IOC Report
0JLWNg4Sz1.exe

loading gif

Files

File Path
Type
Category
Malicious
0JLWNg4Sz1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Google\Update\DViaOgnvmAhwCXZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\DViaOgnvmAhwCXZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\DViaOgnvmAhwCXZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\StartMenuExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\StartMenuExperienceHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0JLWNg4Sz1.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\oLZ05R153F.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\ALzNWdSZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KjTCumlu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\3e8b633d968cb5
ASCII text, with very long lines (845), with no line terminators
dropped
C:\Program Files (x86)\Microsoft\Edge\2afe4ed40d5a86
ASCII text, with no line terminators
dropped
C:\ProgramData\Microsoft OneDrive\setup\3e8b633d968cb5
ASCII text, with no line terminators
dropped
C:\ProgramData\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Recovery\3e8b633d968cb5
ASCII text, with very long lines (827), with no line terminators
dropped
C:\Recovery\55b276f4edf653
ASCII text, with no line terminators
dropped
C:\Recovery\DViaOgnvmAhwCXZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DViaOgnvmAhwCXZ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\StartMenuExperienceHost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smartscreen.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\aC4Ftn18Tq
ASCII text, with no line terminators
dropped
C:\Users\user\Desktop\b773b89e2bfe58
ASCII text, with very long lines (762), with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0JLWNg4Sz1.exe
"C:\Users\user\Desktop\0JLWNg4Sz1.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZ" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZ" /sc ONLOGON /tr "'C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
malicious
C:\ProgramData\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe
"C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe"
malicious
C:\Program Files (x86)\Google\Update\DViaOgnvmAhwCXZ.exe
"C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 9 /tr "'C:\Recovery\DViaOgnvmAhwCXZ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZ" /sc ONLOGON /tr "'C:\Recovery\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 12 /tr "'C:\Recovery\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Recovery\StartMenuExperienceHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Recovery\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\microsoft\Edge\smartscreen.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smartscreen" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft\Edge\smartscreen.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft\Edge\smartscreen.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "0JLWNg4Sz10" /sc MINUTE /mo 10 /tr "'C:\Users\user\Desktop\0JLWNg4Sz1.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "0JLWNg4Sz1" /sc ONLOGON /tr "'C:\Users\user\Desktop\0JLWNg4Sz1.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "0JLWNg4Sz10" /sc MINUTE /mo 14 /tr "'C:\Users\user\Desktop\0JLWNg4Sz1.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\oLZ05R153F.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Users\user\Desktop\0JLWNg4Sz1.exe
C:\Users\user\Desktop\0JLWNg4Sz1.exe
malicious
C:\Users\user\Desktop\0JLWNg4Sz1.exe
C:\Users\user\Desktop\0JLWNg4Sz1.exe
malicious
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe
"C:\Program Files (x86)\microsoft\Edge\smartscreen.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe
"C:\Program Files (x86)\microsoft\Edge\smartscreen.exe"
malicious
C:\Recovery\StartMenuExperienceHost.exe
C:\Recovery\StartMenuExperienceHost.exe
malicious
C:\Recovery\StartMenuExperienceHost.exe
C:\Recovery\StartMenuExperienceHost.exe
malicious
C:\Recovery\StartMenuExperienceHost.exe
"C:\Recovery\StartMenuExperienceHost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
There are 22 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://977255cm.nyashkoon.in/secureWindows.php
188.114.96.3
malicious
http://977255cm.nyashkoon.in/
unknown
malicious
http://977255cm.nyashkoon.in
unknown
malicious
http://977255cm.nyashkX
unknown
http://977255cm.nyashkX:t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
977255cm.nyashkoon.in
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
977255cm.nyashkoon.in
European Union
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\262e9cc7e8741ec11e895b457975c7e7a3aa5176
6e18fa973baad7ceda19b04ae72fa7ac7fc15aae
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E12000
trusted library allocation
page read and write
malicious
2C73000
trusted library allocation
page read and write
malicious
27FE000
trusted library allocation
page read and write
malicious
FA2000
unkown
page readonly
malicious
13471000
trusted library allocation
page read and write
malicious
2E63000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
7FFD9B688000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
7EF000
heap
page read and write
7FFD9B7F8000
trusted library allocation
page read and write
11D0000
heap
page read and write
19A9000
heap
page read and write
3F0A000
trusted library allocation
page read and write
3F3E000
trusted library allocation
page read and write
7B9000
heap
page read and write
3B0000
heap
page read and write
FD5000
unkown
page readonly
7FFD9B868000
trusted library allocation
page read and write
B03000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
1600000
heap
page read and write
12E5D000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
1C51C000
heap
page read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
1B7B2000
heap
page read and write
1C4F0000
heap
page read and write
33CC000
trusted library allocation
page read and write
152D000
heap
page read and write
35AC000
trusted library allocation
page read and write
2E23000
trusted library allocation
page read and write
34F2000
trusted library allocation
page read and write
1B99F000
stack
page read and write
34DB000
trusted library allocation
page read and write
2552000
trusted library allocation
page read and write
1820000
heap
page read and write
7FFD9B7E9000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
3D0000
heap
page read and write
32A9000
trusted library allocation
page read and write
36CD000
trusted library allocation
page read and write
1725000
heap
page read and write
7FFD9B818000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
7FFD9B81C000
trusted library allocation
page read and write
13041000
trusted library allocation
page read and write
1B8BD000
heap
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
3141000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
7FFD9B69C000
trusted library allocation
page execute and read and write
2C7B000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
1BF8E000
stack
page read and write
253B000
trusted library allocation
page read and write
3110000
heap
page read and write
15AF000
stack
page read and write
1C637000
heap
page read and write
1BE88000
heap
page read and write
125ED000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
2570000
trusted library allocation
page read and write
DF0000
heap
page read and write
2EFC000
trusted library allocation
page read and write
2CE61EF0000
heap
page read and write
7FFD9B87D000
trusted library allocation
page read and write
26A0000
heap
page execute and read and write
1510000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
1AD96000
heap
page read and write
2AAB000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
12E17000
trusted library allocation
page read and write
118A000
heap
page read and write
17DE000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page execute and read and write
136F000
heap
page read and write
253F000
trusted library allocation
page read and write
1C528000
heap
page read and write
1208000
heap
page read and write
1BC8D000
heap
page read and write
2CE61F9A000
heap
page read and write
710000
heap
page read and write
3023000
trusted library allocation
page read and write
2ED9000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
124E1000
trusted library allocation
page read and write
12401000
trusted library allocation
page read and write
1C0F0000
heap
page read and write
1E8B7FF0000
heap
page read and write
3406000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
7FFD9B7A1000
trusted library allocation
page execute and read and write
14E0000
trusted library allocation
page read and write
3EAC000
trusted library allocation
page read and write
7FFD9B746000
trusted library allocation
page execute and read and write
1C64F000
heap
page read and write
2F8F000
trusted library allocation
page read and write
7FFD9B672000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
7FFD9B658000
trusted library allocation
page read and write
3E96000
trusted library allocation
page read and write
12411000
trusted library allocation
page read and write
1B7C8000
heap
page read and write
2EDB000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
134A1000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
26B0000
heap
page read and write
1560000
heap
page read and write
7FFD9B68B000
trusted library allocation
page execute and read and write
C35000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page execute and read and write
2576000
trusted library allocation
page read and write
160C000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
3462000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
7FFD9B837000
trusted library allocation
page read and write
1330000
heap
page read and write
34B5000
trusted library allocation
page read and write
19C5000
heap
page read and write
7FFD9B7F6000
trusted library allocation
page read and write
153C000
heap
page read and write
7FFD9B818000
trusted library allocation
page read and write
2CE61EF5000
heap
page read and write
1A6F0000
trusted library allocation
page read and write
160D000
heap
page read and write
34E0000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
3ED4000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2C71000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
32D9000
heap
page read and write
7FFD9B668000
trusted library allocation
page read and write
14F0000
heap
page read and write
1480000
heap
page execute and read and write
2CEC000
trusted library allocation
page read and write
7FFD9B64D000
trusted library allocation
page execute and read and write
342F000
trusted library allocation
page read and write
7FFD9B972000
trusted library allocation
page read and write
7FFD9B716000
trusted library allocation
page read and write
3E7E000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
14A5000
heap
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
345F000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
15B8000
heap
page read and write
7FFD9B746000
trusted library allocation
page execute and read and write
7FFD9B87E000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
7FFD9B85E000
trusted library allocation
page read and write
3E6A000
trusted library allocation
page read and write
3EEC000
trusted library allocation
page read and write
1BD8E000
stack
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
331F000
stack
page read and write
153E000
heap
page read and write
12407000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
1BABF000
stack
page read and write
FE2000
unkown
page readonly
7FFD9BBB3000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
128AD000
trusted library allocation
page read and write
1150000
heap
page read and write
7FFD9B716000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B69B000
trusted library allocation
page execute and read and write
13327000
trusted library allocation
page read and write
1BF7E000
stack
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
7FFD9B653000
trusted library allocation
page execute and read and write
7FFD9B680000
trusted library allocation
page read and write
1584000
heap
page read and write
2F77000
trusted library allocation
page read and write
14F9000
heap
page read and write
7FFD9B736000
trusted library allocation
page execute and read and write
7FFD9B982000
trusted library allocation
page read and write
7FFD9B827000
trusted library allocation
page read and write
1B490000
trusted library allocation
page read and write
3FF71FE000
stack
page read and write
11CB000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
3110000
heap
page execute and read and write
11C0000
heap
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9B6CC000
trusted library allocation
page execute and read and write
34FD000
trusted library allocation
page read and write
339C000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
1500000
heap
page read and write
15F0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
3F3A000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
7FFD9B844000
trusted library allocation
page read and write
7FFD9B736000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
156A000
heap
page read and write
2F35000
trusted library allocation
page read and write
7FFD9B7FA000
trusted library allocation
page read and write
17FE000
stack
page read and write
2A30000
heap
page read and write
1B790000
heap
page read and write
7FFD9B83C000
trusted library allocation
page read and write
3485000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
3EE4000
trusted library allocation
page read and write
7DA000
heap
page read and write
3267000
trusted library allocation
page read and write
7FFD9B710000
trusted library allocation
page execute and read and write
1350D000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
1B8D8000
heap
page read and write
3455000
trusted library allocation
page read and write
3F1C000
trusted library allocation
page read and write
BD0000
heap
page read and write
32BB000
trusted library allocation
page read and write
1348D000
trusted library allocation
page read and write
3EA6000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
12EF1000
trusted library allocation
page read and write
74A000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
16F0000
heap
page read and write
2574000
trusted library allocation
page read and write
12FE7000
trusted library allocation
page read and write
23FE000
stack
page read and write
7FFD9B87E000
trusted library allocation
page read and write
19C0000
heap
page read and write
FF0000
heap
page read and write
7FFD9B87D000
trusted library allocation
page read and write
AC5000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B69C000
trusted library allocation
page execute and read and write
2F4B000
trusted library allocation
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
3190000
heap
page read and write
1BFEF000
stack
page read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
1BDF0000
heap
page read and write
1058000
heap
page read and write
3421000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
3327000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
1B8BB000
heap
page read and write
C7E000
stack
page read and write
730000
heap
page read and write
1306000
heap
page read and write
146F000
stack
page read and write
7FFD9B652000
trusted library allocation
page read and write
7FFD9B673000
trusted library allocation
page read and write
7FFD9B864000
trusted library allocation
page read and write
1B8C2000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
36C9000
trusted library allocation
page read and write
1C566000
heap
page read and write
738000
heap
page read and write
3EC4000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
1E8B7FF0000
heap
page read and write
1015000
heap
page read and write
132A1000
trusted library allocation
page read and write
7FFD9B862000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
1C653000
heap
page read and write
120B000
heap
page read and write
7FFD9B878000
trusted library allocation
page read and write
1B13E000
stack
page read and write
2572000
trusted library allocation
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
1C675000
heap
page read and write
1C631000
heap
page read and write
3EBA000
trusted library allocation
page read and write
1B8CA000
stack
page read and write
2F84000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
7FFD9B7F4000
trusted library allocation
page read and write
7FFD9B668000
trusted library allocation
page read and write
331F000
trusted library allocation
page read and write
2E0F000
stack
page read and write
2EA0000
trusted library allocation
page read and write
889000
heap
page read and write
7FFD9B858000
trusted library allocation
page read and write
1E8B7F10000
heap
page read and write
11C7000
heap
page read and write
7FFD9B684000
trusted library allocation
page read and write
12E21000
trusted library allocation
page read and write
7FFD9B834000
trusted library allocation
page read and write
1C2EB000
stack
page read and write
1C510000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
1340000
heap
page read and write
FE6000
unkown
page readonly
7FFD9B82C000
trusted library allocation
page read and write
1B9EB000
stack
page read and write
1410000
heap
page read and write
1C0FD000
heap
page read and write
12E11000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B6F6000
trusted library allocation
page read and write
1BE86000
heap
page read and write
1BE4E000
heap
page read and write
166D000
heap
page read and write
2F7A000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
7FFD9B726000
trusted library allocation
page execute and read and write
27D4000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
3533000
trusted library allocation
page read and write
11EE000
stack
page read and write
1E8B7FF0000
heap
page read and write
7FFD9B69D000
trusted library allocation
page execute and read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
AAF000
stack
page read and write
7FFD9B710000
trusted library allocation
page execute and read and write
25E0000
heap
page execute and read and write
B32000
stack
page read and write
1B56D000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1E8B8000000
heap
page read and write
1AFCC000
heap
page read and write
12E91000
trusted library allocation
page read and write
1BCBE000
stack
page read and write
10F0000
heap
page read and write
2DCD000
trusted library allocation
page read and write
329F000
stack
page read and write
7FFD9B663000
trusted library allocation
page read and write
14E0000
heap
page execute and read and write
1BD7D000
stack
page read and write
B90000
heap
page read and write
301D000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
13E0000
heap
page read and write
1C0FF000
stack
page read and write
1AC4B000
stack
page read and write
1B9BE000
stack
page read and write
2B0F000
trusted library allocation
page read and write
1C596000
heap
page read and write
1BB3F000
stack
page read and write
7FFD9B854000
trusted library allocation
page read and write
27E8000
trusted library allocation
page read and write
1180000
heap
page read and write
7FFD9B828000
trusted library allocation
page read and write
134DD000
trusted library allocation
page read and write
13461000
trusted library allocation
page read and write
1AA42000
heap
page read and write
7FFD9B88D000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
17A5000
heap
page read and write
30C0000
heap
page execute and read and write
FA2000
unkown
page readonly
1B8B0000
heap
page execute and read and write
2E2B000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
1270000
heap
page read and write
FA0000
unkown
page readonly
1110000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
17CF000
stack
page read and write
3EA2000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
1C625000
heap
page read and write
332B000
trusted library allocation
page read and write
7FFD9B808000
trusted library allocation
page read and write
1B28E000
stack
page read and write
1530000
heap
page read and write
2544000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
1178000
heap
page read and write
128BF000
trusted library allocation
page read and write
B60000
heap
page read and write
2E30000
trusted library allocation
page read and write
136B000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
2E1B000
trusted library allocation
page read and write
14A0000
heap
page read and write
2DB1000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
12FF1000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
334C000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
13E5000
heap
page read and write
3330000
trusted library allocation
page read and write
7FFD9B6AC000
trusted library allocation
page execute and read and write
2565000
trusted library allocation
page read and write
FF9000
heap
page read and write
1B590000
heap
page execute and read and write
1AF30000
heap
page execute and read and write
7FFD9B862000
trusted library allocation
page read and write
71E000
stack
page read and write
18D5000
heap
page read and write
2ED0000
heap
page read and write
3F4A000
trusted library allocation
page read and write
11C5000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
775000
heap
page read and write
7FFD9B844000
trusted library allocation
page read and write
3F48000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
A80000
heap
page read and write
12FE1000
trusted library allocation
page read and write
7FFD9B6F6000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page read and write
15FF000
heap
page read and write
7FFD9B67B000
trusted library allocation
page execute and read and write
1589000
heap
page read and write
1E8B8001000
heap
page read and write
2BAE000
stack
page read and write
3321000
trusted library allocation
page read and write
157B000
heap
page read and write
1200000
trusted library allocation
page read and write
1B39D000
stack
page read and write
1506000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
760000
heap
page read and write
7FFD9B84D000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
12F71000
trusted library allocation
page read and write
1516000
heap
page read and write
2C60000
heap
page execute and read and write
1C60D000
heap
page read and write
1BC70000
heap
page read and write
1BEE0000
heap
page read and write
1880000
heap
page read and write
3EC2000
trusted library allocation
page read and write
3290000
unkown
page readonly
128BA000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
7FFD9B878000
trusted library allocation
page read and write
1BFEF000
stack
page read and write
1E8B8001000
heap
page read and write
7FFD9B7A1000
trusted library allocation
page execute and read and write
2FF0000
trusted library allocation
page read and write
7FFD9B726000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page read and write
7FFD9B85D000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B69C000
trusted library allocation
page execute and read and write
1E8B8000000
heap
page read and write
1342000
heap
page read and write
1E8B7F50000
heap
page read and write
1430000
trusted library allocation
page read and write
12FFD000
trusted library allocation
page read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
17E0000
heap
page read and write
2EE3000
trusted library allocation
page read and write
7FFD9B68B000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
7FFD9B653000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
7FFD9B86D000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
132B1000
trusted library allocation
page read and write
254C000
trusted library allocation
page read and write
2613000
trusted library allocation
page read and write
1BE8F000
stack
page read and write
16EA000
heap
page read and write
311F000
trusted library allocation
page read and write
11D6000
heap
page read and write
339F000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FFD9B654000
trusted library allocation
page read and write
1B073000
heap
page read and write
897000
heap
page read and write
3472000
trusted library allocation
page read and write
11AB000
heap
page read and write
2DB4000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1C4EC000
stack
page read and write
2FFE000
trusted library allocation
page read and write
7FFD9B875000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1485000
heap
page read and write
1550000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
2DE0000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
16F3000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
346C000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
1480000
heap
page read and write
1BE1C000
heap
page read and write
7FFD9B85D000
trusted library allocation
page read and write
1E8B8001000
heap
page read and write
3463000
trusted library allocation
page read and write
1BC60000
heap
page read and write
7FFD9B808000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
3ECE000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
7FFD9B874000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
790000
heap
page read and write
7FFD9B7F8000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B813000
trusted library allocation
page read and write
1206000
heap
page read and write
3199000
heap
page read and write
132F1000
trusted library allocation
page read and write
2F78000
trusted library allocation
page read and write
166F000
heap
page read and write
2E19000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
7FFD9B88D000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page read and write
26A3000
heap
page execute and read and write
7FFD9B882000
trusted library allocation
page read and write
1B7E6000
heap
page read and write
1ADE000
stack
page read and write
7FFD9B865000
trusted library allocation
page read and write
2554000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page read and write
7FFD9B803000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
1C103000
heap
page read and write
1A25000
heap
page read and write
1300000
heap
page read and write
2CE61DC0000
heap
page read and write
1B82D000
stack
page read and write
7FFD9B64D000
trusted library allocation
page execute and read and write
C30000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B854000
trusted library allocation
page read and write
7FFD9B874000
trusted library allocation
page read and write
153F000
heap
page read and write
1C5F3000
heap
page read and write
1577000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
1260000
heap
page read and write
1C135000
heap
page read and write
10C6000
heap
page read and write
333B000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
13451000
trusted library allocation
page read and write
1B1FD000
stack
page read and write
7FFD9B6F6000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
7FFD9B658000
trusted library allocation
page read and write
1E8B8005000
heap
page read and write
2DC2000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
1BC6F000
stack
page read and write
1C7EE000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B720000
trusted library allocation
page execute and read and write
1C8EE000
stack
page read and write
7FFD9B872000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B663000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page execute and read and write
3F16000
trusted library allocation
page read and write
130C000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
3679000
trusted library allocation
page read and write
1BC80000
heap
page read and write
7FFD9B882000
trusted library allocation
page read and write
73C000
heap
page read and write
16A0000
trusted library allocation
page read and write
3686000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
1BE7C000
stack
page read and write
15EF000
stack
page read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
26B9000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
7FFD9B653000
trusted library allocation
page read and write
1480000
heap
page read and write
3F10000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
11DB000
heap
page read and write
162B000
heap
page read and write
1BBC9000
stack
page read and write
34D9000
trusted library allocation
page read and write
D90000
heap
page read and write
33EC000
trusted library allocation
page read and write
880000
heap
page read and write
22F0000
heap
page execute and read and write
B80000
heap
page read and write
13B0000
heap
page read and write
7FFD9B664000
trusted library allocation
page read and write
1531000
heap
page read and write
1850000
trusted library allocation
page read and write
132F7000
trusted library allocation
page read and write
1307D000
trusted library allocation
page read and write
134EA000
trusted library allocation
page read and write
3EF4000
trusted library allocation
page read and write
182F000
stack
page read and write
2EDD000
trusted library allocation
page read and write
30F0000
heap
page execute and read and write
1C07E000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
25DE000
stack
page read and write
DE0000
heap
page read and write
7FFD9B720000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
1641000
heap
page read and write
29B6000
trusted library allocation
page read and write
321F000
stack
page read and write
36D4000
trusted library allocation
page read and write
16A9000
heap
page read and write
311B000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
132C000
heap
page read and write
1329000
heap
page read and write
2401000
trusted library allocation
page read and write
1C3ED000
stack
page read and write
10D0000
heap
page read and write
7FFD9B746000
trusted library allocation
page execute and read and write
1BC3E000
stack
page read and write
7FFD9B706000
trusted library allocation
page read and write
1565000
heap
page read and write
7FFD9B784000
trusted library allocation
page execute and read and write
11AD000
heap
page read and write
257F000
trusted library allocation
page read and write
132A7000
trusted library allocation
page read and write
7FFD9B654000
trusted library allocation
page read and write
7FFD9B818000
trusted library allocation
page read and write
7FFD9B654000
trusted library allocation
page read and write
7FFD9B7F8000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
1C5DD000
heap
page read and write
7FFD9B86C000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
12E21000
trusted library allocation
page read and write
11DD000
heap
page read and write
1510000
heap
page read and write
3F4D000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
3752000
trusted library allocation
page read and write
1C113000
heap
page read and write
2CE61F90000
heap
page read and write
11D8000
heap
page read and write
1558000
heap
page read and write
2E29000
trusted library allocation
page read and write
1CA8B000
stack
page read and write
1C18F000
stack
page read and write
7FFD9B807000
trusted library allocation
page read and write
7FFD9B83D000
trusted library allocation
page read and write
FCE000
stack
page read and write
36FA000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
7FFD9B86E000
trusted library allocation
page read and write
33C6000
trusted library allocation
page read and write
2E42000
trusted library allocation
page read and write
7FFD9B6AC000
trusted library allocation
page execute and read and write
3470000
trusted library allocation
page read and write
1541000
heap
page read and write
2C80000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
1C5AE000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
1E8B8190000
heap
page read and write
7FFD9B643000
trusted library allocation
page execute and read and write
7FFD9B65D000
trusted library allocation
page execute and read and write
36C7000
trusted library allocation
page read and write
1BEFE000
stack
page read and write
7FFD9B642000
trusted library allocation
page read and write
7F2000
heap
page read and write
1C59E000
heap
page read and write
7B0000
heap
page read and write
13381000
trusted library allocation
page read and write
19DE000
stack
page read and write
3292000
unkown
page readonly
11C2000
stack
page read and write
FA0000
heap
page read and write
7FFD9B684000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
7FFD9B85E000
trusted library allocation
page read and write
11E2000
stack
page read and write
134D1000
trusted library allocation
page read and write
1460000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
12C71000
trusted library allocation
page read and write
1B9C5000
stack
page read and write
7FFD9B7A4000
trusted library allocation
page execute and read and write
7FFD9B730000
trusted library allocation
page execute and read and write
7FFD9B756000
trusted library allocation
page execute and read and write
7FFD9B80A000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
1552000
heap
page read and write
134F3000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
367F000
trusted library allocation
page read and write
1B8B0000
heap
page read and write
7FFD9B868000
trusted library allocation
page read and write
3346000
trusted library allocation
page read and write
7FFD9B653000
trusted library allocation
page execute and read and write
3413000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page read and write
1BDE0000
heap
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
1480000
heap
page read and write
2567000
trusted library allocation
page read and write
150C000
heap
page read and write
3F28000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page read and write
136F000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
119A000
heap
page read and write
1BC89000
heap
page read and write
1C4F9000
heap
page read and write
14E2000
stack
page read and write
7FFD9B683000
trusted library allocation
page read and write
7FFD9B815000
trusted library allocation
page read and write
770000
heap
page read and write
1C5BE000
heap
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
14E5000
heap
page read and write
33D9000
trusted library allocation
page read and write
3496000
trusted library allocation
page read and write
7FFD9B668000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
32C2000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
3EF6000
trusted library allocation
page read and write
3450000
heap
page execute and read and write
7FFD9B64D000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page execute and read and write
1720000
heap
page read and write
125B1000
trusted library allocation
page read and write
3F44000
trusted library allocation
page read and write
1BC70000
heap
page read and write
2FC9000
trusted library allocation
page read and write
1BE7E000
stack
page read and write
33F4000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
15B6000
heap
page read and write
7FFD9B808000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page read and write
3EB0000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1606000
heap
page read and write
1B760000
heap
page read and write
1BE5B000
heap
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
3410000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
32E0000
heap
page execute and read and write
7FFD9B678000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
7FFD9B643000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B663000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
7FFD9B664000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
1440000
heap
page read and write
1C63E000
heap
page read and write
1BEB6000
heap
page read and write
7FFD9B82C000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
7FFD9B855000
trusted library allocation
page read and write
1BC8E000
stack
page read and write
1BA80000
heap
page read and write
26C1000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
18FE000
stack
page read and write
2CE61F98000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
3492000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
1B5CE000
stack
page read and write
7FFD9BB20000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
7FFD9B892000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
3A0000
heap
page read and write
3466000
trusted library allocation
page read and write
7FFD9B854000
trusted library allocation
page read and write
2F4F000
trusted library allocation
page read and write
1BF7A000
stack
page read and write
27D1000
trusted library allocation
page read and write
2AA9000
heap
page read and write
3451000
trusted library allocation
page read and write
1AFE4000
heap
page read and write
3006000
trusted library allocation
page read and write
2E8F000
trusted library allocation
page read and write
1800000
heap
page read and write
2F6F000
trusted library allocation
page read and write
17A0000
heap
page read and write
D92000
stack
page read and write
7FFD9B7B1000
trusted library allocation
page execute and read and write
36F4000
trusted library allocation
page read and write
131CD000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
7FFD9B720000
trusted library allocation
page execute and read and write
3464000
trusted library allocation
page read and write
101C000
heap
page read and write
12FC1000
trusted library allocation
page read and write
1BC50000
heap
page execute and read and write
1E8B7F00000
heap
page read and write
1CB8E000
stack
page read and write
7FFD9B854000
trusted library allocation
page read and write
13331000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
1B03E000
stack
page read and write
36F7000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1BC3F000
stack
page read and write
3154000
trusted library allocation
page read and write
7FFD9B706000
trusted library allocation
page read and write
7FFD9B663000
trusted library allocation
page execute and read and write
7FFD9B85C000
trusted library allocation
page read and write
7FFD9B653000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B844000
trusted library allocation
page read and write
7FFD9B684000
trusted library allocation
page read and write
7FFD9B726000
trusted library allocation
page read and write
1890000
heap
page read and write
E50BC7E000
stack
page read and write
1BBBE000
stack
page read and write
7FFD9B7F6000
trusted library allocation
page read and write
14F0000
heap
page read and write
7FFD9B67B000
trusted library allocation
page execute and read and write
1490000
heap
page read and write
7FF41D1F0000
trusted library allocation
page execute and read and write
7FFD9B80C000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
7FFD9B818000
trusted library allocation
page read and write
1C3EA000
stack
page read and write
1BDF0000
heap
page read and write
3487000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
32A0000
heap
page execute and read and write
1196000
heap
page read and write
1C561000
heap
page read and write
3442000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
2D1C000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
1BAC7000
stack
page read and write
2FEF000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
7FFD9B864000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
3F08000
trusted library allocation
page read and write
1399000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
2DCF000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1430000
heap
page read and write
3FF6D1C000
stack
page read and write
18D0000
heap
page read and write
32A1000
trusted library allocation
page read and write
2CE61EC0000
heap
page read and write
2FF6000
trusted library allocation
page read and write
1BEC6000
heap
page read and write
1C558000
heap
page read and write
3494000
trusted library allocation
page read and write
1018000
heap
page read and write
1BE90000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
1BD90000
heap
page execute and read and write
2DC0000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
102B000
heap
page read and write
7FFD9B86E000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
7FFD9B862000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page read and write
12C77000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
3EEA000
trusted library allocation
page read and write
18B0000
heap
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
1BED0000
heap
page read and write
127A1000
trusted library allocation
page read and write
7FFD9B83D000
trusted library allocation
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
7FFD9B875000
trusted library allocation
page read and write
2DAF000
trusted library allocation
page read and write
10E2000
stack
page read and write
3F20000
trusted library allocation
page read and write
32D0000
heap
page read and write
346F000
trusted library allocation
page read and write
12E97000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
7FFD9B643000
trusted library allocation
page execute and read and write
7FFD9B664000
trusted library allocation
page read and write
7FFD9B678000
trusted library allocation
page read and write
7FFD9B808000
trusted library allocation
page read and write
3F26000
trusted library allocation
page read and write
1B89F000
stack
page read and write
7FFD9B860000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
7FFD9B823000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
7FFD9B791000
trusted library allocation
page execute and read and write
7FFD9B674000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page read and write
157E000
heap
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
7FFD9B6AC000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
6D0000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B736000
trusted library allocation
page execute and read and write
2CE61EA0000
heap
page read and write
1895000
heap
page read and write
3261000
trusted library allocation
page read and write
7FFD9B644000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
7FFD9B673000
trusted library allocation
page read and write
102E000
heap
page read and write
7FFD9B858000
trusted library allocation
page read and write
3ECC000
trusted library allocation
page read and write
1BD80000
heap
page read and write
1643000
heap
page read and write
7FFD9B674000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1A20000
heap
page read and write
735000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
A7D000
stack
page read and write
37A5000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
7FFD9B8CA000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
12C81000
trusted library allocation
page read and write
1B88D000
stack
page read and write
26C9000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
1BEDB000
heap
page read and write
14E0000
heap
page read and write
7FFD9B726000
trusted library allocation
page execute and read and write
7FFD9B870000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1940000
heap
page read and write
72B000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
352000
stack
page read and write
E50B92C000
stack
page read and write
1B776000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B673000
trusted library allocation
page read and write
367C000
trusted library allocation
page read and write
7FFD9B844000
trusted library allocation
page read and write
7FFD9B854000
trusted library allocation
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
312C000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page execute and read and write
1E8B7F40000
heap
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
7FFD9B84D000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
2F6D000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B653000
trusted library allocation
page execute and read and write
1BE12000
heap
page read and write
326D000
trusted library allocation
page read and write
7FFD9B884000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
1C5E6000
heap
page read and write
1885000
heap
page read and write
1B18E000
stack
page read and write
7FFD9B850000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
12EA1000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page read and write
7FFD9B640000
trusted library allocation
page read and write
7FFD9B864000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
1C551000
heap
page read and write
1AF90000
heap
page read and write
2DE6000
trusted library allocation
page read and write
7FFD9B6FC000
trusted library allocation
page execute and read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B678000
trusted library allocation
page read and write
2FDE000
stack
page read and write
13301000
trusted library allocation
page read and write
1C10E000
heap
page read and write
7FFD9B710000
trusted library allocation
page read and write
7FFD9B86D000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
7FFD9B872000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
3724000
trusted library allocation
page read and write
14DE000
stack
page read and write
7FFD9B694000
trusted library allocation
page read and write
1BE8F000
stack
page read and write
13191000
trusted library allocation
page read and write
1B5A0000
heap
page read and write
3ED8000
trusted library allocation
page read and write
1390000
heap
page read and write
342D000
trusted library allocation
page read and write
2556000
trusted library allocation
page read and write
7FFD9B81A000
trusted library allocation
page read and write
7FFD9B67D000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page execute and read and write
1C5A2000
heap
page read and write
7FFD9B664000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
7FFD9B706000
trusted library allocation
page read and write
B45000
heap
page read and write
3414000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
326E000
stack
page read and write
7FFD9B791000
trusted library allocation
page execute and read and write
13321000
trusted library allocation
page read and write
1C0EE000
stack
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B663000
trusted library allocation
page execute and read and write
3418000
trusted library allocation
page read and write
2AA0000
heap
page read and write
10E4000
heap
page read and write
9AE000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
FD0000
heap
page read and write
32C7000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
16E7000
heap
page read and write
7FFD9B66B000
trusted library allocation
page execute and read and write
3EB8000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
13F0000
heap
page read and write
1B23E000
stack
page read and write
30A3000
trusted library allocation
page read and write
3EDE000
trusted library allocation
page read and write
7FFD9B674000
trusted library allocation
page read and write
81B000
heap
page read and write
7FFD9B828000
trusted library allocation
page read and write
1BEED000
heap
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
1AD80000
heap
page read and write
2DC5000
trusted library allocation
page read and write
130C1000
trusted library allocation
page read and write
133D1000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
3430000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
7FFD9B882000
trusted library allocation
page read and write
1BB8E000
stack
page read and write
253D000
trusted library allocation
page read and write
27DA000
trusted library allocation
page read and write
2541000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
1AD70000
heap
page read and write
7FFD9B664000
trusted library allocation
page read and write
74C000
heap
page read and write
1BEA7000
heap
page read and write
344F000
trusted library allocation
page read and write
2E4D000
trusted library allocation
page read and write
2E17000
trusted library allocation
page read and write
1C1EF000
stack
page read and write
3150000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
1C50B000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
126C1000
trusted library allocation
page read and write
2270000
heap
page read and write
1B8AD000
stack
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
3EFE000
trusted library allocation
page read and write
7FFD9B803000
trusted library allocation
page read and write
1C5D8000
heap
page read and write
7FFD9B700000
trusted library allocation
page read and write
7FFD9B673000
trusted library allocation
page execute and read and write
32F1000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
1BE3A000
heap
page read and write
2FED000
trusted library allocation
page read and write
7FFD9B865000
trusted library allocation
page read and write
1B7A0000
heap
page read and write
15D0000
trusted library allocation
page read and write
11A8000
heap
page read and write
BF0000
trusted library allocation
page read and write
2E8E000
stack
page read and write
1B9E0000
heap
page execute and read and write
7FFD9B674000
trusted library allocation
page read and write
1100000
heap
page read and write
7FFD9B700000
trusted library allocation
page execute and read and write
2FCB000
trusted library allocation
page read and write
1C6B8000
heap
page read and write
1BC70000
heap
page read and write
1BEE9000
heap
page read and write
34D3000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
1BA9E000
stack
page read and write
11A0000
heap
page read and write
3051000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
DF5000
heap
page read and write
1C61E000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
7B6000
heap
page read and write
7FFD9B813000
trusted library allocation
page read and write
7FFD9B834000
trusted library allocation
page read and write
7FFD9B68D000
trusted library allocation
page execute and read and write
2578000
trusted library allocation
page read and write
19A0000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
7FFD9B716000
trusted library allocation
page read and write
2410000
trusted library allocation
page read and write
F52000
stack
page read and write
1C52B000
heap
page read and write
3490000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
1B79E000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B850000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
1BFFF000
stack
page read and write
7FFD9B855000
trusted library allocation
page read and write
1194000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
1C549000
heap
page read and write
1554000
heap
page read and write
2F9C000
trusted library allocation
page read and write
718000
heap
page read and write
7FFD9B823000
trusted library allocation
page read and write
B20000
heap
page read and write
1C130000
heap
page read and write
7FFD9B658000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
128C7000
trusted library allocation
page read and write
158C000
heap
page read and write
341F000
trusted library allocation
page read and write
8A5000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page execute and read and write
7FFD9B8C0000
trusted library allocation
page read and write
349F000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
312E000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
1C08E000
stack
page read and write
AC0000
heap
page read and write
3F00000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
347F000
trusted library allocation
page read and write
1C577000
heap
page read and write
2CC3000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page execute and read and write
1B06A000
heap
page read and write
1C5A5000
heap
page read and write
1E8B7FCB000
heap
page read and write
359B000
trusted library allocation
page read and write
FA0000
unkown
page readonly
7FFD9B662000
trusted library allocation
page read and write
12D0000
heap
page read and write
7FFD9B7B1000
trusted library allocation
page execute and read and write
1BDE3000
heap
page execute and read and write
FB0000
heap
page read and write
E50B9AF000
stack
page read and write
1B930000
heap
page execute and read and write
3277000
trusted library allocation
page read and write
8A5000
heap
page read and write
134F0000
trusted library allocation
page read and write
3676000
trusted library allocation
page read and write
12D51000
trusted library allocation
page read and write
12871000
trusted library allocation
page read and write
1BFFF000
stack
page read and write
BA0000
heap
page execute and read and write
3F32000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
2EA0000
heap
page execute and read and write
255F000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
BD5000
heap
page read and write
1B41D000
stack
page read and write
1BA3E000
stack
page read and write
7FFD9B66D000
trusted library allocation
page execute and read and write
7FFD9BB00000
trusted library allocation
page read and write
BB0000
heap
page read and write
BE0000
heap
page read and write
7FFD9B644000
trusted library allocation
page read and write
3119000
heap
page read and write
2FD0000
trusted library allocation
page read and write
7FFD9B644000
trusted library allocation
page read and write
13401000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
1C5ED000
heap
page read and write
7FFD9B880000
trusted library allocation
page read and write
3FF70FF000
unkown
page read and write
1E8B7FC0000
heap
page read and write
8A0000
heap
page read and write
7FFD9B6BC000
trusted library allocation
page execute and read and write
100B000
heap
page read and write
7FFD9B663000
trusted library allocation
page execute and read and write
3147000
trusted library allocation
page read and write
1C110000
heap
page read and write
1531000
heap
page read and write
7FFD9B664000
trusted library allocation
page read and write
33DE000
stack
page read and write
1A98D000
stack
page read and write
7FFD9B7FA000
trusted library allocation
page read and write
1275000
heap
page read and write
3373000
trusted library allocation
page read and write
7FFD9B860000
trusted library allocation
page read and write
There are 1292 hidden memdumps, click here to show them.