IOC Report
YYjRtxS70h.exe

loading gif

Files

File Path
Type
Category
Malicious
YYjRtxS70h.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YYjRtxS70h.exe.log
CSV text
modified
malicious
C:\VmTatwGQo\168b8f8b-d51b-4eae-b6db-4c4c9add1d5d.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\76561199804377619[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3254)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\76561199804377619[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3254)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0c4sbize.gt5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fimw0nw.epw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44azgeaa.mu5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dvcmsww.5jr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqrrzbsa.01l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gg2wq42q.z3x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqil3wa2.s4a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gx55hdj2.oc1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hprqkrgy.vx4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i51z1tx3.hhq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipoksj5s.xzo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jorhrdbe.jzy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4axp5zv.0yg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqewxhb2.xo3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnrzkanw.2s4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbdh2p4l.dal.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjhfp4k3.uvq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vuybsjww.poo.ps1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\YYjRtxS70h.exe
"C:\Users\user\Desktop\YYjRtxS70h.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\VmTatwGQo'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\VmTatwGQo
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Windows
malicious
C:\VmTatwGQo\168b8f8b-d51b-4eae-b6db-4c4c9add1d5d.exe
"C:\VmTatwGQo\168b8f8b-d51b-4eae-b6db-4c4c9add1d5d.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=i_iuPUaT8LXN&l=english&am
unknown
https://player.vimeo.com
unknown
https://steamcommunity.com/profiles/76561199804377619com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=47omfdMZRDiz&l=engli
unknown
http://crl.microsoft
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://steamcommunity.com/profiles/76561199804377619?
unknown
https://37.27.43.98/T
unknown
https://steamcommunity.com/profiles/76561199804377619E
unknown
https://github.com/olosha1/pockket/raw/refs/heads/main/jtkhikadjthsad.exe
20.233.83.145
https://steamcommunity.com/profiles/76561199804377619G
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://37.27.43.98/n
unknown
https://telegram.org/img/t_logo_2x.png
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&a
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S
unknown
https://t.me/m3wm0wT
unknown
https://steamcommunity.com/profiles/76561199804377619p1up1Mozilla/5.0
unknown
https://steamcommunity.com/profiles/76561199804377619
104.102.49.254
https://raw.githubusercontent.com/olosha1/pockket/refs/heads/main/jtkhikadjthsad.exe
185.199.110.133
https://aka.ms/pscore6lB
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=G3UTKgHH4xLD&l=engl
unknown
https://steamcommunity.com/profiles/76561199804377619/badges
unknown
https://t.me/_~
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://nuget.org/nuget.exe
unknown
https://steamcommunity.com/profiles/76561199804377619#
unknown
https://37.27.43.98/5
unknown
https://t.me/m3wm0wc
unknown
https://s.ytimg.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcD
unknown
https://steamcommunity.com/profiles/76561199804377619/
unknown
https://37.27.43.98/A
unknown
https://steam.tv/
unknown
https://37.27.43.98
unknown
https://t.me/m3wm0w3
unknown
https://steamcommunity.com/o
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199804377619
unknown
https://37.27.43.98/icate
unknown
https://t.me/m3wm0w7
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=_92T
unknown
https://api.P
unknown
https://contoso.com/Icon
unknown
https://store.steampowered.com/points/shop/
unknown
https://steamcommunity.com/profiles/76561199
unknown
https://t.me/y~
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://github.com/Pester/Pester
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=EZbG2DEumYDH&l=engli
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://crl.micro
unknown
https://raw.githubusercontent.com
unknown
https://steamcommunity.com/profiles/76561199804377619_
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://37.27.43.98/r
unknown
https://37.27.43.98/s
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
http://raw.githubusercontent.com
unknown
https://37.27.43.98/v
unknown
http://www.microsoft.coU
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=LjouqOsWbS
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://steamcommunity.com/profiles/76561199804377619i
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedc
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/m3wm0w
149.154.167.99
https://t.me/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=nc69vwog8R9p&l=
unknown
https://store.steampowered.com/;)
unknown
https://store.steampowered.com/;a(
unknown
https://web.telegram.org
unknown
https://github.com
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=INiZALwvDIbb
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/profiles/76561199804377619tlq
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://contoso.com/License
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
github.com
20.233.83.145
raw.githubusercontent.com
185.199.110.133
t.me
149.154.167.99

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
37.27.43.98
unknown
Iran (ISLAMIC Republic Of)
20.233.83.145
github.com
United States
185.199.110.133
raw.githubusercontent.com
Netherlands
149.154.167.99
t.me
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\YYjRtxS70h_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7B60000
trusted library allocation
page read and write
6E6F000
heap
page read and write
4CDC000
stack
page read and write
AB3000
heap
page read and write
85DA000
trusted library allocation
page read and write
44BB000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
7FD38000
trusted library allocation
page execute and read and write
89C2000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
86CE000
stack
page read and write
2C42000
trusted library allocation
page read and write
8A13000
trusted library allocation
page read and write
A3A000
heap
page read and write
8630000
trusted library allocation
page read and write
D57000
heap
page read and write
61C5000
trusted library allocation
page read and write
8580000
trusted library allocation
page execute and read and write
745D000
stack
page read and write
466E000
trusted library allocation
page read and write
3020000
heap
page read and write
70F0000
trusted library allocation
page read and write
29CD000
trusted library allocation
page execute and read and write
8882000
trusted library allocation
page read and write
7FB50000
trusted library allocation
page execute and read and write
6C6E000
stack
page read and write
A41000
heap
page read and write
5872000
trusted library allocation
page read and write
4AE8000
trusted library allocation
page read and write
6CBE000
stack
page read and write
79FE000
stack
page read and write
6D3D000
stack
page read and write
4737000
trusted library allocation
page read and write
27EE000
unkown
page read and write
853E000
stack
page read and write
291F000
heap
page read and write
5A17000
trusted library allocation
page read and write
88C0000
trusted library allocation
page read and write
6B8C000
stack
page read and write
2CBA000
heap
page read and write
22AC000
stack
page read and write
43A0000
heap
page read and write
74DE000
stack
page read and write
5BFF000
stack
page read and write
4B62000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
5082000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
6DFC000
heap
page read and write
456E000
stack
page read and write
7A40000
trusted library allocation
page read and write
A41000
heap
page read and write
87C4000
heap
page read and write
A78000
heap
page read and write
2722000
trusted library allocation
page read and write
2B8F000
stack
page read and write
2D97000
stack
page read and write
271A000
trusted library allocation
page execute and read and write
75C0000
heap
page read and write
55A8000
trusted library allocation
page read and write
9CE000
heap
page read and write
2770000
heap
page read and write
A47000
heap
page read and write
8C7D000
stack
page read and write
A46000
heap
page read and write
4F6E000
stack
page read and write
868C000
heap
page read and write
7532000
trusted library allocation
page read and write
44EF000
stack
page read and write
57F1000
trusted library allocation
page read and write
29A0000
heap
page read and write
764A000
heap
page read and write
48BC000
trusted library allocation
page read and write
8490000
heap
page read and write
679D000
stack
page read and write
7290000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
2931000
heap
page read and write
45AE000
stack
page read and write
2980000
heap
page read and write
27F0000
heap
page read and write
2716000
trusted library allocation
page execute and read and write
42CF000
stack
page read and write
2AD5000
heap
page read and write
27C5000
heap
page read and write
505C000
stack
page read and write
2B9F000
stack
page read and write
C59000
heap
page read and write
6B1B000
stack
page read and write
452E000
stack
page read and write
59B2000
trusted library allocation
page read and write
72AA000
stack
page read and write
6F55000
heap
page read and write
268C000
stack
page read and write
29C0000
trusted library allocation
page read and write
772E000
stack
page read and write
4A25000
trusted library allocation
page execute and read and write
2A78000
trusted library allocation
page read and write
6F6E000
stack
page read and write
2B5F000
heap
page read and write
6E7B000
stack
page read and write
7635000
heap
page read and write
A47000
heap
page read and write
23F0000
heap
page read and write
8755000
heap
page read and write
473E000
stack
page read and write
4B80000
trusted library allocation
page read and write
43B1000
trusted library allocation
page read and write
4B50000
heap
page read and write
869C000
heap
page read and write
774F000
heap
page read and write
7A50000
trusted library allocation
page read and write
8A40000
trusted library allocation
page execute and read and write
760000
heap
page read and write
7880000
heap
page execute and read and write
46A5000
trusted library allocation
page read and write
2A6E000
stack
page read and write
4486000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
4FD8000
stack
page read and write
4A00000
trusted library allocation
page read and write
A41000
heap
page read and write
28B0000
heap
page read and write
6B6E000
stack
page read and write
767D000
heap
page read and write
6BAB000
stack
page read and write
79E0000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
8E1E000
stack
page read and write
791E000
stack
page read and write
6560000
heap
page read and write
31DE000
stack
page read and write
31A0000
remote allocation
page read and write
53B1000
trusted library allocation
page read and write
6D7A000
stack
page read and write
875A000
heap
page read and write
7867000
trusted library allocation
page read and write
869C000
heap
page read and write
329E000
unkown
page read and write
7910000
trusted library allocation
page execute and read and write
5AD7000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page execute and read and write
2AA9000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
6DBE000
stack
page read and write
A9A000
heap
page read and write
8BBD000
stack
page read and write
7B90000
trusted library allocation
page read and write
2B7C000
stack
page read and write
78D2000
trusted library allocation
page read and write
557E000
stack
page read and write
2BC0000
heap
page read and write
61CE000
stack
page read and write
4B30000
trusted library allocation
page read and write
6DDE000
stack
page read and write
2F68000
heap
page read and write
74C0000
trusted library allocation
page read and write
4E4D000
stack
page read and write
29B1000
trusted library allocation
page read and write
8C8D000
stack
page read and write
2B5E000
stack
page read and write
6E6B000
heap
page read and write
768D000
heap
page read and write
7240000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
A41000
heap
page read and write
70E0000
heap
page execute and read and write
2C20000
trusted library allocation
page read and write
669E000
stack
page read and write
2ED0000
heap
page read and write
4D40000
trusted library allocation
page read and write
22E8000
stack
page read and write
7BA0000
trusted library allocation
page read and write
2D25000
heap
page read and write
7860000
trusted library allocation
page read and write
71EE000
stack
page read and write
276F000
stack
page read and write
2712000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
4492000
trusted library allocation
page read and write
4DBE000
stack
page read and write
71D0000
heap
page read and write
23AE000
unkown
page read and write
508E000
stack
page read and write
570D000
stack
page read and write
7F20000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
71AE000
stack
page read and write
A41000
heap
page read and write
7270000
trusted library allocation
page read and write
88B9000
trusted library allocation
page read and write
3150000
heap
page read and write
32DF000
stack
page read and write
29F5000
trusted library allocation
page execute and read and write
2F20000
heap
page read and write
733E000
stack
page read and write
2A46000
trusted library allocation
page read and write
27A0000
heap
page read and write
2C40000
trusted library allocation
page read and write
28DB000
heap
page read and write
751E000
stack
page read and write
7500000
heap
page read and write
332F000
stack
page read and write
77FB000
heap
page read and write
49F4000
trusted library allocation
page read and write
72BD000
stack
page read and write
A9A000
heap
page read and write
7805000
heap
page read and write
6ADE000
stack
page read and write
857E000
stack
page read and write
4B40000
heap
page execute and read and write
3330000
heap
page read and write
2BB9000
stack
page read and write
31F0000
heap
page read and write
8A30000
trusted library allocation
page read and write
272E000
stack
page read and write
606B000
trusted library allocation
page read and write
7120000
heap
page execute and read and write
293E000
stack
page read and write
810000
heap
page read and write
2F30000
heap
page read and write
8EDE000
stack
page read and write
76B3000
heap
page read and write
2A66000
trusted library allocation
page read and write
2D7B000
heap
page read and write
8E9E000
stack
page read and write
728A000
stack
page read and write
7130000
trusted library allocation
page read and write
751F000
stack
page read and write
8670000
heap
page read and write
8717000
trusted library allocation
page read and write
B50000
heap
page read and write
5AA0000
trusted library allocation
page read and write
D34000
trusted library allocation
page read and write
46B0000
heap
page read and write
310E000
stack
page read and write
7B60000
trusted library allocation
page execute and read and write
480D000
trusted library allocation
page read and write
422E000
stack
page read and write
49A6000
trusted library allocation
page read and write
71BF000
heap
page read and write
7660000
heap
page read and write
61C8000
trusted library allocation
page read and write
2ECE000
stack
page read and write
77CB000
heap
page read and write
7A40000
trusted library allocation
page read and write
58AE000
trusted library allocation
page read and write
7B00000
trusted library allocation
page read and write
6DE0000
heap
page read and write
5010000
heap
page execute and read and write
2F1E000
unkown
page read and write
580E000
stack
page read and write
543E000
stack
page read and write
88D0000
trusted library allocation
page read and write
2727000
trusted library allocation
page execute and read and write
7490000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
726E000
stack
page read and write
5689000
trusted library allocation
page read and write
272B000
trusted library allocation
page execute and read and write
2F89000
heap
page read and write
45C0000
trusted library allocation
page read and write
6970000
heap
page read and write
6074000
trusted library allocation
page read and write
88B0000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
8CBE000
stack
page read and write
2740000
heap
page read and write
47BE000
stack
page read and write
7230000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
2DF5000
heap
page read and write
2720000
trusted library allocation
page read and write
31DE000
stack
page read and write
6DF6000
heap
page read and write
62CE000
stack
page read and write
7B80000
trusted library allocation
page read and write
447E000
trusted library allocation
page read and write
76A5000
heap
page read and write
2C70000
heap
page readonly
8BFB000
stack
page read and write
D3D000
trusted library allocation
page execute and read and write
A3A000
heap
page read and write
71CE000
stack
page read and write
477E000
stack
page read and write
2921000
heap
page read and write
606E000
stack
page read and write
28B5000
heap
page read and write
2A27000
trusted library allocation
page read and write
278E000
stack
page read and write
325E000
unkown
page read and write
7A80000
trusted library allocation
page read and write
CB9000
heap
page read and write
BFE000
stack
page read and write
584D000
stack
page read and write
6BAE000
stack
page read and write
8A10000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
4740000
trusted library allocation
page read and write
6E3D000
stack
page read and write
8770000
trusted library allocation
page read and write
853E000
stack
page read and write
784D000
heap
page read and write
44C000
unkown
page readonly
7870000
trusted library allocation
page read and write
8838000
heap
page read and write
27DD000
trusted library allocation
page execute and read and write
7920000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
77B3000
heap
page read and write
4692000
trusted library allocation
page read and write
770A000
heap
page read and write
7140000
trusted library allocation
page read and write
62E4000
trusted library allocation
page read and write
463C000
stack
page read and write
85BE000
stack
page read and write
5ECE000
stack
page read and write
6179000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
400000
unkown
page readonly
4B3C000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
4B22000
trusted library allocation
page read and write
C3E000
stack
page read and write
87D4000
heap
page read and write
298C000
heap
page read and write
8684000
heap
page read and write
2830000
trusted library allocation
page execute and read and write
6F10000
trusted library allocation
page read and write
737F000
stack
page read and write
6FEE000
stack
page read and write
4A20000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
BC4000
heap
page read and write
8882000
heap
page read and write
5F28000
trusted library allocation
page read and write
7655000
heap
page read and write
87DC000
heap
page read and write
6E1F000
stack
page read and write
4BF0000
heap
page read and write
6FDD000
stack
page read and write
26C9000
stack
page read and write
47F1000
trusted library allocation
page read and write
716E000
stack
page read and write
2F43000
heap
page read and write
78A0000
trusted library allocation
page read and write
8818000
heap
page read and write
A95000
heap
page read and write
2A9A000
heap
page read and write
6171000
trusted library allocation
page read and write
2E7D000
stack
page read and write
5AF8000
trusted library allocation
page read and write
3200000
heap
page read and write
31FD000
trusted library allocation
page execute and read and write
8A7E000
stack
page read and write
314E000
stack
page read and write
75F9000
heap
page read and write
6AED000
stack
page read and write
8760000
trusted library allocation
page read and write
4734000
trusted library allocation
page read and write
7842000
heap
page read and write
640C000
stack
page read and write
2360000
heap
page read and write
A78000
heap
page read and write
439E000
stack
page read and write
8DCE000
stack
page read and write
4230000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
43BC000
stack
page read and write
72CE000
stack
page read and write
74D0000
trusted library allocation
page read and write
430E000
stack
page read and write
2A63000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
2947000
heap
page read and write
780F000
heap
page read and write
865B000
trusted library allocation
page read and write
3050000
heap
page read and write
2F60000
heap
page read and write
435E000
stack
page read and write
5070000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
47E0000
heap
page execute and read and write
6C1E000
stack
page read and write
87CC000
heap
page read and write
7120000
trusted library allocation
page read and write
4B38000
trusted library allocation
page read and write
8C4E000
stack
page read and write
2880000
heap
page readonly
29F2000
trusted library allocation
page read and write
2728000
stack
page read and write
73FA000
stack
page read and write
8698000
heap
page read and write
861E000
stack
page read and write
2FCE000
unkown
page read and write
759E000
stack
page read and write
741E000
stack
page read and write
845D000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
4690000
heap
page execute and read and write
857E000
stack
page read and write
76BC000
heap
page read and write
B30000
heap
page read and write
4BE0000
trusted library allocation
page execute and read and write
3087000
heap
page read and write
84A0000
heap
page read and write
2710000
trusted library allocation
page read and write
736E000
stack
page read and write
7270000
heap
page execute and read and write
76AC000
heap
page read and write
315D000
stack
page read and write
46B8000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
5D8C000
stack
page read and write
4A10000
trusted library allocation
page read and write
594E000
stack
page read and write
745E000
stack
page read and write
85FD000
stack
page read and write
8610000
trusted library allocation
page read and write
7ABD000
stack
page read and write
5874000
trusted library allocation
page read and write
AA1000
heap
page read and write
7FD20000
trusted library allocation
page execute and read and write
C9E000
stack
page read and write
6570000
heap
page read and write
8620000
trusted library allocation
page read and write
9C000
stack
page read and write
561000
unkown
page read and write
787E000
stack
page read and write
5177000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
2A78000
heap
page read and write
52BE000
stack
page read and write
6ED0000
heap
page read and write
658C000
heap
page read and write
2A24000
trusted library allocation
page read and write
795E000
stack
page read and write
547E000
stack
page read and write
29C3000
trusted library allocation
page execute and read and write
2A20000
trusted library allocation
page read and write
8B7E000
stack
page read and write
755E000
stack
page read and write
7A50000
trusted library allocation
page read and write
4ED0000
heap
page execute and read and write
2AFE000
trusted library allocation
page read and write
19D000
stack
page read and write
7B30000
trusted library allocation
page read and write
3031000
heap
page read and write
7A20000
trusted library allocation
page read and write
C4C000
heap
page read and write
4E70000
trusted library allocation
page execute and read and write
6170000
heap
page read and write
2CC6000
heap
page read and write
86CF000
heap
page read and write
79D0000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
7271000
heap
page read and write
71A5000
heap
page execute and read and write
4B20000
trusted library allocation
page read and write
A45000
heap
page read and write
31F3000
trusted library allocation
page execute and read and write
8E5D000
stack
page read and write
7280000
trusted library allocation
page read and write
568D000
trusted library allocation
page read and write
7275000
heap
page execute and read and write
2800000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
652000
unkown
page readonly
2D9D000
stack
page read and write
A78000
heap
page read and write
4695000
heap
page execute and read and write
7D90000
heap
page read and write
76AE000
stack
page read and write
61CC000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
4B70000
heap
page read and write
84CD000
trusted library allocation
page read and write
6F9E000
stack
page read and write
45C000
unkown
page write copy
4B33000
trusted library allocation
page execute and read and write
5858000
trusted library allocation
page read and write
8C7F000
stack
page read and write
5661000
trusted library allocation
page read and write
2FF0000
heap
page read and write
74E0000
trusted library allocation
page read and write
6AAE000
stack
page read and write
719E000
heap
page read and write
4650000
heap
page execute and read and write
4E18000
trusted library allocation
page read and write
270E000
stack
page read and write
89F0000
trusted library allocation
page read and write
49FD000
trusted library allocation
page execute and read and write
2C1D000
trusted library allocation
page execute and read and write
6159000
trusted library allocation
page read and write
885C000
heap
page read and write
4A8E000
stack
page read and write
4CF0000
heap
page read and write
768B000
heap
page read and write
85C0000
heap
page read and write
74B0000
trusted library allocation
page read and write
4671000
trusted library allocation
page read and write
7F10000
trusted library allocation
page execute and read and write
6EC000
stack
page read and write
B60000
heap
page read and write
B55000
heap
page read and write
712D000
stack
page read and write
2E30000
heap
page read and write
4B50000
trusted library allocation
page read and write
472C000
trusted library allocation
page read and write
28E7000
heap
page read and write
287E000
stack
page read and write
401000
unkown
page execute and write copy
680000
unkown
page readonly
2A35000
trusted library allocation
page read and write
45C0000
heap
page execute and read and write
55D4000
trusted library allocation
page read and write
AAA000
heap
page read and write
6065000
trusted library allocation
page read and write
724D000
stack
page read and write
288C000
stack
page read and write
84CB000
trusted library allocation
page read and write
6EFC000
stack
page read and write
CB3000
heap
page read and write
48CD000
trusted library allocation
page read and write
62FC000
trusted library allocation
page read and write
193000
stack
page read and write
4D70000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page execute and read and write
2E50000
heap
page read and write
4679000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
76C5000
heap
page read and write
A78000
heap
page read and write
73BE000
stack
page read and write
7B70000
trusted library allocation
page read and write
870E000
stack
page read and write
84FE000
stack
page read and write
6180000
heap
page read and write
9AE000
stack
page read and write
71C6000
heap
page read and write
2E40000
heap
page read and write
74BE000
stack
page read and write
6F00000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
780B000
heap
page read and write
446E000
stack
page read and write
70D0000
trusted library allocation
page read and write
8720000
heap
page read and write
8BCE000
stack
page read and write
541A000
trusted library allocation
page read and write
72FB000
stack
page read and write
7780000
heap
page read and write
46A000
unkown
page read and write
7620000
trusted library allocation
page read and write
7150000
heap
page read and write
716B000
stack
page read and write
6E5E000
stack
page read and write
8460000
trusted library allocation
page read and write
6F2E000
stack
page read and write
460E000
stack
page read and write
7A30000
trusted library allocation
page read and write
720E000
stack
page read and write
4CE0000
trusted library allocation
page read and write
6F5E000
stack
page read and write
78FD000
stack
page read and write
A95000
heap
page read and write
5357000
trusted library allocation
page read and write
2C14000
trusted library allocation
page read and write
4B34000
trusted library allocation
page read and write
A47000
heap
page read and write
2AEC000
trusted library allocation
page read and write
650000
unkown
page readonly
8694000
heap
page read and write
7631000
heap
page read and write
783E000
stack
page read and write
76DF000
heap
page read and write
2C00000
trusted library allocation
page read and write
A47000
heap
page read and write
4B30000
trusted library allocation
page read and write
73AE000
stack
page read and write
401000
unkown
page execute and write copy
2F0E000
stack
page read and write
2740000
trusted library allocation
page read and write
4E6C000
stack
page read and write
762C000
heap
page read and write
30E1000
heap
page read and write
D40000
trusted library allocation
page read and write
2B05000
heap
page read and write
300D000
stack
page read and write
CB0000
heap
page read and write
6930000
heap
page read and write
7846000
heap
page read and write
709D000
stack
page read and write
4956000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
8B60000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
659E000
heap
page read and write
316E000
unkown
page read and write
46E3000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
43BC000
trusted library allocation
page read and write
7F7A0000
trusted library allocation
page execute and read and write
7150000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
712E000
stack
page read and write
2C80000
trusted library allocation
page execute and read and write
3190000
heap
page read and write
7B73000
trusted library allocation
page read and write
31EE000
stack
page read and write
2EF5000
heap
page read and write
705E000
stack
page read and write
74F0000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
7711000
heap
page read and write
7520000
heap
page read and write
714D000
stack
page read and write
2B1E000
unkown
page read and write
473D000
trusted library allocation
page read and write
2D0C000
heap
page read and write
A98000
heap
page read and write
9C0000
heap
page read and write
7930000
trusted library allocation
page read and write
2A8F000
stack
page read and write
87D0000
heap
page read and write
3030000
heap
page read and write
31F0000
trusted library allocation
page read and write
2B80000
trusted library allocation
page execute and read and write
7170000
trusted library allocation
page read and write
4B49000
trusted library allocation
page read and write
30ED000
heap
page read and write
8694000
heap
page read and write
8450000
trusted library allocation
page read and write
763F000
heap
page read and write
8B70000
trusted library allocation
page read and write
7624000
heap
page read and write
52A6000
trusted library allocation
page read and write
5AFE000
stack
page read and write
6F23000
heap
page read and write
71A0000
heap
page execute and read and write
76E2000
heap
page read and write
76E6000
heap
page read and write
27B0000
trusted library allocation
page read and write
718B000
stack
page read and write
8863000
heap
page read and write
2E87000
heap
page read and write
2C8F000
stack
page read and write
31A0000
remote allocation
page read and write
272D000
stack
page read and write
8580000
heap
page read and write
510E000
stack
page read and write
AA9000
heap
page read and write
6021000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
8688000
heap
page read and write
7A70000
trusted library allocation
page read and write
467E000
stack
page read and write
7160000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
7668000
heap
page read and write
77F2000
heap
page read and write
739E000
stack
page read and write
2AA7000
heap
page read and write
86F5000
heap
page read and write
2E78000
stack
page read and write
68AE000
stack
page read and write
7890000
trusted library allocation
page read and write
8876000
heap
page read and write
76D9000
heap
page read and write
87C0000
heap
page read and write
23EF000
unkown
page read and write
7A60000
trusted library allocation
page read and write
7643000
heap
page read and write
6151000
trusted library allocation
page read and write
6A8C000
stack
page read and write
4310000
heap
page execute and read and write
6C2E000
stack
page read and write
71ED000
stack
page read and write
707E000
stack
page read and write
4410000
trusted library allocation
page read and write
870B000
heap
page read and write
6BDE000
stack
page read and write
8D8E000
stack
page read and write
602C000
stack
page read and write
88A0000
trusted library allocation
page execute and read and write
8D0E000
stack
page read and write
47FC000
trusted library allocation
page read and write
2C13000
trusted library allocation
page execute and read and write
7110000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
3368000
heap
page read and write
654E000
stack
page read and write
43DA000
trusted library allocation
page read and write
2D5C000
stack
page read and write
6304000
trusted library allocation
page read and write
4B60000
trusted library allocation
page execute and read and write
50CF000
stack
page read and write
5A86000
trusted library allocation
page read and write
7B90000
heap
page read and write
517D000
stack
page read and write
29C4000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
FF0000
heap
page read and write
4992000
trusted library allocation
page read and write
8690000
heap
page read and write
C52000
heap
page read and write
4A22000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
6E77000
heap
page read and write
46D5000
trusted library allocation
page read and write
6820000
heap
page execute and read and write
48C4000
trusted library allocation
page read and write
8802000
heap
page read and write
D50000
heap
page read and write
4A22000
trusted library allocation
page read and write
701E000
stack
page read and write
7AF0000
trusted library allocation
page read and write
52FE000
stack
page read and write
48D0000
trusted library allocation
page read and write
6F9F000
stack
page read and write
29C9000
trusted library allocation
page read and write
6FF0000
heap
page read and write
5738000
trusted library allocation
page read and write
4AE6000
trusted library allocation
page read and write
29F7000
trusted library allocation
page execute and read and write
71B3000
heap
page read and write
5021000
trusted library allocation
page read and write
8688000
heap
page read and write
4C3E000
stack
page read and write
32EE000
stack
page read and write
43DE000
trusted library allocation
page read and write
6FF0000
heap
page execute and read and write
43F2000
trusted library allocation
page read and write
79CE000
stack
page read and write
8A10000
trusted library allocation
page read and write
8B73000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
2D8F000
stack
page read and write
6DFB000
stack
page read and write
72ED000
stack
page read and write
8A33000
trusted library allocation
page read and write
4B3D000
trusted library allocation
page execute and read and write
61D4000
trusted library allocation
page read and write
45DE000
stack
page read and write
8640000
heap
page read and write
8880000
trusted library allocation
page execute and read and write
6E7F000
heap
page read and write
6B9B000
stack
page read and write
A50000
heap
page read and write
7240000
trusted library allocation
page read and write
72D2000
trusted library allocation
page read and write
3240000
heap
page read and write
289D000
unkown
page read and write
8A20000
trusted library allocation
page read and write
4C9C000
stack
page read and write
4E00000
heap
page readonly
5893000
trusted library allocation
page read and write
644E000
stack
page read and write
8A20000
trusted library allocation
page read and write
A78000
heap
page read and write
786A000
trusted library allocation
page read and write
7260000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
46FE000
stack
page read and write
6E53000
heap
page read and write
292A000
heap
page read and write
75D0000
heap
page read and write
A91000
heap
page read and write
49F3000
trusted library allocation
page execute and read and write
6F5E000
stack
page read and write
B9A000
heap
page read and write
66A000
unkown
page read and write
27D0000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
6E9E000
stack
page read and write
49AA000
trusted library allocation
page read and write
2960000
heap
page read and write
4D4A000
trusted library allocation
page execute and read and write
29AF000
stack
page read and write
A47000
heap
page read and write
6A6E000
stack
page read and write
7510000
trusted library allocation
page read and write
5015000
trusted library allocation
page read and write
8690000
heap
page read and write
27D3000
trusted library allocation
page execute and read and write
7AC0000
trusted library allocation
page read and write
6FF1000
heap
page read and write
7A10000
trusted library allocation
page read and write
6049000
trusted library allocation
page read and write
7A3E000
stack
page read and write
2F95000
heap
page read and write
2F20000
heap
page read and write
B9E000
heap
page read and write
930000
heap
page read and write
720E000
stack
page read and write
527A000
stack
page read and write
718C000
heap
page read and write
2C98000
heap
page read and write
6FDE000
stack
page read and write
29BD000
trusted library allocation
page read and write
297E000
heap
page read and write
7A00000
trusted library allocation
page read and write
29C6000
trusted library allocation
page read and write
A3A000
heap
page read and write
A9A000
heap
page read and write
AB3000
heap
page read and write
8C3E000
stack
page read and write
5140000
heap
page execute and read and write
2AD4000
heap
page read and write
4FE9000
stack
page read and write
7470000
trusted library allocation
page read and write
48C7000
trusted library allocation
page read and write
3197000
heap
page read and write
7672000
heap
page read and write
61B4000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
5F2C000
stack
page read and write
B90000
heap
page read and write
8CCE000
stack
page read and write
6E37000
heap
page read and write
7638000
heap
page read and write
71A6000
heap
page read and write
7CB0000
trusted library allocation
page execute and read and write
874C000
heap
page read and write
8D4B000
stack
page read and write
54DC000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
6F05000
heap
page read and write
A78000
heap
page read and write
84A0000
trusted library allocation
page execute and read and write
8680000
heap
page read and write
5EC1000
trusted library allocation
page read and write
74FB000
stack
page read and write
2AD0000
heap
page read and write
71F0000
trusted library allocation
page read and write
2D23000
heap
page read and write
476C000
trusted library allocation
page read and write
2B46000
heap
page read and write
4B60000
trusted library allocation
page read and write
865D000
trusted library allocation
page read and write
434E000
stack
page read and write
749C000
trusted library allocation
page read and write
2B42000
heap
page read and write
6F3F000
heap
page read and write
84D0000
trusted library allocation
page read and write
871A000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
68EE000
stack
page read and write
4ACE000
stack
page read and write
72D0000
trusted library allocation
page read and write
493000
unkown
page read and write
56BF000
trusted library allocation
page read and write
85DE000
stack
page read and write
2C45000
trusted library allocation
page execute and read and write
2A10000
heap
page read and write
815000
heap
page read and write
4B65000
trusted library allocation
page execute and read and write
71CE000
stack
page read and write
2FCB000
heap
page read and write
4489000
trusted library allocation
page read and write
46C4000
trusted library allocation
page read and write
76E0000
heap
page execute and read and write
584A000
trusted library allocation
page read and write
77EA000
heap
page read and write
596B000
trusted library allocation
page read and write
798E000
stack
page read and write
5819000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
48FC000
trusted library allocation
page read and write
87C8000
heap
page read and write
4B3C000
stack
page read and write
2B1A000
heap
page read and write
A89000
heap
page read and write
79F0000
trusted library allocation
page execute and read and write
2A70000
heap
page read and write
2A96000
trusted library allocation
page read and write
630E000
stack
page read and write
79F0000
trusted library allocation
page read and write
D0E000
stack
page read and write
7189000
stack
page read and write
2A2F000
trusted library allocation
page read and write
4661000
trusted library allocation
page read and write
2F8E000
unkown
page read and write
C06000
heap
page read and write
5151000
trusted library allocation
page read and write
79DD000
stack
page read and write
7A30000
trusted library allocation
page read and write
7D30000
heap
page read and write
6C30000
heap
page read and write
A47000
heap
page read and write
AAA000
heap
page read and write
7039000
stack
page read and write
3058000
heap
page read and write
6CC1000
heap
page read and write
2C47000
trusted library allocation
page execute and read and write
2807000
trusted library allocation
page execute and read and write
30D3000
heap
page read and write
4CF7000
heap
page read and write
3230000
trusted library allocation
page read and write
4DFE000
stack
page read and write
4BD0000
heap
page readonly
7723000
heap
page read and write
873F000
heap
page read and write
5EE1000
trusted library allocation
page read and write
87D8000
heap
page read and write
4ECE000
stack
page read and write
658A000
heap
page read and write
4FAD000
stack
page read and write
6F32000
heap
page read and write
58F7000
trusted library allocation
page read and write
3249000
heap
page read and write
A78000
heap
page read and write
2F27000
heap
page read and write
7530000
trusted library allocation
page read and write
686E000
stack
page read and write
2A92000
trusted library allocation
page read and write
2C90000
heap
page read and write
67BD000
stack
page read and write
6F0E000
heap
page read and write
7AE0000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
78BE000
stack
page read and write
7460000
trusted library allocation
page execute and read and write
8A00000
trusted library allocation
page read and write
C4E000
heap
page read and write
743D000
stack
page read and write
6FAE000
stack
page read and write
76BF000
heap
page read and write
8BBE000
stack
page read and write
A45000
heap
page read and write
749F000
stack
page read and write
4AD0000
heap
page readonly
44C000
unkown
page readonly
89E0000
trusted library allocation
page execute and read and write
7FB68000
trusted library allocation
page execute and read and write
A41000
heap
page read and write
27E0000
trusted library allocation
page read and write
A78000
heap
page read and write
88BF000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
29A5000
heap
page read and write
61B9000
trusted library allocation
page read and write
86FA000
heap
page read and write
457E000
stack
page read and write
84B0000
trusted library allocation
page execute and read and write
8670000
heap
page read and write
732B000
stack
page read and write
28B0000
heap
page read and write
7200000
trusted library allocation
page execute and read and write
4A09000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
6E7B000
heap
page read and write
31A0000
remote allocation
page read and write
9CA000
heap
page read and write
8680000
heap
page read and write
6B6E000
stack
page read and write
305E000
stack
page read and write
2AAB000
trusted library allocation
page read and write
692A000
stack
page read and write
672E000
stack
page read and write
2820000
trusted library allocation
page read and write
2DF0000
heap
page read and write
84C0000
trusted library allocation
page read and write
447B000
trusted library allocation
page read and write
6F43000
heap
page read and write
4D52000
trusted library allocation
page read and write
78D2000
heap
page read and write
70B0000
trusted library allocation
page read and write
2E58000
heap
page read and write
8590000
trusted library allocation
page read and write
7B50000
heap
page read and write
67FB000
stack
page read and write
7A62000
trusted library allocation
page read and write
28A0000
heap
page read and write
2A38000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
747A000
stack
page read and write
2830000
heap
page read and write
8714000
heap
page read and write
85E0000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
2AF7000
heap
page read and write
7EC000
stack
page read and write
46A7000
trusted library allocation
page read and write
8C0D000
stack
page read and write
6B5D000
stack
page read and write
7AA0000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
7686000
heap
page read and write
74A0000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
76EE000
stack
page read and write
30BC000
heap
page read and write
8060000
heap
page read and write
4D39000
trusted library allocation
page read and write
D33000
trusted library allocation
page execute and read and write
71A4000
heap
page read and write
2E3C000
stack
page read and write
46D8000
trusted library allocation
page read and write
3360000
heap
page read and write
8BFF000
stack
page read and write
5DCE000
stack
page read and write
6EA0000
trusted library allocation
page read and write
400000
unkown
page readonly
764D000
heap
page read and write
464D000
stack
page read and write
868C000
heap
page read and write
46FA000
trusted library allocation
page read and write
4350000
heap
page readonly
29D9000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
2802000
trusted library allocation
page read and write
7320000
heap
page read and write
A91000
heap
page read and write
86FC000
heap
page read and write
4AAE000
stack
page read and write
A96000
heap
page read and write
7771000
heap
page read and write
45C5000
heap
page execute and read and write
285D000
unkown
page read and write
6CAE000
stack
page read and write
6EF0000
heap
page execute and read and write
7A00000
trusted library allocation
page read and write
7177000
heap
page read and write
8680000
heap
page read and write
4B77000
heap
page read and write
2B7E000
stack
page read and write
7CD0000
trusted library allocation
page read and write
4414000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
2ED6000
heap
page read and write
45C6000
trusted library allocation
page read and write
6825000
heap
page execute and read and write
62F5000
trusted library allocation
page read and write
6F3B000
heap
page read and write
709F000
stack
page read and write
8CFF000
stack
page read and write
6A2B000
stack
page read and write
1F0000
heap
page read and write
54C0000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
86C2000
heap
page read and write
74DE000
stack
page read and write
616E000
stack
page read and write
730B000
stack
page read and write
73DF000
stack
page read and write
4400000
trusted library allocation
page execute and read and write
28FE000
stack
page read and write
26EC000
stack
page read and write
51AA000
trusted library allocation
page read and write
6CFE000
stack
page read and write
4F22000
trusted library allocation
page read and write
5A8E000
stack
page read and write
8698000
heap
page read and write
7AC0000
trusted library allocation
page read and write
85D7000
trusted library allocation
page read and write
8660000
trusted library allocation
page execute and read and write
7140000
heap
page read and write
6E64000
heap
page read and write
A41000
heap
page read and write
863E000
stack
page read and write
4EC1000
trusted library allocation
page read and write
4C48000
trusted library allocation
page read and write
AAC000
heap
page read and write
67D000
unkown
page read and write
8A8E000
stack
page read and write
86D6000
heap
page read and write
8745000
heap
page read and write
70A0000
trusted library allocation
page execute and read and write
43FE000
stack
page read and write
6E48000
heap
page read and write
5C8E000
stack
page read and write
4BCE000
stack
page read and write
4865000
trusted library allocation
page read and write
58F3000
trusted library allocation
page read and write
4848000
trusted library allocation
page read and write
CCD000
stack
page read and write
6F2D000
heap
page read and write
2840000
heap
page execute and read and write
870B000
heap
page read and write
A12000
heap
page read and write
8B80000
trusted library allocation
page execute and read and write
D30000
trusted library allocation
page read and write
7F7B8000
trusted library allocation
page execute and read and write
BD0000
heap
page read and write
680000
unkown
page readonly
84B0000
heap
page read and write
2B90000
heap
page read and write
7640000
heap
page execute and read and write
A31000
heap
page read and write
2F25000
heap
page read and write
722E000
stack
page read and write
8ABE000
stack
page read and write
A78000
heap
page read and write
6C3D000
stack
page read and write
705E000
stack
page read and write
8754000
heap
page read and write
27C0000
heap
page read and write
598D000
stack
page read and write
49F0000
trusted library allocation
page read and write
4EEC000
stack
page read and write
70BF000
stack
page read and write
6B2A000
stack
page read and write
4839000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
8D0D000
stack
page read and write
31AE000
stack
page read and write
7B10000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
8590000
trusted library allocation
page execute and read and write
C42000
heap
page read and write
44A0000
heap
page read and write
7753000
heap
page read and write
4809000
trusted library allocation
page read and write
4590000
heap
page read and write
4D55000
trusted library allocation
page execute and read and write
6DF9000
heap
page read and write
2E7B000
heap
page read and write
29F0000
trusted library allocation
page read and write
428E000
stack
page read and write
6BEE000
stack
page read and write
4E8F000
stack
page read and write
6FF5000
heap
page execute and read and write
2C10000
trusted library allocation
page read and write
45C000
unkown
page write copy
76EE000
heap
page read and write
8890000
trusted library allocation
page read and write
7A7E000
stack
page read and write
6054000
trusted library allocation
page read and write
501D000
stack
page read and write
6F0A000
heap
page read and write
29A7000
heap
page read and write
2DCE000
stack
page read and write
4EA0000
heap
page read and write
4B5A000
trusted library allocation
page execute and read and write
7A20000
trusted library allocation
page read and write
2FF5000
heap
page read and write
8A00000
trusted library allocation
page read and write
7689000
heap
page read and write
8684000
heap
page read and write
799E000
stack
page read and write
8743000
heap
page read and write
3209000
heap
page read and write
8440000
trusted library allocation
page execute and read and write
845B000
trusted library allocation
page read and write
E5F000
stack
page read and write
4F2E000
stack
page read and write
657B000
heap
page read and write
72B0000
trusted library allocation
page read and write
86E2000
heap
page read and write
27D4000
trusted library allocation
page read and write
776E000
stack
page read and write
6F00000
trusted library allocation
page read and write
2805000
trusted library allocation
page execute and read and write
A78000
heap
page read and write
307B000
heap
page read and write
85D0000
trusted library allocation
page read and write
FF7000
heap
page read and write
86C2000
heap
page read and write
8750000
trusted library allocation
page read and write
6C7A000
stack
page read and write
28A0000
heap
page read and write
41EC000
stack
page read and write
4A1A000
trusted library allocation
page execute and read and write
765C000
heap
page read and write
533E000
stack
page read and write
55B000
unkown
page read and write
4D2E000
stack
page read and write
There are 1171 hidden memdumps, click here to show them.