IOC Report
2.exe

loading gif

Files

File Path
Type
Category
Malicious
2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Mail\vnzdDsAaAlbcuHJAOf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\vnzdDsAaAlbcuHJAOf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Music\backgroundTaskHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Music\backgroundTaskHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\Local\Temp\84x6wBxxuC.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\VW6Uh1R2rX.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\YyxiuEiAPJ.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\c7Mmfs6BdK.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\p3fxByWxmm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tBeZYUztXm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\uERItUpcE0.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\ujuZrulyBl.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\va0LlUybli.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\wr1mxRbh1u.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\x7DCP4VDR3.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\ServiceProfiles\NetworkService\vnzdDsAaAlbcuHJAOf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\7d597bd455311a
ASCII text, with very long lines (959), with no line terminators
dropped
C:\Program Files\Windows Mail\7d597bd455311a
ASCII text, with very long lines (661), with no line terminators
dropped
C:\Program Files\Windows Mail\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\7d597bd455311a
ASCII text, with no line terminators
dropped
C:\Recovery\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Music\eddb19405b7ce1
ASCII text, with very long lines (760), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\vnzdDsAaAlbcuHJAOf.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\5JijX2rU4M
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\5jLPmpUdR2
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\EQ0FmVgkgy
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\IOWmPAj0de
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\UuNh87LJuE
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\VZ5NRqL9s1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\cLkIR2reKy
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\lpp3juPLDH
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rswAz0PvfE
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tr1BQ6QBbv
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\zxrTf9S7VR
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\7d597bd455311a
ASCII text, with very long lines (519), with no line terminators
dropped
C:\Windows\ServiceProfiles\NetworkService\vnzdDsAaAlbcuHJAOf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2.exe
"C:\Users\user\Desktop\2.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\tBeZYUztXm.bat"
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\x7DCP4VDR3.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\84x6wBxxuC.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\VW6Uh1R2rX.bat"
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\va0LlUybli.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\c7Mmfs6BdK.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\p3fxByWxmm.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\YyxiuEiAPJ.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\uERItUpcE0.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ujuZrulyBl.bat"
malicious
C:\Program Files (x86)\Windows Sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe
"C:\Program Files (x86)\windows sidebar\Gadgets\vnzdDsAaAlbcuHJAOf.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\wr1mxRbh1u.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
There are 44 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://195.10.205.157/Public/Pollauth8/TestLocalapi/1Base/Temp/Todumpprovider/7Eternal/game/63multi/
unknown
malicious
http://195.10.205.157
unknown
malicious
http://195.10.205.157/Public/Pollauth8/TestLocalapi/1Base/Temp/Todumpprovider/7Eternal/game/63multi/29Dump/5/multiHttp0Request/_securebigload.php
195.10.205.157
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
195.10.205.157
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\480d6320db67ad80aeca72bce333a4f4aa151db9
8ab724874644c8f0b90f6c3386b352d48c253639
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vnzdDsAaAlbcuHJAOf_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DC2000
unkown
page readonly
malicious
1BF6D000
stack
page read and write
12F2000
stack
page read and write
1B83E000
stack
page read and write
1B9BE000
stack
page read and write
5A0000
heap
page read and write
31AE000
stack
page read and write
16AE000
stack
page read and write
9E5000
heap
page read and write
1BFBE000
stack
page read and write
16C20A17000
heap
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
20F661B9000
heap
page read and write
7FFD345E2000
trusted library allocation
page read and write
10A5000
heap
page read and write
7FFD34630000
trusted library allocation
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
7FFD345ED000
trusted library allocation
page read and write
7FFD345D0000
trusted library allocation
page read and write
233674C0000
heap
page read and write
310C000
trusted library allocation
page read and write
7FFD344E0000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
1FE69D50000
heap
page read and write
7FFD345C1000
trusted library allocation
page read and write
131BE000
trusted library allocation
page read and write
20ABC580000
heap
page read and write
BC2611C000
stack
page read and write
7FFD344E6000
trusted library allocation
page read and write
7FFD345C0000
trusted library allocation
page read and write
EC9000
heap
page read and write
1BBCC000
stack
page read and write
10A3000
heap
page read and write
7FFD34443000
trusted library allocation
page read and write
7FFD34423000
trusted library allocation
page read and write
BC2619F000
stack
page read and write
BD0000
heap
page read and write
1F54F140000
heap
page read and write
7FFD344C6000
trusted library allocation
page read and write
109E000
stack
page read and write
7FFD34413000
trusted library allocation
page execute and read and write
7FFD345D2000
trusted library allocation
page read and write
1BAB0000
heap
page read and write
F90000
trusted library allocation
page read and write
1B62F000
stack
page read and write
1BD2E000
stack
page read and write
1B681000
heap
page read and write
7FFD345ED000
trusted library allocation
page read and write
1BE9D000
stack
page read and write
CAE000
stack
page read and write
1AE1D000
stack
page read and write
1BFCE000
stack
page read and write
7FFD34560000
trusted library allocation
page execute and read and write
3506000
trusted library allocation
page read and write
1BDCE000
stack
page read and write
3140000
heap
page execute and read and write
1240000
heap
page read and write
7FFD34430000
trusted library allocation
page read and write
7FFD3449C000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
199145A0000
heap
page read and write
1B212000
heap
page read and write
1B93D000
stack
page read and write
C2E000
stack
page read and write
312B000
trusted library allocation
page read and write
25A3EB1A000
heap
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
2F76000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
7FFD3443D000
trusted library allocation
page execute and read and write
7FFD3442D000
trusted library allocation
page execute and read and write
7FFD3444D000
trusted library allocation
page execute and read and write
7C0000
heap
page read and write
A5A000
heap
page read and write
C30000
trusted library allocation
page read and write
3C2936B000
stack
page read and write
7FFD345E2000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
1B5C2000
heap
page read and write
130F1000
trusted library allocation
page read and write
7FFD3442D000
trusted library allocation
page execute and read and write
51D7A7F000
stack
page read and write
7FFD34434000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
AA9000
heap
page read and write
FA0000
heap
page read and write
126BE000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page execute and read and write
D63E4FF000
stack
page read and write
7FFD3460C000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
24AF0735000
heap
page read and write
2A71000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
151A000
heap
page read and write
7FFD344F6000
trusted library allocation
page execute and read and write
AEBD5AF000
stack
page read and write
1F54F160000
heap
page read and write
1620000
heap
page read and write
352A000
trusted library allocation
page read and write
7FFD34430000
trusted library allocation
page read and write
7FFD34454000
trusted library allocation
page read and write
7FFD34630000
trusted library allocation
page read and write
2D8F000
stack
page read and write
3328000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
1B43E000
stack
page read and write
7FFD344F6000
trusted library allocation
page read and write
3000000
heap
page read and write
7E0000
heap
page read and write
7FFD34540000
trusted library allocation
page execute and read and write
1B270000
heap
page read and write
1E1A3C90000
heap
page read and write
11F0000
trusted library allocation
page read and write
7FFD34460000
trusted library allocation
page read and write
CBBAD2C000
stack
page read and write
7FFD345BD000
trusted library allocation
page read and write
1BCBE000
stack
page read and write
1B287000
heap
page read and write
7FFD34453000
trusted library allocation
page read and write
12D0000
heap
page read and write
7FFD34464000
trusted library allocation
page read and write
F80000
heap
page read and write
A9D000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
7FFD34640000
trusted library allocation
page execute and read and write
1930000
heap
page read and write
12D37000
trusted library allocation
page read and write
1B214000
heap
page read and write
7FFD344F6000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
199144E0000
heap
page read and write
9EA000
heap
page read and write
328A000
trusted library allocation
page read and write
1047000
heap
page read and write
1B247000
heap
page read and write
1940000
heap
page read and write
1FE69D70000
heap
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
FFB000
heap
page read and write
134E000
stack
page read and write
2A48000
trusted library allocation
page read and write
7FFD345EF000
trusted library allocation
page read and write
261E000
stack
page read and write
1BC9F000
stack
page read and write
1B233000
heap
page read and write
1B209000
heap
page read and write
2820000
heap
page execute and read and write
25A3ECD0000
heap
page read and write
1F54F060000
heap
page read and write
1B227000
heap
page read and write
F30000
heap
page read and write
1FE69D30000
heap
page read and write
2F7C000
trusted library allocation
page read and write
7FFD34443000
trusted library allocation
page execute and read and write
7FFD34438000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
7FFD345EB000
trusted library allocation
page read and write
7FFD3449C000
trusted library allocation
page execute and read and write
1BB30000
heap
page read and write
1B6A6000
heap
page read and write
7FFD345D2000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
7FFD345B0000
trusted library allocation
page read and write
1B32E000
stack
page read and write
7FFD34526000
trusted library allocation
page execute and read and write
2F61000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
7FFD3446B000
trusted library allocation
page execute and read and write
7FFD345E2000
trusted library allocation
page read and write
7FFD345DC000
trusted library allocation
page read and write
1DAC43BA000
heap
page read and write
FE8000
heap
page read and write
2D31000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page execute and read and write
51D7AFF000
stack
page read and write
AF2000
stack
page read and write
13157000
trusted library allocation
page read and write
25A3EAE0000
heap
page read and write
25446B0B000
heap
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
915000
heap
page read and write
1DAC4645000
heap
page read and write
25A3ECD5000
heap
page read and write
1BA0E000
stack
page read and write
CB02F7F000
stack
page read and write
7FFD344F6000
trusted library allocation
page execute and read and write
C11000
heap
page read and write
1BF9D000
stack
page read and write
627BE7E000
stack
page read and write
1E1A3CF0000
heap
page read and write
D6F73F000
stack
page read and write
7FFD34444000
trusted library allocation
page read and write
284A000
trusted library allocation
page read and write
1BB80000
heap
page execute and read and write
1BA7F000
heap
page read and write
F20000
heap
page read and write
14CE000
heap
page read and write
BB2000
stack
page read and write
F80000
heap
page read and write
101A000
heap
page read and write
A5C000
heap
page read and write
155E000
stack
page read and write
28CB000
trusted library allocation
page read and write
2880000
heap
page read and write
1B99F000
stack
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
7FFD34610000
trusted library allocation
page execute and read and write
7FFD34526000
trusted library allocation
page execute and read and write
7FFD345F2000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
7FFD34413000
trusted library allocation
page execute and read and write
2BEC000
trusted library allocation
page read and write
7FFD3444A000
trusted library allocation
page read and write
7FFD34460000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
1BC3B000
stack
page read and write
2831000
trusted library allocation
page read and write
1BA60000
heap
page execute and read and write
12C21000
trusted library allocation
page read and write
7FFD34446000
trusted library allocation
page read and write
1305000
heap
page read and write
1E1A3C80000
heap
page read and write
7FFD345DB000
trusted library allocation
page read and write
AA7000
heap
page read and write
1B1E0000
heap
page execute and read and write
7FFD34560000
trusted library allocation
page execute and read and write
1BB9E000
stack
page read and write
7FFD345FD000
trusted library allocation
page read and write
7C0000
heap
page read and write
DD0000
trusted library allocation
page read and write
960000
heap
page read and write
1710000
heap
page read and write
7FFD345DC000
trusted library allocation
page read and write
F8E000
stack
page read and write
18F8AFC000
stack
page read and write
1F54F1C7000
heap
page read and write
40BF27F000
stack
page read and write
7FFD34420000
trusted library allocation
page read and write
1A1304D0000
heap
page read and write
7FFD34450000
trusted library allocation
page read and write
590000
heap
page read and write
D316F9F000
stack
page read and write
1B596000
heap
page read and write
1210000
trusted library allocation
page read and write
7FFD34434000
trusted library allocation
page read and write
7FFD344F6000
trusted library allocation
page read and write
1A2696C000
stack
page read and write
1B80E000
stack
page read and write
7FFD3442A000
trusted library allocation
page read and write
1BAEA000
heap
page read and write
C99000
heap
page read and write
7FFD34443000
trusted library allocation
page execute and read and write
920000
trusted library allocation
page read and write
1DAC4360000
heap
page read and write
1B6E4000
heap
page read and write
1BB0B000
heap
page read and write
102A000
heap
page read and write
7FFD345BD000
trusted library allocation
page read and write
1E1A3FC5000
heap
page read and write
2C8C000
trusted library allocation
page read and write
7FFD344C6000
trusted library allocation
page read and write
7FFD34412000
trusted library allocation
page read and write
F80000
heap
page read and write
7FFD345DF000
trusted library allocation
page read and write
CBBADAF000
stack
page read and write
26A0000
heap
page execute and read and write
12E21000
trusted library allocation
page read and write
12F2000
stack
page read and write
18F8BFF000
stack
page read and write
7FFD34530000
trusted library allocation
page execute and read and write
940000
trusted library allocation
page read and write
26E9000
trusted library allocation
page read and write
7FFD344C6000
trusted library allocation
page read and write
14B9000
heap
page read and write
24D0000
heap
page read and write
7FFD34423000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
17A0000
heap
page read and write
1B27C000
heap
page read and write
31B1000
trusted library allocation
page read and write
281E000
stack
page read and write
1BDBE000
stack
page read and write
7FFD345BB000
trusted library allocation
page read and write
F10000
heap
page read and write
7FFD345BF000
trusted library allocation
page read and write
350C000
trusted library allocation
page read and write
7FFD345EF000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
F32000
stack
page read and write
192E000
stack
page read and write
5D0000
heap
page read and write
12933000
trusted library allocation
page read and write
7FFD345D0000
trusted library allocation
page read and write
10A3000
heap
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
14F0000
heap
page read and write
980000
heap
page read and write
7FFD344D0000
trusted library allocation
page execute and read and write
D4E000
stack
page read and write
17C0000
heap
page execute and read and write
19914535000
heap
page read and write
1BB4E000
heap
page read and write
1285000
heap
page read and write
3126000
trusted library allocation
page read and write
7FFD34444000
trusted library allocation
page read and write
1B750000
heap
page execute and read and write
1BCE0000
heap
page read and write
7FFD345FC000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
1BB6E000
stack
page read and write
20ABC590000
heap
page read and write
C40000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
131B7000
trusted library allocation
page read and write
233672C0000
heap
page read and write
1BD9E000
stack
page read and write
7FFD345DB000
trusted library allocation
page read and write
100E000
heap
page read and write
1518000
heap
page read and write
1800000
heap
page read and write
7FFD3443A000
trusted library allocation
page read and write
40BEFDC000
stack
page read and write
7FFD34526000
trusted library allocation
page execute and read and write
3526000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
3BF0A7F000
stack
page read and write
130F7000
trusted library allocation
page read and write
5B0000
heap
page read and write
7FFD344F6000
trusted library allocation
page read and write
1B82D000
stack
page read and write
1B2F2000
heap
page read and write
1BA88000
heap
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
7FFD345B0000
trusted library allocation
page read and write
7FFD345E5000
trusted library allocation
page read and write
7FFD34433000
trusted library allocation
page execute and read and write
3189000
trusted library allocation
page read and write
1075000
heap
page read and write
5C0000
heap
page read and write
1B70E000
stack
page read and write
910000
heap
page read and write
1B92F000
stack
page read and write
1350000
trusted library allocation
page read and write
7FFD3449C000
trusted library allocation
page execute and read and write
1850000
heap
page read and write
CE3000
heap
page read and write
296B000
trusted library allocation
page read and write
12DB7000
trusted library allocation
page read and write
FE0000
heap
page read and write
12833000
trusted library allocation
page read and write
12891000
trusted library allocation
page read and write
7FFD34612000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
12DB1000
trusted library allocation
page read and write
129E000
stack
page read and write
7FFD34453000
trusted library allocation
page read and write
A1B000
heap
page read and write
2F98000
trusted library allocation
page read and write
7FFD34442000
trusted library allocation
page read and write
D6F6BC000
stack
page read and write
7FFD34610000
trusted library allocation
page read and write
1B92D000
stack
page read and write
7FFD3444B000
trusted library allocation
page execute and read and write
7FFD34620000
trusted library allocation
page execute and read and write
2EF1000
trusted library allocation
page read and write
7FFD3446C000
trusted library allocation
page execute and read and write
1BC99000
heap
page read and write
3C2967F000
stack
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
1BEAC000
stack
page read and write
29A8000
trusted library allocation
page read and write
1B90E000
stack
page read and write
1410000
heap
page execute and read and write
1BE2E000
stack
page read and write
1BB0D000
stack
page read and write
7FFD344EC000
trusted library allocation
page execute and read and write
FF9000
heap
page read and write
1760000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
1C09E000
stack
page read and write
1B7A7000
heap
page read and write
12E2E000
trusted library allocation
page read and write
1366000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD3441D000
trusted library allocation
page execute and read and write
1DAC4340000
heap
page read and write
7FFD34432000
trusted library allocation
page read and write
D40000
heap
page read and write
DC0000
unkown
page readonly
EE0000
heap
page read and write
7FFD34464000
trusted library allocation
page read and write
105B000
heap
page read and write
1905000
heap
page read and write
F60000
heap
page read and write
1009000
heap
page read and write
7FFD3449C000
trusted library allocation
page execute and read and write
2969000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
2E59000
trusted library allocation
page read and write
2828000
trusted library allocation
page read and write
24DE8100000
heap
page read and write
7FFD3443D000
trusted library allocation
page execute and read and write
7FFD3445A000
trusted library allocation
page read and write
7FFD3446C000
trusted library allocation
page execute and read and write
20F661B0000
heap
page read and write
7FFD344D0000
trusted library allocation
page read and write
7FFD3460D000
trusted library allocation
page read and write
7FFD3443D000
trusted library allocation
page execute and read and write
BEC000
heap
page read and write
126B7000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
1BDBF000
stack
page read and write
20F66150000
heap
page read and write
20ABC5B0000
heap
page read and write
A70000
heap
page read and write
2C50000
heap
page execute and read and write
12DBE000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
7FFD34600000
trusted library allocation
page read and write
24DE82C7000
heap
page read and write
25446960000
heap
page read and write
16C20985000
heap
page read and write
CBBB07F000
stack
page read and write
1E1A3FC0000
heap
page read and write
7FFD345BB000
trusted library allocation
page read and write
3522000
trusted library allocation
page read and write
7FFD3442D000
trusted library allocation
page execute and read and write
2510000
heap
page read and write
7FFD34530000
trusted library allocation
page execute and read and write
CAA000
heap
page read and write
D45000
heap
page read and write
A73000
heap
page read and write
7FFD345F2000
trusted library allocation
page read and write
7FFD34444000
trusted library allocation
page read and write
25A3EB17000
heap
page read and write
1BFC0000
heap
page read and write
A10000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page execute and read and write
233675D0000
heap
page read and write
1FE69E10000
heap
page read and write
2C10000
heap
page execute and read and write
1BA9E000
stack
page read and write
25446CE5000
heap
page read and write
7FFD344D6000
trusted library allocation
page read and write
7FFD34436000
trusted library allocation
page read and write
B28000
heap
page read and write
3268000
trusted library allocation
page read and write
1000000
heap
page execute and read and write
29D1000
trusted library allocation
page read and write
7FFD34440000
trusted library allocation
page read and write
40BF2FF000
stack
page read and write
2A30000
heap
page read and write
E3C000
unkown
page readonly
7FFD345E0000
trusted library allocation
page read and write
1B100000
heap
page read and write
7FFD34454000
trusted library allocation
page read and write
152C000
heap
page read and write
2E5B000
trusted library allocation
page read and write
1300000
heap
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
2B3E000
stack
page read and write
FE0000
heap
page read and write
F35000
heap
page read and write
2AA8000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
1B754000
heap
page read and write
7FFD34453000
trusted library allocation
page read and write
7FFD3443B000
trusted library allocation
page execute and read and write
25446A40000
heap
page read and write
7FFD345F1000
trusted library allocation
page read and write
C41000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
1BC6E000
stack
page read and write
F40000
heap
page read and write
1330000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
9E0000
heap
page read and write
1BA80000
heap
page read and write
1315E000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
C79000
heap
page read and write
7FFD34444000
trusted library allocation
page read and write
D316F1F000
stack
page read and write
FD0000
heap
page read and write
144E000
stack
page read and write
12897000
trusted library allocation
page read and write
7FFD3460C000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
1BAC5000
heap
page read and write
A36000
heap
page read and write
1B6DB000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
1AEBD000
stack
page read and write
7FFD345E2000
trusted library allocation
page read and write
CDE000
heap
page read and write
7FFD3445B000
trusted library allocation
page execute and read and write
7FFD344F6000
trusted library allocation
page execute and read and write
3196000
trusted library allocation
page read and write
351E000
trusted library allocation
page read and write
D70000
heap
page read and write
1A269EF000
stack
page read and write
7FFD345ED000
trusted library allocation
page read and write
7FFD34443000
trusted library allocation
page read and write
1283E000
trusted library allocation
page read and write
233672D0000
heap
page read and write
2630000
heap
page read and write
16C209B0000
heap
page read and write
2C86000
trusted library allocation
page read and write
1C26B000
stack
page read and write
1F54F455000
heap
page read and write
126B3000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
1FE69D75000
heap
page read and write
E6E000
stack
page read and write
14E5000
heap
page read and write
126B1000
trusted library allocation
page read and write
7FFD34414000
trusted library allocation
page read and write
1BB2E000
stack
page read and write
7FFD3448C000
trusted library allocation
page execute and read and write
D63E57F000
stack
page read and write
D6F7BE000
stack
page read and write
FF9000
heap
page read and write
950000
heap
page read and write
D95000
heap
page read and write
25446A60000
heap
page read and write
24DE82C0000
heap
page read and write
7FFD3446D000
trusted library allocation
page execute and read and write
AEBD52C000
stack
page read and write
E85000
heap
page read and write
182E000
stack
page read and write
1AC4D000
stack
page read and write
13D4000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
F30000
heap
page read and write
9D9000
heap
page read and write
E90000
heap
page read and write
EA0000
heap
page read and write
27C8000
trusted library allocation
page read and write
EAF000
heap
page read and write
2F28000
trusted library allocation
page read and write
7FFD3445A000
trusted library allocation
page read and write
24AF06A0000
heap
page read and write
7FFD34516000
trusted library allocation
page execute and read and write
7FFD345D2000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
7FF4110C0000
trusted library allocation
page execute and read and write
25446CE0000
heap
page read and write
3231000
trusted library allocation
page read and write
7FFD34442000
trusted library allocation
page read and write
102E000
heap
page read and write
F75000
stack
page read and write
EF2000
stack
page read and write
7FFD3442A000
trusted library allocation
page read and write
FF0000
heap
page read and write
7FFD345DD000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
AF2000
stack
page read and write
FC5000
heap
page read and write
1BEBD000
stack
page read and write
138D000
heap
page read and write
199145AA000
heap
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
20ABC5F8000
heap
page read and write
7FFD3441D000
trusted library allocation
page execute and read and write
C70000
heap
page read and write
FC0000
heap
page read and write
7FFD345E3000
trusted library allocation
page read and write
2CB0000
heap
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
1DAC43B7000
heap
page read and write
7FFD34612000
trusted library allocation
page read and write
1E1A3CF8000
heap
page read and write
1B180000
trusted library allocation
page read and write
3011000
heap
page read and write
199143E0000
heap
page read and write
1B1F6000
heap
page read and write
2580000
heap
page execute and read and write
CE8000
heap
page read and write
7FFD34608000
trusted library allocation
page read and write
7FFD34433000
trusted library allocation
page execute and read and write
1B53E000
stack
page read and write
AEBD87F000
stack
page read and write
7FFD34526000
trusted library allocation
page execute and read and write
14D9000
heap
page read and write
1C66B000
stack
page read and write
1720000
heap
page read and write
7FFD345D0000
trusted library allocation
page read and write
1B3C0000
heap
page execute and read and write
7FFD344E0000
trusted library allocation
page execute and read and write
14EE000
heap
page read and write
7FFD34442000
trusted library allocation
page read and write
C89000
heap
page read and write
291E000
stack
page read and write
7FFD345EC000
trusted library allocation
page read and write
3BF07FC000
stack
page read and write
FC0000
heap
page read and write
1C3BF000
stack
page read and write
7FFD345F2000
trusted library allocation
page read and write
155A000
heap
page read and write
A9D000
heap
page read and write
3466000
trusted library allocation
page read and write
100E000
heap
page read and write
7FFD345EE000
trusted library allocation
page read and write
10CB000
heap
page read and write
13D0000
heap
page read and write
1450000
heap
page execute and read and write
1C21B000
stack
page read and write
1B0E0000
heap
page execute and read and write
7FFD34640000
trusted library allocation
page execute and read and write
10DE000
heap
page read and write
7FFD34434000
trusted library allocation
page read and write
14EA000
heap
page read and write
7FFD3448C000
trusted library allocation
page execute and read and write
1DAC43B0000
heap
page read and write
16C20960000
heap
page read and write
1AF90000
heap
page read and write
1289E000
trusted library allocation
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
7FFD34506000
trusted library allocation
page execute and read and write
1625000
heap
page read and write
3C293EF000
stack
page read and write
130FE000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
2D10000
heap
page read and write
1BA2E000
stack
page read and write
7FFD345EB000
trusted library allocation
page read and write
138E000
stack
page read and write
A84000
heap
page read and write
7FFD345FF000
trusted library allocation
page read and write
14E0000
heap
page read and write
7FFD345F6000
trusted library allocation
page read and write
1BEBE000
stack
page read and write
1B5B4000
heap
page read and write
7FFD34602000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
233672F7000
heap
page read and write
1C1BE000
stack
page read and write
1293E000
trusted library allocation
page read and write
7FFD3442A000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
1019000
heap
page read and write
1C66B000
stack
page read and write
1BA9E000
stack
page read and write
131B1000
trusted library allocation
page read and write
13CE000
heap
page read and write
1B72E000
stack
page read and write
A19000
heap
page read and write
7FFD34640000
trusted library allocation
page execute and read and write
5A0000
heap
page read and write
29A8000
trusted library allocation
page read and write
1C23B000
stack
page read and write
1A26C7F000
stack
page read and write
2B8C000
trusted library allocation
page read and write
3129000
trusted library allocation
page read and write
1BCE0000
heap
page read and write
2E48000
trusted library allocation
page read and write
7FFD344F0000
trusted library allocation
page execute and read and write
1A1303F0000
heap
page read and write
16C20A1A000
heap
page read and write
1C1B0000
heap
page read and write
B26000
heap
page read and write
2891000
trusted library allocation
page read and write
7FFD34443000
trusted library allocation
page execute and read and write
7FFD34600000
trusted library allocation
page read and write
7FFD34442000
trusted library allocation
page read and write
1BECE000
stack
page read and write
1B67D000
stack
page read and write
7FFD345E5000
trusted library allocation
page read and write
7FFD3446D000
trusted library allocation
page execute and read and write
32F1000
trusted library allocation
page read and write
7FFD344FC000
trusted library allocation
page execute and read and write
CD7000
heap
page read and write
7FFD345C6000
trusted library allocation
page read and write
CAF000
heap
page read and write
24DE82B9000
heap
page read and write
1B602000
heap
page read and write
9A0000
heap
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
100A000
heap
page read and write
13C0000
trusted library allocation
page read and write
7FFD34413000
trusted library allocation
page execute and read and write
7FFD3441D000
trusted library allocation
page execute and read and write
20F661C7000
heap
page read and write
1410000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD34434000
trusted library allocation
page read and write
1BE9F000
stack
page read and write
1B9C0000
heap
page read and write
EDD000
heap
page read and write
C50000
trusted library allocation
page read and write
1B1AC000
heap
page read and write
7FFD345D2000
trusted library allocation
page read and write
10B3000
heap
page read and write
7FFD34418000
trusted library allocation
page read and write
7FFD345BB000
trusted library allocation
page read and write
1B1AC000
stack
page read and write
1B62E000
stack
page read and write
1725000
heap
page read and write
E80000
heap
page read and write
FB0000
heap
page read and write
DC0000
unkown
page readonly
7FFD345E0000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
9B0000
heap
page read and write
7FFD3445A000
trusted library allocation
page read and write
2E1E000
stack
page read and write
CF2000
stack
page read and write
627BEFE000
stack
page read and write
7FFD34444000
trusted library allocation
page read and write
1C33B000
stack
page read and write
12937000
trusted library allocation
page read and write
7FFD3445A000
trusted library allocation
page read and write
23367305000
heap
page read and write
1C02E000
stack
page read and write
FF0000
heap
page read and write
3151000
trusted library allocation
page read and write
24AF04DA000
heap
page read and write
31E9000
trusted library allocation
page read and write
7FFD344C0000
trusted library allocation
page read and write
7FFD345DF000
trusted library allocation
page read and write
1A1305F0000
heap
page read and write
7FFD344E6000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
9D7000
heap
page read and write
7FFD34410000
trusted library allocation
page read and write
7FFD345F1000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
14A0000
heap
page read and write
1FE69E1A000
heap
page read and write
24DE8200000
heap
page read and write
20F663F0000
heap
page read and write
3176000
trusted library allocation
page read and write
7FFD34423000
trusted library allocation
page read and write
7FFD3447C000
trusted library allocation
page execute and read and write
BAE000
stack
page read and write
1059000
heap
page read and write
CB02EFF000
stack
page read and write
131B3000
trusted library allocation
page read and write
24AF04D0000
heap
page read and write
1BC70000
heap
page read and write
10D3000
heap
page read and write
7FFD344D0000
trusted library allocation
page execute and read and write
7FFD34464000
trusted library allocation
page read and write
BFA000
heap
page read and write
5D0000
heap
page read and write
18F8B7F000
stack
page read and write
1C1CE000
stack
page read and write
7FFD34434000
trusted library allocation
page read and write
1B1B0000
heap
page read and write
7FFD345DD000
trusted library allocation
page read and write
1BB9E000
stack
page read and write
7FFD344C6000
trusted library allocation
page read and write
1B82F000
stack
page read and write
12C23000
trusted library allocation
page read and write
8D0000
heap
page read and write
1FE69C50000
heap
page read and write
1BC2F000
stack
page read and write
24AF06C0000
heap
page read and write
1A1304F8000
heap
page read and write
19914530000
heap
page read and write
2DE9000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
11DF000
stack
page read and write
3446000
trusted library allocation
page read and write
7FFD34464000
trusted library allocation
page read and write
1B33D000
stack
page read and write
2C30000
heap
page read and write
7FFD34640000
trusted library allocation
page execute and read and write
AAB000
heap
page read and write
16F0000
heap
page read and write
7FFD34453000
trusted library allocation
page read and write
7FFD345EB000
trusted library allocation
page read and write
627BBFB000
stack
page read and write
14B0000
heap
page read and write
7FFD34413000
trusted library allocation
page execute and read and write
E95000
heap
page read and write
1E1A3CFA000
heap
page read and write
F70000
heap
page read and write
31EB000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
1B9DC000
heap
page read and write
25A3EC10000
heap
page read and write
13A2000
heap
page read and write
17A5000
heap
page read and write
1BC0E000
stack
page read and write
1B72E000
stack
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
7FFD3446B000
trusted library allocation
page execute and read and write
1BC9E000
stack
page read and write
F75000
heap
page read and write
7FFD34530000
trusted library allocation
page execute and read and write
1BC8A000
heap
page read and write
2F96000
trusted library allocation
page read and write
BF0000
heap
page read and write
1945000
heap
page read and write
7FFD34433000
trusted library allocation
page read and write
1BA3F000
stack
page read and write
25446B07000
heap
page read and write
30A6000
trusted library allocation
page read and write
3BF0AFF000
stack
page read and write
158E000
heap
page read and write
2860000
heap
page execute and read and write
E60000
heap
page execute and read and write
8F2000
stack
page read and write
7FFD34424000
trusted library allocation
page read and write
350A000
trusted library allocation
page read and write
1B4F0000
heap
page read and write
2D38000
trusted library allocation
page read and write
1BA3C000
heap
page read and write
7FFD34640000
trusted library allocation
page execute and read and write
7FFD345F2000
trusted library allocation
page read and write
7FFD34412000
trusted library allocation
page read and write
17F0000
heap
page execute and read and write
1B6F9000
heap
page read and write
7FFD3443D000
trusted library allocation
page execute and read and write
1B2BC000
stack
page read and write
1C110000
heap
page read and write
7FFD34434000
trusted library allocation
page read and write
7FFD345CB000
trusted library allocation
page read and write
273E000
stack
page read and write
F90000
heap
page read and write
1C0BE000
stack
page read and write
C5A000
heap
page read and write
7FFD3460C000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
FD0000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
7FFD3446D000
trusted library allocation
page execute and read and write
7FFD34606000
trusted library allocation
page read and write
136C000
heap
page read and write
12837000
trusted library allocation
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
BD0000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
13151000
trusted library allocation
page read and write
24AF04C0000
heap
page read and write
20ABC5FA000
heap
page read and write
1070000
heap
page read and write
27F1000
trusted library allocation
page read and write
1245000
heap
page read and write
1B693000
heap
page read and write
139E000
heap
page read and write
FB0000
heap
page read and write
7FFD3446C000
trusted library allocation
page execute and read and write
7FFD34630000
trusted library allocation
page read and write
7FFD345EB000
trusted library allocation
page read and write
138F000
heap
page read and write
1B2CA000
heap
page read and write
1B92E000
stack
page read and write
1558000
heap
page read and write
7FFD344F6000
trusted library allocation
page execute and read and write
1B00A000
heap
page read and write
7B0000
heap
page read and write
7FFD3443D000
trusted library allocation
page execute and read and write
151A000
heap
page read and write
7FFD3443D000
trusted library allocation
page execute and read and write
7FFD34422000
trusted library allocation
page read and write
7FFD34423000
trusted library allocation
page execute and read and write
1E1A3CB0000
heap
page read and write
1B146000
heap
page read and write
7FFD34560000
trusted library allocation
page execute and read and write
1B1F0000
heap
page read and write
1A130645000
heap
page read and write
1DAC4640000
heap
page read and write
1BBBE000
stack
page read and write
7FFD345C1000
trusted library allocation
page read and write
1360000
heap
page read and write
1B60E000
stack
page read and write
7FFD34414000
trusted library allocation
page read and write
7FFD344D0000
trusted library allocation
page execute and read and write
25A3EA00000
heap
page read and write
1BFBE000
stack
page read and write
1B52D000
stack
page read and write
20F66130000
heap
page read and write
1C2BD000
stack
page read and write
344C000
trusted library allocation
page read and write
7FFD34443000
trusted library allocation
page execute and read and write
7FFD3444A000
trusted library allocation
page read and write
25446B00000
heap
page read and write
14F9000
heap
page read and write
1B5CC000
stack
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
1050000
heap
page read and write
14EE000
stack
page read and write
12C27000
trusted library allocation
page read and write
51D77CC000
stack
page read and write
1B200000
heap
page read and write
7FFD34516000
trusted library allocation
page execute and read and write
2C2E000
stack
page read and write
2920000
heap
page read and write
2A0C000
trusted library allocation
page read and write
7FFD344F0000
trusted library allocation
page read and write
7FFD34423000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
1BD9E000
stack
page read and write
1BABE000
stack
page read and write
7FFD345E0000
trusted library allocation
page read and write
1B82E000
stack
page read and write
172E000
stack
page read and write
2BA6000
trusted library allocation
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
7FFD34412000
trusted library allocation
page read and write
25A3EB10000
heap
page read and write
20F66120000
heap
page read and write
1A1304F0000
heap
page read and write
CD0000
heap
page read and write
7FFD344FC000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
D50000
trusted library allocation
page read and write
7FFD345B0000
trusted library allocation
page read and write
1A1304FA000
heap
page read and write
7FFD345DC000
trusted library allocation
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
A3C000
heap
page read and write
26EB000
trusted library allocation
page read and write
1900000
heap
page read and write
1B729000
heap
page read and write
7FFD345BB000
trusted library allocation
page read and write
7FFD3442D000
trusted library allocation
page execute and read and write
1B1F3000
heap
page read and write
12931000
trusted library allocation
page read and write
16C20980000
heap
page read and write
9EE000
heap
page read and write
E7E000
stack
page read and write
5C5000
heap
page read and write
119E000
stack
page read and write
A30000
heap
page read and write
F07000
heap
page read and write
1B9C7000
heap
page read and write
1B73D000
stack
page read and write
1C2CD000
stack
page read and write
12C2E000
trusted library allocation
page read and write
199144C0000
heap
page read and write
1B6F0000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
1B6BC000
heap
page read and write
233672F0000
heap
page read and write
EDA000
heap
page read and write
1B42E000
stack
page read and write
7FFD345BD000
trusted library allocation
page read and write
7FFD34602000
trusted library allocation
page read and write
7FFD34414000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
F70000
heap
page read and write
1038000
heap
page read and write
7FFD3442A000
trusted library allocation
page read and write
199145A7000
heap
page read and write
7FFD344CC000
trusted library allocation
page execute and read and write
24DE8490000
heap
page read and write
7FFD344F0000
trusted library allocation
page read and write
D75000
heap
page read and write
2B86000
trusted library allocation
page read and write
C45000
heap
page read and write
1B73E000
stack
page read and write
7FFD345C2000
trusted library allocation
page read and write
7FFD345FD000
trusted library allocation
page read and write
24AF04D7000
heap
page read and write
7FFD345C0000
trusted library allocation
page read and write
2DA0000
heap
page execute and read and write
7FFD3446D000
trusted library allocation
page execute and read and write
1ADBD000
stack
page read and write
FD9000
heap
page read and write
1BF9E000
stack
page read and write
2A08000
trusted library allocation
page read and write
2FCF000
stack
page read and write
7FFD34416000
trusted library allocation
page read and write
7FFD34440000
trusted library allocation
page read and write
D53000
heap
page read and write
1B52E000
stack
page read and write
16C20990000
heap
page read and write
1B726000
heap
page read and write
101D000
heap
page read and write
1F54F1C0000
heap
page read and write
BD9000
heap
page read and write
1280000
heap
page read and write
2D20000
heap
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
29CA000
trusted library allocation
page read and write
1F54F1CA000
heap
page read and write
1C0CE000
stack
page read and write
20ABC8E0000
heap
page read and write
7FFD34440000
trusted library allocation
page read and write
9D0000
heap
page read and write
7FFD344DC000
trusted library allocation
page execute and read and write
139E000
stack
page read and write
2C21000
trusted library allocation
page read and write
7FFD3441D000
trusted library allocation
page execute and read and write
1270000
heap
page execute and read and write
12E27000
trusted library allocation
page read and write
552000
stack
page read and write
1BB2F000
stack
page read and write
7FFD3446C000
trusted library allocation
page execute and read and write
1B63D000
stack
page read and write
7FFD34602000
trusted library allocation
page read and write
23367318000
heap
page read and write
16C20A10000
heap
page read and write
7FFD34602000
trusted library allocation
page read and write
1C3CF000
stack
page read and write
627BF7E000
stack
page read and write
CB02E7C000
stack
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
7FFD345BF000
trusted library allocation
page read and write
24AF0730000
heap
page read and write
20ABC5F0000
heap
page read and write
1A26CFF000
stack
page read and write
1F54F450000
heap
page read and write
7FFD34602000
trusted library allocation
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
12893000
trusted library allocation
page read and write
1AFFC000
heap
page read and write
7FFD34602000
trusted library allocation
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
1DAC4260000
heap
page read and write
2BE6000
trusted library allocation
page read and write
20ABC8E5000
heap
page read and write
7FFD345E2000
trusted library allocation
page read and write
16EE000
stack
page read and write
24DE81E0000
heap
page read and write
1B2BE000
heap
page read and write
1BA2D000
stack
page read and write
142B000
heap
page read and write
130F3000
trusted library allocation
page read and write
15D6000
heap
page read and write
13A0000
heap
page read and write
1BA0E000
stack
page read and write
1C0CF000
stack
page read and write
7FFD34560000
trusted library allocation
page execute and read and write
D316E9C000
stack
page read and write
1B850000
heap
page execute and read and write
C3B000
heap
page read and write
3208000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
12D31000
trusted library allocation
page read and write
7FFD3442D000
trusted library allocation
page execute and read and write
ED0000
heap
page read and write
12D3E000
trusted library allocation
page read and write
12831000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
1B796000
heap
page read and write
1A130640000
heap
page read and write
2ECA000
trusted library allocation
page read and write
F7E000
stack
page read and write
7FFD34600000
trusted library allocation
page read and write
1B242000
heap
page read and write
FD0000
heap
page read and write
D63E47C000
stack
page read and write
7FFD345E6000
trusted library allocation
page read and write
1FE69E18000
heap
page read and write
1BE8B000
stack
page read and write
C0E000
heap
page read and write
24DE82B0000
heap
page read and write
1B3AD000
stack
page read and write
FEE000
heap
page read and write
7FFD345BF000
trusted library allocation
page read and write
7FFD345CE000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
1B9CC000
heap
page read and write
1C2BB000
stack
page read and write
13153000
trusted library allocation
page read and write
There are 1063 hidden memdumps, click here to show them.