IOC Report
e6db7d34b498982601b2c45ac5b2a1c1b9502e502514c.exe

loading gif

Files

File Path
Type
Category
Malicious
e6db7d34b498982601b2c45ac5b2a1c1b9502e502514c.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\684126\Intake.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SecureData Technologies\Y
data
dropped
C:\Users\user\AppData\Local\Temp\684126\C
data
dropped
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Defend
data
dropped
C:\Users\user\AppData\Local\Temp\Done
data
dropped
C:\Users\user\AppData\Local\Temp\Dow
data
dropped
C:\Users\user\AppData\Local\Temp\Drop
data
dropped
C:\Users\user\AppData\Local\Temp\Ever
data
dropped
C:\Users\user\AppData\Local\Temp\Haiti
data
dropped
C:\Users\user\AppData\Local\Temp\Judy
data
dropped
C:\Users\user\AppData\Local\Temp\Luck
ASCII text, with very long lines (512), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Luck.bat (copy)
ASCII text, with very long lines (512), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Manufacturers
data
dropped
C:\Users\user\AppData\Local\Temp\Nevertheless
data
dropped
C:\Users\user\AppData\Local\Temp\Qualified
data
dropped
C:\Users\user\AppData\Local\Temp\Runner
data
dropped
C:\Users\user\AppData\Local\Temp\Wesley
data
dropped
C:\Users\user\AppData\Local\Temp\Wire
data
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e6db7d34b498982601b2c45ac5b2a1c1b9502e502514c.exe
"C:\Users\user\Desktop\e6db7d34b498982601b2c45ac5b2a1c1b9502e502514c.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Luck Luck.bat & Luck.bat & exit
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 684126
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Wire + ..\Qualified + ..\Manufacturers + ..\Wesley + ..\Haiti + ..\Done + ..\Drop + ..\Runner + ..\Defend + ..\Judy + ..\Dow C
malicious
C:\Users\user\AppData\Local\Temp\684126\Intake.pif
Intake.pif C
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & echo URL="C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & exit
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js"
malicious
C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.pif
"C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.pif" "C:\Users\user\AppData\Local\SecureData Technologies\Y"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.js"
malicious
C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.pif
"C:\Users\user\AppData\Local\SecureData Technologies\TurtleHarbor.pif" "C:\Users\user\AppData\Local\SecureData Technologies\Y"
malicious
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
C:\Users\user\AppData\Local\Temp\684126\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
C:\Windows\SysWOW64\findstr.exe
findstr /V "VegetablesIndividualBindingGba" Ever
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.200.149.147:27667
malicious
http://www.autoitscript.com/autoit3/J
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
http://www.fontbureau.com/designers
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.goodfont.co.kr
unknown
https://www.autoitscript.com/autoit3/
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
CvcMEMMQKdoWtsiZdkN.CvcMEMMQKdoWtsiZdkN
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
1181000
heap
page read and write
3B91000
heap
page read and write
E94000
heap
page read and write
124E000
heap
page read and write
1B72000
trusted library allocation
page read and write
12EC000
heap
page read and write
11C7000
heap
page read and write
121E000
heap
page read and write
34BF000
unkown
page read and write
DD1000
unkown
page execute read
2A16000
trusted library allocation
page read and write
B71000
heap
page read and write
12FD000
heap
page read and write
15E13478000
heap
page read and write
1393000
heap
page read and write
554D000
trusted library allocation
page read and write
400000
unkown
page readonly
1B74000
trusted library allocation
page read and write
11CE000
heap
page read and write
190E000
trusted library allocation
page read and write
1250000
heap
page read and write
29EF000
trusted library allocation
page read and write
4FD000
unkown
page readonly
194C000
heap
page read and write
5020000
trusted library allocation
page execute and read and write
3B91000
heap
page read and write
5610000
trusted library allocation
page read and write
3B91000
heap
page read and write
107E000
heap
page read and write
A64000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
92C000
remote allocation
page execute and read and write
1B72000
trusted library allocation
page read and write
4D20000
heap
page read and write
12ED000
heap
page read and write
7E7E000
stack
page read and write
3B91000
heap
page read and write
1194000
heap
page read and write
12AC000
heap
page read and write
B7D000
heap
page read and write
2A4A000
trusted library allocation
page read and write
123E000
stack
page read and write
29F9000
trusted library allocation
page read and write
11EB000
heap
page read and write
1930000
heap
page read and write
7C5C000
heap
page read and write
3416000
heap
page read and write
1043000
heap
page read and write
2A1A000
trusted library allocation
page read and write
2A27000
trusted library allocation
page read and write
A94000
heap
page read and write
509C000
stack
page read and write
1998000
heap
page read and write
13F5000
heap
page read and write
5600000
heap
page read and write
1124000
heap
page read and write
1B70000
trusted library allocation
page read and write
E6E000
stack
page read and write
1CCF000
trusted library allocation
page read and write
10EF000
heap
page read and write
32B6000
trusted library allocation
page read and write
4D32000
trusted library allocation
page read and write
1B71000
trusted library allocation
page read and write
3B91000
heap
page read and write
3272000
trusted library allocation
page read and write
1397000
heap
page read and write
3B91000
heap
page read and write
1B72000
trusted library allocation
page read and write
12C1000
heap
page read and write
A94000
heap
page read and write
1830000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
1054000
heap
page read and write
194D000
heap
page read and write
140A000
heap
page read and write
29E9000
trusted library allocation
page read and write
CC2000
unkown
page readonly
1B74000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
3A0000
unkown
page readonly
4D3E000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
119D000
heap
page read and write
36B0000
trusted library allocation
page read and write
13F4000
heap
page read and write
3130000
heap
page read and write
5D0000
heap
page read and write
10C9000
heap
page read and write
23D0000
heap
page read and write
321F000
trusted library allocation
page read and write
1254000
heap
page read and write
12AB000
heap
page read and write
114B000
heap
page read and write
922F000
stack
page read and write
FC0000
heap
page read and write
1B71000
trusted library allocation
page read and write
11B0000
heap
page read and write
4F70000
heap
page read and write
7B9000
stack
page read and write
1C30000
trusted library allocation
page read and write
11A8000
heap
page read and write
55D0000
trusted library allocation
page execute and read and write
1224000
heap
page read and write
DD0000
heap
page read and write
1CAC000
trusted library allocation
page read and write
A94000
heap
page read and write
1543000
trusted library allocation
page execute and read and write
1315000
heap
page read and write
1105000
heap
page read and write
3B91000
heap
page read and write
2DBE000
unkown
page read and write
33E0000
heap
page read and write
2A37000
trusted library allocation
page read and write
5B80000
heap
page read and write
1029000
heap
page read and write
1550000
trusted library allocation
page read and write
518000
unkown
page readonly
1054000
heap
page read and write
3670000
trusted library allocation
page read and write
1C0F000
trusted library allocation
page read and write
13D1000
heap
page read and write
27F0000
heap
page read and write
B82000
heap
page read and write
3C6000
unkown
page readonly
1D0E858C000
heap
page read and write
3221000
trusted library allocation
page read and write
6EBE000
stack
page read and write
11B9000
heap
page read and write
3A0000
unkown
page readonly
132C000
heap
page read and write
29E4000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
5D6000
heap
page read and write
3534000
heap
page read and write
26FE000
stack
page read and write
A94000
heap
page read and write
A80000
trusted library allocation
page read and write
1D0EA270000
heap
page read and write
11D9000
heap
page read and write
1B79000
trusted library allocation
page read and write
E86000
unkown
page readonly
12DE000
heap
page read and write
1C19000
trusted library allocation
page read and write
1C24000
trusted library allocation
page read and write
4D24000
trusted library allocation
page read and write
14D3000
heap
page read and write
1C08000
trusted library allocation
page read and write
344B000
heap
page read and write
7C50000
heap
page read and write
1D0E8592000
heap
page read and write
12E9000
heap
page read and write
11C6000
heap
page read and write
1C17000
trusted library allocation
page read and write
12D2000
heap
page read and write
1B7B000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
94AE000
stack
page read and write
1B75000
trusted library allocation
page read and write
1771000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
1102000
heap
page read and write
231D000
stack
page read and write
3257000
trusted library allocation
page read and write
11F0000
heap
page read and write
394F000
heap
page read and write
14408FF000
stack
page read and write
2A3E000
trusted library allocation
page read and write
1307000
heap
page read and write
5A90000
heap
page read and write
112C000
heap
page read and write
1C9D000
trusted library allocation
page read and write
19A4000
heap
page read and write
3E41000
trusted library allocation
page read and write
1C05000
trusted library allocation
page read and write
15E134AF000
heap
page read and write
3670000
trusted library allocation
page read and write
1928000
heap
page read and write
36B0000
trusted library allocation
page read and write
3B91000
heap
page read and write
1170000
heap
page read and write
33CA000
heap
page read and write
1126000
heap
page read and write
1170000
heap
page read and write
14DC000
heap
page read and write
BAC000
heap
page read and write
1B7F000
trusted library allocation
page read and write
32E2000
heap
page read and write
1D0E85AD000
heap
page read and write
13F9000
heap
page read and write
1771000
trusted library allocation
page read and write
11DE000
stack
page read and write
3376000
heap
page read and write
31FC000
trusted library allocation
page read and write
11C1000
heap
page read and write
1B79000
trusted library allocation
page read and write
1081000
heap
page read and write
13F1000
heap
page read and write
408000
unkown
page readonly
31B5000
trusted library allocation
page read and write
7C54000
heap
page read and write
104F000
heap
page read and write
1D0E8576000
heap
page read and write
4D70000
trusted library allocation
page read and write
11DB000
heap
page read and write
A69000
stack
page read and write
1B77000
trusted library allocation
page read and write
10BF000
heap
page read and write
1771000
trusted library allocation
page read and write
1B71000
trusted library allocation
page read and write
E94000
heap
page read and write
2A8A000
trusted library allocation
page read and write
1C02000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
DE0000
heap
page read and write
B65000
heap
page read and write
D69000
stack
page read and write
552B000
trusted library allocation
page read and write
3B91000
heap
page read and write
5A70000
heap
page read and write
1008000
heap
page read and write
11AE000
heap
page read and write
18DF000
stack
page read and write
2830000
heap
page execute and read and write
1CA7000
trusted library allocation
page read and write
5AC6000
heap
page read and write
12E6000
heap
page read and write
1112000
heap
page read and write
3D9000
unkown
page readonly
115D000
heap
page read and write
326C000
trusted library allocation
page read and write
1C22000
trusted library allocation
page read and write
1C34000
trusted library allocation
page read and write
137B000
heap
page read and write
3138000
heap
page read and write
310000
unkown
page readonly
11B6000
heap
page read and write
A05000
heap
page read and write
185C000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
1845000
trusted library allocation
page read and write
114D000
heap
page read and write
1092000
heap
page read and write
1154000
heap
page read and write
5AD8000
heap
page read and write
518000
unkown
page readonly
1462000
heap
page read and write
1C0A000
trusted library allocation
page read and write
12E6000
heap
page read and write
3B91000
heap
page read and write
10E9000
heap
page read and write
A8A000
trusted library allocation
page execute and read and write
4F60000
heap
page read and write
127D000
heap
page read and write
119D000
heap
page read and write
2E2F000
stack
page read and write
1054000
heap
page read and write
2869000
trusted library allocation
page read and write
CC0000
unkown
page readonly
5770000
heap
page read and write
3202000
trusted library allocation
page read and write
15E134A6000
heap
page read and write
1C12000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
1079000
heap
page read and write
1D0E84B0000
heap
page read and write
6C7E000
stack
page read and write
32E3000
heap
page read and write
15E134CF000
heap
page read and write
15E13430000
heap
page read and write
3B91000
heap
page read and write
28E7000
trusted library allocation
page read and write
10E4000
heap
page read and write
1329000
heap
page read and write
5552000
trusted library allocation
page read and write
142A000
heap
page read and write
1974000
heap
page read and write
12FD000
heap
page read and write
1B7A000
trusted library allocation
page read and write
344B000
heap
page read and write
33F1000
heap
page read and write
11B7000
heap
page read and write
13F1000
heap
page read and write
4C8F000
stack
page read and write
1282000
heap
page read and write
1155000
heap
page read and write
4CC000
unkown
page read and write
1174000
heap
page read and write
321B000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
3D4000
unkown
page write copy
4DC0000
trusted library allocation
page read and write
1C37000
trusted library allocation
page read and write
15E1349F000
heap
page read and write
1161000
heap
page read and write
326A000
trusted library allocation
page read and write
1C27000
trusted library allocation
page read and write
1901000
heap
page read and write
1C3C000
trusted library allocation
page read and write
1928000
heap
page read and write
1110000
heap
page read and write
41E000
unkown
page read and write
1C08000
trusted library allocation
page read and write
33E0000
heap
page read and write
2D0D000
stack
page read and write
156A000
trusted library allocation
page execute and read and write
36B0000
trusted library allocation
page read and write
B69000
heap
page read and write
1D0E9EE0000
heap
page read and write
33A0000
heap
page read and write
1273000
heap
page read and write
11E9000
heap
page read and write
1C0A000
trusted library allocation
page read and write
11F9000
heap
page read and write
D6C000
stack
page read and write
59E000
heap
page read and write
11FF000
heap
page read and write
110A000
heap
page read and write
122E000
heap
page read and write
11DF000
heap
page read and write
104F000
heap
page read and write
15E134B0000
heap
page read and write
A94000
heap
page read and write
A94000
heap
page read and write
194B000
heap
page read and write
29EB000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
1032000
heap
page read and write
3B91000
heap
page read and write
3530000
heap
page read and write
1154000
heap
page read and write
1482000
heap
page read and write
1771000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
1070000
heap
page read and write
1B72000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
15E134A6000
heap
page read and write
1170000
heap
page read and write
13EB000
heap
page read and write
11E3000
heap
page read and write
36B0000
trusted library allocation
page read and write
1139000
heap
page read and write
3AA0000
trusted library allocation
page read and write
119F000
heap
page read and write
1D0E857F000
heap
page read and write
10E8000
heap
page read and write
12EA000
heap
page read and write
5110000
heap
page read and write
2824000
trusted library allocation
page read and write
1291000
heap
page read and write
4EE0000
trusted library allocation
page read and write
1D0E859E000
heap
page read and write
1181000
heap
page read and write
3040000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
2A14000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
90C000
stack
page read and write
12FE000
heap
page read and write
1B75000
trusted library allocation
page read and write
12A1000
heap
page read and write
2E40000
trusted library allocation
page read and write
400000
unkown
page readonly
1122000
heap
page read and write
D57000
heap
page read and write
1771000
trusted library allocation
page read and write
E94000
heap
page read and write
1D0E8568000
heap
page read and write
13AC000
heap
page read and write
31AD000
trusted library allocation
page read and write
4FD000
unkown
page readonly
31B3000
trusted library allocation
page read and write
401000
unkown
page execute read
1D0E856E000
heap
page read and write
4D75000
trusted library allocation
page read and write
1C1A000
trusted library allocation
page read and write
3618000
heap
page read and write
50EF000
stack
page read and write
1847000
trusted library allocation
page read and write
C38000
heap
page read and write
1091000
heap
page read and write
1820000
trusted library allocation
page read and write
10E0000
heap
page read and write
123B000
heap
page read and write
1B74000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
40F6000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
12C0000
heap
page read and write
39A0000
heap
page read and write
5199000
heap
page read and write
1C33000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
125B000
heap
page read and write
1043000
heap
page read and write
10BE000
heap
page read and write
7D7E000
stack
page read and write
31E3000
trusted library allocation
page read and write
1275000
heap
page read and write
10FF000
heap
page read and write
1C06000
trusted library allocation
page read and write
3D9000
unkown
page readonly
109E000
heap
page read and write
39A1000
heap
page read and write
1472000
heap
page read and write
11F9000
heap
page read and write
5040000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
310000
unkown
page readonly
3FF000
stack
page read and write
10F9000
heap
page read and write
1B75000
trusted library allocation
page read and write
B86000
heap
page read and write
15E13460000
heap
page read and write
B90000
heap
page read and write
186A000
trusted library allocation
page read and write
1C09000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
15E13470000
heap
page read and write
3B91000
heap
page read and write
15E134BD000
heap
page read and write
DD0000
heap
page read and write
31CC000
trusted library allocation
page read and write
1D0E84F5000
heap
page read and write
E94000
heap
page read and write
A86000
trusted library allocation
page execute and read and write
A94000
heap
page read and write
1771000
trusted library allocation
page read and write
EEE000
stack
page read and write
15E134A6000
heap
page read and write
56E0000
trusted library allocation
page read and write
B84000
heap
page read and write
1027000
heap
page read and write
11A6000
heap
page read and write
1A10000
heap
page read and write
11D9000
heap
page read and write
3670000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
1910000
heap
page read and write
1049000
heap
page read and write
10CF000
heap
page read and write
559000
stack
page read and write
1C34000
trusted library allocation
page read and write
CE42CFE000
stack
page read and write
FAE000
stack
page read and write
11CB000
heap
page read and write
29F7000
trusted library allocation
page read and write
1B76000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
2826000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
1996000
heap
page read and write
1B77000
trusted library allocation
page read and write
9FE000
stack
page read and write
29C5000
trusted library allocation
page read and write
C61000
heap
page read and write
11EC000
heap
page read and write
1D0E8490000
heap
page read and write
C7B000
heap
page read and write
1350000
trusted library allocation
page read and write
1C29000
trusted library allocation
page read and write
108C000
heap
page read and write
3670000
trusted library allocation
page read and write
1B7A000
trusted library allocation
page read and write
2FAD000
stack
page read and write
35BF000
stack
page read and write
1054000
heap
page read and write
3AA0000
trusted library allocation
page read and write
2867000
trusted library allocation
page read and write
29DE000
trusted library allocation
page read and write
3360000
heap
page read and write
1771000
trusted library allocation
page read and write
1126000
heap
page read and write
4061000
trusted library allocation
page read and write
EF0000
heap
page read and write
D2C000
stack
page read and write
1D0E8561000
heap
page read and write
1023000
heap
page read and write
1908000
heap
page read and write
15E134DA000
heap
page read and write
1166000
heap
page read and write
1B71000
trusted library allocation
page read and write
33DA000
heap
page read and write
13F5000
heap
page read and write
3736000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
4D78000
trusted library allocation
page read and write
1CFD000
trusted library allocation
page read and write
B34000
heap
page read and write
137B000
heap
page read and write
11C5000
heap
page read and write
5167000
heap
page read and write
1B72000
trusted library allocation
page read and write
10EE000
heap
page read and write
11DF000
heap
page read and write
3251000
trusted library allocation
page read and write
1C22000
trusted library allocation
page read and write
502E000
stack
page read and write
3970000
heap
page read and write
6DBE000
stack
page read and write
3D9000
unkown
page readonly
3418000
heap
page read and write
40A000
unkown
page write copy
1771000
trusted library allocation
page read and write
1459000
heap
page read and write
1C12000
trusted library allocation
page read and write
131C000
heap
page read and write
33B9000
heap
page read and write
1566000
trusted library allocation
page execute and read and write
11EE000
heap
page read and write
A6D000
trusted library allocation
page execute and read and write
3A0000
unkown
page readonly
1B71000
trusted library allocation
page read and write
1050000
heap
page read and write
CCE000
unkown
page readonly
1270000
heap
page read and write
1258000
heap
page read and write
3E41000
trusted library allocation
page read and write
51B6000
heap
page read and write
1771000
trusted library allocation
page read and write
12FE000
heap
page read and write
30FD000
stack
page read and write
1CB9000
trusted library allocation
page read and write
4FAE000
stack
page read and write
4C8000
unkown
page read and write
1B72000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
3429000
heap
page read and write
7260000
trusted library allocation
page read and write
125D000
heap
page read and write
127F000
heap
page read and write
1291000
heap
page read and write
1771000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
D0B000
stack
page read and write
29F1000
trusted library allocation
page read and write
18F5000
trusted library allocation
page read and write
26FF000
stack
page read and write
15E1348D000
heap
page read and write
1D0E856F000
heap
page read and write
13E8000
heap
page read and write
128A000
heap
page read and write
4F4C000
stack
page read and write
7EBE000
stack
page read and write
10FE000
heap
page read and write
1C0E000
trusted library allocation
page read and write
12FA000
heap
page read and write
E20000
heap
page read and write
1191000
heap
page read and write
137B000
heap
page read and write
3845000
trusted library allocation
page read and write
11F0000
heap
page read and write
CE42AFF000
stack
page read and write
131B000
heap
page read and write
104B000
heap
page read and write
1B7D000
trusted library allocation
page read and write
ED0000
heap
page read and write
A60000
trusted library allocation
page read and write
D30000
trusted library allocation
page execute and read and write
1361000
heap
page read and write
1996000
heap
page read and write
11DF000
heap
page read and write
110B000
heap
page read and write
A50000
trusted library allocation
page read and write
14D2000
heap
page read and write
1942000
heap
page read and write
1214000
heap
page read and write
3BE000
stack
page read and write
33FC000
heap
page read and write
31D9000
trusted library allocation
page read and write
E3D000
stack
page read and write
29FB000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
33F5000
heap
page read and write
137B000
heap
page read and write
18B4000
trusted library allocation
page read and write
D6E000
stack
page read and write
5D0000
heap
page read and write
C6A000
heap
page read and write
11C5000
heap
page read and write
310000
unkown
page readonly
35C0000
heap
page read and write
1C2D000
trusted library allocation
page read and write
4FEF000
stack
page read and write
118B000
heap
page read and write
12C9000
heap
page read and write
10B2000
heap
page read and write
311000
unkown
page execute read
B21000
heap
page read and write
1D0E85A8000
heap
page read and write
3215000
trusted library allocation
page read and write
1079000
heap
page read and write
125A000
heap
page read and write
4D52000
trusted library allocation
page read and write
33E9000
heap
page read and write
1122000
heap
page read and write
1771000
trusted library allocation
page read and write
13FA000
heap
page read and write
115B000
heap
page read and write
3C50000
trusted library allocation
page read and write
1B71000
trusted library allocation
page read and write
AE3000
heap
page read and write
5790000
heap
page read and write
5B8E000
heap
page read and write
5010000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
B13000
heap
page read and write
1CA7000
trusted library allocation
page read and write
15E134A6000
heap
page read and write
3C6000
unkown
page readonly
1B7C000
trusted library allocation
page read and write
1D0E8592000
heap
page read and write
3D0000
unkown
page write copy
32B0000
heap
page read and write
1D0E858D000
heap
page read and write
4F50000
trusted library section
page readonly
10CE000
heap
page read and write
A9B000
trusted library allocation
page execute and read and write
4065000
trusted library allocation
page read and write
54E0000
heap
page read and write
1D0E857F000
heap
page read and write
3B91000
heap
page read and write
1333000
heap
page read and write
31C8000
trusted library allocation
page read and write
12BE000
heap
page read and write
1CB8000
trusted library allocation
page read and write
C00000
heap
page read and write
1540000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
15E13492000
heap
page read and write
137C000
heap
page read and write
3B91000
heap
page read and write
506F000
stack
page read and write
2D70000
heap
page read and write
4D41000
trusted library allocation
page read and write
1D0E8576000
heap
page read and write
1B76000
trusted library allocation
page read and write
1B71000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
B45000
heap
page read and write
1440AFF000
stack
page read and write
E99000
unkown
page readonly
3253000
trusted library allocation
page read and write
3584000
heap
page read and write
3EC0000
trusted library allocation
page read and write
DC0000
heap
page read and write
3D0000
unkown
page read and write
1106000
heap
page read and write
1D0E859A000
heap
page read and write
345C000
heap
page read and write
13DA000
heap
page read and write
A94000
heap
page read and write
14DC000
heap
page read and write
31EE000
trusted library allocation
page read and write
99F000
stack
page read and write
1269000
heap
page read and write
1544000
trusted library allocation
page read and write
1D0E84F0000
heap
page read and write
110E000
heap
page read and write
1267000
heap
page read and write
3429000
heap
page read and write
1CE7000
trusted library allocation
page read and write
344B000
heap
page read and write
1149000
heap
page read and write
3B91000
heap
page read and write
1C29000
trusted library allocation
page read and write
E94000
heap
page read and write
3670000
trusted library allocation
page read and write
1112000
heap
page read and write
11B6000
heap
page read and write
1861000
trusted library allocation
page read and write
1353000
heap
page read and write
3380000
heap
page read and write
980000
heap
page read and write
3206000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
4E20000
trusted library allocation
page execute and read and write
2912000
trusted library allocation
page read and write
10CE000
heap
page read and write
323C000
trusted library allocation
page read and write
130E000
heap
page read and write
1560000
trusted library allocation
page read and write
2A7E000
stack
page read and write
137C000
heap
page read and write
29AA000
trusted library allocation
page read and write
118A000
heap
page read and write
1C17000
trusted library allocation
page read and write
18D4000
trusted library allocation
page read and write
1D0E85A0000
heap
page read and write
1305000
heap
page read and write
1360000
heap
page read and write
1044000
heap
page read and write
1B72000
trusted library allocation
page read and write
B5B000
heap
page read and write
29ED000
trusted library allocation
page read and write
1409000
heap
page read and write
401000
unkown
page execute read
3457000
heap
page read and write
2A01000
trusted library allocation
page read and write
A94000
heap
page read and write
B8B000
heap
page read and write
155D000
trusted library allocation
page execute and read and write
1810000
trusted library allocation
page read and write
11D8000
heap
page read and write
3C50000
trusted library allocation
page read and write
C4E000
heap
page read and write
F2E000
stack
page read and write
31D2000
trusted library allocation
page read and write
1B7A000
trusted library allocation
page read and write
219E000
stack
page read and write
DAE000
stack
page read and write
370000
heap
page read and write
553E000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
2991000
trusted library allocation
page read and write
1C12000
trusted library allocation
page read and write
101F000
heap
page read and write
5A80000
heap
page read and write
121E000
heap
page read and write
E94000
unkown
page write copy
1B72000
trusted library allocation
page read and write
1D0E8569000
heap
page read and write
FEE000
stack
page read and write
123F000
heap
page read and write
11CB000
heap
page read and write
15E134BF000
heap
page read and write
3E41000
trusted library allocation
page read and write
1B77000
trusted library allocation
page read and write
121E000
heap
page read and write
12EA000
heap
page read and write
2985000
trusted library allocation
page read and write
A97000
trusted library allocation
page execute and read and write
19A0000
heap
page read and write
1D0E8592000
heap
page read and write
1267000
heap
page read and write
1C24000
trusted library allocation
page read and write
15E134C7000
heap
page read and write
6C3F000
stack
page read and write
1157000
heap
page read and write
5F0000
heap
page read and write
93AE000
stack
page read and write
1090000
heap
page read and write
375D000
heap
page read and write
183C000
trusted library allocation
page read and write
1996000
heap
page read and write
1C0F000
trusted library allocation
page read and write
4D93000
heap
page read and write
326E000
trusted library allocation
page read and write
7C8A000
heap
page read and write
2CBC000
stack
page read and write
EDF000
stack
page read and write
3B91000
heap
page read and write
3670000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page read and write
1B78000
trusted library allocation
page read and write
3B91000
heap
page read and write
408000
unkown
page readonly
1996000
heap
page read and write
3E71000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
10EB000
heap
page read and write
13F1000
heap
page read and write
83E000
stack
page read and write
6B3E000
stack
page read and write
1044000
heap
page read and write
4C4E000
stack
page read and write
15E1349B000
heap
page read and write
1D0E859C000
heap
page read and write
29B0000
trusted library allocation
page read and write
1239000
heap
page read and write
284F000
stack
page read and write
1771000
trusted library allocation
page read and write
A94000
heap
page read and write
15E13465000
heap
page read and write
13E4000
heap
page read and write
1562000
trusted library allocation
page read and write
5A75000
heap
page read and write
9F0000
heap
page read and write
1C1F000
trusted library allocation
page read and write
3236000
trusted library allocation
page read and write
121D000
heap
page read and write
1194000
heap
page read and write
13CE000
heap
page read and write
CE42DFF000
stack
page read and write
39A1000
heap
page read and write
102F000
heap
page read and write
27FE000
stack
page read and write
13E3000
heap
page read and write
4D60000
trusted library allocation
page read and write
2BCF000
stack
page read and write
18E1000
heap
page read and write
5590000
trusted library allocation
page read and write
10DE000
stack
page read and write
1C19000
trusted library allocation
page read and write
5750000
trusted library section
page readonly
1C26000
trusted library allocation
page read and write
29B4000
trusted library allocation
page read and write
1046000
heap
page read and write
15E134D7000
heap
page read and write
1996000
heap
page read and write
122E000
heap
page read and write
3670000
trusted library allocation
page read and write
1349000
heap
page read and write
1C04000
trusted library allocation
page read and write
2BBC000
stack
page read and write
1124000
heap
page read and write
39A1000
heap
page read and write
15E134CB000
heap
page read and write
36B0000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
11C5000
heap
page read and write
10E4000
heap
page read and write
1D0E856F000
heap
page read and write
31C6000
trusted library allocation
page read and write
1000000
heap
page read and write
12F1000
heap
page read and write
3D9000
unkown
page readonly
1B72000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
1103000
heap
page read and write
1C26000
trusted library allocation
page read and write
124D000
heap
page read and write
11F8000
heap
page read and write
1771000
trusted library allocation
page read and write
E60000
unkown
page readonly
552E000
trusted library allocation
page read and write
3B91000
heap
page read and write
E90000
heap
page read and write
310000
unkown
page readonly
3D4000
unkown
page write copy
1C27000
trusted library allocation
page read and write
23CE000
unkown
page read and write
1313000
heap
page read and write
293E000
stack
page read and write
4CCE000
stack
page read and write
7282000
trusted library allocation
page read and write
3B70000
heap
page read and write
18E0000
heap
page read and write
2820000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
4104000
trusted library allocation
page read and write
15E134A0000
heap
page read and write
1244000
heap
page read and write
119D000
heap
page read and write
1572000
trusted library allocation
page read and write
122F000
heap
page read and write
3B91000
heap
page read and write
1284000
heap
page read and write
1CDE000
trusted library allocation
page read and write
A94000
heap
page read and write
1280000
heap
page read and write
2A63000
trusted library allocation
page read and write
1C1E000
trusted library allocation
page read and write
1957000
trusted library allocation
page read and write
298D000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
1C17000
trusted library allocation
page read and write
12C3000
heap
page read and write
1B77000
trusted library allocation
page read and write
116B000
heap
page read and write
1D0E85A8000
heap
page read and write
1C16000
trusted library allocation
page read and write
1186000
heap
page read and write
11B8000
heap
page read and write
19A000
stack
page read and write
50AE000
stack
page read and write
222E000
stack
page read and write
144A000
heap
page read and write
3C50000
trusted library allocation
page read and write
1054000
heap
page read and write
519D000
stack
page read and write
1043000
heap
page read and write
1D0E83B0000
heap
page read and write
4C0F000
stack
page read and write
2A33000
trusted library allocation
page read and write
1C1A000
trusted library allocation
page read and write
110E000
heap
page read and write
2A35000
trusted library allocation
page read and write
B16000
heap
page read and write
274E000
stack
page read and write
89E000
stack
page read and write
15E1349B000
heap
page read and write
110A000
heap
page read and write
4041000
trusted library allocation
page read and write
1154000
heap
page read and write
296B000
trusted library allocation
page read and write
CCE000
stack
page read and write
1D0E85A1000
heap
page read and write
D10000
heap
page read and write
1329000
heap
page read and write
AEF000
heap
page read and write
1201000
heap
page read and write
5C9000
heap
page read and write
10E4000
heap
page read and write
936E000
stack
page read and write
1302000
heap
page read and write
1B75000
trusted library allocation
page read and write
E70000
heap
page read and write
10D8000
heap
page read and write
15E134A6000
heap
page read and write
15E134CB000
heap
page read and write
3249000
trusted library allocation
page read and write
1043000
heap
page read and write
3223000
trusted library allocation
page read and write
E94000
heap
page read and write
1054000
heap
page read and write
12E5000
heap
page read and write
1090000
heap
page read and write
116C000
heap
page read and write
2A21000
trusted library allocation
page read and write
3C50000
trusted library allocation
page read and write
1D0E8576000
heap
page read and write
11DC000
heap
page read and write
112E000
remote allocation
page execute and read and write
2A56000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
11E1000
heap
page read and write
3B91000
heap
page read and write
1CA9000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
1439000
heap
page read and write
515F000
heap
page read and write
3C50000
trusted library allocation
page read and write
6A00000
heap
page read and write
1493000
heap
page read and write
3454000
heap
page read and write
4E8000
unkown
page read and write
3E79000
trusted library allocation
page read and write
10AB000
heap
page read and write
3670000
trusted library allocation
page read and write
33F2000
heap
page read and write
110B000
heap
page read and write
110B000
heap
page read and write
1B7A000
trusted library allocation
page read and write
10AA000
heap
page read and write
127D000
heap
page read and write
303F000
stack
page read and write
29F5000
trusted library allocation
page read and write
13F8000
heap
page read and write
3E7B000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
123F000
heap
page read and write
3B71000
heap
page read and write
11EE000
heap
page read and write
1108000
heap
page read and write
36B0000
trusted library allocation
page read and write
A82000
trusted library allocation
page read and write
2DFE000
stack
page read and write
4F05000
heap
page read and write
A94000
heap
page read and write
119D000
heap
page read and write
3132000
trusted library allocation
page read and write
15E134CB000
heap
page read and write
5150000
heap
page read and write
2300000
heap
page read and write
2A54000
trusted library allocation
page read and write
3E7D000
trusted library allocation
page read and write
A94000
heap
page read and write
12CA000
heap
page read and write
5050000
heap
page read and write
1C19000
trusted library allocation
page read and write
1B73000
trusted library allocation
page read and write
14404FF000
stack
page read and write
3670000
trusted library allocation
page read and write
28FE000
unkown
page read and write
1CDB000
trusted library allocation
page read and write
D50000
heap
page read and write
8F7000
stack
page read and write
1122000
heap
page read and write
926E000
stack
page read and write
127D000
heap
page read and write
11FD000
heap
page read and write
344D000
heap
page read and write
29B2000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
13A4000
heap
page read and write
344B000
heap
page read and write
DCE000
stack
page read and write
2A5B000
trusted library allocation
page read and write
5820000
heap
page execute and read and write
E94000
heap
page read and write
3670000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
3388000
heap
page read and write
BA3000
heap
page read and write
2A23000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
5910000
heap
page read and write
1771000
trusted library allocation
page read and write
10CE000
heap
page read and write
40A000
unkown
page read and write
108F000
heap
page read and write
11F9000
heap
page read and write
1280000
heap
page read and write
31FE000
trusted library allocation
page read and write
11A6000
heap
page read and write
1C31000
trusted library allocation
page read and write
2997000
trusted library allocation
page read and write
1361000
heap
page read and write
11B6000
heap
page read and write
E6C000
stack
page read and write
311000
unkown
page execute read
11D2000
heap
page read and write
36B0000
trusted library allocation
page read and write
AB0000
heap
page read and write
11C1000
heap
page read and write
2916000
trusted library allocation
page read and write
1B71000
trusted library allocation
page read and write
1D0E8574000
heap
page read and write
293B000
trusted library allocation
page read and write
E4B000
stack
page read and write
1231000
heap
page read and write
1C04000
trusted library allocation
page read and write
1771000
trusted library allocation
page read and write
11A0000
heap
page read and write
C30000
heap
page read and write
339E000
heap
page read and write
59A000
heap
page read and write
B41000
heap
page read and write
3B91000
heap
page read and write
6D0000
heap
page read and write
115C000
heap
page read and write
50E000
unkown
page readonly
1220000
heap
page read and write
530000
heap
page read and write
3B71000
heap
page read and write
3219000
trusted library allocation
page read and write
11DC000
heap
page read and write
5A1D000
stack
page read and write
11D9000
heap
page read and write
17FF000
stack
page read and write
3A0000
unkown
page readonly
1108000
heap
page read and write
31D7000
trusted library allocation
page read and write
14D2000
heap
page read and write
1027000
heap
page read and write
DFD000
stack
page read and write
2931000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
CE426FF000
stack
page read and write
F3F000
stack
page read and write
2BC000
stack
page read and write
345A000
heap
page read and write
1577000
trusted library allocation
page execute and read and write
2A5F000
trusted library allocation
page read and write
1348000
heap
page read and write
11F7000
heap
page read and write
2841000
trusted library allocation
page read and write
110E000
heap
page read and write
1D0E8548000
heap
page read and write
3D0000
unkown
page write copy
6D7E000
stack
page read and write
125E000
heap
page read and write
1967000
heap
page read and write
15E151F0000
heap
page read and write
14402FA000
stack
page read and write
3B91000
heap
page read and write
136C000
heap
page read and write
11E1000
heap
page read and write
11EE000
heap
page read and write
11E1000
heap
page read and write
4F80000
heap
page execute and read and write
15E13330000
heap
page read and write
1C11000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
1344000
heap
page read and write
360000
heap
page read and write
10A1000
heap
page read and write
56F0000
heap
page read and write
1052000
heap
page read and write
3E41000
trusted library allocation
page read and write
1031000
heap
page read and write
31E7000
trusted library allocation
page read and write
15E1349B000
heap
page read and write
AB8000
heap
page read and write
1580000
heap
page read and write
29B7000
trusted library allocation
page read and write
CE427FF000
stack
page read and write
3C50000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
15E134C8000
heap
page read and write
14409FF000
stack
page read and write
5510000
trusted library allocation
page read and write
311000
unkown
page execute read
A7D000
trusted library allocation
page execute and read and write
19A0000
heap
page read and write
1084000
heap
page read and write
31E5000
trusted library allocation
page read and write
E90000
unkown
page write copy
13B9000
heap
page read and write
3B91000
heap
page read and write
138D000
heap
page read and write
1B76000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
1044000
heap
page read and write
1280000
heap
page read and write
1053000
heap
page read and write
36B0000
trusted library allocation
page read and write
1D0E8592000
heap
page read and write
574B000
stack
page read and write
29CE000
trusted library allocation
page read and write
12FA000
heap
page read and write
1771000
trusted library allocation
page read and write
21E0000
heap
page read and write
325B000
trusted library allocation
page read and write
3728000
trusted library allocation
page read and write
1C0C000
trusted library allocation
page read and write
12E5000
heap
page read and write
18E9000
heap
page read and write
11CC000
heap
page read and write
4E00000
heap
page read and write
1B78000
trusted library allocation
page read and write
1100000
remote allocation
page execute and read and write
1D0E85A5000
heap
page read and write
3E6F000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
87F000
stack
page read and write
1B71000
trusted library allocation
page read and write
1996000
heap
page read and write
A94000
heap
page read and write
29C7000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
3C50000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
10B4000
heap
page read and write
3B91000
heap
page read and write
700000
heap
page read and write
1C3E000
trusted library allocation
page read and write
1969000
heap
page read and write
1B7F000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
1D0E858D000
heap
page read and write
1055000
heap
page read and write
3D0000
unkown
page read and write
3107000
trusted library allocation
page read and write
B53000
heap
page read and write
1CEE000
trusted library allocation
page read and write
1B7F000
trusted library allocation
page read and write
5140000
heap
page read and write
1D0E85A1000
heap
page read and write
291D000
trusted library allocation
page read and write
4D2B000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
2C92000
heap
page read and write
311000
unkown
page execute read
12FD000
heap
page read and write
3670000
trusted library allocation
page read and write
900000
remote allocation
page execute and read and write
122D000
heap
page read and write
298F000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
534D000
stack
page read and write
33DA000
heap
page read and write
10CE000
heap
page read and write
2810000
trusted library allocation
page read and write
F40000
heap
page read and write
10F7000
stack
page read and write
15E134CB000
heap
page read and write
3204000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
DBF000
stack
page read and write
1B78000
trusted library allocation
page read and write
3B91000
heap
page read and write
29CB000
trusted library allocation
page read and write
1B7D000
trusted library allocation
page read and write
15E13492000
heap
page read and write
1169000
heap
page read and write
469000
unkown
page read and write
1967000
heap
page read and write
31D0000
heap
page read and write
2A3B000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
33C2000
heap
page read and write
A94000
heap
page read and write
3364000
heap
page read and write
5524000
trusted library allocation
page read and write
1B77000
trusted library allocation
page read and write
1C24000
trusted library allocation
page read and write
5784000
trusted library allocation
page read and write
1043000
heap
page read and write
1194000
heap
page read and write
56C0000
trusted library allocation
page execute and read and write
1B7D000
trusted library allocation
page read and write
590000
heap
page read and write
29D0000
heap
page read and write
2C90000
heap
page read and write
A00000
heap
page read and write
11AA000
heap
page read and write
5520000
trusted library allocation
page read and write
1395000
heap
page read and write
5014000
trusted library allocation
page read and write
12E6000
heap
page read and write
15E14EA0000
heap
page read and write
1113000
heap
page read and write
1B75000
trusted library allocation
page read and write
344B000
heap
page read and write
3670000
trusted library allocation
page read and write
1053000
heap
page read and write
3B91000
heap
page read and write
121E000
heap
page read and write
10CE000
heap
page read and write
10DC000
heap
page read and write
1923000
trusted library allocation
page read and write
1294000
heap
page read and write
3061000
trusted library allocation
page read and write
1D0E858B000
heap
page read and write
315E000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
1170000
heap
page read and write
31AF000
trusted library allocation
page read and write
1122000
heap
page read and write
CE42BFE000
stack
page read and write
1324000
heap
page read and write
1C3B000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
3B91000
heap
page read and write
1B7F000
trusted library allocation
page read and write
12E6000
heap
page read and write
11B6000
heap
page read and write
1B77000
trusted library allocation
page read and write
1102000
remote allocation
page execute and read and write
1B7A000
trusted library allocation
page read and write
1B7F000
trusted library allocation
page read and write
3050000
heap
page execute and read and write
12D6000
heap
page read and write
3673000
trusted library allocation
page read and write
DDB000
stack
page read and write
1910000
heap
page read and write
1C07000
trusted library allocation
page read and write
D40000
heap
page read and write
124D000
heap
page read and write
1A09000
trusted library allocation
page read and write
3B71000
heap
page read and write
2993000
trusted library allocation
page read and write
12F1000
heap
page read and write
A94000
heap
page read and write
15E13410000
heap
page read and write
3C6000
unkown
page readonly
DC6000
heap
page read and write
12C6000
heap
page read and write
5A20000
trusted library allocation
page execute and read and write
1054000
heap
page read and write
DD0000
unkown
page readonly
111D000
heap
page read and write
29DC000
trusted library allocation
page read and write
1D0E85A8000
heap
page read and write
157B000
trusted library allocation
page execute and read and write
57E000
stack
page read and write
3276000
trusted library allocation
page read and write
12C3000
heap
page read and write
1267000
heap
page read and write
11E9000
heap
page read and write
25FE000
stack
page read and write
1B79000
trusted library allocation
page read and write
10FA000
heap
page read and write
FF0000
heap
page read and write
9B000
stack
page read and write
1974000
heap
page read and write
50E000
unkown
page readonly
12E8000
heap
page read and write
3B91000
heap
page read and write
1D0E859C000
heap
page read and write
A4E000
stack
page read and write
14406FF000
stack
page read and write
119E000
heap
page read and write
134C000
heap
page read and write
E94000
heap
page read and write
29D7000
heap
page read and write
2FC000
stack
page read and write
3B91000
heap
page read and write
1C24000
trusted library allocation
page read and write
31E0000
heap
page read and write
11D9000
heap
page read and write
4D6F000
trusted library allocation
page read and write
2F30000
heap
page read and write
110B000
heap
page read and write
12E5000
heap
page read and write
1570000
trusted library allocation
page read and write
4D3A000
trusted library allocation
page read and write
14407FF000
stack
page read and write
1B71000
trusted library allocation
page read and write
3B91000
heap
page read and write
3E80000
trusted library allocation
page read and write
4D47000
trusted library allocation
page read and write
12D9000
heap
page read and write
33A1000
heap
page read and write
1C22000
trusted library allocation
page read and write
1974000
heap
page read and write
1C32000
trusted library allocation
page read and write
13CE000
heap
page read and write
11BC000
heap
page read and write
1191000
heap
page read and write
1D0E855C000
heap
page read and write
10B4000
heap
page read and write
19A8000
heap
page read and write
2CA0000
heap
page read and write
3ECE000
trusted library allocation
page read and write
111B000
heap
page read and write
12BF000
heap
page read and write
9B0000
heap
page read and write
432000
unkown
page read and write
1032000
heap
page read and write
3241000
trusted library allocation
page read and write
13EB000
heap
page read and write
29FF000
trusted library allocation
page read and write
A94000
heap
page read and write
293E000
trusted library allocation
page read and write
1364000
heap
page read and write
1D0E84FC000
heap
page read and write
29A6000
trusted library allocation
page read and write
49DD000
stack
page read and write
1A4F000
trusted library allocation
page read and write
1771000
trusted library allocation
page read and write
15E1348E000
heap
page read and write
2E8E000
stack
page read and write
32CC000
heap
page read and write
109A000
heap
page read and write
3E76000
trusted library allocation
page read and write
1D0E8540000
heap
page read and write
1C31000
trusted library allocation
page read and write
2995000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
3B6F000
stack
page read and write
12C6000
heap
page read and write
2380000
heap
page read and write
7C82000
heap
page read and write
11B6000
heap
page read and write
1C3C000
trusted library allocation
page read and write
4F00000
heap
page read and write
5C0000
heap
page read and write
1043000
heap
page read and write
29AC000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
B49000
heap
page read and write
708000
heap
page read and write
1129000
heap
page read and write
12D1000
heap
page read and write
11EC000
heap
page read and write
12BE000
heap
page read and write
1170000
heap
page read and write
32C0000
heap
page read and write
2989000
trusted library allocation
page read and write
1D0E8561000
heap
page read and write
580000
heap
page read and write
10A1000
heap
page read and write
3670000
trusted library allocation
page read and write
1D0E85A6000
heap
page read and write
127A000
heap
page read and write
1171000
heap
page read and write
31AB000
trusted library allocation
page read and write
3C6000
unkown
page readonly
3405000
heap
page read and write
13AE000
heap
page read and write
11DF000
heap
page read and write
31B7000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
A63000
trusted library allocation
page execute and read and write
3F45000
trusted library allocation
page read and write
1CAD000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
5F5000
heap
page read and write
A92000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
29E2000
trusted library allocation
page read and write
94C000
stack
page read and write
3670000
trusted library allocation
page read and write
9CE000
stack
page read and write
2A5D000
trusted library allocation
page read and write
3E74000
trusted library allocation
page read and write
B79000
heap
page read and write
1164000
heap
page read and write
5760000
heap
page read and write
3670000
trusted library allocation
page read and write
3B91000
heap
page read and write
1122000
heap
page read and write
1315000
heap
page read and write
1281000
heap
page read and write
5900000
heap
page read and write
1DFF000
stack
page read and write
11AD000
heap
page read and write
13C3000
heap
page read and write
14D2000
heap
page read and write
2A96000
trusted library allocation
page read and write
A94000
heap
page read and write
1329000
heap
page read and write
1C0E000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
E2E000
stack
page read and write
2A1E000
trusted library allocation
page read and write
2A18000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
1365000
heap
page read and write
1D0E8576000
heap
page read and write
1150000
heap
page read and write
520000
heap
page read and write
15E134D4000
heap
page read and write
133A000
heap
page read and write
1054000
heap
page read and write
3B91000
heap
page read and write
15E134CD000
heap
page read and write
3B91000
heap
page read and write
1C3E000
trusted library allocation
page read and write
3B91000
heap
page read and write
3670000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
1C24000
trusted library allocation
page read and write
2270000
heap
page read and write
1CB7000
trusted library allocation
page read and write
12CF000
heap
page read and write
1193000
heap
page read and write
1939000
heap
page read and write
3B91000
heap
page read and write
85F000
stack
page read and write
15E1346C000
heap
page read and write
3217000
trusted library allocation
page read and write
3110000
heap
page read and write
12C3000
heap
page read and write
4D90000
heap
page read and write
127D000
heap
page read and write
CE429FF000
stack
page read and write
56F3000
heap
page read and write
33C2000
heap
page read and write
298B000
trusted library allocation
page read and write
3610000
heap
page read and write
1459000
heap
page read and write
CE423FA000
stack
page read and write
2A29000
trusted library allocation
page read and write
4D8000
unkown
page read and write
4F54000
trusted library section
page readonly
32E5000
heap
page read and write
14403FE000
stack
page read and write
EF6000
heap
page read and write
2FEE000
stack
page read and write
1143000
heap
page read and write
2935000
trusted library allocation
page read and write
1942000
heap
page read and write
12BE000
heap
page read and write
1054000
heap
page read and write
3255000
trusted library allocation
page read and write
1B74000
trusted library allocation
page read and write
4D0F000
stack
page read and write
2A03000
trusted library allocation
page read and write
12CA000
heap
page read and write
3E81000
trusted library allocation
page read and write
1163000
heap
page read and write
12A8000
heap
page read and write
3B91000
heap
page read and write
2B7F000
stack
page read and write
3670000
trusted library allocation
page read and write
153E000
stack
page read and write
29A8000
trusted library allocation
page read and write
A94000
heap
page read and write
110C000
heap
page read and write
313D000
trusted library allocation
page read and write
There are 1449 hidden memdumps, click here to show them.