IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\rstxdhuj[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\5[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000343001\5.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Ylrdnrwcx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe
"C:\Users\user\AppData\Local\Temp\1000342001\rstxdhuj.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 904

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php(x8
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpnd
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://html4/loose.dtd
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://management.azure.commismatching
unknown
http://103.130.147.211/Files/5.exep
unknown
http://103.130.147.211/Files/5.exet
unknown
http://103.130.147.211/Files/5.exes
unknown
http://103.130.147.211/Files/5.exePV
unknown
http://103.130.147.211/Files/5.exej
unknown
http://.css
unknown
http://103.130.147.211/Files/5.exe07.EXER
unknown
http://103.130.147.211/Files/5.exed
unknown
http://103.130.147.211/Files/5.exeY
unknown
http://103.130.147.211/Files/5.exeV
unknown
https://login.chinacloudapi.cn/cannot
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://103.130.147.211/Files/5.exe32.EXEu
unknown
http://103.130.147.211/Files/5.exeP
unknown
http://103.130.147.211/Files/5.exepf0
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
http://dejavu.sourceforge.net/wiki/index.php/Licensehttp://dejavu.sourceforge.net/wiki/index.php/Lic
unknown
http://www.ascendercorp.com/typedesigners.html
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://.jpg
unknown
http://dejavu.sourceforge.net
unknown
http://www.ascendercorp.com/http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.ht
unknown
http://www.ascendercorp.com/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://103.130.147.211/Files/5.exef5E
unknown
http://103.130.147.211/Files/5.exe2
unknown
https://github.com/mgravell/protobuf-net
unknown
http://103.130.147.211/ert
unknown
http://103.130.147.211/Local
unknown
http://185.215.113.16/inc/rstxdhuj.exe5867
unknown
https://github.com/uber-go/dig/issues/new
unknown
http://103.130.147.211/Files/5.exeZ0Y
unknown
http://103.130.147.211/Files/5.exef59e5d67ee87
unknown
http://dejavu.sourceforge.nethttp://dejavu.sourceforge.netFonts
unknown
https://management.chinacloudapi.cnmlkem768:
unknown
http://185.215.113.16/Jo89Ku7d/index.phpQ
unknown
http://103.130.147.211/Files/5.exef59
unknown
http://185.215.113.16/Jo89Ku7d/index.php00342001
unknown
http://185.215.113.16/Jo89Ku7d/index.phpRNAM
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://login.microsoftonline.com/crypto/rc4:
unknown
http://103.130.147.211/
unknown
http://185.215.113.16/inc/rstxdhuj.exe
unknown
http://103.130.147.211/Files/5.exe
unknown
http://103.130.147.211/c
unknown
http://scripts.sil.org/OFL
unknown
http://dejavu.sourceforge.net/wiki/index.php/License
unknown
http://103.130.147.211/Files/5.exep0g
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
google.com
142.250.186.46

IPs

IP
Domain
Country
Malicious
103.130.147.211
unknown
Turkey
malicious
185.215.113.16
unknown
Portugal
malicious
142.250.186.46
google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ylrdnrwcx

Memdumps

Base Address
Regiontype
Protect
Malicious
2591000
trusted library allocation
page read and write
malicious
51B0000
direct allocation
page read and write
malicious
4E30000
direct allocation
page read and write
malicious
3611000
trusted library allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
26E1000
trusted library allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
861000
unkown
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
5A30000
trusted library section
page read and write
malicious
4FC0000
direct allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
49F0000
direct allocation
page read and write
malicious
5190000
direct allocation
page execute and read and write
BB0000
direct allocation
page read and write
543E000
stack
page read and write
4D21000
heap
page read and write
1595000
heap
page read and write
2963000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
2783000
trusted library allocation
page read and write
4D21000
heap
page read and write
F7E000
heap
page read and write
1003000
heap
page read and write
EF7000
stack
page read and write
2892000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
298F000
trusted library allocation
page read and write
4D21000
heap
page read and write
2CA4000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
5E4000
heap
page read and write
269000
unkown
page write copy
4A90000
direct allocation
page read and write
3EA000
unkown
page execute and read and write
4D21000
heap
page read and write
4B70000
direct allocation
page execute and read and write
4B31000
heap
page read and write
12DE000
stack
page read and write
4D21000
heap
page read and write
34DE000
stack
page read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
40FE000
stack
page read and write
557000
stack
page read and write
4D21000
heap
page read and write
4D0000
unkown
page execute and read and write
285C000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
286B000
trusted library allocation
page read and write
12BB000
trusted library allocation
page execute and read and write
2AC3000
trusted library allocation
page read and write
513000
unkown
page execute and read and write
2A2C000
trusted library allocation
page read and write
6B4000
unkown
page execute and write copy
4BFE000
stack
page read and write
158C000
heap
page read and write
201000
unkown
page execute and write copy
690000
heap
page read and write
2843000
trusted library allocation
page read and write
B30000
unkown
page execute and read and write
3A6E000
stack
page read and write
23D0000
heap
page read and write
27F2000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
41FF000
stack
page read and write
3C1F000
stack
page read and write
4B20000
direct allocation
page read and write
297E000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
33FF000
stack
page read and write
4B31000
heap
page read and write
4D21000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
38EF000
stack
page read and write
28D4000
trusted library allocation
page read and write
4D21000
heap
page read and write
200000
unkown
page read and write
4D21000
heap
page read and write
2862000
trusted library allocation
page read and write
54AE000
stack
page read and write
59B0000
trusted library allocation
page execute and read and write
2B3C000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
3DFF000
stack
page read and write
4B80000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
1B4000
unkown
page readonly
465E000
stack
page read and write
BB0000
direct allocation
page read and write
2A89000
trusted library allocation
page read and write
4D31000
heap
page read and write
2A0B000
trusted library allocation
page read and write
4B3F000
stack
page read and write
2C91000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
4D21000
heap
page read and write
2A09000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
2C7A000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
38FF000
stack
page read and write
2A3B000
trusted library allocation
page read and write
4D21000
heap
page read and write
201000
unkown
page execute and write copy
55BE000
stack
page read and write
5370000
direct allocation
page execute and read and write
2A57000
trusted library allocation
page read and write
357F000
stack
page read and write
399F000
stack
page read and write
31FE000
stack
page read and write
1510000
heap
page read and write
4B31000
heap
page read and write
5960000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
585D000
stack
page read and write
4B60000
direct allocation
page execute and read and write
4D21000
heap
page read and write
53C0000
direct allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
893000
trusted library allocation
page execute and read and write
8B0000
trusted library allocation
page read and write
10C4000
heap
page read and write
3E9F000
stack
page read and write
4B20000
direct allocation
page read and write
4B31000
heap
page read and write
2C78000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
4B31000
heap
page read and write
2C41000
trusted library allocation
page read and write
4E30000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
278B000
trusted library allocation
page read and write
FC3000
heap
page read and write
3F7E000
stack
page read and write
4B31000
heap
page read and write
30A0000
direct allocation
page read and write
2DF8000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
2A5B000
trusted library allocation
page read and write
47FF000
stack
page read and write
2B47000
trusted library allocation
page read and write
31AE000
stack
page read and write
4B31000
heap
page read and write
4FC0000
direct allocation
page read and write
2894000
trusted library allocation
page read and write
8CB000
unkown
page execute and read and write
357E000
stack
page read and write
35DF000
stack
page read and write
513000
unkown
page execute and write copy
114F000
heap
page read and write
5349000
stack
page read and write
3E3F000
stack
page read and write
3EA000
unkown
page execute and read and write
379A000
trusted library allocation
page read and write
6AD0000
heap
page read and write
483E000
stack
page read and write
4D21000
heap
page read and write
2877000
trusted library allocation
page read and write
4B31000
heap
page read and write
2C09000
trusted library allocation
page read and write
2845000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
4B31000
heap
page read and write
279E000
trusted library allocation
page read and write
26B000
unkown
page execute and read and write
347E000
stack
page read and write
4D21000
heap
page read and write
5194000
heap
page read and write
11EA000
heap
page read and write
5010000
direct allocation
page execute and read and write
37F8000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page read and write
101B000
heap
page read and write
4B31000
heap
page read and write
15AF000
heap
page read and write
2A2F000
trusted library allocation
page read and write
BB0000
direct allocation
page read and write
30A0000
direct allocation
page read and write
4B31000
heap
page read and write
3599000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
1235000
heap
page read and write
4E30000
direct allocation
page read and write
269000
unkown
page read and write
2FDE000
stack
page read and write
4A30000
heap
page execute and read and write
30A0000
direct allocation
page read and write
245E000
stack
page read and write
2C20000
heap
page read and write
52FF000
stack
page read and write
F98000
heap
page read and write
2C1E000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
4670000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
2944000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
468E000
stack
page read and write
4D21000
heap
page read and write
5D5000
heap
page read and write
4E7E000
stack
page read and write
6B0000
heap
page read and write
297C000
trusted library allocation
page read and write
4CBF000
stack
page read and write
2B13000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
2C10000
trusted library allocation
page execute and read and write
4571000
heap
page read and write
33EF000
stack
page read and write
5990000
trusted library allocation
page read and write
B80000
heap
page read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
8BA000
trusted library allocation
page execute and read and write
10C4000
heap
page read and write
86CC000
stack
page read and write
5340000
direct allocation
page execute and read and write
2965000
trusted library allocation
page read and write
14AB000
stack
page read and write
30A0000
direct allocation
page read and write
2809000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
393F000
stack
page read and write
70E000
stack
page read and write
870E000
stack
page read and write
1599000
heap
page read and write
2902000
trusted library allocation
page read and write
3A7F000
stack
page read and write
32EE000
stack
page read and write
2A28000
trusted library allocation
page read and write
14C0000
heap
page read and write
27A0000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
514000
unkown
page execute and write copy
2C07000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
39DE000
stack
page read and write
1198000
heap
page read and write
2A45000
trusted library allocation
page read and write
15AD000
heap
page read and write
2B44000
trusted library allocation
page read and write
28D2000
trusted library allocation
page read and write
513000
unkown
page execute and write copy
4B31000
heap
page read and write
479E000
stack
page read and write
37AF000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
295F000
trusted library allocation
page read and write
3FDF000
stack
page read and write
4D21000
heap
page read and write
F8A000
heap
page read and write
443F000
stack
page read and write
146E000
stack
page read and write
3BAE000
stack
page read and write
158D000
heap
page read and write
4D21000
heap
page read and write
5AD0000
trusted library allocation
page execute and read and write
5150000
direct allocation
page execute and read and write
2A2E000
stack
page read and write
2942000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
3B1E000
stack
page read and write
129F000
stack
page read and write
F7E000
heap
page read and write
37EE000
stack
page read and write
4B31000
heap
page read and write
2D90000
heap
page read and write
4A90000
trusted library allocation
page read and write
4571000
heap
page read and write
4B20000
direct allocation
page read and write
2896000
trusted library allocation
page read and write
E8F000
stack
page read and write
536E000
stack
page read and write
27B3000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
F60000
heap
page read and write
2882000
trusted library allocation
page read and write
4CFE000
stack
page read and write
3EA000
unkown
page execute and read and write
297A000
trusted library allocation
page read and write
89D000
trusted library allocation
page execute and read and write
3CFF000
stack
page read and write
3B7F000
stack
page read and write
2785000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
49F0000
direct allocation
page read and write
4D21000
heap
page read and write
42EF000
stack
page read and write
4B1F000
stack
page read and write
12E0000
heap
page read and write
2D70000
trusted library allocation
page read and write
4B31000
heap
page read and write
2C3D000
trusted library allocation
page read and write
F7A000
heap
page read and write
4D21000
heap
page read and write
5380000
direct allocation
page execute and read and write
4D21000
heap
page read and write
755000
heap
page read and write
4B20000
direct allocation
page read and write
2AC1000
trusted library allocation
page read and write
349F000
stack
page read and write
35BE000
stack
page read and write
500C000
stack
page read and write
2DE1000
trusted library allocation
page read and write
4D21000
heap
page read and write
54A0000
heap
page read and write
281D000
trusted library allocation
page read and write
1599000
heap
page read and write
2C52000
trusted library allocation
page read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
269000
unkown
page write copy
4B31000
heap
page read and write
2BEC000
trusted library allocation
page read and write
14CA000
heap
page read and write
5340000
direct allocation
page execute and read and write
299D000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
32AF000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
BC0000
heap
page read and write
2948000
trusted library allocation
page read and write
53D0000
direct allocation
page execute and read and write
2DD0000
heap
page execute and read and write
4D21000
heap
page read and write
4FC0000
direct allocation
page read and write
4D21000
heap
page read and write
28D6000
trusted library allocation
page read and write
2F7E000
stack
page read and write
4D0000
unkown
page execute and read and write
6C0000
heap
page read and write
5190000
heap
page read and write
526E000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
27CC000
trusted library allocation
page read and write
4B31000
heap
page read and write
6B4000
unkown
page execute and write copy
4B20000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
53FE000
stack
page read and write
4F7E000
stack
page read and write
407F000
stack
page read and write
51B0000
direct allocation
page read and write
2D97000
heap
page read and write
2C2F000
trusted library allocation
page read and write
8B6000
trusted library allocation
page execute and read and write
4D21000
heap
page read and write
4A90000
direct allocation
page read and write
2A55000
trusted library allocation
page read and write
F67000
heap
page read and write
4B31000
heap
page read and write
2860000
trusted library allocation
page read and write
4B31000
heap
page read and write
2A2A000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
45FE000
stack
page read and write
4B80000
direct allocation
page execute and read and write
2D70000
heap
page read and write
4FD000
unkown
page execute and read and write
46FE000
stack
page read and write
30B7000
heap
page read and write
6605000
heap
page read and write
423E000
stack
page read and write
4E91000
direct allocation
page read and write
2B36000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
D12000
unkown
page execute and read and write
4990000
heap
page read and write
790000
heap
page read and write
F80000
heap
page read and write
3DEF000
stack
page read and write
367F000
stack
page read and write
4D21000
heap
page read and write
200000
unkown
page readonly
6600000
heap
page read and write
2932000
trusted library allocation
page read and write
31BF000
stack
page read and write
5310000
direct allocation
page execute and read and write
27EF000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
4B31000
heap
page read and write
4B50000
heap
page read and write
4EAE000
stack
page read and write
2B10000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
580F000
stack
page read and write
27E7000
trusted library allocation
page read and write
32BF000
stack
page read and write
894000
trusted library allocation
page read and write
15AF000
heap
page read and write
70F1000
heap
page read and write
861000
unkown
page execute and write copy
6606000
heap
page read and write
411F000
stack
page read and write
5E20000
trusted library allocation
page execute and read and write
2A14000
trusted library allocation
page read and write
FFE000
stack
page read and write
4FD000
unkown
page execute and read and write
4FEE000
stack
page read and write
2A81000
trusted library allocation
page read and write
4BBF000
stack
page read and write
2EEF000
stack
page read and write
2C72000
trusted library allocation
page read and write
4B31000
heap
page read and write
2C6F000
stack
page read and write
510F000
stack
page read and write
10C4000
heap
page read and write
3E3E000
stack
page read and write
3CBF000
stack
page read and write
26B000
unkown
page execute and read and write
5720000
heap
page execute and read and write
3A2F000
stack
page read and write
5AE000
heap
page read and write
860000
unkown
page readonly
10C4000
heap
page read and write
333E000
stack
page read and write
2AF8000
trusted library allocation
page read and write
6B2000
unkown
page execute and read and write
2CBD000
trusted library allocation
page read and write
4D21000
heap
page read and write
3D9E000
stack
page read and write
27D2000
trusted library allocation
page read and write
533E000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4A51000
direct allocation
page read and write
30A0000
direct allocation
page read and write
2C1C000
trusted library allocation
page read and write
1507000
heap
page read and write
8CB000
trusted library allocation
page execute and read and write
4D21000
heap
page read and write
2C26000
trusted library allocation
page read and write
280F000
trusted library allocation
page read and write
2997000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
475F000
stack
page read and write
56EE000
stack
page read and write
283F000
trusted library allocation
page read and write
343E000
stack
page read and write
2C93000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
46BF000
stack
page read and write
27BA000
trusted library allocation
page read and write
128D000
trusted library allocation
page execute and read and write
1586000
heap
page read and write
5140000
direct allocation
page execute and read and write
40BE000
stack
page read and write
287D000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
2BEE000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
51FE000
stack
page read and write
4D21000
heap
page read and write
27B1000
trusted library allocation
page read and write
B8E000
stack
page read and write
393E000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
2B23000
trusted library allocation
page read and write
5BB0000
heap
page read and write
3E2E000
stack
page read and write
4B31000
heap
page read and write
6DA6000
heap
page read and write
3D5F000
stack
page read and write
483F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
29B4000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
4D21000
heap
page read and write
2C70000
trusted library allocation
page read and write
674E000
stack
page read and write
11D2000
heap
page read and write
288E000
trusted library allocation
page read and write
554C000
stack
page read and write
200000
unkown
page read and write
5150000
direct allocation
page execute and read and write
B73000
unkown
page execute and write copy
5040000
direct allocation
page execute and read and write
291B000
trusted library allocation
page read and write
1095000
heap
page read and write
28AD000
trusted library allocation
page read and write
4D21000
heap
page read and write
30DF000
stack
page read and write
59C0000
trusted library allocation
page execute and read and write
4B50000
direct allocation
page execute and read and write
4B31000
heap
page read and write
B5E000
stack
page read and write
2A0D000
trusted library allocation
page read and write
4B31000
heap
page read and write
306E000
stack
page read and write
4B31000
heap
page read and write
BB0000
direct allocation
page read and write
7F0000
heap
page read and write
353F000
stack
page read and write
4B31000
heap
page read and write
5B5D000
stack
page read and write
42FF000
stack
page read and write
406F000
stack
page read and write
2923000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
4B31000
heap
page read and write
4A3E000
stack
page read and write
2C5D000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
429E000
stack
page read and write
4B20000
direct allocation
page read and write
37F6000
trusted library allocation
page read and write
36AE000
stack
page read and write
1168000
heap
page read and write
5170000
direct allocation
page execute and read and write
4D21000
heap
page read and write
1120000
heap
page read and write
54EB000
stack
page read and write
432E000
stack
page read and write
B74000
unkown
page execute and write copy
2925000
trusted library allocation
page read and write
493F000
stack
page read and write
28F3000
trusted library allocation
page read and write
2993000
trusted library allocation
page read and write
461F000
stack
page read and write
43DE000
stack
page read and write
595E000
stack
page read and write
2C0D000
trusted library allocation
page read and write
2898000
trusted library allocation
page read and write
4991000
heap
page read and write
2770000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
289A000
trusted library allocation
page read and write
F0B000
stack
page read and write
282C000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
5021000
direct allocation
page read and write
28AB000
trusted library allocation
page read and write
2823000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
27B5000
trusted library allocation
page read and write
10C0000
heap
page read and write
4DF9000
stack
page read and write
32FE000
stack
page read and write
45BE000
stack
page read and write
2AF1000
trusted library allocation
page read and write
335F000
stack
page read and write
2A59000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
325E000
stack
page read and write
14CE000
heap
page read and write
4B31000
heap
page read and write
2C4E000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
2B2F000
stack
page read and write
28FA000
trusted library allocation
page read and write
4D21000
heap
page read and write
37FF000
stack
page read and write
4D21000
heap
page read and write
B5B000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
291F000
trusted library allocation
page read and write
6D7A000
heap
page read and write
5AE0000
trusted library section
page read and write
392E000
stack
page read and write
C0000
unkown
page readonly
31BF000
stack
page read and write
29CB000
trusted library allocation
page read and write
433E000
stack
page read and write
4B31000
heap
page read and write
10C4000
heap
page read and write
276C000
trusted library allocation
page read and write
4D21000
heap
page read and write
8C5000
trusted library allocation
page execute and read and write
140E000
stack
page read and write
2868000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
4D21000
heap
page read and write
4570000
heap
page read and write
4B31000
heap
page read and write
28B3000
trusted library allocation
page read and write
5A15000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
2A74000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
23D8000
heap
page read and write
316F000
stack
page read and write
572E000
stack
page read and write
2879000
trusted library allocation
page read and write
4D21000
heap
page read and write
4A20000
trusted library allocation
page read and write
52FB000
stack
page read and write
2B08000
trusted library allocation
page read and write
15AF000
heap
page read and write
12A6000
trusted library allocation
page execute and read and write
4D21000
heap
page read and write
2B3A000
trusted library allocation
page read and write
433F000
stack
page read and write
276E000
trusted library allocation
page read and write
497F000
stack
page read and write
2ACA000
trusted library allocation
page read and write
5A9C000
stack
page read and write
513000
unkown
page execute and read and write
2AEB000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
4B40000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
5558000
heap
page read and write
4B31000
heap
page read and write
880E000
stack
page read and write
2B0C000
trusted library allocation
page read and write
8C9000
unkown
page read and write
3ABE000
stack
page read and write
2978000
trusted library allocation
page read and write
4D0000
unkown
page execute and read and write
4B31000
heap
page read and write
5340000
direct allocation
page execute and read and write
27E5000
trusted library allocation
page read and write
4D21000
heap
page read and write
289D000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
4D21000
heap
page read and write
28E9000
trusted library allocation
page read and write
FA0000
heap
page read and write
1270000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
3BBE000
stack
page read and write
294C000
trusted library allocation
page read and write
26E7000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
287F000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
BAC000
stack
page read and write
28ED000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
291D000
trusted library allocation
page read and write
3F3F000
stack
page read and write
6DAE000
heap
page read and write
2B6E000
stack
page read and write
4B31000
heap
page read and write
2A5D000
trusted library allocation
page read and write
3F6E000
stack
page read and write
3C5E000
stack
page read and write
12AA000
trusted library allocation
page execute and read and write
2D6E000
stack
page read and write
C2000
unkown
page readonly
4B31000
heap
page read and write
70F0000
heap
page read and write
2A70000
trusted library allocation
page read and write
2934000
trusted library allocation
page read and write
10C4000
heap
page read and write
8C7000
trusted library allocation
page execute and read and write
27B7000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
512E000
stack
page read and write
4B31000
heap
page read and write
5AC0000
trusted library allocation
page read and write
2E3E000
stack
page read and write
AFD000
stack
page read and write
4B31000
heap
page read and write
F58000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
795000
heap
page read and write
5A2E000
stack
page read and write
59A0000
trusted library allocation
page read and write
28D9000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
2E9F000
stack
page read and write
BC0000
heap
page read and write
840000
heap
page read and write
2B2A000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
558C000
heap
page read and write
3ADF000
stack
page read and write
4B3D000
stack
page read and write
4BBE000
stack
page read and write
30BE000
stack
page read and write
2A8F000
trusted library allocation
page read and write
2A22000
trusted library allocation
page read and write
4B31000
heap
page read and write
2A3D000
trusted library allocation
page read and write
27A2000
trusted library allocation
page read and write
B73000
unkown
page execute and read and write
4D21000
heap
page read and write
FC0000
heap
page read and write
3591000
trusted library allocation
page read and write
5180000
direct allocation
page execute and read and write
294F000
trusted library allocation
page read and write
4D00000
heap
page read and write
F20000
heap
page read and write
4B31000
heap
page read and write
2ADC000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
27D5000
trusted library allocation
page read and write
4B31000
heap
page read and write
288A000
trusted library allocation
page read and write
401E000
stack
page read and write
4B31000
heap
page read and write
2C46000
trusted library allocation
page read and write
27FE000
trusted library allocation
page read and write
2A51000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
41EE000
stack
page read and write
5830000
trusted library section
page read and write
40BF000
stack
page read and write
2AD4000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4571000
heap
page read and write
5330000
direct allocation
page execute and read and write
F70000
heap
page read and write
2A3F000
trusted library allocation
page read and write
4D21000
heap
page read and write
5211000
direct allocation
page read and write
F50000
heap
page read and write
74C000
stack
page read and write
2C37000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
151F000
heap
page read and write
4D21000
heap
page read and write
1599000
heap
page read and write
4D21000
heap
page read and write
2936000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4A90000
direct allocation
page read and write
36BF000
stack
page read and write
2A53000
trusted library allocation
page read and write
497E000
stack
page read and write
2AB3000
trusted library allocation
page read and write
52C0000
heap
page read and write
339E000
stack
page read and write
44DF000
stack
page read and write
2480000
heap
page execute and read and write
4B31000
heap
page read and write
1163000
heap
page read and write
27FC000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
290A000
trusted library allocation
page read and write
311E000
stack
page read and write
63C000
heap
page read and write
389E000
stack
page read and write
900000
trusted library allocation
page read and write
4D30000
heap
page read and write
4D21000
heap
page read and write
7100000
heap
page read and write
2982000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
553F000
heap
page read and write
10C4000
heap
page read and write
49F0000
direct allocation
page read and write
29B8000
trusted library allocation
page read and write
1284000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
200000
unkown
page readonly
4991000
heap
page read and write
51E0000
direct allocation
page execute and read and write
30A0000
direct allocation
page read and write
D14000
unkown
page execute and write copy
30A0000
direct allocation
page read and write
10C4000
heap
page read and write
2A6E000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
262000
unkown
page execute and read and write
FEB000
heap
page read and write
4D21000
heap
page read and write
8C9000
unkown
page write copy
2CAE000
stack
page read and write
5AB0000
trusted library allocation
page read and write
6D70000
heap
page read and write
10C4000
heap
page read and write
487E000
stack
page read and write
30B0000
heap
page read and write
3DE1000
trusted library allocation
page read and write
4B31000
heap
page read and write
2AD2000
trusted library allocation
page read and write
70FE000
heap
page read and write
2C6C000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
2A78000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
A1E000
stack
page read and write
5AA6000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
28BB000
trusted library allocation
page read and write
26B0000
heap
page read and write
442F000
stack
page read and write
2929000
trusted library allocation
page read and write
2C3B000
trusted library allocation
page read and write
8B2000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
276A000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
5AA000
heap
page read and write
4A90000
direct allocation
page read and write
4D21000
heap
page read and write
68E000
heap
page read and write
352F000
stack
page read and write
2AAC000
trusted library allocation
page read and write
910000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
2A0F000
trusted library allocation
page read and write
570E000
stack
page read and write
294A000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
356E000
stack
page read and write
2BBE000
stack
page read and write
3B6F000
stack
page read and write
4D21000
heap
page read and write
4571000
heap
page read and write
514000
unkown
page execute and write copy
2AC7000
trusted library allocation
page read and write
51D0000
direct allocation
page execute and read and write
2A43000
trusted library allocation
page read and write
46FF000
stack
page read and write
2D2E000
stack
page read and write
302F000
stack
page read and write
10AE000
stack
page read and write
2C01000
trusted library allocation
page read and write
A4A000
unkown
page execute and read and write
2804000
trusted library allocation
page read and write
2C0D000
stack
page read and write
4B31000
heap
page read and write
6B4000
unkown
page execute and write copy
26B000
unkown
page execute and read and write
2338000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
4D21000
heap
page read and write
5514000
heap
page read and write
4D20000
heap
page read and write
5980000
trusted library allocation
page read and write
262000
unkown
page execute and read and write
2CBF000
stack
page read and write
269000
unkown
page read and write
282A000
trusted library allocation
page read and write
514000
unkown
page execute and write copy
27D0000
trusted library allocation
page read and write
4B31000
heap
page read and write
12D0000
trusted library allocation
page read and write
BA0000
heap
page read and write
50EE000
stack
page read and write
4D21000
heap
page read and write
5350000
direct allocation
page execute and read and write
3E7E000
stack
page read and write
2A4F000
trusted library allocation
page read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
29DD000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
74E000
stack
page read and write
14F6000
heap
page read and write
2ADA000
trusted library allocation
page read and write
4D21000
heap
page read and write
2CBF000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
400000
remote allocation
page execute and read and write
27EB000
trusted library allocation
page read and write
B3E000
stack
page read and write
4D21000
heap
page read and write
5920000
trusted library allocation
page read and write
473E000
stack
page read and write
1294000
trusted library allocation
page read and write
54D0000
heap
page read and write
5160000
direct allocation
page execute and read and write
2D9D000
heap
page read and write
2DFF000
stack
page read and write
1090000
heap
page read and write
4A1E000
stack
page read and write
1591000
heap
page read and write
BB0000
direct allocation
page read and write
2C74000
trusted library allocation
page read and write
4B31000
heap
page read and write
4D21000
heap
page read and write
54E1000
heap
page read and write
F83000
heap
page read and write
2F2E000
stack
page read and write
4F7F000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
12B7000
trusted library allocation
page execute and read and write
6C6C000
stack
page read and write
2A8D000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
4A90000
direct allocation
page read and write
2A41000
trusted library allocation
page read and write
4D21000
heap
page read and write
30A0000
direct allocation
page read and write
27CA000
trusted library allocation
page read and write
F40000
heap
page read and write
451E000
stack
page read and write
522F000
stack
page read and write
10C4000
heap
page read and write
200000
unkown
page read and write
12FA000
stack
page read and write
2C20000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
2C60000
heap
page read and write
4D21000
heap
page read and write
279C000
trusted library allocation
page read and write
26E0000
heap
page read and write
4C20000
direct allocation
page execute and read and write
51B0000
direct allocation
page read and write
860000
unkown
page read and write
2AAE000
trusted library allocation
page read and write
4D21000
heap
page read and write
2A76000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
5572000
heap
page read and write
37FE000
stack
page read and write
4B31000
heap
page read and write
10C4000
heap
page read and write
371F000
stack
page read and write
2817000
trusted library allocation
page read and write
4991000
heap
page read and write
117D000
heap
page read and write
2A7B000
trusted library allocation
page read and write
4B31000
heap
page read and write
2C33000
trusted library allocation
page read and write
53AE000
stack
page read and write
10C4000
heap
page read and write
4D21000
heap
page read and write
5320000
direct allocation
page execute and read and write
3F7F000
stack
page read and write
4ABE000
stack
page read and write
4FD000
unkown
page execute and read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
305F000
stack
page read and write
1290000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
4A10000
trusted library allocation
page read and write
397E000
stack
page read and write
3FBE000
stack
page read and write
1571000
heap
page read and write
32FF000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
BB0000
direct allocation
page read and write
3A3F000
stack
page read and write
2DAF000
stack
page read and write
5A20000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
2980000
trusted library allocation
page read and write
30A0000
direct allocation
page read and write
4D21000
heap
page read and write
5C5E000
stack
page read and write
27ED000
trusted library allocation
page read and write
684F000
stack
page read and write
2AA0000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
4B20000
direct allocation
page read and write
2906000
trusted library allocation
page read and write
4D21000
heap
page read and write
BB0000
direct allocation
page read and write
425F000
stack
page read and write
285A000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
4A7F000
stack
page read and write
4B31000
heap
page read and write
4D21000
heap
page read and write
69CE000
stack
page read and write
D80000
heap
page read and write
DF0000
heap
page read and write
4A90000
direct allocation
page read and write
29B2000
trusted library allocation
page read and write
40AE000
stack
page read and write
5B30000
trusted library section
page read and write
3EDE000
stack
page read and write
1586000
heap
page read and write
2A96000
trusted library allocation
page read and write
EFD000
stack
page read and write
201000
unkown
page execute and write copy
64C000
heap
page read and write
4D21000
heap
page read and write
4980000
heap
page read and write
12A0000
trusted library allocation
page read and write
2806000
trusted library allocation
page read and write
29EF000
stack
page read and write
557E000
stack
page read and write
27E3000
trusted library allocation
page read and write
15B2000
heap
page read and write
2970000
trusted library allocation
page read and write
2CC1000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
1283000
trusted library allocation
page execute and read and write
112B000
heap
page read and write
5440000
remote allocation
page read and write
15A2000
heap
page read and write
2CBB000
trusted library allocation
page read and write
10C4000
heap
page read and write
5000000
direct allocation
page execute and read and write
6B2000
unkown
page execute and read and write
6B2000
unkown
page execute and read and write
4FD0000
direct allocation
page execute and read and write
26AE000
stack
page read and write
41BF000
stack
page read and write
4D21000
heap
page read and write
41AF000
stack
page read and write
10C4000
heap
page read and write
1027000
heap
page read and write
2D6C000
stack
page read and write
49D0000
trusted library allocation
page execute and read and write
14B0000
heap
page read and write
4B20000
direct allocation
page read and write
BCB000
heap
page read and write
543F000
stack
page read and write
29D9000
trusted library allocation
page read and write
1024000
heap
page read and write
28E7000
trusted library allocation
page read and write
4D21000
heap
page read and write
29F0000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
44BE000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4FAC000
stack
page read and write
4D21000
heap
page read and write
5340000
direct allocation
page execute and read and write
4D21000
heap
page read and write
2F3F000
stack
page read and write
4991000
heap
page read and write
54B0000
heap
page read and write
5130000
direct allocation
page execute and read and write
4D21000
heap
page read and write
48DE000
stack
page read and write
29A2000
trusted library allocation
page read and write
8C2000
unkown
page execute and read and write
4B31000
heap
page read and write
2802000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
564F000
stack
page read and write
4C00000
direct allocation
page execute and read and write
4D21000
heap
page read and write
8C2000
trusted library allocation
page read and write
383E000
stack
page read and write
5E00000
heap
page read and write
4D21000
heap
page read and write
2AD8000
trusted library allocation
page read and write
B5D000
unkown
page execute and read and write
11D7000
heap
page read and write
4D21000
heap
page read and write
BB0000
direct allocation
page read and write
437E000
stack
page read and write
29F8000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
505000
unkown
page execute and read and write
2C35000
trusted library allocation
page read and write
505000
unkown
page execute and read and write
2904000
trusted library allocation
page read and write
4B31000
heap
page read and write
592F000
stack
page read and write
1220000
heap
page read and write
293E000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
B1F000
stack
page read and write
27A7000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
447F000
stack
page read and write
2B04000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
BB0000
direct allocation
page read and write
1022000
heap
page read and write
51B0000
direct allocation
page read and write
547E000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4D21000
heap
page read and write
29EE000
trusted library allocation
page read and write
279A000
trusted library allocation
page read and write
10FD000
stack
page read and write
309E000
stack
page read and write
3BFE000
stack
page read and write
4FC0000
direct allocation
page read and write
3D3E000
stack
page read and write
343F000
stack
page read and write
439F000
stack
page read and write
4B20000
direct allocation
page read and write
366F000
stack
page read and write
266E000
stack
page read and write
29F2000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
489F000
stack
page read and write
582E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
2787000
trusted library allocation
page read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
321F000
stack
page read and write
505000
unkown
page execute and read and write
27EF000
stack
page read and write
342E000
stack
page read and write
1598000
heap
page read and write
30A0000
direct allocation
page read and write
28CC000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
415E000
stack
page read and write
36BE000
stack
page read and write
BB0000
direct allocation
page read and write
2BCE000
stack
page read and write
4E30000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
2ABD000
trusted library allocation
page read and write
4B31000
heap
page read and write
BB0000
direct allocation
page read and write
BDC000
heap
page read and write
4B20000
direct allocation
page read and write
4D21000
heap
page read and write
2460000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
4D21000
heap
page read and write
2AF3000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
4D21000
heap
page read and write
2DEE000
stack
page read and write
BD0000
heap
page read and write
49F0000
direct allocation
page read and write
45BF000
stack
page read and write
2841000
trusted library allocation
page read and write
4D21000
heap
page read and write
2B3E000
trusted library allocation
page read and write
456F000
stack
page read and write
457F000
stack
page read and write
4D21000
heap
page read and write
285E000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
37BF000
stack
page read and write
29D3000
trusted library allocation
page read and write
27CE000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
6ACF000
stack
page read and write
29CF000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
447E000
stack
page read and write
8490000
heap
page read and write
3BBF000
stack
page read and write
4B31000
heap
page read and write
159D000
heap
page read and write
8F0000
trusted library allocation
page execute and read and write
4D21000
heap
page read and write
4B31000
heap
page read and write
3A7E000
stack
page read and write
B65000
unkown
page execute and read and write
4B31000
heap
page read and write
8AD000
trusted library allocation
page execute and read and write
4B31000
heap
page read and write
2DBE000
stack
page read and write
3CEE000
stack
page read and write
200000
unkown
page readonly
55EE000
stack
page read and write
41FE000
stack
page read and write
59D0000
trusted library allocation
page execute and read and write
37D8000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
4B31000
heap
page read and write
2AA4000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
5A0000
heap
page read and write
4D21000
heap
page read and write
361E000
stack
page read and write
4B31000
heap
page read and write
5150000
direct allocation
page execute and read and write
5150000
direct allocation
page execute and read and write
28BD000
trusted library allocation
page read and write
10C4000
heap
page read and write
2ABF000
trusted library allocation
page read and write
295D000
trusted library allocation
page read and write
599D000
stack
page read and write
2A72000
trusted library allocation
page read and write
4B31000
heap
page read and write
4F90000
direct allocation
page execute and read and write
4B31000
heap
page read and write
2917000
trusted library allocation
page read and write
10C4000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
49DF000
stack
page read and write
2940000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
D1C000
stack
page read and write
4D21000
heap
page read and write
281B000
trusted library allocation
page read and write
27A4000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
513000
unkown
page execute and write copy
4D21000
heap
page read and write
698F000
stack
page read and write
4B30000
heap
page read and write
4B31000
heap
page read and write
85CC000
stack
page read and write
307F000
stack
page read and write
4D21000
heap
page read and write
15A2000
heap
page read and write
241C000
stack
page read and write
262000
unkown
page execute and read and write
5BA0000
trusted library allocation
page execute and read and write
2946000
trusted library allocation
page read and write
1586000
heap
page read and write
296C000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
2995000
trusted library allocation
page read and write
7100000
heap
page read and write
F70000
heap
page read and write
2B27000
trusted library allocation
page read and write
BB0000
direct allocation
page read and write
B60000
heap
page read and write
2927000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
4571000
heap
page read and write
2B06000
trusted library allocation
page read and write
1230000
heap
page read and write
2B42000
trusted library allocation
page read and write
2CC7000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
269000
unkown
page write copy
5929000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
4D21000
heap
page read and write
51C0000
direct allocation
page execute and read and write
258E000
stack
page read and write
3CFE000
stack
page read and write
3F2F000
stack
page read and write
5531000
heap
page read and write
4D21000
heap
page read and write
446E000
stack
page read and write
BB0000
direct allocation
page read and write
2A12000
trusted library allocation
page read and write
159D000
heap
page read and write
4FAF000
stack
page read and write
4D21000
heap
page read and write
28B1000
trusted library allocation
page read and write
4D21000
heap
page read and write
6D6C000
stack
page read and write
30A0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
5AA0000
trusted library allocation
page read and write
750000
heap
page read and write
27C8000
trusted library allocation
page read and write
13DF000
stack
page read and write
17BE000
stack
page read and write
27FA000
trusted library allocation
page read and write
4CFF000
stack
page read and write
2F9F000
stack
page read and write
2839000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
28EF000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
28B9000
trusted library allocation
page read and write
7C0000
heap
page read and write
2798000
trusted library allocation
page read and write
2CFE000
stack
page read and write
16BF000
stack
page read and write
1571000
heap
page read and write
296A000
trusted library allocation
page read and write
375E000
stack
page read and write
30A0000
direct allocation
page read and write
582E000
stack
page read and write
118E000
heap
page read and write
BB0000
direct allocation
page read and write
513000
unkown
page execute and read and write
29AA000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
4D21000
heap
page read and write
4571000
heap
page read and write
688E000
stack
page read and write
2789000
trusted library allocation
page read and write
56BF000
stack
page read and write
F10000
heap
page read and write
2999000
trusted library allocation
page read and write
282E000
trusted library allocation
page read and write
FA5000
heap
page read and write
2C54000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
4D21000
heap
page read and write
269000
unkown
page read and write
36FE000
stack
page read and write
5970000
trusted library allocation
page execute and read and write
2B2E000
trusted library allocation
page read and write
45C000
stack
page read and write
28D0000
trusted library allocation
page read and write
277D000
trusted library allocation
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
385F000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
3CAF000
stack
page read and write
29EC000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
There are 1309 hidden memdumps, click here to show them.