
6A5EF000
unkown
page write copy
3434000
heap
page read and write
3921000
heap
page read and write
6A2C6000
unkown
page write copy
686A5000
unkown
page write copy
83D9000
heap
page read and write
6DAE000
stack
page read and write
C90000
heap
page read and write
3530000
heap
page read and write
6A8A0000
unkown
page read and write
5590000
direct allocation
page read and write
6EE000
stack
page read and write
3921000
heap
page read and write
69412000
unkown
page write copy
7F030000
trusted library allocation
page execute and read and write
10B0000
unkown
page readonly
8F7000
heap
page read and write
68674000
unkown
page read and write
467C000
stack
page read and write
A8EDFFE000
stack
page read and write
3921000
heap
page read and write
2F94000
heap
page read and write
83F000
heap
page read and write
2FCD000
stack
page read and write
6A91B000
unkown
page write copy
20490000
direct allocation
page read and write
8B6000
heap
page read and write
32FF000
stack
page read and write
6A71E000
unkown
page write copy
6BFCF000
unkown
page write copy
20EF5000
heap
page read and write
1060000
unkown
page read and write
3921000
heap
page read and write
6A99C000
unkown
page write copy
3921000
heap
page read and write
54AA000
heap
page read and write
3921000
heap
page read and write
91A000
heap
page read and write
8150000
trusted library allocation
page read and write
25F0000
heap
page read and write
6A722000
unkown
page read and write
3921000
heap
page read and write
6A2B6000
unkown
page write copy
3921000
heap
page read and write
8FA000
heap
page read and write
58E000
stack
page read and write
87DC000
direct allocation
page execute and read and write
3F4C000
direct allocation
page execute and read and write
950000
heap
page read and write
6A5F4000
unkown
page write copy
3921000
heap
page read and write
6C045000
unkown
page readonly
88F1000
heap
page read and write
6A916000
unkown
page write copy
347E000
heap
page read and write
909000
heap
page read and write
6BFC9000
unkown
page read and write
69893000
unkown
page write copy
69B0000
direct allocation
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
497C000
unkown
page read and write
828000
heap
page read and write
8DF000
heap
page read and write
6A876000
unkown
page read and write
861000
unkown
page execute read
6E95000
heap
page read and write
3921000
heap
page read and write
344F000
heap
page read and write
3C07000
heap
page read and write
6EF7000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
747000
heap
page read and write
76C0000
trusted library allocation
page read and write
3921000
heap
page read and write
30FC000
unkown
page read and write
909000
heap
page read and write
33A7000
heap
page read and write
12A6000
heap
page read and write
33F1000
heap
page read and write
6A92F000
unkown
page write copy
2F60000
heap
page read and write
5EE000
unkown
page execute read
3836000
unkown
page read and write
3921000
heap
page read and write
2C80000
unkown
page readonly
68650000
unkown
page readonly
31FF000
unkown
page read and write
8C7000
heap
page read and write
20E20000
remote allocation
page read and write
68666000
unkown
page read and write
85F000
heap
page read and write
6A5D1000
unkown
page read and write
5324000
unclassified section
page read and write
3921000
heap
page read and write
1A00000
unkown
page readonly
3921000
heap
page read and write
3C80000
direct allocation
page execute and read and write
21130000
direct allocation
page read and write
6BFC7000
unkown
page read and write
8876000
heap
page read and write
3AD0000
trusted library allocation
page read and write
6BFD1000
unkown
page read and write
2B3F000
stack
page read and write
20CFE000
stack
page read and write
176C000
remote allocation
page execute and read and write
19A000
stack
page read and write
3910000
heap
page read and write
5487000
heap
page read and write
8F7000
heap
page read and write
15E0000
stack
page read and write
69426000
unkown
page execute read
3921000
heap
page read and write
8867000
heap
page read and write
686A2000
unkown
page write copy
6A792000
unkown
page write copy
6A669000
unkown
page read and write
6A94C000
unkown
page read and write
AF0000
heap
page read and write
10D0000
heap
page read and write
6869C000
unkown
page read and write
20E20000
remote allocation
page read and write
904000
heap
page read and write
34AE000
stack
page read and write
3921000
heap
page read and write
7467000
trusted library allocation
page read and write
5265000
heap
page read and write
4CA0000
unkown
page read and write
BE1000
unkown
page readonly
691B5000
unkown
page execute read
2D41000
heap
page read and write
400000
unkown
page readonly
3542000
heap
page read and write
7700000
trusted library allocation
page read and write
69204000
unkown
page write copy
20860000
heap
page read and write
3921000
heap
page read and write
71000
heap
page read and write
356C000
remote allocation
page execute and read and write
20C80000
direct allocation
page read and write
86E000
unkown
page readonly
212E1000
heap
page read and write
3921000
heap
page read and write
6AA85000
unkown
page write copy
6AA13000
unkown
page read and write
3921000
heap
page read and write
54DC000
heap
page read and write
53EE000
stack
page read and write
2125B000
heap
page read and write
21760000
direct allocation
page execute and read and write
3921000
heap
page read and write
27F78A1C000
trusted library allocation
page read and write
CFA000
stack
page read and write
3921000
heap
page read and write
3A20000
heap
page read and write
3921000
heap
page read and write
6A687000
unkown
page write copy
6E86000
heap
page read and write
98000
stack
page read and write
3921000
heap
page read and write
39E0000
heap
page read and write
3921000
heap
page read and write
1060000
unkown
page read and write
740000
heap
page read and write
3921000
heap
page read and write
6AA0E000
unkown
page read and write
686B8000
unkown
page read and write
6F8E000
stack
page read and write
718E000
stack
page read and write
A8ED7FD000
stack
page read and write
3921000
heap
page read and write
7BE000
stack
page read and write
6A788000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
6A861000
unkown
page read and write
204F0000
direct allocation
page read and write
5499000
heap
page read and write
6DB86000
unkown
page readonly
8FE000
heap
page read and write
3921000
heap
page read and write
88E000
stack
page read and write
3520000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
8DF000
heap
page read and write
10F5000
heap
page read and write
6A5D3000
unkown
page write copy
6A9B2000
unkown
page write copy
6A5E9000
unkown
page read and write
3921000
heap
page read and write
13D2000
system
page execute and read and write
6868A000
unkown
page read and write
917000
heap
page read and write
13EA000
system
page execute and read and write
3921000
heap
page read and write
5487000
heap
page read and write
68D0000
direct allocation
page read and write
31B0000
heap
page read and write
20D8E000
stack
page read and write
88AC000
heap
page read and write
3921000
heap
page read and write
AF0000
heap
page read and write
88E000
heap
page read and write
3921000
heap
page read and write
6A5F5000
unkown
page read and write
6AA18000
unkown
page write copy
6AA5A000
unkown
page read and write
6AA11000
unkown
page write copy
904000
heap
page read and write
649000
unkown
page execute read
68E0000
direct allocation
page read and write
20E5E000
stack
page read and write
3921000
heap
page read and write
913000
heap
page read and write
6A2CF000
unkown
page read and write
42E000
unkown
page read and write
8314000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
691D6000
unkown
page readonly
27F76F55000
heap
page read and write
3C10000
trusted library allocation
page read and write
6A1A2000
unkown
page execute read
33B9000
heap
page read and write
3921000
heap
page read and write
6A6CF000
unkown
page read and write
3921000
heap
page read and write
2D50000
heap
page read and write
10C1000
unkown
page readonly
4FF0000
trusted library allocation
page read and write
934000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
3921000
heap
page read and write
5267000
heap
page read and write
21170000
direct allocation
page read and write
54E000
stack
page read and write
340F000
heap
page read and write
72E000
stack
page read and write
69890000
unkown
page readonly
3921000
heap
page read and write
68698000
unkown
page write copy
6A0B4000
unkown
page write copy
36A4000
unkown
page read and write
6A911000
unkown
page read and write
86D0000
direct allocation
page execute and read and write
2FE2000
unkown
page read and write
2F20000
unkown
page read and write
3921000
heap
page read and write
8860000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
3921000
heap
page read and write
2FE2000
unkown
page read and write
33B8000
heap
page read and write
73A000
heap
page read and write
33E0000
heap
page read and write
8771000
unkown
page execute and read and write
3921000
heap
page read and write
381F000
stack
page read and write
860000
unkown
page readonly
9C0000
heap
page read and write
5A6000
heap
page read and write
85EB000
stack
page read and write
3921000
heap
page read and write
84E0000
trusted library allocation
page read and write
547B000
heap
page read and write
694D1000
unkown
page read and write
317E000
stack
page read and write
85F000
heap
page read and write
7371000
unkown
page execute and read and write
698D7000
unkown
page read and write
A8ECFFC000
stack
page read and write
2D39000
heap
page read and write
85AC000
stack
page read and write
3449000
heap
page read and write
3921000
heap
page read and write
3439000
heap
page read and write
341E000
heap
page read and write
3921000
heap
page read and write
6DB8D000
unkown
page read and write
88D1000
heap
page read and write
A1F000
stack
page read and write
27F78A0F000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
DFC000
stack
page read and write
6A8B8000
unkown
page write copy
5F2000
unkown
page execute read
8E5000
heap
page read and write
7750000
trusted library allocation
page read and write
13F8000
system
page execute and read and write
3ADA000
heap
page read and write
88DA000
heap
page read and write
6AA7E000
unkown
page write copy
27F76D10000
heap
page read and write
6AA7D000
unkown
page read and write
21490000
direct allocation
page execute and read and write
82A0000
trusted library allocation
page execute and read and write
8AE000
heap
page read and write
6A927000
unkown
page write copy
6A1A1000
unkown
page read and write
770000
heap
page read and write
68723000
unkown
page write copy
6A9FC000
unkown
page write copy
917000
heap
page read and write
698D4000
unkown
page write copy
686A3000
unkown
page read and write
10EB000
unkown
page read and write
32CE000
stack
page read and write
46C0000
trusted library allocation
page read and write
6A8A1000
unkown
page write copy
686B7000
unkown
page write copy
6A833000
unkown
page write copy
691B2000
unkown
page write copy
57DA000
unclassified section
page read and write
84E000
heap
page read and write
9BDC000
direct allocation
page execute and read and write
4088000
unclassified section
page read and write
3921000
heap
page read and write
6A6D1000
unkown
page write copy
47EA000
unkown
page read and write
6A71A000
unkown
page read and write
30BD000
stack
page read and write
8A3000
heap
page read and write
3921000
heap
page read and write
6A933000
unkown
page write copy
3940000
heap
page read and write
7720000
trusted library allocation
page read and write
6EF9000
heap
page read and write
401000
unkown
page execute read
861000
unkown
page execute read
1860000
unkown
page readonly
2F1B000
stack
page read and write
8FE000
heap
page read and write
3921000
heap
page read and write
88E2000
heap
page read and write
7050000
heap
page read and write
735000
heap
page read and write
829F000
stack
page read and write
5B2F000
stack
page read and write
5C90000
unclassified section
page read and write
F0F000
unkown
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
48D8000
trusted library allocation
page read and write
1270000
heap
page read and write
27F78BAE000
trusted library allocation
page read and write
40EC000
unclassified section
page read and write
307D000
stack
page read and write
6F10000
trusted library allocation
page read and write
2112C000
stack
page read and write
20E9F000
stack
page read and write
6AAB6000
unkown
page read and write
463E000
stack
page read and write
532E000
stack
page read and write
6A82A000
unkown
page write copy
3921000
heap
page read and write
2C90000
unkown
page read and write
88E000
heap
page read and write
AFDC000
direct allocation
page execute and read and write
6A0B3000
unkown
page read and write
3300000
heap
page read and write
69982000
unkown
page execute read
93D000
trusted library allocation
page execute and read and write
39D2000
heap
page read and write
345C000
heap
page read and write
6A9FA000
unkown
page write copy
43A000
unkown
page read and write
54DC000
heap
page read and write
6910000
direct allocation
page read and write
39D6000
heap
page read and write
975000
trusted library allocation
page execute and read and write
27F78900000
trusted library allocation
page read and write
3921000
heap
page read and write
5540000
direct allocation
page read and write
27F78900000
trusted library allocation
page read and write
27F76DFF000
system
page execute and read and write
4FEA000
trusted library allocation
page read and write
4E6E000
unclassified section
page read and write
837B000
heap
page read and write
68694000
unkown
page write copy
88FB000
heap
page read and write
8970000
trusted library allocation
page read and write
3921000
heap
page read and write
3FD2000
unclassified section
page read and write
40B000
unkown
page write copy
2F3B000
heap
page read and write
6DB70000
unkown
page readonly
6A9EE000
unkown
page read and write
6A0B0000
unkown
page readonly
1270000
heap
page read and write
33B8000
heap
page read and write
3960000
unkown
page execute and read and write
2BF6000
heap
page read and write
1030000
unkown
page readonly
54AE000
heap
page read and write
6A2B7000
unkown
page read and write
3921000
heap
page read and write
8882000
heap
page read and write
6DB71000
unkown
page execute read
8DC000
heap
page read and write
686A0000
unkown
page write copy
8F7000
heap
page read and write
84D0000
trusted library allocation
page read and write
43E000
unkown
page read and write
8690000
trusted library allocation
page read and write
3921000
heap
page read and write
698D8000
unkown
page write copy
20480000
direct allocation
page read and write
6A71C000
unkown
page read and write
54DC000
heap
page read and write
3921000
heap
page read and write
6A189000
unkown
page write copy
3921000
heap
page read and write
EFC000
stack
page read and write
6AA08000
unkown
page read and write
52AE000
stack
page read and write
3921000
heap
page read and write
6A828000
unkown
page read and write
6A935000
unkown
page read and write
3921000
heap
page read and write
3926000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
694DA000
unkown
page write copy
5A8000
unkown
page read and write
4826000
unclassified section
page read and write
6BFC5000
unkown
page write copy
3414000
heap
page read and write
3921000
heap
page read and write
46BE000
stack
page read and write
204E0000
direct allocation
page read and write
5E8000
unkown
page execute read
694C0000
unkown
page readonly
36DC8000
system
page read and write
20CB0000
direct allocation
page read and write
970000
trusted library allocation
page read and write
27F76E80000
heap
page read and write
68651000
unkown
page read and write
69411000
unkown
page read and write
36DD2000
system
page read and write
6A9B0000
unkown
page write copy
2EB0000
heap
page read and write
2D4E000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
20F58000
heap
page read and write
6A2C8000
unkown
page read and write
3921000
heap
page read and write
25F4000
heap
page read and write
8CC000
heap
page read and write
69390000
unkown
page readonly
2540000
heap
page read and write
346D000
heap
page read and write
8E5000
heap
page read and write
6A9AB000
unkown
page write copy
691E7000
unkown
page write copy
6BFC8000
unkown
page write copy
B5A000
stack
page read and write
21138000
heap
page read and write
6990000
direct allocation
page read and write
12A4000
heap
page read and write
3921000
heap
page read and write
14D0000
unkown
page readonly
1050000
unkown
page read and write
A8EEFFE000
stack
page read and write
77A000
heap
page read and write
68652000
unkown
page write copy
82F5000
heap
page read and write
91FE000
stack
page read and write
C80000
unkown
page readonly
691EE000
unkown
page write copy
475E000
stack
page read and write
2D50000
heap
page read and write
DF5000
heap
page read and write
5AFE000
unclassified section
page read and write
3921000
heap
page read and write
3414000
heap
page read and write
3921000
heap
page read and write
1670000
unkown
page readonly
3921000
heap
page read and write
88ED000
heap
page read and write
3921000
heap
page read and write
3921000
heap
page read and write
3DA9000
direct allocation
page execute and read and write
27F78A02000
trusted library allocation
page read and write
875000
unkown
page read and write
2C40000
heap
page read and write
2F50000
heap
page read and write
3921000
heap
page read and write
38B0000
trusted library allocation
page read and write
69203000
unkown
page read and write
79F000
heap
page read and write
7760000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
6A86A000
unkown
page write copy
6A791000
unkown
page read and write
57EC000
trusted library allocation
page read and write
2F54000
heap
page read and write
69425000
unkown
page read and write
76D0000
trusted library allocation
page read and write
3921000
heap
page read and write
68661000
unkown
page read and write
3921000
heap
page read and write
8CC000
heap
page read and write
910000
trusted library section
page read and write
3921000
heap
page read and write
6A94D000
unkown
page write copy
6DB8F000
unkown
page readonly
3921000
heap
page read and write
3921000
heap
page read and write
6865B000
unkown
page write copy
3921000
heap
page read and write
3440000
heap
page read and write
3921000
heap
page read and write
1172000
unkown
page read and write
5A0000
heap
page read and write
5499000
heap
page read and write
9B0000
heap
page read and write
5475000
heap
page read and write
6A743000
unkown
page write copy
6A820000
unkown
page read and write
6A9A0000
unkown
page write copy
346E000
stack
page read and write
10D0000
heap
page read and write
235E0000
unclassified section
page execute and read and write
1670000
unkown
page readonly
96A000
trusted library allocation
page execute and read and write
3417000
heap
page read and write
20CA0000
direct allocation
page read and write
3921000
heap
page read and write
39F1000
heap
page read and write
373D4000
system
page read and write
10C1000
unkown
page readonly
14D0000
unkown
page readonly
20F78000
heap
page read and write
6A823000
unkown
page read and write
54F0000
heap
page read and write
691E4000
unkown
page read and write
3921000
heap
page read and write
401000
unkown
page execute read
21170000
direct allocation
page read and write
84D000
stack
page read and write
27F78BA4000
trusted library allocation
page read and write
3921000
heap
page read and write
691B0000
unkown
page readonly
546F000
heap
page read and write
3340000
heap
page read and write
34E0000
heap
page read and write
20EF0000
heap
page read and write
54DC000
heap
page read and write
2140A000
heap
page read and write
6F62000
heap
page read and write
3921000
heap
page read and write
68697000
unkown
page read and write
337E000
stack
page read and write
53F0000
heap
page read and write
1030000
unkown
page readonly
698D2000
unkown
page read and write
6A8B7000
unkown
page read and write
6900000
direct allocation
page read and write
596C000
unclassified section
page read and write
3921000
heap
page read and write
21170000
direct allocation
page read and write
20960000
heap
page read and write
6A9A6000
unkown
page read and write
2D31000
heap
page read and write
3921000
heap
page read and write
6A180000
unkown
page readonly
691F3000
unkown
page write copy
6E44000
heap
page read and write
6FF000
stack
page read and write
3490000
heap
page read and write
68667000
unkown
page write copy
33B8000
heap
page read and write
4010000
unkown
page read and write
6E8D000
heap
page read and write
4D60000
unkown
page execute and read and write
691B4000
unkown
page read and write
27F76F46000
heap
page read and write
54AB000
heap
page read and write
6A71B000
unkown
page write copy
949000
trusted library allocation
page read and write
6AA16000
unkown
page read and write
AE0000
unkown
page readonly
68725000
unkown
page read and write
6A90F000
unkown
page write copy
24BE000
stack
page read and write
82D0000
heap
page read and write
67BE000
stack
page read and write
7710000
trusted library allocation
page read and write
33AF000
heap
page read and write
6869A000
unkown
page read and write
400000
unkown
page readonly
47DE000
trusted library allocation
page read and write
626000
unkown
page execute read
6920B000
unkown
page write copy
B5A000
stack
page read and write
536E000
stack
page read and write
There are 1280 hidden memdumps, click here to show them.