IOC Report
SecuriteInfo.com.Trojan.NSIS.Agent.20411.3944.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.NSIS.Agent.20411.3944.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Buffer.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduSpark.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\EdTech Spark Solutions\w
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Y
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Alot
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Borders
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Bucks
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Chad
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Consecutive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Cruises
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Deborah
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Double
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Emotions
ASCII text, with very long lines (1081), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Emotions.cmd (copy)
ASCII text, with very long lines (1081), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Experiencing
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Favourites
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Fighter
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Flip
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Genre
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Hayes
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Instances
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Involve
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Kde
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ld
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Old
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Participants
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Que
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Race
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Richmond
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Seek
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Tags
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Terminal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Tokyo
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Violence
data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSIS.Agent.20411.3944.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSIS.Agent.20411.3944.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Emotions Emotions.cmd & Emotions.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 1181
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "MasBathroomsCompoundInjection" Participants
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Terminal + Involve + Experiencing + Borders + Deborah + Flip 1181\Y
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Buffer.pif
1181\Buffer.pif 1181\Y
malicious
C:\Windows\SysWOW64\PING.EXE
ping -n 5 127.0.0.1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Indeed" /tr "wscript //B 'C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "Indeed" /tr "wscript //B 'C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduSpark.url" & echo URL="C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduSpark.url" & exit
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js"
malicious
C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.pif
"C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.pif" "C:\Users\user\AppData\Local\EdTech Spark Solutions\w"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.js"
malicious
C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.pif
"C:\Users\user\AppData\Local\EdTech Spark Solutions\EduSpark.pif" "C:\Users\user\AppData\Local\EdTech Spark Solutions\w"
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Buffer.pif
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Buffer.pif
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Buffer.pif
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\1181\Buffer.pif
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://zippyfinickysofwps.shop/api
104.21.39.216
malicious
boredimperissvieos.shop
malicious
sweetsquarediaslw.shop
malicious
miniaturefinerninewjs.shop
malicious
plaintediousidowsko.shop
malicious
acceptabledcooeprs.shop
malicious
zippyfinickysofwps.shop
malicious
obsceneclassyjuwks.shop
malicious
holicisticscrarws.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://zippyfinickysofwps.shop/pil
unknown
https://www.autoitscript.com/autoit3/
unknown
https://zippyfinickysofwps.shop/piu
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://zippyfinickysofwps.shop/h
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.entrust.net/rpa03
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://zippyfinickysofwps.shop/
unknown
https://zippyfinickysofwps.shop/pic
unknown
https://zippyfinickysofwps.shop/api-aF
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
https://zippyfinickysofwps.shop/apil
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://www.entrust.net/rpa0
unknown
https://zippyfinickysofwps.shop/pi
unknown
There are 44 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
zippyfinickysofwps.shop
104.21.39.216
malicious
hhnlUmHdzjZFqZYoOtpryMy.hhnlUmHdzjZFqZYoOtpryMy
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.39.216
zippyfinickysofwps.shop
United States
malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
230000
remote allocation
page read and write
malicious
304A000
heap
page read and write
FA2000
heap
page read and write
10EF000
heap
page read and write
CF0000
trusted library allocation
page read and write
471000
heap
page read and write
1A0E8F54000
heap
page read and write
4DA1000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
4677000
trusted library allocation
page read and write
291A000
heap
page read and write
487000
heap
page read and write
495000
heap
page read and write
1A0E8F57000
heap
page read and write
17ED000
heap
page read and write
401000
unkown
page execute read
17FD000
heap
page read and write
221E000
stack
page read and write
47D000
heap
page read and write
17F3000
heap
page read and write
17C7000
heap
page read and write
1A547EBC000
heap
page read and write
121E000
heap
page read and write
107F000
heap
page read and write
15EC000
heap
page read and write
16AD000
heap
page read and write
1822000
heap
page read and write
4B70000
heap
page read and write
1709000
heap
page read and write
2CD8000
heap
page read and write
1754000
heap
page read and write
3F1000
unkown
page execute read
1725000
heap
page read and write
15D8000
heap
page read and write
48C000
heap
page read and write
3180000
heap
page read and write
24CF000
stack
page read and write
180B000
heap
page read and write
1500000
heap
page read and write
1A547ED7000
heap
page read and write
187E000
heap
page read and write
1230000
heap
page read and write
4B3F000
heap
page read and write
182E000
heap
page read and write
1705000
heap
page read and write
17FB000
heap
page read and write
1791000
heap
page read and write
3903000
heap
page read and write
3BF4000
trusted library allocation
page read and write
10DD000
heap
page read and write
3E4F379000
stack
page read and write
304A000
heap
page read and write
1562000
heap
page read and write
27CB000
heap
page read and write
17EC000
heap
page read and write
30F0000
heap
page read and write
F7B000
stack
page read and write
17E3000
heap
page read and write
470000
unkown
page readonly
116A000
heap
page read and write
17ED000
heap
page read and write
D44000
heap
page read and write
1504000
heap
page read and write
3F0000
unkown
page readonly
3B79000
trusted library allocation
page read and write
42F1000
heap
page read and write
3B6B000
trusted library allocation
page read and write
1504000
heap
page read and write
1738000
heap
page read and write
17F1000
heap
page read and write
187E000
heap
page read and write
17ED000
heap
page read and write
1256000
heap
page read and write
18FB000
heap
page read and write
495000
heap
page read and write
17E7000
heap
page read and write
2C2E000
stack
page read and write
44B0000
heap
page read and write
37F0000
trusted library allocation
page read and write
1925000
heap
page read and write
3E55000
heap
page read and write
3E16000
heap
page read and write
3BFE000
trusted library allocation
page read and write
471000
heap
page read and write
4DA5000
trusted library allocation
page read and write
17E7000
heap
page read and write
F38000
heap
page read and write
EF4000
heap
page read and write
3BF0000
trusted library allocation
page read and write
4C5000
unkown
page readonly
1827000
heap
page read and write
2270000
trusted library allocation
page read and write
47D000
heap
page read and write
2A9E000
stack
page read and write
17EC000
heap
page read and write
3131000
heap
page read and write
160D000
heap
page read and write
495000
heap
page read and write
3BFC000
trusted library allocation
page read and write
3B8D000
trusted library allocation
page read and write
47D000
heap
page read and write
14B0000
heap
page read and write
495000
heap
page read and write
1188000
heap
page read and write
1A0E8F4E000
heap
page read and write
42F1000
heap
page read and write
14FE000
stack
page read and write
D44000
heap
page read and write
3188000
heap
page read and write
17A5000
heap
page read and write
2270000
trusted library allocation
page read and write
316A000
heap
page read and write
47D000
heap
page read and write
3BFB000
trusted library allocation
page read and write
3E4F9FF000
stack
page read and write
1884000
heap
page read and write
4DA3000
trusted library allocation
page read and write
1298000
heap
page read and write
483000
heap
page read and write
3E9D000
heap
page read and write
597E8FF000
stack
page read and write
185D000
heap
page read and write
187E000
heap
page read and write
1A547EE0000
heap
page read and write
1571000
heap
page read and write
487000
heap
page read and write
F43000
heap
page read and write
33FD000
trusted library allocation
page read and write
759D000
trusted library allocation
page read and write
470000
unkown
page readonly
17E7000
heap
page read and write
2916000
heap
page read and write
471000
heap
page read and write
5F0000
heap
page read and write
3B7C000
trusted library allocation
page read and write
48C000
heap
page read and write
4DA0000
trusted library allocation
page read and write
140E000
stack
page read and write
17ED000
heap
page read and write
2C6F000
stack
page read and write
17E7000
heap
page read and write
4A8000
heap
page read and write
1A547F0F000
heap
page read and write
3BA1000
trusted library allocation
page read and write
1504000
heap
page read and write
1A0E8F47000
heap
page read and write
2160000
heap
page read and write
48C000
heap
page read and write
17F0000
heap
page read and write
3674000
heap
page read and write
383F000
stack
page read and write
47D000
heap
page read and write
2E41000
heap
page read and write
471000
heap
page read and write
74B1000
trusted library allocation
page read and write
1A547F0F000
heap
page read and write
1572000
heap
page read and write
F93000
heap
page read and write
17ED000
heap
page read and write
533000
unkown
page readonly
16C7000
heap
page read and write
17DD000
heap
page read and write
597EFFF000
stack
page read and write
1583000
heap
page read and write
17ED000
heap
page read and write
306E000
heap
page read and write
4DA6000
trusted library allocation
page read and write
16A1000
heap
page read and write
15DB000
heap
page read and write
487000
heap
page read and write
483000
heap
page read and write
42F1000
heap
page read and write
48C000
heap
page read and write
3F17000
heap
page read and write
487000
heap
page read and write
16C6000
heap
page read and write
471000
unkown
page execute read
74B1000
trusted library allocation
page read and write
17E7000
heap
page read and write
495000
heap
page read and write
3BF6000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
4A3000
heap
page read and write
3BFA000
trusted library allocation
page read and write
483000
heap
page read and write
4EE2000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
1A0E8F26000
heap
page read and write
332E000
trusted library allocation
page read and write
108B000
heap
page read and write
42F1000
heap
page read and write
17FB000
heap
page read and write
1A547F0F000
heap
page read and write
3E7F000
stack
page read and write
FDD000
heap
page read and write
F6C000
heap
page read and write
3B79000
trusted library allocation
page read and write
533000
unkown
page readonly
1504000
heap
page read and write
EC3000
heap
page read and write
17F1000
heap
page read and write
53D000
unkown
page write copy
47D000
heap
page read and write
3BC1000
trusted library allocation
page read and write
1A548085000
heap
page read and write
17F3000
heap
page read and write
42F1000
heap
page read and write
483000
heap
page read and write
17FB000
heap
page read and write
471000
heap
page read and write
47D000
heap
page read and write
4C1000
unkown
page write copy
17F0000
heap
page read and write
487000
heap
page read and write
48C000
heap
page read and write
7577000
trusted library allocation
page read and write
EE0000
heap
page read and write
4DAB000
trusted library allocation
page read and write
4BA0000
heap
page read and write
1A548080000
heap
page read and write
1A547F01000
heap
page read and write
487000
heap
page read and write
487000
heap
page read and write
313D000
heap
page read and write
3EDE000
stack
page read and write
45A8000
trusted library allocation
page read and write
17E7000
heap
page read and write
48C000
heap
page read and write
1504000
heap
page read and write
EC2000
heap
page read and write
FD9000
heap
page read and write
25E6000
heap
page read and write
35F0000
heap
page read and write
21AE000
stack
page read and write
17E3000
heap
page read and write
1786000
heap
page read and write
3BF4000
trusted library allocation
page read and write
1282000
heap
page read and write
3270000
heap
page read and write
EF4000
heap
page read and write
F9A000
heap
page read and write
400000
unkown
page readonly
1256000
heap
page read and write
313E000
heap
page read and write
3686000
heap
page read and write
1A547EC9000
heap
page read and write
2CD4000
heap
page read and write
4C1000
unkown
page write copy
483000
heap
page read and write
1548000
heap
page read and write
FB7000
heap
page read and write
10DF000
heap
page read and write
495000
heap
page read and write
17ED000
heap
page read and write
17DF000
heap
page read and write
3B8E000
trusted library allocation
page read and write
231F000
stack
page read and write
408000
unkown
page readonly
2CB2000
heap
page read and write
1904000
heap
page read and write
17F1000
heap
page read and write
17ED000
heap
page read and write
17E3000
heap
page read and write
90E000
stack
page read and write
2A0F000
stack
page read and write
483000
heap
page read and write
27BC000
heap
page read and write
117A000
heap
page read and write
2798000
heap
page read and write
1811000
heap
page read and write
17FB000
heap
page read and write
3D22000
trusted library allocation
page read and write
1801000
heap
page read and write
3BC5000
trusted library allocation
page read and write
1786000
heap
page read and write
17D8000
heap
page read and write
47D000
heap
page read and write
1662000
heap
page read and write
3EC6000
heap
page read and write
F41000
heap
page read and write
F23000
heap
page read and write
2C90000
heap
page read and write
1563000
heap
page read and write
1201000
heap
page read and write
17E7000
heap
page read and write
2913000
heap
page read and write
116A000
heap
page read and write
75AA000
trusted library allocation
page read and write
3140000
heap
page read and write
1231000
heap
page read and write
1753000
heap
page read and write
EC6000
heap
page read and write
47D000
heap
page read and write
124D000
heap
page read and write
1A547E40000
heap
page read and write
74B1000
trusted library allocation
page read and write
17D8000
heap
page read and write
27BD000
heap
page read and write
17FD000
heap
page read and write
2911000
heap
page read and write
495000
heap
page read and write
17DC000
heap
page read and write
3BFB000
trusted library allocation
page read and write
15C9000
heap
page read and write
1730000
heap
page read and write
18F2000
heap
page read and write
1A0E8F26000
heap
page read and write
27AC000
stack
page read and write
483000
heap
page read and write
17ED000
heap
page read and write
3BFC000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
17ED000
heap
page read and write
3310000
heap
page read and write
101E000
heap
page read and write
291C000
heap
page read and write
17ED000
heap
page read and write
FA2000
heap
page read and write
3B91000
trusted library allocation
page read and write
18B8000
heap
page read and write
18F2000
heap
page read and write
1017000
heap
page read and write
4669000
trusted library allocation
page read and write
42F1000
heap
page read and write
330D000
stack
page read and write
4DA9000
trusted library allocation
page read and write
495000
heap
page read and write
74B1000
trusted library allocation
page read and write
1822000
heap
page read and write
FBE000
heap
page read and write
17DF000
heap
page read and write
3B6B000
trusted library allocation
page read and write
17ED000
heap
page read and write
110F000
heap
page read and write
17E2000
heap
page read and write
27DD000
heap
page read and write
D44000
heap
page read and write
47D000
heap
page read and write
1A547EDF000
heap
page read and write
2CC8000
heap
page read and write
3BFE000
trusted library allocation
page read and write
422000
unkown
page read and write
FC8000
heap
page read and write
487000
heap
page read and write
27CE000
heap
page read and write
3BF2000
trusted library allocation
page read and write
3BC5000
trusted library allocation
page read and write
74B1000
trusted library allocation
page read and write
74B1000
trusted library allocation
page read and write
3D1A000
trusted library allocation
page read and write
3961000
heap
page read and write
1198000
heap
page read and write
16BD000
heap
page read and write
1817000
heap
page read and write
17FD000
heap
page read and write
17CB000
heap
page read and write
15F5000
heap
page read and write
15B7000
heap
page read and write
1504000
heap
page read and write
3E4FDFF000
stack
page read and write
124D000
heap
page read and write
F7F000
heap
page read and write
487000
heap
page read and write
17E2000
heap
page read and write
1631000
heap
page read and write
1AAE000
stack
page read and write
D44000
heap
page read and write
434000
unkown
page read and write
42F1000
heap
page read and write
17E7000
heap
page read and write
F22000
heap
page read and write
196E000
stack
page read and write
3E16000
heap
page read and write
471000
heap
page read and write
42F1000
heap
page read and write
FD0000
heap
page read and write
4DA6000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
483000
heap
page read and write
10F2000
heap
page read and write
D44000
heap
page read and write
FB0000
heap
page read and write
D44000
heap
page read and write
3BF9000
trusted library allocation
page read and write
408000
unkown
page readonly
1041000
heap
page read and write
762E000
trusted library allocation
page read and write
3860000
heap
page read and write
1664000
heap
page read and write
47D000
heap
page read and write
103A000
stack
page read and write
17E5000
heap
page read and write
1891000
heap
page read and write
5D0000
heap
page read and write
3BBE000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
180D000
heap
page read and write
3BF9000
trusted library allocation
page read and write
1801000
heap
page read and write
3B84000
trusted library allocation
page read and write
11F6000
heap
page read and write
4DA6000
trusted library allocation
page read and write
4A3000
heap
page read and write
483000
heap
page read and write
2510000
heap
page read and write
169F000
stack
page read and write
495000
heap
page read and write
1814000
heap
page read and write
17FB000
heap
page read and write
471000
heap
page read and write
F7C000
heap
page read and write
2F31000
heap
page read and write
27D7000
heap
page read and write
3BF4000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
1822000
heap
page read and write
3B40000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
308D000
heap
page read and write
17C7000
heap
page read and write
754C000
trusted library allocation
page read and write
17F1000
heap
page read and write
3D80000
heap
page read and write
7591000
trusted library allocation
page read and write
1474000
heap
page read and write
471000
heap
page read and write
1474000
heap
page read and write
17A5000
heap
page read and write
1504000
heap
page read and write
48C000
heap
page read and write
4DAE000
trusted library allocation
page read and write
180D000
heap
page read and write
114B000
heap
page read and write
107A000
heap
page read and write
27CF000
heap
page read and write
3BFF000
trusted library allocation
page read and write
17FB000
heap
page read and write
1786000
heap
page read and write
495000
heap
page read and write
19AE000
stack
page read and write
193A000
heap
page read and write
545000
unkown
page readonly
3BF7000
trusted library allocation
page read and write
2F31000
heap
page read and write
1674000
heap
page read and write
1504000
heap
page read and write
181C000
heap
page read and write
1820000
heap
page read and write
1651000
heap
page read and write
17ED000
heap
page read and write
3B91000
trusted library allocation
page read and write
174D000
heap
page read and write
2270000
trusted library allocation
page read and write
141B000
stack
page read and write
104A000
heap
page read and write
4DA1000
trusted library allocation
page read and write
487000
heap
page read and write
1504000
heap
page read and write
3B8E000
trusted library allocation
page read and write
FFB000
heap
page read and write
15E0000
heap
page read and write
F3C000
heap
page read and write
1A547D60000
heap
page read and write
4DA1000
trusted library allocation
page read and write
597E59A000
stack
page read and write
17FD000
heap
page read and write
180B000
heap
page read and write
1747000
heap
page read and write
48C000
heap
page read and write
1736000
heap
page read and write
1A547F0F000
heap
page read and write
1839000
heap
page read and write
2CDC000
heap
page read and write
533000
unkown
page readonly
1504000
heap
page read and write
17ED000
heap
page read and write
75A0000
trusted library allocation
page read and write
306D000
heap
page read and write
1720000
heap
page read and write
4DA7000
trusted library allocation
page read and write
47D000
heap
page read and write
48C000
heap
page read and write
38EE000
stack
page read and write
27AF000
heap
page read and write
3BFB000
trusted library allocation
page read and write
3112000
heap
page read and write
74B1000
trusted library allocation
page read and write
1791000
heap
page read and write
448000
heap
page read and write
1293000
heap
page read and write
43FF000
stack
page read and write
ED8000
heap
page read and write
756C000
trusted library allocation
page read and write
1840000
heap
page read and write
43A8000
trusted library allocation
page read and write
1811000
heap
page read and write
47D000
heap
page read and write
495000
heap
page read and write
2F31000
heap
page read and write
18A6000
heap
page read and write
3B2E000
stack
page read and write
40C000
unkown
page read and write
3BBE000
trusted library allocation
page read and write
47D000
heap
page read and write
4AFE000
stack
page read and write
3BAD000
trusted library allocation
page read and write
17ED000
heap
page read and write
4A3000
heap
page read and write
400000
unkown
page readonly
10AD000
heap
page read and write
1244000
heap
page read and write
1815000
heap
page read and write
3041000
heap
page read and write
74B1000
trusted library allocation
page read and write
778B000
trusted library allocation
page read and write
1214000
heap
page read and write
17E0000
heap
page read and write
48C000
heap
page read and write
FAB000
heap
page read and write
3040000
heap
page read and write
17DF000
heap
page read and write
161E000
heap
page read and write
1896000
heap
page read and write
184A000
heap
page read and write
291C000
heap
page read and write
471000
unkown
page execute read
37F0000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
181F000
heap
page read and write
440000
heap
page read and write
3098000
heap
page read and write
1188000
heap
page read and write
27B3000
heap
page read and write
4B3000
unkown
page readonly
1214000
heap
page read and write
42F1000
heap
page read and write
3185000
heap
page read and write
1474000
heap
page read and write
30A8000
heap
page read and write
4DA1000
trusted library allocation
page read and write
2CDC000
heap
page read and write
3BF5000
trusted library allocation
page read and write
1A547F02000
heap
page read and write
4C1000
heap
page read and write
10FD000
heap
page read and write
1242000
heap
page read and write
17E3000
heap
page read and write
11DF000
heap
page read and write
3961000
heap
page read and write
1FB0000
heap
page read and write
1A547ED7000
heap
page read and write
4C1000
heap
page read and write
48C000
heap
page read and write
1583000
heap
page read and write
3B58000
trusted library allocation
page read and write
F91000
heap
page read and write
1891000
heap
page read and write
3F0000
unkown
page readonly
17FF000
heap
page read and write
4DA2000
trusted library allocation
page read and write
291D000
heap
page read and write
3F0000
unkown
page readonly
3EB2000
heap
page read and write
4DA9000
trusted library allocation
page read and write
48C000
heap
page read and write
483000
heap
page read and write
74B1000
trusted library allocation
page read and write
1A0E8ED0000
heap
page read and write
42F1000
heap
page read and write
BC5000
heap
page read and write
10BC000
heap
page read and write
3B6D000
trusted library allocation
page read and write
11BE000
heap
page read and write
3AD9000
heap
page read and write
17BC000
heap
page read and write
2A4E000
stack
page read and write
1803000
heap
page read and write
42F1000
heap
page read and write
CF0000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
17DF000
heap
page read and write
3B90000
trusted library allocation
page read and write
15C3000
heap
page read and write
BBF000
stack
page read and write
3BBE000
trusted library allocation
page read and write
2914000
heap
page read and write
3BFA000
trusted library allocation
page read and write
50D000
unkown
page readonly
4DA2000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
10DD000
heap
page read and write
50D000
unkown
page readonly
172C000
heap
page read and write
545000
unkown
page readonly
17FB000
heap
page read and write
F55000
heap
page read and write
4DAC000
trusted library allocation
page read and write
17EF000
heap
page read and write
17C7000
heap
page read and write
3E16000
heap
page read and write
3924000
heap
page read and write
180A000
heap
page read and write
250E000
stack
page read and write
30F0000
heap
page read and write
1815000
heap
page read and write
3BFE000
trusted library allocation
page read and write
2F30000
heap
page read and write
483000
heap
page read and write
1873000
heap
page read and write
17FB000
heap
page read and write
178C000
heap
page read and write
42F1000
heap
page read and write
4B3000
unkown
page readonly
124D000
heap
page read and write
120A000
heap
page read and write
17E7000
heap
page read and write
35EC000
stack
page read and write
487000
heap
page read and write
4A3000
heap
page read and write
2790000
heap
page read and write
17D5000
heap
page read and write
21F0000
heap
page read and write
17FB000
heap
page read and write
30E1000
heap
page read and write
17F1000
heap
page read and write
15FC000
heap
page read and write
3E4A000
heap
page read and write
129A000
heap
page read and write
2923000
heap
page read and write
1662000
heap
page read and write
7562000
trusted library allocation
page read and write
16E4000
heap
page read and write
3D81000
heap
page read and write
483000
heap
page read and write
F9C000
heap
page read and write
CF0000
trusted library allocation
page read and write
4BD000
unkown
page write copy
1A547EFC000
heap
page read and write
74B1000
trusted library allocation
page read and write
112D000
heap
page read and write
49DE000
trusted library allocation
page read and write
17ED000
heap
page read and write
1585000
heap
page read and write
483000
heap
page read and write
1583000
heap
page read and write
4A3000
heap
page read and write
1670000
heap
page read and write
2917000
heap
page read and write
42F1000
heap
page read and write
126C000
heap
page read and write
4DAB000
trusted library allocation
page read and write
483000
heap
page read and write
1A0E8F10000
heap
page read and write
487000
heap
page read and write
1A0E8F3E000
heap
page read and write
42F1000
heap
page read and write
EC7000
heap
page read and write
17D9000
heap
page read and write
3BF7000
trusted library allocation
page read and write
17F1000
heap
page read and write
1089000
heap
page read and write
395C000
heap
page read and write
48C000
heap
page read and write
4C1000
unkown
page write copy
105C000
heap
page read and write
181F000
heap
page read and write
15E0000
heap
page read and write
3C4B000
trusted library allocation
page read and write
19A000
stack
page read and write
172E000
heap
page read and write
1794000
heap
page read and write
187E000
heap
page read and write
1282000
heap
page read and write
16BB000
heap
page read and write
2917000
heap
page read and write
471000
heap
page read and write
4DA3000
trusted library allocation
page read and write
181F000
heap
page read and write
101E000
heap
page read and write
4BD000
unkown
page write copy
F7C000
heap
page read and write
17FB000
heap
page read and write
BC0000
heap
page read and write
3B59000
trusted library allocation
page read and write
7749000
trusted library allocation
page read and write
18CC000
heap
page read and write
18E0000
heap
page read and write
ED5000
heap
page read and write
143E000
stack
page read and write
27CB000
heap
page read and write
1654000
heap
page read and write
3953000
heap
page read and write
4C1000
heap
page read and write
4DA2000
trusted library allocation
page read and write
F29000
heap
page read and write
11EE000
heap
page read and write
1113000
heap
page read and write
17E5000
heap
page read and write
3B4A000
trusted library allocation
page read and write
3BF3000
trusted library allocation
page read and write
176D000
heap
page read and write
4DAE000
trusted library allocation
page read and write
74B1000
trusted library allocation
page read and write
414000
unkown
page read and write
1474000
heap
page read and write
EC3000
heap
page read and write
4DA1000
trusted library allocation
page read and write
18FD000
heap
page read and write
3BFC000
trusted library allocation
page read and write
42F1000
heap
page read and write
3B41000
trusted library allocation
page read and write
3E4C000
heap
page read and write
37F0000
trusted library allocation
page read and write
540000
heap
page read and write
FF2000
heap
page read and write
470000
unkown
page readonly
3F0000
unkown
page readonly
16A3000
heap
page read and write
2AF0000
heap
page read and write
17DF000
heap
page read and write
3BF4000
trusted library allocation
page read and write
1571000
heap
page read and write
48D000
unkown
page readonly
3F1000
unkown
page execute read
164E000
heap
page read and write
3BF6000
trusted library allocation
page read and write
1504000
heap
page read and write
48D000
unkown
page readonly
3BF2000
trusted library allocation
page read and write
2C98000
heap
page read and write
17ED000
heap
page read and write
3B48000
trusted library allocation
page read and write
1859000
heap
page read and write
10DD000
heap
page read and write
27DA000
heap
page read and write
1763000
heap
page read and write
1A547ECA000
heap
page read and write
17DF000
heap
page read and write
27DA000
heap
page read and write
341D000
stack
page read and write
32CD000
stack
page read and write
33EF000
trusted library allocation
page read and write
3E4F000
heap
page read and write
2919000
heap
page read and write
1786000
heap
page read and write
17C3000
heap
page read and write
2A68000
heap
page read and write
ED7000
heap
page read and write
3953000
heap
page read and write
17FB000
heap
page read and write
4C5000
unkown
page readonly
1919000
heap
page read and write
171F000
heap
page read and write
17D8000
heap
page read and write
10EF000
heap
page read and write
3EC4000
heap
page read and write
17FB000
heap
page read and write
4BD000
unkown
page write copy
1474000
heap
page read and write
1747000
heap
page read and write
471000
heap
page read and write
1504000
heap
page read and write
F29000
heap
page read and write
7644000
trusted library allocation
page read and write
3D2A000
trusted library allocation
page read and write
47D000
heap
page read and write
3F1000
unkown
page execute read
471000
heap
page read and write
17DF000
heap
page read and write
487000
heap
page read and write
11CC000
heap
page read and write
495000
heap
page read and write
313C000
heap
page read and write
1474000
heap
page read and write
17ED000
heap
page read and write
177C000
heap
page read and write
237E000
stack
page read and write
CF0000
trusted library allocation
page read and write
17F2000
heap
page read and write
1A0E8F0B000
heap
page read and write
3BFC000
trusted library allocation
page read and write
1805000
heap
page read and write
1A0E9100000
heap
page read and write
4B3F000
heap
page read and write
18E0000
heap
page read and write
3B48000
trusted library allocation
page read and write
124F000
heap
page read and write
291E000
heap
page read and write
110F000
heap
page read and write
1A0E8F19000
heap
page read and write
483000
heap
page read and write
21BC000
heap
page read and write
1815000
heap
page read and write
17FA000
heap
page read and write
47D000
heap
page read and write
483000
heap
page read and write
42F1000
heap
page read and write
3178000
heap
page read and write
487000
heap
page read and write
1089000
heap
page read and write
176F000
heap
page read and write
17E2000
heap
page read and write
48D000
unkown
page readonly
2CAE000
heap
page read and write
1504000
heap
page read and write
42F1000
heap
page read and write
18B8000
heap
page read and write
3B66000
trusted library allocation
page read and write
1A0E8F55000
heap
page read and write
17E7000
heap
page read and write
2270000
trusted library allocation
page read and write
189D000
heap
page read and write
1809000
heap
page read and write
FB5000
heap
page read and write
17EF000
heap
page read and write
17EF000
heap
page read and write
17E7000
heap
page read and write
3B41000
trusted library allocation
page read and write
3097000
heap
page read and write
3BF7000
trusted library allocation
page read and write
4BD000
unkown
page write copy
495000
heap
page read and write
471000
heap
page read and write
3B6A000
trusted library allocation
page read and write
2912000
heap
page read and write
1504000
heap
page read and write
F2B000
heap
page read and write
1786000
heap
page read and write
450000
heap
page read and write
FDF000
heap
page read and write
1A547F02000
heap
page read and write
487000
heap
page read and write
3BF9000
trusted library allocation
page read and write
17DF000
heap
page read and write
48C000
heap
page read and write
17FE000
heap
page read and write
2270000
trusted library allocation
page read and write
1504000
heap
page read and write
212C000
stack
page read and write
471000
heap
page read and write
188D000
heap
page read and write
3B48000
trusted library allocation
page read and write
3EAB000
heap
page read and write
483000
heap
page read and write
17DF000
heap
page read and write
1593000
heap
page read and write
113A000
heap
page read and write
3F1000
unkown
page execute read
767B000
trusted library allocation
page read and write
1217000
heap
page read and write
1585000
heap
page read and write
17DF000
heap
page read and write
47D000
heap
page read and write
17E6000
heap
page read and write
17ED000
heap
page read and write
42F1000
heap
page read and write
48C000
heap
page read and write
25C4000
heap
page read and write
1583000
heap
page read and write
43B000
unkown
page readonly
3903000
heap
page read and write
487000
heap
page read and write
F91000
heap
page read and write
42F1000
heap
page read and write
3B42000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
FAB000
heap
page read and write
42F1000
heap
page read and write
7586000
trusted library allocation
page read and write
1504000
heap
page read and write
483000
heap
page read and write
1662000
heap
page read and write
3B41000
trusted library allocation
page read and write
1759000
heap
page read and write
27D8000
heap
page read and write
291B000
heap
page read and write
107A000
heap
page read and write
4DA8000
trusted library allocation
page read and write
3BF9000
trusted library allocation
page read and write
495000
heap
page read and write
108A000
heap
page read and write
1804000
heap
page read and write
125B000
heap
page read and write
291A000
heap
page read and write
1A0EAD60000
heap
page read and write
2A60000
heap
page read and write
CF0000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
36ED000
stack
page read and write
3BF8000
trusted library allocation
page read and write
42F1000
heap
page read and write
1904000
heap
page read and write
17FB000
heap
page read and write
BFE000
stack
page read and write
3B95000
trusted library allocation
page read and write
17FB000
heap
page read and write
4DA1000
trusted library allocation
page read and write
1809000
heap
page read and write
D40000
heap
page read and write
EE3000
heap
page read and write
CF0000
trusted library allocation
page read and write
1002000
heap
page read and write
15FA000
stack
page read and write
1504000
heap
page read and write
10DD000
heap
page read and write
7662000
trusted library allocation
page read and write
3BFD000
trusted library allocation
page read and write
1800000
heap
page read and write
495000
heap
page read and write
2CC8000
heap
page read and write
3860000
heap
page read and write
2CDC000
heap
page read and write
50D000
unkown
page readonly
541000
unkown
page write copy
37F0000
trusted library allocation
page read and write
3034000
heap
page read and write
4C1000
unkown
page write copy
4A3000
heap
page read and write
17F1000
heap
page read and write
EF4000
heap
page read and write
4DAF000
trusted library allocation
page read and write
39EF000
stack
page read and write
3BB5000
trusted library allocation
page read and write
2917000
heap
page read and write
495000
heap
page read and write
17C9000
heap
page read and write
74B1000
trusted library allocation
page read and write
186E000
stack
page read and write
17FB000
heap
page read and write
3B79000
trusted library allocation
page read and write
4314000
trusted library allocation
page read and write
1866000
heap
page read and write
471000
heap
page read and write
109E000
heap
page read and write
180C000
heap
page read and write
4DA3000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
471000
heap
page read and write
4B3F000
heap
page read and write
3B48000
trusted library allocation
page read and write
17ED000
heap
page read and write
487000
heap
page read and write
3B41000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
47D000
heap
page read and write
4DA1000
trusted library allocation
page read and write
3EA0000
heap
page read and write
CF0000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
17E3000
heap
page read and write
3540000
remote allocation
page read and write
4DAA000
trusted library allocation
page read and write
4C1000
unkown
page write copy
3E4FBFF000
stack
page read and write
3BF8000
trusted library allocation
page read and write
2913000
heap
page read and write
1504000
heap
page read and write
180F000
heap
page read and write
483000
heap
page read and write
17F1000
heap
page read and write
4A3000
heap
page read and write
3B79000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
471000
heap
page read and write
BDB000
stack
page read and write
48C000
heap
page read and write
18E1000
heap
page read and write
2270000
trusted library allocation
page read and write
3178000
heap
page read and write
43B000
unkown
page readonly
17FB000
heap
page read and write
5CE000
stack
page read and write
FC0000
heap
page read and write
470000
unkown
page readonly
495000
heap
page read and write
25E0000
heap
page read and write
1279000
heap
page read and write
3BF0000
trusted library allocation
page read and write
4A8000
heap
page read and write
3BAD000
trusted library allocation
page read and write
160D000
heap
page read and write
110F000
heap
page read and write
4DAB000
trusted library allocation
page read and write
176D000
heap
page read and write
53D000
unkown
page read and write
CF0000
trusted library allocation
page read and write
471000
heap
page read and write
101E000
heap
page read and write
98000
stack
page read and write
1504000
heap
page read and write
117F000
heap
page read and write
17FB000
heap
page read and write
17F2000
heap
page read and write
471000
heap
page read and write
17CC000
heap
page read and write
17EF000
heap
page read and write
17E3000
heap
page read and write
1814000
heap
page read and write
17BB000
heap
page read and write
3A2E000
stack
page read and write
3E16000
heap
page read and write
3B77000
trusted library allocation
page read and write
7552000
trusted library allocation
page read and write
1540000
heap
page read and write
1677000
heap
page read and write
4DAC000
trusted library allocation
page read and write
42E000
unkown
page read and write
1662000
heap
page read and write
4DAD000
trusted library allocation
page read and write
15C9000
heap
page read and write
58E000
stack
page read and write
15BF000
heap
page read and write
2CBC000
heap
page read and write
1A547EC1000
heap
page read and write
106F000
heap
page read and write
1504000
heap
page read and write
46AC000
trusted library allocation
page read and write
1571000
heap
page read and write
4DA0000
trusted library allocation
page read and write
42DF000
stack
page read and write
3BB9000
trusted library allocation
page read and write
483000
heap
page read and write
EA0000
heap
page read and write
FAC000
heap
page read and write
3BFA000
trusted library allocation
page read and write
42F1000
heap
page read and write
1A547ED7000
heap
page read and write
3B8E000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
15C3000
heap
page read and write
D44000
heap
page read and write
74B1000
trusted library allocation
page read and write
487000
heap
page read and write
49B000
heap
page read and write
18CD000
heap
page read and write
42B000
unkown
page read and write
4DA3000
trusted library allocation
page read and write
3BF9000
trusted library allocation
page read and write
3063000
heap
page read and write
FCB000
heap
page read and write
EC6000
heap
page read and write
3B69000
trusted library allocation
page read and write
471000
unkown
page execute read
291D000
heap
page read and write
47D000
heap
page read and write
387C000
heap
page read and write
42F1000
heap
page read and write
291E000
heap
page read and write
11A3000
heap
page read and write
180D000
heap
page read and write
42F1000
heap
page read and write
1662000
heap
page read and write
FA2000
heap
page read and write
4DAF000
trusted library allocation
page read and write
4480000
heap
page read and write
4C5000
unkown
page readonly
1A0E8F26000
heap
page read and write
495000
heap
page read and write
11DF000
heap
page read and write
1A0E9120000
heap
page read and write
4DA6000
trusted library allocation
page read and write
1708000
heap
page read and write
471000
heap
page read and write
1E0F000
stack
page read and write
4A3000
heap
page read and write
40A000
unkown
page write copy
3E4F7FE000
stack
page read and write
101E000
heap
page read and write
3BFC000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
3158000
heap
page read and write
181C000
heap
page read and write
21EE000
stack
page read and write
42F1000
heap
page read and write
1504000
heap
page read and write
FBE000
heap
page read and write
597EDFE000
stack
page read and write
17E7000
heap
page read and write
F83000
heap
page read and write
180C000
heap
page read and write
16B1000
heap
page read and write
42F1000
heap
page read and write
17E7000
heap
page read and write
3EC4000
heap
page read and write
316A000
heap
page read and write
3160000
heap
page read and write
2270000
trusted library allocation
page read and write
483000
heap
page read and write
1504000
heap
page read and write
3E80000
heap
page read and write
4DA9000
trusted library allocation
page read and write
3BFB000
trusted library allocation
page read and write
1111000
heap
page read and write
3F1000
unkown
page execute read
F7C000
heap
page read and write
161B000
heap
page read and write
2CC8000
heap
page read and write
1A0E912C000
heap
page read and write
1474000
heap
page read and write
471000
heap
page read and write
3E94000
heap
page read and write
3B59000
trusted library allocation
page read and write
16C6000
heap
page read and write
1504000
heap
page read and write
3B6B000
trusted library allocation
page read and write
545000
unkown
page readonly
53D000
unkown
page read and write
48D000
unkown
page readonly
1936000
heap
page read and write
3B59000
trusted library allocation
page read and write
2918000
heap
page read and write
4DAF000
trusted library allocation
page read and write
427000
unkown
page read and write
27DD000
heap
page read and write
3B59000
trusted library allocation
page read and write
3670000
heap
page read and write
7606000
trusted library allocation
page read and write
1791000
heap
page read and write
17FB000
heap
page read and write
1600000
remote allocation
page execute and read and write
471000
heap
page read and write
17E3000
heap
page read and write
187F000
heap
page read and write
597ECFF000
stack
page read and write
4BD000
unkown
page write copy
3BF8000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
1A547EEF000
heap
page read and write
487000
heap
page read and write
4DA6000
trusted library allocation
page read and write
2500000
heap
page read and write
597EEFF000
stack
page read and write
1562000
heap
page read and write
17ED000
heap
page read and write
1A0E8F2F000
heap
page read and write
3B6F000
trusted library allocation
page read and write
17E7000
heap
page read and write
174C000
heap
page read and write
17A5000
heap
page read and write
3872000
heap
page read and write
1504000
heap
page read and write
17ED000
heap
page read and write
2270000
trusted library allocation
page read and write
15DA000
heap
page read and write
116A000
heap
page read and write
CF0000
trusted library allocation
page read and write
3BF4000
trusted library allocation
page read and write
3E4FCFF000
stack
page read and write
1621000
heap
page read and write
3953000
heap
page read and write
1A0E8F4A000
heap
page read and write
48C000
heap
page read and write
15CA000
heap
page read and write
17E7000
heap
page read and write
47D000
heap
page read and write
53D000
unkown
page write copy
3BF0000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
17F1000
heap
page read and write
1A547F05000
heap
page read and write
168C000
heap
page read and write
27DD000
heap
page read and write
471000
unkown
page execute read
2ADF000
stack
page read and write
487000
heap
page read and write
3B6F000
trusted library allocation
page read and write
160D000
heap
page read and write
17ED000
heap
page read and write
495000
heap
page read and write
15C3000
heap
page read and write
ED9000
heap
page read and write
1059000
heap
page read and write
3E81000
heap
page read and write
1504000
heap
page read and write
4B3F000
stack
page read and write
1035000
heap
page read and write
FB5000
heap
page read and write
1A547E60000
heap
page read and write
17ED000
heap
page read and write
487000
heap
page read and write
1791000
heap
page read and write
3DBA000
trusted library allocation
page read and write
495000
heap
page read and write
1801000
heap
page read and write
495000
heap
page read and write
CF0000
trusted library allocation
page read and write
ED2000
heap
page read and write
2CD3000
heap
page read and write
3BFA000
trusted library allocation
page read and write
3E4FEFE000
stack
page read and write
48C000
heap
page read and write
483000
heap
page read and write
15B2000
heap
page read and write
D8E000
stack
page read and write
117A000
heap
page read and write
1809000
heap
page read and write
102A000
heap
page read and write
47D000
heap
page read and write
16A6000
heap
page read and write
F28000
heap
page read and write
110F000
heap
page read and write
17ED000
heap
page read and write
F4C000
heap
page read and write
15E3000
heap
page read and write
1926000
heap
page read and write
EA8000
heap
page read and write
15D8000
heap
page read and write
443E000
stack
page read and write
17E7000
heap
page read and write
17FB000
heap
page read and write
142F000
stack
page read and write
42F1000
heap
page read and write
17D5000
heap
page read and write
74B1000
trusted library allocation
page read and write
1063000
heap
page read and write
17C3000
heap
page read and write
487000
heap
page read and write
42F1000
heap
page read and write
3960000
heap
page read and write
180F000
heap
page read and write
16BF000
heap
page read and write
BEF000
stack
page read and write
1A0E8F4A000
heap
page read and write
2915000
heap
page read and write
3EA0000
heap
page read and write
180F000
heap
page read and write
392C000
heap
page read and write
11E0000
heap
page read and write
1160000
heap
page read and write
597EBFF000
stack
page read and write
2914000
heap
page read and write
17ED000
heap
page read and write
FAB000
heap
page read and write
1474000
heap
page read and write
471000
heap
page read and write
9C000
stack
page read and write
1AB0000
heap
page read and write
4DA0000
trusted library allocation
page read and write
2A50000
heap
page read and write
17FB000
heap
page read and write
3EBD000
heap
page read and write
17FD000
heap
page read and write
3E4F6FF000
stack
page read and write
17E3000
heap
page read and write
483000
heap
page read and write
3B59000
trusted library allocation
page read and write
11E5000
heap
page read and write
27EC000
stack
page read and write
1786000
heap
page read and write
3849000
heap
page read and write
3BF7000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
1027000
heap
page read and write
3BF6000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
18B8000
heap
page read and write
3BF4000
trusted library allocation
page read and write
34AE000
stack
page read and write
1A0E8EA0000
heap
page read and write
471000
heap
page read and write
17E7000
heap
page read and write
1504000
heap
page read and write
4C5000
unkown
page readonly
47D000
heap
page read and write
471000
heap
page read and write
17E7000
heap
page read and write
42F1000
heap
page read and write
48C000
heap
page read and write
48C000
heap
page read and write
174C000
heap
page read and write
1639000
heap
page read and write
3B7F000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
111C000
heap
page read and write
2270000
trusted library allocation
page read and write
25C0000
heap
page read and write
16D8000
heap
page read and write
17FB000
heap
page read and write
1A547FD0000
heap
page read and write
37F0000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
4DA7000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
495000
heap
page read and write
7558000
trusted library allocation
page read and write
1904000
heap
page read and write
1194000
heap
page read and write
42F1000
heap
page read and write
155F000
heap
page read and write
161B000
heap
page read and write
116E000
heap
page read and write
17E7000
heap
page read and write
471000
heap
page read and write
37F0000
trusted library allocation
page read and write
17E3000
heap
page read and write
E20000
heap
page read and write
37F0000
trusted library allocation
page read and write
44C0000
heap
page read and write
597E9FF000
stack
page read and write
3BF9000
trusted library allocation
page read and write
1720000
heap
page read and write
27D4000
heap
page read and write
16C6000
heap
page read and write
FDC000
heap
page read and write
15C8000
heap
page read and write
487000
heap
page read and write
3BBE000
trusted library allocation
page read and write
17ED000
heap
page read and write
1195000
heap
page read and write
1470000
heap
page read and write
4DA7000
trusted library allocation
page read and write
1004000
heap
page read and write
1759000
heap
page read and write
483000
heap
page read and write
476D000
trusted library allocation
page read and write
1033000
heap
page read and write
471000
heap
page read and write
17FA000
heap
page read and write
F37000
heap
page read and write
3B67000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
3F0000
unkown
page readonly
1020000
heap
page read and write
27DA000
heap
page read and write
2DCE000
stack
page read and write
495000
heap
page read and write
42F1000
heap
page read and write
15B4000
heap
page read and write
FEA000
heap
page read and write
48C000
heap
page read and write
761A000
trusted library allocation
page read and write
2919000
heap
page read and write
48C000
heap
page read and write
4A4000
heap
page read and write
48C000
heap
page read and write
447F000
stack
page read and write
187E000
heap
page read and write
395C000
heap
page read and write
495000
heap
page read and write
2E0F000
stack
page read and write
308D000
heap
page read and write
254E000
stack
page read and write
3B80000
trusted library allocation
page read and write
395C000
heap
page read and write
313E000
heap
page read and write
495000
heap
page read and write
1504000
heap
page read and write
16C6000
heap
page read and write
1A54808C000
heap
page read and write
3D7E000
stack
page read and write
3C82000
trusted library allocation
page read and write
17C9000
heap
page read and write
3961000
heap
page read and write
47D000
heap
page read and write
1583000
heap
page read and write
40A000
unkown
page read and write
17E6000
heap
page read and write
3B8D000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
42F1000
heap
page read and write
17E6000
heap
page read and write
3B47000
trusted library allocation
page read and write
F91000
heap
page read and write
193C000
heap
page read and write
59E000
stack
page read and write
3BF2000
trusted library allocation
page read and write
11EE000
heap
page read and write
113A000
heap
page read and write
17E6000
heap
page read and write
37F0000
trusted library allocation
page read and write
11EE000
heap
page read and write
17A7000
heap
page read and write
2CBB000
heap
page read and write
487000
heap
page read and write
17C4000
heap
page read and write
4DA4000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
17FA000
heap
page read and write
3B71000
trusted library allocation
page read and write
16DC000
heap
page read and write
3BF2000
trusted library allocation
page read and write
1787000
heap
page read and write
F41000
heap
page read and write
42F1000
heap
page read and write
487000
heap
page read and write
48C000
heap
page read and write
17FA000
heap
page read and write
48C000
heap
page read and write
D44000
heap
page read and write
17D5000
heap
page read and write
75AC000
trusted library allocation
page read and write
74B1000
trusted library allocation
page read and write
3BF8000
trusted library allocation
page read and write
EF4000
heap
page read and write
50D000
unkown
page readonly
3B4C000
trusted library allocation
page read and write
17A5000
heap
page read and write
7CF000
stack
page read and write
1656000
remote allocation
page execute and read and write
42F1000
heap
page read and write
533000
unkown
page readonly
3E53000
heap
page read and write
15A4000
heap
page read and write
1A0E8F50000
heap
page read and write
1802000
heap
page read and write
483000
heap
page read and write
1504000
heap
page read and write
1A0E8F3D000
heap
page read and write
1188000
heap
page read and write
3B69000
trusted library allocation
page read and write
17FF000
heap
page read and write
4A5000
heap
page read and write
168E000
heap
page read and write
487000
heap
page read and write
1A0E9125000
heap
page read and write
3E51000
heap
page read and write
17E6000
heap
page read and write
18D7000
heap
page read and write
2E50000
heap
page read and write
42F1000
heap
page read and write
1920000
heap
page read and write
4DAF000
trusted library allocation
page read and write
ED4000
heap
page read and write
17ED000
heap
page read and write
3B74000
trusted library allocation
page read and write
3B88000
trusted library allocation
page read and write
47D000
heap
page read and write
483000
heap
page read and write
1A547EC1000
heap
page read and write
1803000
heap
page read and write
F37000
heap
page read and write
CD0000
heap
page read and write
EBF000
heap
page read and write
1282000
heap
page read and write
1755000
heap
page read and write
3E9F000
heap
page read and write
42F1000
heap
page read and write
487000
heap
page read and write
471000
heap
page read and write
17D1000
heap
page read and write
3E16000
heap
page read and write
17F3000
heap
page read and write
163B000
heap
page read and write
47D000
heap
page read and write
2270000
trusted library allocation
page read and write
4B3000
unkown
page readonly
17D0000
heap
page read and write
3B44000
trusted library allocation
page read and write
107A000
heap
page read and write
F75000
heap
page read and write
190E000
heap
page read and write
1504000
heap
page read and write
286000
remote allocation
page read and write
48C000
heap
page read and write
17F4000
heap
page read and write
3B91000
trusted library allocation
page read and write
291E000
heap
page read and write
3BFA000
trusted library allocation
page read and write
17E6000
heap
page read and write
495000
heap
page read and write
3540000
remote allocation
page read and write
10A2000
heap
page read and write
10E4000
heap
page read and write
110F000
heap
page read and write
2270000
trusted library allocation
page read and write
1242000
heap
page read and write
11F9000
heap
page read and write
17E7000
heap
page read and write
108F000
heap
page read and write
17FD000
heap
page read and write
74B1000
trusted library allocation
page read and write
17E7000
heap
page read and write
541000
unkown
page write copy
4DA7000
trusted library allocation
page read and write
17FD000
heap
page read and write
495000
heap
page read and write
3B77000
trusted library allocation
page read and write
F7C000
heap
page read and write
178D000
heap
page read and write
47D000
heap
page read and write
3B8D000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
48D000
unkown
page readonly
27DA000
heap
page read and write
4DA4000
trusted library allocation
page read and write
1791000
heap
page read and write
48C000
heap
page read and write
3B4D000
trusted library allocation
page read and write
17ED000
heap
page read and write
2270000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
1A547F07000
heap
page read and write
74B1000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
3BF0000
trusted library allocation
page read and write
3C51000
trusted library allocation
page read and write
17DF000
heap
page read and write
3B79000
trusted library allocation
page read and write
1504000
heap
page read and write
351D000
stack
page read and write
471000
heap
page read and write
1A547EED000
heap
page read and write
37F0000
trusted library allocation
page read and write
1504000
heap
page read and write
401000
unkown
page execute read
495000
heap
page read and write
1A547F0F000
heap
page read and write
17FD000
heap
page read and write
1623000
heap
page read and write
192C000
heap
page read and write
1563000
heap
page read and write
487000
heap
page read and write
483000
heap
page read and write
F23000
heap
page read and write
1726000
heap
page read and write
1583000
heap
page read and write
2915000
heap
page read and write
47D000
heap
page read and write
487000
heap
page read and write
160F000
heap
page read and write
3B66000
trusted library allocation
page read and write
1907000
heap
page read and write
17F1000
heap
page read and write
1A0E8EB0000
heap
page read and write
291C000
heap
page read and write
17FB000
heap
page read and write
37F0000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
25CE000
stack
page read and write
1A547EA0000
heap
page read and write
495000
heap
page read and write
483000
heap
page read and write
3153000
heap
page read and write
17CD000
heap
page read and write
395C000
heap
page read and write
471000
heap
page read and write
3139000
heap
page read and write
3179000
heap
page read and write
1A549C60000
heap
page read and write
483000
heap
page read and write
1759000
heap
page read and write
7694000
trusted library allocation
page read and write
BCF000
stack
page read and write
2AF6000
heap
page read and write
2CD6000
heap
page read and write
15C1000
heap
page read and write
2E4E000
stack
page read and write
EC6000
heap
page read and write
1A547EF8000
heap
page read and write
3BFB000
trusted library allocation
page read and write
3CF2000
trusted library allocation
page read and write
176D000
heap
page read and write
161B000
heap
page read and write
460000
heap
page read and write
364E000
stack
page read and write
CF0000
trusted library allocation
page read and write
495000
heap
page read and write
4A3000
heap
page read and write
42F1000
heap
page read and write
3B59000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
47D000
heap
page read and write
17ED000
heap
page read and write
27D3000
heap
page read and write
17FA000
heap
page read and write
48C000
heap
page read and write
3B47000
trusted library allocation
page read and write
16FE000
heap
page read and write
174B000
heap
page read and write
17FE000
heap
page read and write
3B8D000
trusted library allocation
page read and write
4B3000
unkown
page readonly
15FE000
heap
page read and write
17ED000
heap
page read and write
483000
heap
page read and write
3E48000
heap
page read and write
3E9000
stack
page read and write
3B69000
trusted library allocation
page read and write
17E7000
heap
page read and write
18BB000
heap
page read and write
8CF000
stack
page read and write
3BFD000
trusted library allocation
page read and write
1A0E8F2F000
heap
page read and write
17ED000
heap
page read and write
291A000
heap
page read and write
23C0000
heap
page read and write
4DA3000
trusted library allocation
page read and write
17E0000
heap
page read and write
27CB000
heap
page read and write
4DAF000
trusted library allocation
page read and write
16B0000
heap
page read and write
116C000
heap
page read and write
FBE000
heap
page read and write
1A0E8F58000
heap
page read and write
1A0E8EF0000
heap
page read and write
18F4000
heap
page read and write
48C000
heap
page read and write
3E4FAFF000
stack
page read and write
74B1000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
15D8000
heap
page read and write
17BB000
heap
page read and write
F41000
heap
page read and write
15C9000
heap
page read and write
495000
heap
page read and write
3141000
heap
page read and write
1A547ED7000
heap
page read and write
17E7000
heap
page read and write
4ABF000
stack
page read and write
4B3000
unkown
page readonly
3B41000
trusted library allocation
page read and write
1712000
heap
page read and write
487000
heap
page read and write
4C5000
unkown
page readonly
16BC000
heap
page read and write
101E000
heap
page read and write
3B5E000
trusted library allocation
page read and write
1832000
heap
page read and write
7560000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
118A000
heap
page read and write
3030000
heap
page read and write
11CE000
heap
page read and write
2E57000
heap
page read and write
74B1000
trusted library allocation
page read and write
EE3000
heap
page read and write
4DA0000
trusted library allocation
page read and write
487000
heap
page read and write
3BF0000
trusted library allocation
page read and write
3054000
heap
page read and write
15B5000
heap
page read and write
4DAE000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
35AF000
stack
page read and write
3B91000
trusted library allocation
page read and write
1811000
heap
page read and write
3BF9000
trusted library allocation
page read and write
3C6A000
trusted library allocation
page read and write
291C000
heap
page read and write
37F0000
trusted library allocation
page read and write
17DD000
heap
page read and write
F23000
heap
page read and write
1613000
heap
page read and write
1A0E8F18000
heap
page read and write
4DA2000
trusted library allocation
page read and write
FF0000
heap
page read and write
1891000
heap
page read and write
3540000
remote allocation
page read and write
2AE0000
heap
page read and write
1A0E8F50000
heap
page read and write
CF0000
trusted library allocation
page read and write
483000
heap
page read and write
18EA000
heap
page read and write
1720000
heap
page read and write
4A8000
heap
page read and write
1A0E8F10000
heap
page read and write
7766000
trusted library allocation
page read and write
3BF4000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
3BFC000
trusted library allocation
page read and write
FA4000
heap
page read and write
17DD000
heap
page read and write
156B000
heap
page read and write
13FE000
stack
page read and write
477B000
trusted library allocation
page read and write
3B76000
trusted library allocation
page read and write
1659000
heap
page read and write
107A000
heap
page read and write
38BC000
heap
page read and write
3C7E000
stack
page read and write
27DD000
heap
page read and write
47D000
heap
page read and write
1771000
heap
page read and write
3B41000
trusted library allocation
page read and write
395C000
heap
page read and write
177A000
heap
page read and write
111F000
heap
page read and write
3EBC000
heap
page read and write
47D000
heap
page read and write
184B000
heap
page read and write
CF0000
trusted library allocation
page read and write
3BF3000
trusted library allocation
page read and write
2270000
trusted library allocation
page read and write
3BF0000
trusted library allocation
page read and write
17ED000
heap
page read and write
1A0E8F46000
heap
page read and write
1159000
heap
page read and write
17BD000
heap
page read and write
4DA0000
trusted library allocation
page read and write
A0F000
stack
page read and write
545000
unkown
page readonly
17ED000
heap
page read and write
1299000
heap
page read and write
17E7000
heap
page read and write
There are 1690 hidden memdumps, click here to show them.