IOC Report
boooba.exe

loading gif

Files

File Path
Type
Category
Malicious
boooba.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Libs\WR64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Libs\sihost64.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\IOAshdohSha.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\IOAshdohSha.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\boooba.exe
"C:\Users\user\Desktop\boooba.exe"
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "C:\Users\user\Desktop\boooba.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\user\IOAshdohSha.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\user\IOAshdohSha.exe"
malicious
C:\Users\user\IOAshdohSha.exe
C:\Users\user\IOAshdohSha.exe
malicious
C:\Windows\System32\cmd.exe
"cmd" cmd /c "C:\Users\user\IOAshdohSha.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\IOAshdohSha.exe
C:\Users\user\IOAshdohSha.exe
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "C:\Users\user\IOAshdohSha.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Libs\sihost64.exe
"C:\Users\user\AppData\Roaming\Microsoft\Libs\sihost64.exe"
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "C:\Users\user\IOAshdohSha.exe"
malicious
C:\Windows\System32\nslookup.exe
C:\Windows/System32\nslookup.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10300 --user=45dXYsg6JEFipo688i2DkJFNBPbGZCjXpMYLRn8TRMpsYQH37gdzKMeHPjXrvfXAbZF32ifsRRLqEKoA1zsiskRJNyJydQG --pass= --cpu-max-threads-hint=100
malicious
C:\Windows\System32\nslookup.exe
C:\Windows/System32\nslookup.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10300 --user=45dXYsg6JEFipo688i2DkJFNBPbGZCjXpMYLRn8TRMpsYQH37gdzKMeHPjXrvfXAbZF32ifsRRLqEKoA1zsiskRJNyJydQG --pass= --cpu-max-threads-hint=100
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "/sihost64"
malicious
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://xmrig.com/benchmark/%s
unknown
https://xmrig.com/wizard
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://xmrig.com/wizard%s
unknown
https://xmrig.com/docs/algorithms
unknown

Domains

Name
IP
Malicious
xmr-eu1.nanopool.org
51.15.58.224
malicious

IPs

IP
Domain
Country
Malicious
212.47.253.124
unknown
France
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1E32C45B000
heap
page read and write
malicious
1E32C45C000
heap
page read and write
malicious
13CBC45D000
heap
page read and write
malicious
19A4A4B0000
heap
page read and write
malicious
1E32C456000
heap
page read and write
malicious
1E32C45C000
heap
page read and write
malicious
13CBC451000
heap
page read and write
malicious
13CBC45C000
heap
page read and write
malicious
13CBC456000
heap
page read and write
malicious
1E32C45C000
heap
page read and write
malicious
1E32C45F000
heap
page read and write
malicious
13CBC45C000
heap
page read and write
malicious
29965517000
unkown
page read and write
malicious
13CBC455000
heap
page read and write
malicious
1F9F0E4A000
heap
page read and write
malicious
1E32C459000
heap
page read and write
malicious
1E32C457000
heap
page read and write
malicious
13CBC45A000
heap
page read and write
malicious
13CBC45A000
heap
page read and write
malicious
13CBC454000
heap
page read and write
malicious
13CBC45E000
heap
page read and write
malicious
19A4A4F5000
heap
page read and write
malicious
1E32C45A000
heap
page read and write
malicious
13CBC455000
heap
page read and write
malicious
1E32C45D000
heap
page read and write
malicious
13CBC454000
heap
page read and write
malicious
1E32C453000
heap
page read and write
malicious
13CBC452000
heap
page read and write
malicious
140000000
remote allocation
page execute and read and write
malicious
13CBC45E000
heap
page read and write
malicious
13CBC45F000
heap
page read and write
malicious
1E32C455000
heap
page read and write
malicious
29966FF4000
trusted library allocation
page read and write
malicious
19A4A4B8000
heap
page read and write
malicious
2997F6D0000
heap
page read and write
malicious
1E32C45A000
heap
page read and write
malicious
140000000
remote allocation
page execute and read and write
malicious
1E32C45D000
heap
page read and write
malicious
2996549D000
unkown
page read and write
malicious
1E32C45D000
heap
page read and write
malicious
13CBC451000
heap
page read and write
malicious
19A4A50A000
heap
page read and write
malicious
13CBC45C000
heap
page read and write
malicious
1E32C458000
heap
page read and write
malicious
1E32C453000
heap
page read and write
malicious
1E32C455000
heap
page read and write
malicious
299654CB000
unkown
page read and write
malicious
1E32C458000
heap
page read and write
malicious
1E32C452000
heap
page read and write
malicious
13CBC45A000
heap
page read and write
malicious
140751000
remote allocation
page execute and read and write
malicious
1E32C45D000
heap
page read and write
malicious
1F9F0DF8000
heap
page read and write
malicious
1F9F0E0E000
heap
page read and write
malicious
13CBC453000
heap
page read and write
malicious
29966FA1000
trusted library allocation
page read and write
malicious
13CBC45F000
heap
page read and write
malicious
1E32C453000
heap
page read and write
malicious
140751000
remote allocation
page execute and read and write
malicious
1F9F0DF0000
heap
page read and write
malicious
1F9F0E49000
heap
page read and write
malicious
1E32C456000
heap
page read and write
malicious
13CBC459000
heap
page read and write
malicious
13CBC452000
heap
page read and write
malicious
13CBC452000
heap
page read and write
malicious
13CBC454000
heap
page read and write
malicious
1E32C451000
heap
page read and write
malicious
1E32C458000
heap
page read and write
malicious
13CA3530000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
1E313710000
trusted library allocation
page read and write
13CA362B000
heap
page read and write
14C000
stack
page read and write
13CA3500000
trusted library allocation
page read and write
15773AC0000
heap
page read and write
7FFD9B87D000
trusted library allocation
page execute and read and write
190000
heap
page read and write
13CBC458000
heap
page read and write
15759760000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
B4F000
stack
page read and write
7C6000
heap
page read and write
190000
heap
page read and write
15773ACB000
heap
page read and write
1575959F000
heap
page read and write
7FFD9BA88000
trusted library allocation
page execute and read and write
29966D90000
heap
page readonly
13CA3530000
trusted library allocation
page read and write
29966F40000
trusted library allocation
page read and write
15759562000
heap
page read and write
7FFD9B986000
trusted library allocation
page read and write
29965463000
unkown
page read and write
13300FE000
unkown
page readonly
13CA37B0000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
29966F50000
trusted library allocation
page read and write
13CA364D000
heap
page read and write
15773ADD000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
1575B2D5000
trusted library allocation
page read and write
A40000
heap
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
7FFD9B872000
trusted library allocation
page read and write
15773AA5000
heap
page read and write
1F9F0E87000
heap
page read and write
ABF000
stack
page read and write
15773ACB000
heap
page read and write
1E313690000
trusted library allocation
page read and write
1575B386000
trusted library allocation
page read and write
1575B2D0000
trusted library allocation
page read and write
1575B2E0000
trusted library allocation
page read and write
15773AD5000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
19A4A588000
heap
page read and write
29966E00000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
2996546E000
unkown
page read and write
15773B0D000
heap
page read and write
1E313697000
trusted library allocation
page read and write
180000
heap
page read and write
29966E00000
trusted library allocation
page read and write
13CA37E0000
trusted library allocation
page read and write
15759783000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
29966DB0000
trusted library allocation
page read and write
9CD0FFE000
stack
page read and write
1F9F0D50000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
1F9F8656000
heap
page read and write
623000
unkown
page read and write
9CD137E000
unkown
page readonly
29966E01000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
13CA37E0000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
1E3136D0000
trusted library allocation
page read and write
13CA3641000
heap
page read and write
1E313700000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1575B290000
trusted library allocation
page read and write
15773BE0000
heap
page read and write
15773AAB000
heap
page read and write
1575B290000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
401000
unkown
page execute read
1575B2D0000
trusted library allocation
page read and write
19A51B71000
heap
page read and write
29966E03000
trusted library allocation
page read and write
13303FE000
unkown
page readonly
19A4C010000
heap
page read and write
13CA361E000
heap
page read and write
13CA35FB000
heap
page read and write
1F9F2860000
heap
page readonly
1E313690000
trusted library allocation
page read and write
1575B2D0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
19A4BF50000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
157594DF000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3555000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
401000
unkown
page execute read
1E3136E0000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
5D0000
heap
page read and write
403000
unkown
page readonly
29966F30000
trusted library allocation
page read and write
1E3136EC000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
29976FB0000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1F9F0E59000
heap
page read and write
1E313690000
trusted library allocation
page read and write
401000
unkown
page execute read
21DD5BE8000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
15773BD0000
heap
page execute and read and write
15773AC3000
heap
page read and write
15773AC3000
heap
page read and write
8CF000
stack
page read and write
13CA3609000
heap
page read and write
19A4BF00000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
1575B2E0000
trusted library allocation
page read and write
13302FE000
unkown
page readonly
1575B39B000
trusted library allocation
page read and write
15773A9B000
heap
page read and write
29966E00000
trusted library allocation
page read and write
29966E05000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
13CA3609000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
403000
unkown
page readonly
1575B290000
trusted library allocation
page read and write
13CA3560000
trusted library allocation
page read and write
13CA37C0000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
9CD07C5000
stack
page read and write
1575958F000
heap
page read and write
1E3136D0000
trusted library allocation
page read and write
15773A93000
heap
page read and write
29966F30000
trusted library allocation
page read and write
15759579000
heap
page read and write
13CA37D0000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
19A4A680000
heap
page read and write
13CA35E9000
heap
page read and write
1E313710000
trusted library allocation
page read and write
6CD000
heap
page read and write
1E313691000
trusted library allocation
page read and write
5C0000
heap
page read and write
15759581000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
19A4E971000
heap
page read and write
7DF4F82F0000
trusted library allocation
page execute and read and write
1E313740000
trusted library allocation
page read and write
29976FA1000
trusted library allocation
page read and write
13CA365D000
heap
page read and write
1B0000
heap
page read and write
1E313730000
trusted library allocation
page read and write
29966F45000
trusted library allocation
page read and write
13CA35C0000
trusted library allocation
page read and write
15773AB4000
heap
page read and write
13CA364D000
heap
page read and write
1E32C45F000
heap
page read and write
1E313690000
trusted library allocation
page read and write
14C000
stack
page read and write
29966E00000
trusted library allocation
page read and write
29966DF0000
trusted library allocation
page read and write
1575B2E0000
trusted library allocation
page read and write
299654D7000
heap
page read and write
7FFD9B6E5000
trusted library allocation
page read and write
13CA34F0000
trusted library allocation
page read and write
59D01FF000
stack
page read and write
29966F60000
heap
page execute and read and write
133037C000
stack
page read and write
133017E000
stack
page read and write
133027E000
stack
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA35B1000
heap
page read and write
1404B4000
remote allocation
page execute and read and write
19A4A51A000
heap
page read and write
1575B290000
trusted library allocation
page read and write
13CA35C9000
heap
page read and write
1E3136C0000
trusted library allocation
page read and write
1575B295000
trusted library allocation
page read and write
1F9F9056000
heap
page read and write
5D9000
heap
page read and write
1E313740000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
13CA37F0000
trusted library allocation
page read and write
13CA35C0000
heap
page read and write
15773B79000
heap
page read and write
52F10FC000
stack
page read and write
13CA3530000
trusted library allocation
page read and write
401000
unkown
page execute read
15773A9F000
heap
page read and write
9CD11FE000
stack
page read and write
5DC000
heap
page read and write
15773B42000
heap
page read and write
13CA35F6000
heap
page read and write
180000
heap
page read and write
29966E00000
trusted library allocation
page read and write
13CA35AD000
heap
page read and write
15759750000
trusted library allocation
page read and write
1E313730000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
29976FAE000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
400000
unkown
page readonly
13CA3560000
trusted library allocation
page read and write
13CA35E0000
trusted library allocation
page read and write
13CA3602000
heap
page read and write
1E311BC5000
heap
page read and write
1F9F0EE3000
heap
page read and write
1E3136F0000
trusted library allocation
page read and write
13CA365D000
heap
page read and write
1575B290000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
29966F50000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
1E3136D0000
trusted library allocation
page read and write
7CD000
heap
page read and write
9CD0CFE000
stack
page read and write
15773AC2000
heap
page read and write
157594E3000
heap
page read and write
14C000
stack
page read and write
2608BFF000
stack
page read and write
13CA37E0000
trusted library allocation
page read and write
21392C30000
heap
page read and write
1575B290000
trusted library allocation
page read and write
7FFD9B8D2000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
1E313780000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
13CA37F0000
trusted library allocation
page read and write
13CA3602000
heap
page read and write
1575B290000
trusted library allocation
page read and write
1576B3D0000
trusted library allocation
page read and write
B84000
heap
page read and write
59D03FF000
stack
page read and write
1E313690000
trusted library allocation
page read and write
15773B08000
heap
page read and write
29965470000
unkown
page read and write
15773A80000
heap
page read and write
157595A4000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
13CA3602000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
1575B390000
trusted library allocation
page read and write
13CA3609000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
1F9F2910000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
13CA35B8000
heap
page read and write
260850A000
stack
page read and write
21DD5BCA000
heap
page read and write
2608CFE000
stack
page read and write
1F9F7256000
heap
page read and write
29966E03000
trusted library allocation
page read and write
400000
unkown
page readonly
1F0000
heap
page read and write
19A4DF71000
heap
page read and write
1E313700000
trusted library allocation
page read and write
1E313730000
trusted library allocation
page read and write
29966F40000
trusted library allocation
page read and write
1575B350000
trusted library allocation
page read and write
13CA35A0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
19A4A5AB000
heap
page read and write
13CA35F6000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
29966DF3000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
29966F70000
trusted library allocation
page read and write
15773AAF000
heap
page read and write
1575B2D0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1575B2E0000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
B70000
heap
page read and write
157594F5000
heap
page read and write
19A4A4A0000
heap
page read and write
1E3136E0000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
1575B2E0000
trusted library allocation
page read and write
15773A96000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
19A4F371000
heap
page read and write
2608A7B000
stack
page read and write
29965530000
unkown
page read and write
13CA37D0000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
1575B370000
trusted library allocation
page read and write
13CA37E0000
trusted library allocation
page read and write
15773AA8000
heap
page read and write
29966E15000
heap
page read and write
7DF4F82E0000
trusted library allocation
page execute and read and write
15773ACB000
heap
page read and write
29965400000
unkown
page read and write
1F9F2760000
heap
page read and write
157596C0000
heap
page read and write
59CFBCD000
stack
page read and write
133077E000
stack
page read and write
1F9F2AF0000
heap
page read and write
13CA3597000
heap
page read and write
29966E00000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
1F9F4A56000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1E313710000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3647000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
401000
unkown
page execute read
623000
unkown
page read and write
409000
unkown
page read and write
29966E00000
trusted library allocation
page read and write
403000
unkown
page readonly
29966DE3000
trusted library allocation
page read and write
7FFD9B8D4000
trusted library allocation
page read and write
13CA35E2000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
132FF76000
stack
page read and write
2996549B000
unkown
page read and write
157595AE000
heap
page read and write
1E3136F0000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
B52000
heap
page read and write
13CA37D0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1E3136D0000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1E31370B000
trusted library allocation
page read and write
7FFD9B8DD000
trusted library allocation
page execute and read and write
13CA35B5000
heap
page read and write
14C000
stack
page read and write
1575B290000
trusted library allocation
page read and write
29966E10000
heap
page read and write
1E3136C0000
trusted library allocation
page read and write
1575B2D0000
trusted library allocation
page read and write
13CA37E0000
trusted library allocation
page read and write
15773A98000
heap
page read and write
13CA35ED000
heap
page read and write
1575951E000
heap
page read and write
9CD0EFE000
stack
page read and write
1575B290000
trusted library allocation
page read and write
190000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
29965585000
heap
page read and write
1E313700000
trusted library allocation
page read and write
1E313710000
trusted library allocation
page read and write
1E3137A0000
trusted library allocation
page read and write
157595AE000
heap
page read and write
1E313690000
trusted library allocation
page read and write
15773AB6000
heap
page read and write
13CA3610000
trusted library allocation
page read and write
21DD5BE8000
heap
page read and write
9CD10FE000
stack
page read and write
13CA3800000
trusted library allocation
page read and write
1F9F5E56000
heap
page read and write
21392E30000
heap
page read and write
1F9F2915000
heap
page read and write
19A50771000
heap
page read and write
13CA37D0000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
19A4BEB0000
heap
page readonly
1575B2D0000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
7FFD9B884000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page execute and read and write
15759598000
heap
page read and write
1575B290000
trusted library allocation
page read and write
403000
unkown
page readonly
1E3136D0000
trusted library allocation
page read and write
13CA37C0000
trusted library allocation
page read and write
13CA35FD000
heap
page read and write
7FFD9BA72000
trusted library allocation
page read and write
157594B7000
heap
page read and write
7DF449430000
trusted library allocation
page execute and read and write
758000
heap
page read and write
13CA3590000
trusted library allocation
page read and write
13CA365B000
heap
page read and write
5F88B8C000
stack
page read and write
157595AE000
heap
page read and write
7DF4F8300000
trusted library allocation
page execute and read and write
29966F40000
trusted library allocation
page read and write
29965420000
unkown
page read and write
9CD107E000
unkown
page readonly
29966E00000
trusted library allocation
page read and write
6C0000
heap
page read and write
1E313790000
trusted library allocation
page read and write
13CA3560000
trusted library allocation
page read and write
21DD5DF0000
heap
page read and write
15773AE0000
heap
page read and write
13CA3530000
trusted library allocation
page read and write
2608EFF000
stack
page read and write
13CA3602000
heap
page read and write
1E3136E0000
trusted library allocation
page read and write
750000
heap
page read and write
21DD5BC0000
heap
page read and write
19A4BF10000
heap
page read and write
59D00FE000
stack
page read and write
1E313710000
trusted library allocation
page read and write
1575B2F0000
trusted library allocation
page read and write
13CA37E0000
trusted library allocation
page read and write
157597B0000
direct allocation
page read and write
1E313714000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
13CA364D000
heap
page read and write
19A4D000000
heap
page read and write
59D02FF000
stack
page read and write
15759780000
trusted library allocation
page read and write
13CA3570000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
623000
unkown
page read and write
401000
unkown
page execute read
7FFD9B880000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
13CA37B0000
trusted library allocation
page read and write
29966F40000
trusted library allocation
page read and write
29966F70000
trusted library allocation
page read and write
15773B13000
heap
page read and write
29966E00000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
15759790000
trusted library allocation
page read and write
2996552C000
unkown
page read and write
190000
heap
page read and write
29966E00000
trusted library allocation
page read and write
1E311BD2000
heap
page read and write
1E313700000
trusted library allocation
page read and write
94F000
stack
page read and write
13CA3570000
trusted library allocation
page read and write
2608AFE000
stack
page read and write
13CA3602000
heap
page read and write
9CD0DFD000
stack
page read and write
29966F40000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
19A51171000
heap
page read and write
1575B2D0000
trusted library allocation
page read and write
15773AA9000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
1575B297000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
13CA3501000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
1E313740000
trusted library allocation
page read and write
21DD5B70000
heap
page read and write
13CA35C5000
heap
page read and write
1575B2D0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
15773AB1000
heap
page read and write
1E3136F0000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
29966DE0000
trusted library allocation
page read and write
15759578000
heap
page read and write
29966E00000
trusted library allocation
page read and write
1F9F0DB0000
direct allocation
page execute read
9CD127E000
unkown
page readonly
1575B290000
trusted library allocation
page read and write
13CA37E4000
trusted library allocation
page read and write
29966F40000
trusted library allocation
page read and write
2608DFF000
stack
page read and write
13CA37C0000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
15773AB9000
heap
page read and write
21DD5B80000
heap
page read and write
1E3136D0000
trusted library allocation
page read and write
98F000
stack
page read and write
29966E28000
heap
page read and write
21392E50000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
157595A4000
heap
page read and write
13CA3560000
trusted library allocation
page read and write
13CA35F6000
heap
page read and write
19A4FD71000
heap
page read and write
19A4A5A3000
heap
page read and write
133047E000
stack
page read and write
1E3136E0000
trusted library allocation
page read and write
15759730000
heap
page readonly
A5E000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1F9F2870000
direct allocation
page execute and read and write
59D027F000
stack
page read and write
401000
unkown
page execute read
1E3136C0000
trusted library allocation
page read and write
7FFD9B98C000
trusted library allocation
page execute and read and write
1F9F0D90000
heap
page read and write
5F88EFF000
unkown
page read and write
7FFD9B8D3000
trusted library allocation
page execute and read and write
13CA37B0000
trusted library allocation
page read and write
21392C20000
heap
page read and write
15773A99000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
403000
unkown
page readonly
19A4C015000
heap
page read and write
29976FA9000
trusted library allocation
page read and write
157597A0000
heap
page read and write
1575959D000
heap
page read and write
13CA3620000
trusted library allocation
page read and write
13CA362B000
trusted library allocation
page read and write
1E313695000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1E313710000
trusted library allocation
page read and write
400000
unkown
page readonly
13CA35F6000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
15759700000
trusted library allocation
page read and write
29965310000
unkown
page readonly
7FFD9B890000
trusted library allocation
page read and write
157595A4000
heap
page read and write
15773ACB000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
15759526000
heap
page read and write
15773AE3000
heap
page read and write
1E313700000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
19A4BF59000
heap
page read and write
13CA37C0000
trusted library allocation
page read and write
13306FE000
unkown
page readonly
1575B2A0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
21392F80000
heap
page read and write
7CF000
stack
page read and write
299654E4000
heap
page read and write
1E313690000
trusted library allocation
page read and write
15773B0D000
heap
page read and write
15759490000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
15773ACB000
heap
page read and write
29965300000
unkown
page execute and read and write
A4F000
stack
page read and write
7FFD9B870000
trusted library allocation
page read and write
29966F40000
trusted library allocation
page read and write
1E3136F0000
trusted library allocation
page read and write
29966E05000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
1575B330000
trusted library allocation
page read and write
15773AAD000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
13CA3600000
trusted library allocation
page read and write
19A4BE70000
direct allocation
page execute read
7FFD9B8E5000
trusted library allocation
page read and write
7DF449450000
trusted library allocation
page execute and read and write
1F9F6856000
heap
page read and write
19A4BF71000
heap
page read and write
6C9000
heap
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3507000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
1575B2A0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1E3136D5000
trusted library allocation
page read and write
400000
unkown
page readonly
29966F50000
trusted library allocation
page read and write
133057E000
stack
page read and write
1E313700000
trusted library allocation
page read and write
59D017F000
stack
page read and write
13CA1992000
heap
page read and write
1E313690000
trusted library allocation
page read and write
15759590000
heap
page read and write
1E313690000
trusted library allocation
page read and write
1E3136F0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
29966E07000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
13CA37D2000
trusted library allocation
page read and write
9CD0F7E000
unkown
page readonly
7FFD9B6D3000
trusted library allocation
page execute and read and write
13CA3616000
trusted library allocation
page read and write
15773C70000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1E3136F0000
trusted library allocation
page read and write
13CA365D000
heap
page read and write
400000
unkown
page readonly
15773ACB000
heap
page read and write
13CA35F6000
heap
page read and write
29977A57000
trusted library allocation
page read and write
21392C60000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
1575959C000
heap
page read and write
133007E000
unkown
page read and write
29966E00000
trusted library allocation
page read and write
1E313680000
trusted library allocation
page read and write
15773AA1000
heap
page read and write
15759581000
heap
page read and write
1B0000
heap
page read and write
9CD117E000
unkown
page readonly
1E313760000
trusted library allocation
page read and write
1E3136D0000
trusted library allocation
page read and write
1E313730000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
1575B2F0000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
13CA35FA000
heap
page read and write
13CA3800000
trusted library allocation
page read and write
15759720000
trusted library allocation
page read and write
13CA37E0000
trusted library allocation
page read and write
7FFD9B888000
trusted library allocation
page execute and read and write
1E3136D0000
trusted library allocation
page read and write
15773A85000
heap
page read and write
1E313690000
trusted library allocation
page read and write
15773AA1000
heap
page read and write
1575B825000
trusted library allocation
page read and write
15759480000
heap
page read and write
29966E00000
trusted library allocation
page read and write
5F88FFF000
stack
page read and write
400000
unkown
page readonly
29966F30000
trusted library allocation
page read and write
15759745000
heap
page read and write
1E3136F0000
trusted library allocation
page read and write
13CA35B0000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
157594F2000
heap
page read and write
1E313690000
trusted library allocation
page read and write
19A4BE50000
heap
page read and write
1E313730000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1575B300000
trusted library allocation
page read and write
13307FE000
unkown
page readonly
1E313700000
trusted library allocation
page read and write
13305FE000
unkown
page readonly
21DD5BA0000
heap
page read and write
1404B4000
remote allocation
page execute and read and write
1F9F0E87000
heap
page read and write
1E313690000
trusted library allocation
page read and write
1F9F0EC7000
heap
page read and write
1F9F0D60000
heap
page read and write
13CA35DA000
heap
page read and write
15773BE1000
heap
page read and write
133067E000
stack
page read and write
13CA35F0000
trusted library allocation
page read and write
5C5000
heap
page read and write
1575B290000
trusted library allocation
page read and write
15773B42000
heap
page read and write
59D007C000
stack
page read and write
13CA3505000
trusted library allocation
page read and write
29966D50000
trusted library section
page read and write
13CA363E000
heap
page read and write
52F11FF000
unkown
page read and write
1E3136E0000
trusted library allocation
page read and write
180000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
13CA35A8000
heap
page read and write
157594F0000
heap
page read and write
1E3136F0000
trusted library allocation
page read and write
29966D60000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
1575B2F0000
trusted library allocation
page read and write
15773AD5000
heap
page read and write
15773ABD000
heap
page read and write
15773ACE000
heap
page read and write
1E313730000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
7FFD9B886000
trusted library allocation
page execute and read and write
15773AD5000
heap
page read and write
1575B290000
trusted library allocation
page read and write
15759556000
heap
page read and write
400000
unkown
page readonly
1E313730000
trusted library allocation
page read and write
1575B295000
trusted library allocation
page read and write
15773C71000
heap
page read and write
157595A4000
heap
page read and write
15773ADA000
heap
page read and write
1F9F5456000
heap
page read and write
29966E00000
trusted library allocation
page read and write
29966D80000
trusted library allocation
page read and write
13CA3560000
trusted library allocation
page read and write
13CA35F1000
heap
page read and write
29965580000
heap
page read and write
157594B0000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
15759740000
heap
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA365B000
heap
page read and write
13CA37D0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
13CA3505000
trusted library allocation
page read and write
13CA35FD000
heap
page read and write
1575B290000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
15773AB9000
heap
page read and write
1E313690000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
1575B360000
trusted library allocation
page read and write
13301FE000
unkown
page readonly
13CA37C0000
trusted library allocation
page read and write
7DF449440000
trusted library allocation
page execute and read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
59CFB49000
stack
page read and write
21392C6B000
heap
page read and write
52F12FF000
stack
page read and write
13CA35BF000
heap
page read and write
1E3136C0000
trusted library allocation
page read and write
15773A92000
heap
page read and write
13CA3800000
trusted library allocation
page read and write
15773AC8000
heap
page read and write
15773ADD000
heap
page read and write
19A4A579000
heap
page read and write
13CA35B5000
heap
page read and write
157595AE000
heap
page read and write
1E313700000
trusted library allocation
page read and write
1575B291000
trusted library allocation
page read and write
15773AB9000
heap
page read and write
132FFFE000
unkown
page readonly
13CA37B0000
trusted library allocation
page read and write
260858D000
stack
page read and write
1575B290000
trusted library allocation
page read and write
13CA35ED000
heap
page read and write
29966F40000
trusted library allocation
page read and write
13CA35EE000
heap
page read and write
1575B290000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
15773B43000
heap
page read and write
1E313702000
trusted library allocation
page read and write
9BF000
stack
page read and write
29966E00000
trusted library allocation
page read and write
13CA3609000
heap
page read and write
29966D30000
heap
page read and write
13CA3550000
trusted library allocation
page read and write
13CA3602000
heap
page read and write
13CA3530000
trusted library allocation
page read and write
1F9F0EB7000
heap
page read and write
15773AA9000
heap
page read and write
29966E00000
trusted library allocation
page read and write
59D04FE000
stack
page read and write
2608B7F000
stack
page read and write
13CA37D0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
403000
unkown
page readonly
29966E00000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1E3137BB000
trusted library allocation
page read and write
15773ABB000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
15773B0F000
heap
page read and write
1575B291000
trusted library allocation
page read and write
29966F50000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
13CA3609000
heap
page read and write
1E313690000
trusted library allocation
page read and write
1E313695000
trusted library allocation
page read and write
13304FE000
unkown
page readonly
13CA35D0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
29966F90000
heap
page read and write
29966F30000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
29966DD0000
trusted library section
page read and write
1575B2E0000
trusted library allocation
page read and write
15773ADC000
heap
page read and write
13CA1984000
heap
page read and write
21DD5E00000
heap
page read and write
13CA363E000
heap
page read and write
13CA35AD000
heap
page read and write
15773A88000
heap
page read and write
29966E00000
trusted library allocation
page read and write
1E313770000
trusted library allocation
page read and write
9CD12FE000
stack
page read and write
1E3136D0000
trusted library allocation
page read and write
1575B3C1000
trusted library allocation
page read and write
403000
unkown
page readonly
13CA3500000
trusted library allocation
page read and write
1E313740000
trusted library allocation
page read and write
13CA35D8000
heap
page read and write
19A4A539000
heap
page read and write
1575B2D0000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page read and write
15773AB1000
heap
page read and write
1E3137A6000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
1B0000
heap
page read and write
1F9F7C56000
heap
page read and write
13CA37D0000
trusted library allocation
page read and write
29966E01000
trusted library allocation
page read and write
13CA35DA000
heap
page read and write
29966F30000
trusted library allocation
page read and write
15773AB1000
heap
page read and write
13CA37B0000
trusted library allocation
page read and write
15773A90000
heap
page read and write
13CA37D0000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
400000
unkown
page readonly
1E3136F0000
trusted library allocation
page read and write
13CA37F0000
trusted library allocation
page read and write
13CA35F6000
heap
page read and write
29965320000
heap
page read and write
1B0000
heap
page read and write
1575B280000
heap
page read and write
1E313710000
trusted library allocation
page read and write
180000
heap
page read and write
13CA35AE000
heap
page read and write
15759250000
unkown
page execute and read and write
13CA37C0000
trusted library allocation
page read and write
15773B42000
heap
page read and write
1E313700000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
157595A7000
heap
page read and write
13CBC001000
heap
page read and write
1E3136C0000
trusted library allocation
page read and write
13CA35A1000
heap
page read and write
13CA3800000
trusted library allocation
page read and write
15773AE1000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
29965430000
unkown
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
13CA37B0000
trusted library allocation
page read and write
15773AB9000
heap
page read and write
1575959D000
heap
page read and write
9CD0D7E000
unkown
page readonly
1E313740000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
13CA37BC000
trusted library allocation
page read and write
403000
unkown
page readonly
13CA359B000
heap
page read and write
15773E10000
trusted library section
page read and write
1576B3C1000
trusted library allocation
page read and write
29966F40000
trusted library allocation
page read and write
29966F70000
trusted library allocation
page read and write
7FFD9BB22000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1576B3C9000
trusted library allocation
page read and write
1575B3B0000
heap
page execute and read and write
7FFD9BA7D000
trusted library allocation
page execute and read and write
29966E00000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
1575B2D0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1F9F0E77000
heap
page read and write
7C0000
heap
page read and write
13CA35F1000
heap
page read and write
29966F30000
trusted library allocation
page read and write
13CA37D0000
trusted library allocation
page read and write
1575B320000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
1575B2E0000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
13CA37B0000
trusted library allocation
page read and write
15773A81000
heap
page read and write
15759680000
heap
page read and write
13CA3602000
heap
page read and write
14073D000
remote allocation
page execute and read and write
1575B290000
trusted library allocation
page read and write
401000
unkown
page execute read
2997F6C0000
heap
page execute and read and write
1E3137D0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
21DD5DF5000
heap
page read and write
15773ACB000
heap
page read and write
29966E00000
trusted library allocation
page read and write
13CA35DB000
heap
page read and write
13CA37C0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
29966F50000
trusted library allocation
page read and write
15773A98000
heap
page read and write
13CA35D4000
heap
page read and write
29966DA0000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
13CA37F0000
trusted library allocation
page read and write
15773AD5000
heap
page read and write
13CA3530000
trusted library allocation
page read and write
13CA3570000
trusted library allocation
page read and write
9CD09F4000
unkown
page read and write
21DD5BE5000
heap
page read and write
1576B3CE000
trusted library allocation
page read and write
13CA3501000
trusted library allocation
page read and write
15773C72000
heap
page read and write
157595AE000
heap
page read and write
13CA3530000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
15773AB9000
heap
page read and write
15773C21000
heap
page read and write
1E3136E0000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
15773ACB000
heap
page read and write
29966E00000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
19A4BEC0000
direct allocation
page execute and read and write
13CA3609000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
13CA3602000
heap
page read and write
1E313710000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
13CA3609000
heap
page read and write
19A4BF61000
heap
page read and write
13CA3560000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
29966E00000
trusted library allocation
page read and write
13CA37F0000
trusted library allocation
page read and write
13CA3550000
trusted library allocation
page read and write
14073D000
remote allocation
page execute and read and write
13CA3500000
trusted library allocation
page read and write
13CA3550000
trusted library allocation
page read and write
157595A3000
heap
page read and write
13CA35CC000
heap
page read and write
13CA3609000
heap
page read and write
157597A5000
heap
page read and write
13CA365B000
heap
page read and write
1E313691000
trusted library allocation
page read and write
7FFD9B9B6000
trusted library allocation
page execute and read and write
1F9F4056000
heap
page read and write
13CA35F6000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
13CA37F0000
trusted library allocation
page read and write
1575B290000
trusted library allocation
page read and write
13CA37DB000
trusted library allocation
page read and write
1E3136F0000
trusted library allocation
page read and write
15773B15000
heap
page read and write
19A4D571000
heap
page read and write
29965460000
unkown
page read and write
19A4BF69000
heap
page read and write
19A52571000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
13CA3500000
trusted library allocation
page read and write
29966F30000
trusted library allocation
page read and write
29965570000
trusted library section
page read and write
13CA38C0000
trusted library allocation
page read and write
9CD0A7E000
unkown
page readonly
15773ADD000
heap
page read and write
15773C73000
heap
page read and write
1575B2A0000
trusted library allocation
page read and write
13CA3550000
trusted library allocation
page read and write
5D6000
heap
page read and write
1575B310000
trusted library allocation
page read and write
15773A89000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
1575959D000
heap
page read and write
13CA3500000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
1E3137B0000
trusted library allocation
page read and write
1575B380000
trusted library allocation
page read and write
2608C7F000
stack
page read and write
29966E00000
trusted library allocation
page read and write
9CD0E7E000
unkown
page readonly
13CA3500000
trusted library allocation
page read and write
1E313690000
trusted library allocation
page read and write
1F9F27A0000
heap
page read and write
1E313700000
trusted library allocation
page read and write
157595AE000
heap
page read and write
19A4A50B000
heap
page read and write
1575B340000
trusted library allocation
page read and write
1E3136C0000
trusted library allocation
page read and write
13CA3530000
trusted library allocation
page read and write
1E313700000
trusted library allocation
page read and write
1E3136E0000
trusted library allocation
page read and write
There are 1058 hidden memdumps, click here to show them.