IOC Report
FBVmDbz2nb.exe

loading gif

Files

File Path
Type
Category
Malicious
FBVmDbz2nb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\225E7CNEQKY05J8BSS2KINA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RBZFTNPOH3OCI4WNHGK52I3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\225E7CNEQKY05J8BSS2KINA.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FBVmDbz2nb.exe
"C:\Users\user\Desktop\FBVmDbz2nb.exe"
malicious
C:\Users\user\AppData\Local\Temp\225E7CNEQKY05J8BSS2KINA.exe
"C:\Users\user\AppData\Local\Temp\225E7CNEQKY05J8BSS2KINA.exe"
malicious
C:\Users\user\AppData\Local\Temp\RBZFTNPOH3OCI4WNHGK52I3.exe
"C:\Users\user\AppData\Local\Temp\RBZFTNPOH3OCI4WNHGK52I3.exe"
malicious

URLs

Name
IP
Malicious
cuddlyready.xyz
malicious
https://cuddlyready.xyz/api
104.21.32.96
malicious
sendypaster.xyz
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.16/off/def.exe_
unknown
http://185.215.113.16:80/steam/random.exeDateProxy-Connectionkeep-aliveConnectionCache-Control
unknown
https://cuddlyready.xyz/pi
unknown
https://cuddlyready.xyz/
unknown
https://cuddlyready.xyz/qR
unknown
http://185.215.113.16/steam/random.exeq
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/off/def.exeN
unknown
https://cuddlyready.xyz/l
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5
unknown
steppriflej.xyz
https://cuddlyready.xyz/d
unknown
smash-boiling.cyou
http://185.215.113.206/c4becf79229cb002.phpfg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://cuddlyready.xyz/o
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta
unknown
supporse-comment.cyou
hosue-billowy.cyou
http://185.215.113.16/steam/random.exeX
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://185.215.113.16:80/steam/random.exe
unknown
https://cuddlyready.xyz:443/apii
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://cuddlyready.xyz/api2
unknown
http://185.215.113.16/steam/random.exe
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://185.215.113.206/c4becf79229cb002.phpZg
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.
unknown
https://cuddlyready.xyz/apioh
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://cuddlyready.xyz/apiZ
unknown
ripe-blade.cyou
https://cuddlyready.xyz:443/api
unknown
greywe-snotty.cyou
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16/steam/random.exeQV
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://cuddlyready.xyz/apig
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/off/def.exe
unknown
http://185.215.113.206
unknown
pollution-raker.cyou
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 52 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cuddlyready.xyz
104.21.32.96
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
104.21.32.96
cuddlyready.xyz
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4D40000
direct allocation
page read and write
malicious
531000
unkown
page execute and read and write
malicious
118C000
heap
page read and write
malicious
FC4000
heap
page read and write
5ED8000
trusted library allocation
page read and write
5ECA000
trusted library allocation
page read and write
4EE1000
heap
page read and write
2BA000
unkown
page execute and write copy
62D8000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
647E000
trusted library allocation
page read and write
62D4000
trusted library allocation
page read and write
6FAF000
stack
page read and write
63C4000
trusted library allocation
page read and write
637B000
trusted library allocation
page read and write
48C1000
heap
page read and write
2C6000
unkown
page execute and write copy
642E000
trusted library allocation
page read and write
1600000
heap
page read and write
62D9000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
6541000
trusted library allocation
page read and write
2B2000
unkown
page execute and write copy
6584000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
15EB000
heap
page read and write
387F000
stack
page read and write
5E6A000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
4EE1000
heap
page read and write
FC4000
heap
page read and write
5ED2000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
1583000
heap
page read and write
5EF5000
trusted library allocation
page read and write
5EC7000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
639D000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
647A000
trusted library allocation
page read and write
15B3000
heap
page read and write
5F38000
trusted library allocation
page read and write
4EE1000
heap
page read and write
110E000
stack
page read and write
AE4000
heap
page read and write
BC1000
unkown
page execute and write copy
FC4000
heap
page read and write
63EF000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
FC4000
heap
page read and write
64E8000
trusted library allocation
page read and write
5EBE000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
62D5000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
4D2000
unkown
page execute and read and write
63CE000
trusted library allocation
page read and write
5EC7000
trusted library allocation
page read and write
157D000
heap
page read and write
5EB1000
trusted library allocation
page read and write
63E9000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
FC4000
heap
page read and write
62D4000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
5F38000
trusted library allocation
page read and write
1600000
heap
page read and write
15B8000
heap
page read and write
636A000
trusted library allocation
page read and write
62E2000
trusted library allocation
page read and write
6047000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
15AA000
heap
page read and write
5ED2000
trusted library allocation
page read and write
A16000
unkown
page execute and write copy
5ED4000
trusted library allocation
page read and write
4DC000
unkown
page execute and write copy
FC4000
heap
page read and write
4EE1000
heap
page read and write
63F9000
trusted library allocation
page read and write
FC4000
heap
page read and write
6568000
trusted library allocation
page read and write
5812000
heap
page read and write
5EE5000
trusted library allocation
page read and write
502000
unkown
page execute and read and write
49BE000
stack
page read and write
15C0000
heap
page read and write
36DE000
stack
page read and write
62DC000
trusted library allocation
page read and write
637A000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
2B2000
unkown
page execute and read and write
1130000
direct allocation
page read and write
AE4000
heap
page read and write
63F5000
trusted library allocation
page read and write
159A000
heap
page read and write
556000
unkown
page execute and write copy
9F5000
unkown
page execute and write copy
AE4000
heap
page read and write
157D000
heap
page read and write
6134000
trusted library allocation
page read and write
63C1000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
5ECC000
trusted library allocation
page read and write
FC4000
heap
page read and write
5F03000
trusted library allocation
page read and write
5ED8000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
5BE000
unkown
page execute and read and write
5F49000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
FC4000
heap
page read and write
3C3F000
stack
page read and write
47C4000
trusted library allocation
page read and write
43D000
unkown
page execute and read and write
AE4000
heap
page read and write
5E42000
trusted library allocation
page read and write
3A5F000
stack
page read and write
FC4000
heap
page read and write
62DA000
trusted library allocation
page read and write
11CA000
heap
page read and write
5ECC000
trusted library allocation
page read and write
4CA000
unkown
page execute and read and write
FC4000
heap
page read and write
48C1000
heap
page read and write
49FC000
stack
page read and write
EBA000
unkown
page execute and write copy
116E000
heap
page read and write
5EF5000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
FC4000
heap
page read and write
319F000
stack
page read and write
5EB0000
trusted library allocation
page read and write
9F2000
unkown
page execute and write copy
62DC000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
6545000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
97B000
unkown
page execute and write copy
AE0000
heap
page read and write
6385000
trusted library allocation
page read and write
AE4000
heap
page read and write
1626000
heap
page read and write
FC4000
heap
page read and write
62DE000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
AE4000
heap
page read and write
62D6000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
265F000
stack
page read and write
1609000
heap
page read and write
64E4000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
4DB000
unkown
page execute and read and write
9B0000
heap
page read and write
160E000
heap
page read and write
5E42000
trusted library allocation
page read and write
6427000
trusted library allocation
page read and write
63BB000
trusted library allocation
page read and write
8F3000
unkown
page execute and read and write
48BF000
stack
page read and write
5EF5000
trusted library allocation
page read and write
FC4000
heap
page read and write
5F14000
trusted library allocation
page read and write
6467000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
6501000
trusted library allocation
page read and write
AAC000
stack
page read and write
62D6000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
639A000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
63D2000
trusted library allocation
page read and write
5F52000
trusted library allocation
page read and write
39FE000
stack
page read and write
AE4000
heap
page read and write
5EB8000
trusted library allocation
page read and write
AE4000
heap
page read and write
5F5F000
trusted library allocation
page read and write
10CE000
stack
page read and write
5ECE000
trusted library allocation
page read and write
6441000
trusted library allocation
page read and write
3EBF000
stack
page read and write
5370000
direct allocation
page read and write
AE4000
heap
page read and write
FC4000
heap
page read and write
47CD000
trusted library allocation
page execute and read and write
54F0000
direct allocation
page execute and read and write
2E1E000
stack
page read and write
FC4000
heap
page read and write
2B6000
unkown
page write copy
97A000
heap
page read and write
15B6000
heap
page read and write
5EC9000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
5E84000
trusted library allocation
page read and write
345E000
stack
page read and write
15AA000
heap
page read and write
62DD000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
1607000
heap
page read and write
FC4000
heap
page read and write
5F69000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
159A000
heap
page read and write
5E8A000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
FC4000
heap
page read and write
11D4000
heap
page read and write
5E35000
trusted library allocation
page read and write
331E000
stack
page read and write
646D000
trusted library allocation
page read and write
15AA000
heap
page read and write
2C3C000
stack
page read and write
AE4000
heap
page read and write
5EAF000
trusted library allocation
page read and write
641C000
trusted library allocation
page read and write
1583000
heap
page read and write
AE4000
heap
page read and write
4EE1000
heap
page read and write
62D7000
trusted library allocation
page read and write
AE4000
heap
page read and write
62D0000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
FC4000
heap
page read and write
5F56000
trusted library allocation
page read and write
6511000
trusted library allocation
page read and write
FC4000
heap
page read and write
5F05000
trusted library allocation
page read and write
381E000
stack
page read and write
AE4000
heap
page read and write
4F5000
unkown
page execute and write copy
60AC000
trusted library allocation
page read and write
2B0000
unkown
page read and write
5EBB000
trusted library allocation
page read and write
3D7F000
stack
page read and write
62D9000
trusted library allocation
page read and write
638C000
trusted library allocation
page read and write
646A000
trusted library allocation
page read and write
AE4000
heap
page read and write
553B000
trusted library allocation
page read and write
5F0C000
trusted library allocation
page read and write
59D0000
remote allocation
page read and write
62D8000
trusted library allocation
page read and write
1127000
heap
page read and write
5E50000
trusted library allocation
page read and write
AE4000
heap
page read and write
F5E000
stack
page read and write
4AA000
unkown
page execute and read and write
62D7000
trusted library allocation
page read and write
92C000
unkown
page execute and write copy
15A1000
heap
page read and write
62DD000
trusted library allocation
page read and write
5E3B000
trusted library allocation
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
5ED2000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
AB0000
heap
page read and write
5E60000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
53F000
unkown
page execute and write copy
5DF000
unkown
page execute and read and write
AE4000
heap
page read and write
341F000
stack
page read and write
62D7000
trusted library allocation
page read and write
AE4000
heap
page read and write
4807000
trusted library allocation
page execute and read and write
5EC9000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
AE4000
heap
page read and write
4B1000
unkown
page execute and write copy
A02000
unkown
page execute and write copy
972000
unkown
page execute and read and write
A00000
unkown
page execute and write copy
363E000
stack
page read and write
5EB7000
trusted library allocation
page read and write
2FFE000
stack
page read and write
4E7F000
stack
page read and write
5EAC000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
8F0000
unkown
page execute and read and write
637F000
trusted library allocation
page read and write
323F000
stack
page read and write
5EF5000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
6432000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
63BE000
trusted library allocation
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
5E4B000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
A17000
unkown
page execute and write copy
62DA000
trusted library allocation
page read and write
77C000
unkown
page execute and write copy
5EB0000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
FC4000
heap
page read and write
15B3000
heap
page read and write
434000
unkown
page execute and read and write
940000
unkown
page execute and read and write
5EF5000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
3E1F000
stack
page read and write
9CC000
heap
page read and write
62D7000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
1597000
heap
page read and write
3EFE000
stack
page read and write
62D2000
trusted library allocation
page read and write
47F0000
direct allocation
page execute and read and write
47E0000
direct allocation
page read and write
641B000
trusted library allocation
page read and write
6505000
trusted library allocation
page read and write
FC4000
heap
page read and write
62D9000
trusted library allocation
page read and write
FC4000
heap
page read and write
6137000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
34FE000
stack
page read and write
5EE4000
trusted library allocation
page read and write
63EB000
trusted library allocation
page read and write
AE4000
heap
page read and write
62D3000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
4970000
direct allocation
page execute and read and write
6572000
trusted library allocation
page read and write
641D000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
FC4000
heap
page read and write
4660000
direct allocation
page read and write
64DE000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
642D000
trusted library allocation
page read and write
FC4000
heap
page read and write
512F000
stack
page read and write
FC4000
heap
page read and write
53BF000
stack
page read and write
62DD000
trusted library allocation
page read and write
64C1000
trusted library allocation
page read and write
63D6000
trusted library allocation
page read and write
640D000
trusted library allocation
page read and write
62D4000
trusted library allocation
page read and write
6421000
trusted library allocation
page read and write
2BFF000
stack
page read and write
5F7D000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
5EFB000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
11B1000
heap
page read and write
447000
unkown
page execute and write copy
3F5F000
stack
page read and write
5EE5000
trusted library allocation
page read and write
5E64000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
449000
unkown
page execute and read and write
157E000
heap
page read and write
FC4000
heap
page read and write
77A000
unkown
page write copy
64FF000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
558000
unkown
page execute and write copy
AE4000
heap
page read and write
5E42000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
5EC3000
trusted library allocation
page read and write
6375000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
62DF000
trusted library allocation
page read and write
62D5000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
6141000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
40DE000
stack
page read and write
4E90000
direct allocation
page execute and read and write
269B000
stack
page read and write
5E3D000
trusted library allocation
page read and write
62D2000
trusted library allocation
page read and write
FC4000
heap
page read and write
5E9F000
trusted library allocation
page read and write
6142000
trusted library allocation
page read and write
5E8A000
trusted library allocation
page read and write
395D000
stack
page read and write
15B3000
heap
page read and write
4EBE000
stack
page read and write
4680000
direct allocation
page read and write
FC4000
heap
page read and write
5EB7000
trusted library allocation
page read and write
433000
unkown
page execute and write copy
6566000
trusted library allocation
page read and write
62D3000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EF5000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
417000
unkown
page execute and read and write
63F2000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EE5000
trusted library allocation
page read and write
5E52000
trusted library allocation
page read and write
643B000
trusted library allocation
page read and write
5EE1000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
5370000
direct allocation
page read and write
5EC7000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
6377000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
4EE1000
heap
page read and write
28DF000
stack
page read and write
2A5E000
stack
page read and write
FC4000
heap
page read and write
5EC3000
trusted library allocation
page read and write
FC0000
heap
page read and write
AE4000
heap
page read and write
FC4000
heap
page read and write
5EF5000
trusted library allocation
page read and write
62D3000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
38BE000
stack
page read and write
63C9000
trusted library allocation
page read and write
5F69000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
1609000
heap
page read and write
3AFF000
stack
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
1130000
direct allocation
page read and write
AE4000
heap
page read and write
5EFB000
trusted library allocation
page read and write
AE4000
heap
page read and write
FC4000
heap
page read and write
5EE4000
trusted library allocation
page read and write
54FD000
stack
page read and write
30C0000
direct allocation
page read and write
4680000
direct allocation
page read and write
3B3E000
stack
page read and write
6517000
trusted library allocation
page read and write
AE4000
heap
page read and write
556000
unkown
page execute and read and write
62DF000
trusted library allocation
page read and write
33BE000
stack
page read and write
FC4000
heap
page read and write
62D2000
trusted library allocation
page read and write
4F2000
unkown
page execute and write copy
30C0000
direct allocation
page read and write
160D000
heap
page read and write
4680000
direct allocation
page read and write
2B5F000
stack
page read and write
5EB6000
trusted library allocation
page read and write
907000
unkown
page execute and read and write
62DB000
trusted library allocation
page read and write
AE4000
heap
page read and write
915000
unkown
page execute and read and write
62D7000
trusted library allocation
page read and write
4691000
heap
page read and write
2C5000
unkown
page execute and read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
5EEB000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
FC4000
heap
page read and write
6400000
trusted library allocation
page read and write
63CB000
trusted library allocation
page read and write
657F000
trusted library allocation
page read and write
6045000
trusted library allocation
page read and write
6B42000
trusted library allocation
page read and write
63FD000
trusted library allocation
page read and write
AE4000
heap
page read and write
63E3000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
6478000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
9AB000
unkown
page execute and write copy
9AE000
unkown
page execute and read and write
5EE4000
trusted library allocation
page read and write
409F000
stack
page read and write
5ECB000
trusted library allocation
page read and write
5EBE000
trusted library allocation
page read and write
453E000
stack
page read and write
642C000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
FC4000
heap
page read and write
3DBE000
stack
page read and write
62D2000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
93D000
unkown
page execute and write copy
FC4000
heap
page read and write
6132000
trusted library allocation
page read and write
3BDE000
stack
page read and write
43C000
unkown
page execute and write copy
2E7F000
stack
page read and write
5EBD000
trusted library allocation
page read and write
FC4000
heap
page read and write
62D4000
trusted library allocation
page read and write
AE4000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
5F38000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
5E38000
trusted library allocation
page read and write
638E000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
1597000
heap
page read and write
62DC000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EAC000
trusted library allocation
page read and write
AE4000
heap
page read and write
11B5000
heap
page read and write
FC4000
heap
page read and write
5E6E000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
AE4000
heap
page read and write
62E4000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
646F000
trusted library allocation
page read and write
FC4000
heap
page read and write
5FCF000
trusted library allocation
page read and write
5FE000
stack
page read and write
54F0000
direct allocation
page execute and read and write
2B0000
unkown
page readonly
5F69000
trusted library allocation
page read and write
5640000
heap
page read and write
1626000
heap
page read and write
AE4000
heap
page read and write
6475000
trusted library allocation
page read and write
70EF000
stack
page read and write
96D000
unkown
page execute and read and write
AE4000
heap
page read and write
4A00000
trusted library allocation
page execute and read and write
54E0000
direct allocation
page execute and read and write
64E2000
trusted library allocation
page read and write
8FD000
unkown
page execute and write copy
485B000
stack
page read and write
590000
heap
page read and write
FC4000
heap
page read and write
4680000
direct allocation
page read and write
5EB5000
trusted library allocation
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
5EF5000
trusted library allocation
page read and write
15EB000
heap
page read and write
651D000
trusted library allocation
page read and write
5ED1000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
64C5000
trusted library allocation
page read and write
4C7000
unkown
page execute and write copy
6047000
trusted library allocation
page read and write
788000
unkown
page execute and write copy
AE4000
heap
page read and write
AE4000
heap
page read and write
6133000
trusted library allocation
page read and write
FC4000
heap
page read and write
5EBE000
trusted library allocation
page read and write
5F69000
trusted library allocation
page read and write
63D7000
trusted library allocation
page read and write
5370000
direct allocation
page read and write
5EF5000
trusted library allocation
page read and write
4EE1000
heap
page read and write
60A8000
trusted library allocation
page read and write
AE4000
heap
page read and write
5ED4000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
FC4000
heap
page read and write
5F7E000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
6429000
trusted library allocation
page read and write
5E84000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
AE4000
heap
page read and write
5E35000
trusted library allocation
page read and write
59D0000
remote allocation
page read and write
4680000
direct allocation
page read and write
5EAC000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
327E000
stack
page read and write
1612000
heap
page read and write
495E000
stack
page read and write
EF0000
heap
page read and write
5EF5000
trusted library allocation
page read and write
5E8A000
trusted library allocation
page read and write
AE4000
heap
page read and write
1627000
heap
page read and write
637E000
trusted library allocation
page read and write
AE4000
heap
page read and write
1583000
heap
page read and write
656C000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
62D2000
trusted library allocation
page read and write
5E56000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
639F000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
160D000
heap
page read and write
4D7E000
stack
page read and write
62D8000
trusted library allocation
page read and write
5F52000
trusted library allocation
page read and write
4B2E000
stack
page read and write
FC4000
heap
page read and write
5E63000
trusted library allocation
page read and write
15B5000
heap
page read and write
1626000
heap
page read and write
459000
unkown
page execute and read and write
3E5E000
stack
page read and write
6402000
trusted library allocation
page read and write
FC4000
heap
page read and write
1597000
heap
page read and write
77A000
unkown
page write copy
63CF000
trusted library allocation
page read and write
4A20000
heap
page read and write
62D5000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
62D3000
trusted library allocation
page read and write
C12000
unkown
page write copy
5E3D000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
FC4000
heap
page read and write
E10000
heap
page read and write
64E4000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
AE4000
heap
page read and write
1150000
direct allocation
page read and write
6408000
trusted library allocation
page read and write
990000
unkown
page execute and read and write
6379000
trusted library allocation
page read and write
904000
unkown
page execute and read and write
FC4000
heap
page read and write
62D3000
trusted library allocation
page read and write
1110000
heap
page read and write
62D8000
trusted library allocation
page read and write
15EB000
heap
page read and write
5EC9000
trusted library allocation
page read and write
4EE1000
heap
page read and write
FC4000
heap
page read and write
309E000
stack
page read and write
5E39000
trusted library allocation
page read and write
15EB000
heap
page read and write
AE4000
heap
page read and write
64D1000
trusted library allocation
page read and write
6378000
trusted library allocation
page read and write
47FA000
trusted library allocation
page execute and read and write
63F0000
trusted library allocation
page read and write
43FE000
stack
page read and write
6406000
trusted library allocation
page read and write
5FD4000
trusted library allocation
page read and write
377E000
stack
page read and write
5ED1000
trusted library allocation
page read and write
AE4000
heap
page read and write
563E000
stack
page read and write
1626000
heap
page read and write
3C7E000
stack
page read and write
AE4000
heap
page read and write
62DD000
trusted library allocation
page read and write
FC4000
heap
page read and write
6407000
trusted library allocation
page read and write
4AB000
unkown
page execute and write copy
6519000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
641B000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
92B000
unkown
page execute and read and write
650D000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
643D000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
15B4000
heap
page read and write
5BD4000
trusted library allocation
page read and write
531000
unkown
page execute and write copy
4A1000
unkown
page execute and write copy
AE4000
heap
page read and write
5EE5000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
5EE2000
trusted library allocation
page read and write
AE4000
heap
page read and write
637B000
trusted library allocation
page read and write
AE4000
heap
page read and write
15B3000
heap
page read and write
FC4000
heap
page read and write
5E88000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
43BF000
stack
page read and write
3CDF000
stack
page read and write
5F7D000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EAF000
trusted library allocation
page read and write
77C000
unkown
page execute and read and write
8F9000
stack
page read and write
5EF5000
trusted library allocation
page read and write
FC4000
heap
page read and write
5EF5000
trusted library allocation
page read and write
62AA000
trusted library allocation
page read and write
5E3B000
trusted library allocation
page read and write
636F000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
646C000
trusted library allocation
page read and write
64AF000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
5E6A000
trusted library allocation
page read and write
FC4000
heap
page read and write
30C0000
direct allocation
page read and write
AE4000
heap
page read and write
15C0000
heap
page read and write
4810000
heap
page read and write
63A7000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
62D2000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EE5000
trusted library allocation
page read and write
112B000
heap
page read and write
32DF000
stack
page read and write
5E44000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
62E5000
trusted library allocation
page read and write
62DC000
trusted library allocation
page read and write
989000
unkown
page execute and write copy
30C0000
direct allocation
page read and write
62D8000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EBD000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
3B9F000
stack
page read and write
2B6000
unkown
page write copy
AE4000
heap
page read and write
5E64000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
30C0000
direct allocation
page read and write
5E66000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
62DC000
trusted library allocation
page read and write
AE4000
heap
page read and write
15EB000
heap
page read and write
5E7C000
trusted library allocation
page read and write
2FBF000
stack
page read and write
910000
unkown
page execute and write copy
AE4000
heap
page read and write
5E57000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
8DA000
unkown
page execute and read and write
4691000
heap
page read and write
AE4000
heap
page read and write
6432000
trusted library allocation
page read and write
6383000
trusted library allocation
page read and write
2C4000
unkown
page execute and write copy
FC4000
heap
page read and write
5EF5000
trusted library allocation
page read and write
9B8000
heap
page read and write
5F51000
trusted library allocation
page read and write
5EE3000
trusted library allocation
page read and write
62D4000
trusted library allocation
page read and write
46F000
unkown
page execute and write copy
62DA000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
6507000
trusted library allocation
page read and write
5E68000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
62D6000
trusted library allocation
page read and write
6EAE000
stack
page read and write
959000
unkown
page execute and write copy
5EE5000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
403E000
stack
page read and write
AE4000
heap
page read and write
613C000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
1150000
direct allocation
page read and write
5EB6000
trusted library allocation
page read and write
FC4000
heap
page read and write
5EB6000
trusted library allocation
page read and write
4E3000
unkown
page execute and read and write
6192000
trusted library allocation
page read and write
642C000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
FC4000
heap
page read and write
2DDF000
stack
page read and write
3FFF000
stack
page read and write
373F000
stack
page read and write
1597000
heap
page read and write
47C3000
trusted library allocation
page execute and read and write
63D5000
trusted library allocation
page read and write
BAE000
stack
page read and write
2F5E000
stack
page read and write
5EE5000
trusted library allocation
page read and write
4EE1000
heap
page read and write
AE4000
heap
page read and write
5EBD000
trusted library allocation
page read and write
6501000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
FC4000
heap
page read and write
5EAC000
trusted library allocation
page read and write
5F38000
trusted library allocation
page read and write
5E5A000
trusted library allocation
page read and write
116A000
heap
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
4970000
trusted library allocation
page read and write
1609000
heap
page read and write
613E000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
6024000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
157D000
heap
page read and write
5EF5000
trusted library allocation
page read and write
64CD000
trusted library allocation
page read and write
47BE000
stack
page read and write
15C0000
heap
page read and write
62D3000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EF5000
trusted library allocation
page read and write
47D4000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
663A000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
8DC000
unkown
page execute and write copy
96A000
unkown
page execute and write copy
5EE5000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
42BE000
stack
page read and write
AE4000
heap
page read and write
3A9E000
stack
page read and write
AE4000
heap
page read and write
63A3000
trusted library allocation
page read and write
359E000
stack
page read and write
AE4000
heap
page read and write
62DA000
trusted library allocation
page read and write
97E000
heap
page read and write
5EAF000
trusted library allocation
page read and write
4DA000
unkown
page execute and write copy
1130000
direct allocation
page read and write
5E9F000
trusted library allocation
page read and write
431F000
stack
page read and write
991000
unkown
page execute and write copy
63DB000
trusted library allocation
page read and write
FC4000
heap
page read and write
FC4000
heap
page read and write
62D5000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
613B000
trusted library allocation
page read and write
15EB000
heap
page read and write
4680000
direct allocation
page read and write
4EB0000
direct allocation
page execute and read and write
96E000
unkown
page execute and write copy
641A000
trusted library allocation
page read and write
480000
unkown
page execute and read and write
64A9000
trusted library allocation
page read and write
FC4000
heap
page read and write
1597000
heap
page read and write
291E000
stack
page read and write
4EE1000
heap
page read and write
604B000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
4BD1000
trusted library allocation
page read and write
A00000
unkown
page execute and write copy
159A000
heap
page read and write
5E71000
trusted library allocation
page read and write
6096000
trusted library allocation
page read and write
AE4000
heap
page read and write
5ECF000
trusted library allocation
page read and write
337F000
stack
page read and write
5FCB000
trusted library allocation
page read and write
63C2000
trusted library allocation
page read and write
AE4000
heap
page read and write
5810000
heap
page read and write
3F9E000
stack
page read and write
52BE000
stack
page read and write
4FEF000
stack
page read and write
5EC7000
trusted library allocation
page read and write
63C9000
trusted library allocation
page read and write
53D000
unkown
page execute and write copy
5E5D000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
6394000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
4EE1000
heap
page read and write
391F000
stack
page read and write
657E000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
AE4000
heap
page read and write
9C0000
heap
page read and write
5F31000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
62DD000
trusted library allocation
page read and write
15B5000
heap
page read and write
AE4000
heap
page read and write
5EB5000
trusted library allocation
page read and write
1612000
heap
page read and write
1120000
heap
page read and write
5EE5000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
5EE1000
trusted library allocation
page read and write
6D6D000
stack
page read and write
62D8000
trusted library allocation
page read and write
4EE1000
heap
page read and write
BC0000
unkown
page readonly
AE4000
heap
page read and write
FC4000
heap
page read and write
41A000
unkown
page execute and write copy
5EE5000
trusted library allocation
page read and write
501000
unkown
page execute and write copy
5F7E000
trusted library allocation
page read and write
646B000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
FC4000
heap
page read and write
1130000
direct allocation
page read and write
53B2000
direct allocation
page read and write
5E7A000
trusted library allocation
page read and write
477F000
stack
page read and write
62D6000
trusted library allocation
page read and write
FC4000
heap
page read and write
15AA000
heap
page read and write
5EC7000
trusted library allocation
page read and write
157E000
heap
page read and write
5EBD000
trusted library allocation
page read and write
5FC1000
trusted library allocation
page read and write
1583000
heap
page read and write
5EF5000
trusted library allocation
page read and write
639E000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EE5000
trusted library allocation
page read and write
580000
heap
page read and write
159A000
heap
page read and write
63D8000
trusted library allocation
page read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
2D3F000
stack
page read and write
AE4000
heap
page read and write
5EE5000
trusted library allocation
page read and write
495000
unkown
page execute and read and write
5EF5000
trusted library allocation
page read and write
15EB000
heap
page read and write
5EF5000
trusted library allocation
page read and write
637D000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
AE4000
heap
page read and write
5F61000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
FC4000
heap
page read and write
5EB8000
trusted library allocation
page read and write
64CB000
trusted library allocation
page read and write
4F8000
unkown
page execute and read and write
6409000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
34BF000
stack
page read and write
15B3000
heap
page read and write
313E000
stack
page read and write
63C5000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
FC4000
heap
page read and write
1626000
heap
page read and write
63D7000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
AE4000
heap
page read and write
5C6000
unkown
page execute and read and write
AE4000
heap
page read and write
1130000
direct allocation
page read and write
48C1000
heap
page read and write
5E44000
trusted library allocation
page read and write
26C000
stack
page read and write
62D9000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
5E6E000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
5EE5000
trusted library allocation
page read and write
11ED000
heap
page read and write
636C000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
6378000
trusted library allocation
page read and write
63BC000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
647A000
trusted library allocation
page read and write
63C8000
trusted library allocation
page read and write
AE4000
heap
page read and write
5EE4000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
57DE000
stack
page read and write
417E000
stack
page read and write
AE4000
heap
page read and write
6031000
trusted library allocation
page read and write
FC4000
heap
page read and write
641B000
trusted library allocation
page read and write
FC4000
heap
page read and write
5ED4000
trusted library allocation
page read and write
5ED1000
trusted library allocation
page read and write
305F000
stack
page read and write
5F03000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
1609000
heap
page read and write
5EF5000
trusted library allocation
page read and write
39BF000
stack
page read and write
6421000
trusted library allocation
page read and write
5EB8000
trusted library allocation
page read and write
6033000
trusted library allocation
page read and write
1160000
heap
page read and write
11E6000
heap
page read and write
5E9F000
trusted library allocation
page read and write
1604000
heap
page read and write
5F31000
trusted library allocation
page read and write
92A000
unkown
page execute and write copy
62E1000
trusted library allocation
page read and write
6FEE000
stack
page read and write
1130000
direct allocation
page read and write
5EC7000
trusted library allocation
page read and write
502E000
stack
page read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
AE4000
heap
page read and write
54D0000
direct allocation
page execute and read and write
5F61000
trusted library allocation
page read and write
6419000
trusted library allocation
page read and write
5ED1000
trusted library allocation
page read and write
63DC000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
970000
heap
page read and write
5EAC000
trusted library allocation
page read and write
FC4000
heap
page read and write
5EB0000
trusted library allocation
page read and write
15B7000
heap
page read and write
463F000
stack
page read and write
48E000
unkown
page execute and write copy
AE4000
heap
page read and write
427F000
stack
page read and write
5EE4000
trusted library allocation
page read and write
63EE000
trusted library allocation
page read and write
4EE1000
heap
page read and write
5EE5000
trusted library allocation
page read and write
FC4000
heap
page read and write
2B9E000
stack
page read and write
FC4000
heap
page read and write
62D7000
trusted library allocation
page read and write
6172000
trusted library allocation
page read and write
5E88000
trusted library allocation
page read and write
FC4000
heap
page read and write
59D0000
remote allocation
page read and write
63F3000
trusted library allocation
page read and write
FC4000
heap
page read and write
6033000
trusted library allocation
page read and write
6383000
trusted library allocation
page read and write
FC4000
heap
page read and write
63DB000
trusted library allocation
page read and write
4EE1000
heap
page read and write
5EB8000
trusted library allocation
page read and write
653F000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
64AB000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
6212000
trusted library allocation
page read and write
63CA000
trusted library allocation
page read and write
15B5000
heap
page read and write
5ED4000
trusted library allocation
page read and write
1609000
heap
page read and write
5EAF000
trusted library allocation
page read and write
4EE1000
heap
page read and write
41DF000
stack
page read and write
62D7000
trusted library allocation
page read and write
4EE1000
heap
page read and write
5F52000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
63F9000
trusted library allocation
page read and write
5FC5000
trusted library allocation
page read and write
413F000
stack
page read and write
63A1000
trusted library allocation
page read and write
AE4000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
5EE1000
trusted library allocation
page read and write
AE4000
heap
page read and write
4B90000
heap
page execute and read and write
279F000
stack
page read and write
999000
unkown
page execute and read and write
4FE0000
trusted library allocation
page read and write
63BE000
trusted library allocation
page read and write
FC4000
heap
page read and write
621A000
trusted library allocation
page read and write
31DE000
stack
page read and write
62D9000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
642E000
trusted library allocation
page read and write
4EE1000
heap
page read and write
47B0000
trusted library allocation
page read and write
63A1000
trusted library allocation
page read and write
613D000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
2BA000
unkown
page execute and read and write
48C1000
heap
page read and write
63A1000
trusted library allocation
page read and write
604B000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
62D4000
trusted library allocation
page read and write
493000
unkown
page execute and write copy
5EF5000
trusted library allocation
page read and write
93E000
stack
page read and write
15EB000
heap
page read and write
63F4000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
5FBB000
trusted library allocation
page read and write
638C000
trusted library allocation
page read and write
62D5000
trusted library allocation
page read and write
FC4000
heap
page read and write
64BF000
trusted library allocation
page read and write
63A2000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
4B5000
unkown
page execute and read and write
27DE000
stack
page read and write
5F3A000
trusted library allocation
page read and write
97F000
unkown
page execute and read and write
5ED4000
trusted library allocation
page read and write
63BD000
trusted library allocation
page read and write
62D1000
trusted library allocation
page read and write
5F3B000
trusted library allocation
page read and write
63C3000
trusted library allocation
page read and write
15AA000
heap
page read and write
53E000
unkown
page execute and read and write
FC4000
heap
page read and write
63A6000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
4EE1000
heap
page read and write
62D5000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
63F8000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
5E37000
trusted library allocation
page read and write
FC4000
heap
page read and write
5EE5000
trusted library allocation
page read and write
6388000
trusted library allocation
page read and write
1626000
heap
page read and write
355F000
stack
page read and write
906000
unkown
page execute and write copy
5E57000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
15A1000
heap
page read and write
369F000
stack
page read and write
8FD000
unkown
page execute and read and write
61E2000
trusted library allocation
page read and write
15A1000
heap
page read and write
AE4000
heap
page read and write
639B000
trusted library allocation
page read and write
FC4000
heap
page read and write
9BB000
unkown
page execute and read and write
5EB1000
trusted library allocation
page read and write
A09000
unkown
page execute and write copy
44FF000
stack
page read and write
5E75000
trusted library allocation
page read and write
957000
heap
page read and write
480B000
trusted library allocation
page execute and read and write
62D6000
trusted library allocation
page read and write
4CB000
unkown
page execute and write copy
AE4000
heap
page read and write
63E5000
trusted library allocation
page read and write
452000
unkown
page execute and write copy
5ED4000
trusted library allocation
page read and write
AE4000
heap
page read and write
F9E000
stack
page read and write
5EE4000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
526F000
stack
page read and write
6471000
trusted library allocation
page read and write
FC4000
heap
page read and write
4EE1000
heap
page read and write
5E57000
trusted library allocation
page read and write
641D000
trusted library allocation
page read and write
FC4000
heap
page read and write
4BC0000
heap
page execute and read and write
5EF5000
trusted library allocation
page read and write
950000
heap
page read and write
5E74000
trusted library allocation
page read and write
30FF000
stack
page read and write
63F4000
trusted library allocation
page read and write
AE4000
heap
page read and write
467E000
stack
page read and write
4B0000
unkown
page execute and read and write
5F56000
trusted library allocation
page read and write
FC4000
heap
page read and write
5E7A000
trusted library allocation
page read and write
37DF000
stack
page read and write
AE4000
heap
page read and write
5E4A000
trusted library allocation
page read and write
9B9000
unkown
page execute and write copy
62DA000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
A09000
unkown
page execute and write copy
AE4000
heap
page read and write
6392000
trusted library allocation
page read and write
4B6E000
stack
page read and write
FC4000
heap
page read and write
6503000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
492000
unkown
page execute and read and write
5EB5000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
902000
unkown
page execute and write copy
5EE4000
trusted library allocation
page read and write
A16000
unkown
page execute and read and write
4EE1000
heap
page read and write
30C0000
direct allocation
page read and write
5F7E000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
558000
unkown
page execute and write copy
6470000
trusted library allocation
page read and write
A01000
unkown
page execute and read and write
35FF000
stack
page read and write
6E6E000
stack
page read and write
63D5000
trusted library allocation
page read and write
5E5D000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
530000
unkown
page read and write
47E0000
direct allocation
page read and write
2A1F000
stack
page read and write
161F000
heap
page read and write
1130000
direct allocation
page read and write
5EE5000
trusted library allocation
page read and write
62DC000
trusted library allocation
page read and write
530000
unkown
page readonly
5F38000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EBC000
trusted library allocation
page read and write
647C000
trusted library allocation
page read and write
5EB5000
trusted library allocation
page read and write
AE4000
heap
page read and write
8F1000
unkown
page execute and write copy
30C0000
direct allocation
page read and write
547000
unkown
page execute and write copy
30C0000
direct allocation
page read and write
1130000
direct allocation
page read and write
2CDE000
stack
page read and write
AE4000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
56DE000
stack
page read and write
1583000
heap
page read and write
DBE000
stack
page read and write
5EAC000
trusted library allocation
page read and write
4EE1000
heap
page read and write
5FBF000
trusted library allocation
page read and write
1626000
heap
page read and write
4691000
heap
page read and write
FC4000
heap
page read and write
5EAF000
trusted library allocation
page read and write
9D6000
unkown
page execute and read and write
62D4000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
2EBE000
stack
page read and write
421E000
stack
page read and write
62DD000
trusted library allocation
page read and write
6396000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
93C000
unkown
page execute and read and write
5E69000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
54F0000
direct allocation
page execute and read and write
135E000
stack
page read and write
6471000
trusted library allocation
page read and write
516E000
stack
page read and write
63CC000
trusted library allocation
page read and write
53FD000
stack
page read and write
547000
unkown
page execute and write copy
5F7E000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
AAE000
stack
page read and write
4F4000
unkown
page execute and read and write
4EE1000
heap
page read and write
5E5A000
trusted library allocation
page read and write
AE4000
heap
page read and write
4680000
direct allocation
page read and write
432000
unkown
page execute and read and write
6137000
trusted library allocation
page read and write
63A4000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
5E5A000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
5ECD000
trusted library allocation
page read and write
AE4000
heap
page read and write
161F000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
4690000
heap
page read and write
5E35000
trusted library allocation
page read and write
62E2000
trusted library allocation
page read and write
4EE1000
heap
page read and write
BA5000
stack
page read and write
6092000
trusted library allocation
page read and write
5E9F000
trusted library allocation
page read and write
CBE000
stack
page read and write
2D7E000
stack
page read and write
159A000
heap
page read and write
6389000
trusted library allocation
page read and write
63CE000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
5ED1000
trusted library allocation
page read and write
2F1F000
stack
page read and write
5EBA000
trusted library allocation
page read and write
FC4000
heap
page read and write
AE4000
heap
page read and write
5ED2000
trusted library allocation
page read and write
AE4000
heap
page read and write
5E47000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
768000
unkown
page execute and read and write
FC4000
heap
page read and write
620A000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
5EB1000
trusted library allocation
page read and write
3D1E000
stack
page read and write
6386000
trusted library allocation
page read and write
650B000
trusted library allocation
page read and write
AE4000
heap
page read and write
48C1000
heap
page read and write
553E000
stack
page read and write
63F7000
trusted library allocation
page read and write
641F000
trusted library allocation
page read and write
5E88000
trusted library allocation
page read and write
5E6C000
trusted library allocation
page read and write
5E6A000
trusted library allocation
page read and write
62D1000
trusted library allocation
page read and write
95E000
unkown
page execute and read and write
5E5A000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
6371000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
63E9000
trusted library allocation
page read and write
4680000
direct allocation
page read and write
2C9F000
stack
page read and write
5E75000
trusted library allocation
page read and write
FC4000
heap
page read and write
There are 1401 hidden memdumps, click here to show them.