IOC Report
SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\ssleay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\vp8decoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\vp8encoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\webmmux.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\webmvorbisdecoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\webmvorbisencoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\EULA.rtf
Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
dropped
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\eventmsg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\settings.dat
Unicode text, UTF-8 (with BOM) text, with very long lines (2897), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Remote Utilities Agent\Logs\rut_log_2024-05.html
HTML document, ASCII text, with CRLF, CR line terminators
dropped
C:\Users\user\AppData\Roaming\Remote Utilities Agent\Logs\rut_log_2024-07.html
HTML document, ASCII text, with CR line terminators
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D
data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_09E960F015FF4A8F16C13B5E9BAAA43F
data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D
data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_09E960F015FF4A8F16C13B5E9BAAA43F
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe
"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exe"
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe
"C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe" -run_agent
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe
"C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe" -run_agent
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe
"C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rutserv.exe" -run_agent -second
malicious
C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe
"C:\Users\user\AppData\Roaming\Remote Utilities Agent\70020\DBEBCA0792\rfusclient.exe" /tray /user
malicious

URLs

Name
IP
Malicious
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
unknown
http://update.remoteutilities.net/upgrade_beta.ini
unknown
http://www.indyproject.org/
unknown
http://www.openssl.org/V
unknown
http://rmansys.ru/internet-id/
unknown
http://madExcept.comU
unknown
http://www.openssl.org/support/faq.html
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://update.remoteutilities.net/upgrade.ini
unknown

Domains

Name
IP
Malicious
connect.aimcosoftware.uk
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
General
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
Security
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
notification
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
FUSClientPath
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
InternetId
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
Certificates
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
CalendarRecordSettings
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
General
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
Certificates
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
notification
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
InternetId
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
InternetId
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
General
HKEY_CURRENT_USER\SOFTWARE\Usoris\Remote Utilities\Host\Parameters
Security
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
Blob
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3591000
heap
page read and write
17E5000
heap
page read and write
5071000
heap
page read and write
85BF000
stack
page read and write
35C6000
heap
page read and write
10D8000
heap
page read and write
1166000
heap
page read and write
116C000
heap
page read and write
1171000
unkown
page read and write
1512000
unkown
page readonly
3591000
heap
page read and write
3591000
heap
page read and write
1296000
heap
page read and write
9A5E000
stack
page read and write
2F91000
heap
page read and write
5911000
direct allocation
page read and write
3591000
heap
page read and write
47DE000
stack
page read and write
175F000
heap
page read and write
529E000
unkown
page read and write
2FE0000
heap
page read and write
11F0000
heap
page read and write
3591000
heap
page read and write
9EC000
unkown
page execute read
4C5E000
stack
page read and write
3591000
heap
page read and write
7CC27000
direct allocation
page read and write
4F7E000
heap
page read and write
2DF1000
heap
page read and write
1784000
heap
page read and write
3591000
heap
page read and write
44E000
unkown
page execute read
36CC000
stack
page read and write
338B000
direct allocation
page read and write
4870000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
11D4000
unkown
page read and write
2F91000
heap
page read and write
7FDC4000
direct allocation
page read and write
7EA60000
direct allocation
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
D1F000
unkown
page read and write
1162000
heap
page read and write
7E7D0000
direct allocation
page read and write
337D000
direct allocation
page read and write
333F000
direct allocation
page read and write
1736000
heap
page read and write
2DF1000
heap
page read and write
11142000
unkown
page read and write
409000
unkown
page execute read
3591000
heap
page read and write
CD2000
unkown
page read and write
17DC000
heap
page read and write
8350000
heap
page read and write
2DF1000
heap
page read and write
49AF000
direct allocation
page read and write
9CB000
unkown
page execute and read and write
9748000
heap
page read and write
2E66000
heap
page read and write
3591000
heap
page read and write
1196000
unkown
page read and write
122F000
heap
page read and write
2DF1000
heap
page read and write
3013000
heap
page read and write
1162000
heap
page read and write
2C32000
direct allocation
page read and write
5AE1000
direct allocation
page read and write
855F000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
506F000
heap
page read and write
177D000
heap
page read and write
1589000
unkown
page readonly
2F91000
heap
page read and write
1796000
heap
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
1738000
heap
page read and write
2C15000
direct allocation
page read and write
507E000
stack
page read and write
1204E000
unkown
page read and write
16C0000
heap
page read and write
4AD6000
direct allocation
page read and write
2C0D000
direct allocation
page read and write
85B5000
trusted library allocation
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
1736000
heap
page read and write
7F24A000
direct allocation
page read and write
116A000
heap
page read and write
3591000
heap
page read and write
400000
unkown
page readonly
3591000
heap
page read and write
3591000
heap
page read and write
A48000
unkown
page execute and read and write
4610000
direct allocation
page read and write
8532000
trusted library allocation
page read and write
116D000
heap
page read and write
97000
stack
page read and write
3411000
direct allocation
page read and write
3591000
heap
page read and write
7F040000
direct allocation
page read and write
6A1E000
stack
page read and write
1542000
unkown
page readonly
154B000
unkown
page readonly
7E3D0000
direct allocation
page read and write
7FD40000
direct allocation
page read and write
1756000
heap
page read and write
1094000
heap
page read and write
2E6C000
direct allocation
page read and write
3591000
heap
page read and write
1235000
heap
page read and write
85D1000
trusted library allocation
page read and write
1004000
heap
page read and write
D7B000
unkown
page readonly
3870000
heap
page read and write
11E0000
heap
page read and write
155B000
unkown
page readonly
1253000
heap
page read and write
6D774000
direct allocation
page read and write
3591000
heap
page read and write
17CA000
heap
page read and write
2F91000
heap
page read and write
7FDD2000
direct allocation
page read and write
84AA000
trusted library allocation
page read and write
1275000
heap
page read and write
6A5E000
stack
page read and write
116D000
heap
page read and write
897A000
heap
page read and write
2E22000
direct allocation
page read and write
3591000
heap
page read and write
7EC50000
direct allocation
page read and write
85C1000
trusted library allocation
page read and write
57EE000
heap
page read and write
48E0000
heap
page read and write
9B000
stack
page read and write
A4E000
unkown
page execute and read and write
9846000
heap
page read and write
AF5E000
stack
page read and write
5DEE000
stack
page read and write
46AD000
direct allocation
page read and write
1164000
heap
page read and write
1746000
heap
page read and write
1739000
heap
page read and write
7EFF0000
direct allocation
page read and write
3591000
heap
page read and write
882F000
stack
page read and write
1282000
heap
page read and write
84B9000
trusted library allocation
page read and write
1004000
heap
page read and write
332F000
stack
page read and write
CEA000
unkown
page read and write
4E60000
direct allocation
page execute and read and write
4ECE000
stack
page read and write
116D000
heap
page read and write
640F000
stack
page read and write
52B5000
unkown
page read and write
3591000
heap
page read and write
1A8F000
stack
page read and write
33ED000
direct allocation
page read and write
8A6F000
stack
page read and write
CAE000
unkown
page execute read
46D3000
direct allocation
page read and write
3591000
heap
page read and write
6D733000
direct allocation
page read and write
5055000
heap
page read and write
3591000
heap
page read and write
11149000
unkown
page readonly
A59F000
stack
page read and write
126D000
heap
page read and write
2D50000
direct allocation
page read and write
2DF1000
heap
page read and write
17D2000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
97FE000
heap
page read and write
A71F000
stack
page read and write
8939000
heap
page read and write
4621000
direct allocation
page read and write
17CD000
heap
page read and write
8AEE000
stack
page read and write
7FAB0000
direct allocation
page read and write
1577000
unkown
page readonly
19B000
stack
page read and write
472C000
direct allocation
page read and write
5041000
direct allocation
page read and write
168F000
unkown
page readonly
3591000
heap
page read and write
7E970000
direct allocation
page read and write
6D780000
direct allocation
page read and write
7EF80000
direct allocation
page read and write
2F91000
heap
page read and write
1790000
heap
page read and write
3591000
heap
page read and write
5A8D000
direct allocation
page read and write
57FA000
heap
page read and write
3591000
heap
page read and write
129D000
heap
page read and write
470F000
direct allocation
page read and write
33FB000
direct allocation
page read and write
116D000
heap
page read and write
113F000
heap
page read and write
6D750000
direct allocation
page read and write
8944000
heap
page read and write
10E7000
unkown
page execute read
7EF80000
direct allocation
page read and write
3591000
heap
page read and write
84C9000
trusted library allocation
page read and write
1200000
unkown
page read and write
7EE90000
direct allocation
page read and write
14DD000
unkown
page readonly
3592000
heap
page read and write
173C000
heap
page read and write
3591000
heap
page read and write
1162000
heap
page read and write
339B000
direct allocation
page read and write
8DB000
unkown
page execute read
858F000
trusted library allocation
page read and write
33A8000
direct allocation
page read and write
4D3B000
direct allocation
page read and write
1162000
heap
page read and write
33DE000
direct allocation
page read and write
1147000
heap
page read and write
85F7000
trusted library allocation
page read and write
7CC2C000
direct allocation
page read and write
2DF1000
heap
page read and write
1534000
unkown
page readonly
3591000
heap
page read and write
538D000
stack
page read and write
3402000
direct allocation
page read and write
85CE000
trusted library allocation
page read and write
980D000
heap
page read and write
1164000
heap
page read and write
2FA0000
heap
page read and write
2B20000
heap
page read and write
6D737000
direct allocation
page read and write
84F6000
trusted library allocation
page read and write
3591000
heap
page read and write
51A0000
heap
page read and write
3591000
heap
page read and write
14B6000
unkown
page readonly
2F91000
heap
page read and write
1246000
heap
page read and write
1572000
unkown
page readonly
9C9E000
stack
page read and write
1703000
heap
page read and write
CE7000
unkown
page read and write
84DC000
trusted library allocation
page read and write
1590000
heap
page read and write
6D767000
direct allocation
page read and write
7FDE3000
direct allocation
page read and write
3591000
heap
page read and write
6D6CA000
direct allocation
page read and write
1004000
heap
page read and write
7D3D0000
direct allocation
page read and write
110D000
heap
page read and write
14D5000
unkown
page readonly
84E9000
trusted library allocation
page read and write
74D000
unkown
page execute read
2F91000
heap
page read and write
6D783000
direct allocation
page read and write
2DF1000
heap
page read and write
3591000
heap
page read and write
46A6000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
7FDF0000
direct allocation
page read and write
8585000
trusted library allocation
page read and write
499F000
direct allocation
page read and write
7FBE0000
direct allocation
page read and write
8575000
trusted library allocation
page read and write
8937000
heap
page read and write
3591000
heap
page read and write
342F000
direct allocation
page read and write
2F91000
heap
page read and write
1004000
heap
page read and write
3591000
heap
page read and write
158B000
unkown
page readonly
5AD3000
direct allocation
page read and write
3591000
heap
page read and write
116B000
heap
page read and write
2BC8000
direct allocation
page read and write
1264000
unkown
page readonly
1162000
heap
page read and write
6D78A000
direct allocation
page read and write
936F000
stack
page read and write
2DF1000
heap
page read and write
400000
unkown
page readonly
971A000
heap
page read and write
125A000
heap
page read and write
3591000
heap
page read and write
400000
unkown
page readonly
1162000
heap
page read and write
5270000
direct allocation
page read and write
7FBB0000
direct allocation
page read and write
1168000
heap
page read and write
117C000
unkown
page read and write
8850000
remote allocation
page read and write
5164000
unkown
page read and write
506F000
heap
page read and write
CBA000
unkown
page read and write
8623000
heap
page read and write
CBA000
unkown
page write copy
4E50000
heap
page read and write
1162000
heap
page read and write
9C9000
unkown
page execute read
116D000
heap
page read and write
9771000
heap
page read and write
3591000
heap
page read and write
5A9D000
direct allocation
page read and write
514E000
stack
page read and write
7EC70000
direct allocation
page read and write
29E0000
heap
page read and write
14BC000
unkown
page readonly
7FDE8000
direct allocation
page read and write
2F91000
heap
page read and write
7FE16000
direct allocation
page read and write
2F91000
heap
page read and write
1170000
unkown
page read and write
3330000
direct allocation
page read and write
116D000
heap
page read and write
983B000
heap
page read and write
85EC000
trusted library allocation
page read and write
14EA000
unkown
page readonly
3591000
heap
page read and write
121F000
unkown
page read and write
17A8000
heap
page read and write
B61E000
stack
page read and write
1234000
unkown
page read and write
1004000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
7FD90000
direct allocation
page read and write
2F91000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
14B8000
unkown
page readonly
2C58000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
4740000
heap
page read and write
7FDCF000
direct allocation
page read and write
4FC000
unkown
page execute read
7ACE4000
direct allocation
page read and write
469A000
direct allocation
page read and write
14E6000
unkown
page readonly
8DEF000
stack
page read and write
3591000
heap
page read and write
8539000
trusted library allocation
page read and write
D6D000
unkown
page write copy
344C000
direct allocation
page read and write
7FD90000
direct allocation
page read and write
1094000
heap
page read and write
33D7000
direct allocation
page read and write
3591000
heap
page read and write
18EE000
stack
page read and write
1162000
heap
page read and write
1E4000
heap
page read and write
84EC000
trusted library allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
8529000
trusted library allocation
page read and write
A99E000
stack
page read and write
7EFF0000
direct allocation
page read and write
18B0000
heap
page read and write
FD0000
heap
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
117D000
unkown
page read and write
2F91000
heap
page read and write
858B000
trusted library allocation
page read and write
7CCD9000
direct allocation
page read and write
157D000
unkown
page readonly
33BE000
direct allocation
page read and write
1094000
heap
page read and write
152D000
unkown
page readonly
3418000
direct allocation
page read and write
3591000
heap
page read and write
85AE000
trusted library allocation
page read and write
D2A000
unkown
page read and write
7FD40000
direct allocation
page read and write
84D3000
trusted library allocation
page read and write
4AC7000
direct allocation
page read and write
8974000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
3010000
heap
page read and write
6ECF000
stack
page read and write
177B000
heap
page read and write
2DF1000
heap
page read and write
857F000
trusted library allocation
page read and write
98DE000
stack
page read and write
33A6000
direct allocation
page read and write
6D772000
direct allocation
page read and write
3591000
heap
page read and write
972E000
heap
page read and write
23FB000
unkown
page write copy
1000000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
17C3000
heap
page read and write
2F91000
heap
page read and write
8929000
heap
page read and write
58A0000
direct allocation
page read and write
6D6E3000
direct allocation
page read and write
7AC45000
direct allocation
page read and write
CDA000
unkown
page read and write
340A000
direct allocation
page read and write
84C0000
trusted library allocation
page read and write
2E38000
direct allocation
page read and write
14CD000
unkown
page readonly
6D6BA000
direct allocation
page read and write
7ECB0000
direct allocation
page read and write
3591000
heap
page read and write
2DF1000
heap
page read and write
125E000
heap
page read and write
84BD000
trusted library allocation
page read and write
177A000
heap
page read and write
19B000
stack
page read and write
1794000
heap
page read and write
3591000
heap
page read and write
7FD70000
direct allocation
page read and write
2DF1000
heap
page read and write
116D000
heap
page read and write
3591000
heap
page read and write
85D8000
trusted library allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
2DD9000
direct allocation
page read and write
8850000
remote allocation
page read and write
18B4000
heap
page read and write
7FDB0000
direct allocation
page read and write
58A6000
direct allocation
page read and write
4E20000
heap
page read and write
7FDA0000
direct allocation
page read and write
4DFE000
stack
page read and write
3591000
heap
page read and write
2DFE000
direct allocation
page read and write
4F49000
direct allocation
page read and write
14C9000
unkown
page readonly
3591000
heap
page read and write
922F000
stack
page read and write
5127000
heap
page read and write
8F000
stack
page read and write
8578000
trusted library allocation
page read and write
5140000
heap
page read and write
54CF000
stack
page read and write
849D000
trusted library allocation
page read and write
9B000
stack
page read and write
178D000
heap
page read and write
6D77E000
direct allocation
page read and write
7FE44000
direct allocation
page read and write
85DC000
trusted library allocation
page read and write
17E9000
heap
page read and write
8509000
trusted library allocation
page read and write
10DC000
unkown
page execute read
3591000
heap
page read and write
2F91000
heap
page read and write
5074000
heap
page read and write
854F000
trusted library allocation
page read and write
1175000
heap
page read and write
1113D000
unkown
page read and write
3591000
heap
page read and write
1198000
unkown
page read and write
19F8000
unkown
page write copy
7FDC4000
direct allocation
page read and write
3461000
direct allocation
page read and write
156A000
unkown
page readonly
3591000
heap
page read and write
2DF1000
heap
page read and write
FE0000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
33E6000
direct allocation
page read and write
2F91000
heap
page read and write
51BC000
stack
page read and write
2F91000
heap
page read and write
1E4000
heap
page read and write
1094000
heap
page read and write
3591000
heap
page read and write
6D6EC000
direct allocation
page read and write
15A0000
heap
page read and write
171E000
heap
page read and write
96E0000
heap
page read and write
989E000
stack
page read and write
3592000
heap
page read and write
7AC07000
direct allocation
page read and write
3591000
heap
page read and write
33D7000
direct allocation
page read and write
9EDE000
stack
page read and write
16F8000
heap
page read and write
85E1000
trusted library allocation
page read and write
9803000
heap
page read and write
852F000
trusted library allocation
page read and write
2F91000
heap
page read and write
186E000
stack
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
116D000
heap
page read and write
3591000
heap
page read and write
1789000
heap
page read and write
1247000
heap
page read and write
85B8000
trusted library allocation
page read and write
621E000
stack
page read and write
110E7000
unkown
page readonly
985B000
heap
page read and write
5328000
direct allocation
page read and write
4DD0000
heap
page read and write
3591000
heap
page read and write
4EFE000
stack
page read and write
7EFC0000
direct allocation
page read and write
3591000
heap
page read and write
6D6D6000
direct allocation
page read and write
3591000
heap
page read and write
1174000
unkown
page read and write
6D742000
direct allocation
page read and write
2DF0000
direct allocation
page read and write
3591000
heap
page read and write
6D799000
direct allocation
page read and write
7F610000
direct allocation
page read and write
EF3000
unkown
page readonly
531C000
direct allocation
page read and write
174A000
heap
page read and write
2DF1000
heap
page read and write
343D000
direct allocation
page read and write
5060000
heap
page read and write
3436000
direct allocation
page read and write
85BE000
trusted library allocation
page read and write
178A000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
116C000
heap
page read and write
4E70000
heap
page read and write
16D0000
heap
page read and write
6D722000
direct allocation
page read and write
3591000
heap
page read and write
336C000
direct allocation
page read and write
322E000
stack
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
49B9000
direct allocation
page read and write
2F91000
heap
page read and write
2D3F000
stack
page read and write
8F2000
unkown
page execute read
2C21000
direct allocation
page read and write
14D1000
unkown
page readonly
157F000
unkown
page readonly
333F000
direct allocation
page read and write
12000000
unkown
page readonly
CE1000
unkown
page read and write
1BD0000
heap
page read and write
1E0000
heap
page read and write
2DD2000
direct allocation
page read and write
1162000
heap
page read and write
128A000
heap
page read and write
1285000
heap
page read and write
2C28000
direct allocation
page read and write
3592000
heap
page read and write
5061000
heap
page read and write
16D8000
heap
page read and write
4820000
heap
page read and write
B71F000
stack
page read and write
1162000
heap
page read and write
2F91000
heap
page read and write
6E4000
unkown
page execute read
153E000
unkown
page readonly
1162000
heap
page read and write
1164000
heap
page read and write
3591000
heap
page read and write
1794000
heap
page read and write
506D000
heap
page read and write
14F7000
unkown
page readonly
6D76C000
direct allocation
page read and write
6D6FF000
direct allocation
page read and write
3591000
heap
page read and write
3592000
heap
page read and write
3591000
heap
page read and write
4741000
direct allocation
page read and write
A28000
unkown
page execute and read and write
7F010000
direct allocation
page read and write
694F000
stack
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
2F91000
heap
page read and write
5150000
unkown
page read and write
2C8A000
direct allocation
page read and write
2B9F000
heap
page read and write
84C6000
trusted library allocation
page read and write
3591000
heap
page read and write
7FDB3000
direct allocation
page read and write
6D75E000
direct allocation
page read and write
6FEF000
stack
page read and write
D3F000
unkown
page read and write
401000
unkown
page execute read
7F010000
direct allocation
page read and write
116D000
heap
page read and write
3591000
heap
page read and write
13EE000
stack
page read and write
7EFD0000
direct allocation
page read and write
2DC4000
direct allocation
page read and write
4F1C000
stack
page read and write
3590000
heap
page read and write
1778000
heap
page read and write
53CE000
stack
page read and write
3591000
heap
page read and write
5B0D000
direct allocation
page read and write
4E70000
heap
page read and write
7E970000
direct allocation
page read and write
46F8000
direct allocation
page read and write
3591000
heap
page read and write
1595000
unkown
page readonly
524F000
stack
page read and write
1253000
heap
page read and write
6DED000
stack
page read and write
129D000
heap
page read and write
11142000
unkown
page read and write
14C5000
unkown
page readonly
3591000
heap
page read and write
7FE4B000
direct allocation
page read and write
7EB40000
direct allocation
page read and write
6D730000
direct allocation
page read and write
3591000
heap
page read and write
2E64000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
6D6CE000
direct allocation
page read and write
3591000
heap
page read and write
91B000
unkown
page execute read
177C000
heap
page read and write
5050000
heap
page read and write
7FE00000
direct allocation
page read and write
6BEE000
stack
page read and write
178F000
heap
page read and write
3591000
heap
page read and write
84A1000
trusted library allocation
page read and write
85BB000
trusted library allocation
page read and write
1744000
heap
page read and write
3428000
direct allocation
page read and write
116D000
heap
page read and write
3591000
heap
page read and write
9732000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
984A000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
2B40000
heap
page read and write
3591000
heap
page read and write
97000
stack
page read and write
7F200000
direct allocation
page read and write
2F91000
heap
page read and write
7FDE0000
direct allocation
page read and write
2E31000
direct allocation
page read and write
A81F000
stack
page read and write
A08000
unkown
page execute and read and write
7CEC0000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
7FD80000
direct allocation
page read and write
2F91000
heap
page read and write
112B000
heap
page read and write
3591000
heap
page read and write
11F9000
heap
page read and write
3591000
heap
page read and write
2E2A000
direct allocation
page read and write
1004000
heap
page read and write
1746000
heap
page read and write
548E000
stack
page read and write
8552000
trusted library allocation
page read and write
1094000
heap
page read and write
17D0000
heap
page read and write
B4DE000
stack
page read and write
856F000
trusted library allocation
page read and write
2E48000
direct allocation
page read and write
116B000
heap
page read and write
7CB7E000
direct allocation
page read and write
1094000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
1192000
unkown
page read and write
3591000
heap
page read and write
707000
unkown
page execute read
3591000
heap
page read and write
85EE000
trusted library allocation
page read and write
D2E000
unkown
page read and write
127A000
heap
page read and write
919000
unkown
page execute read
19BD000
unkown
page write copy
84B3000
trusted library allocation
page read and write
8992000
heap
page read and write
2F2C000
stack
page read and write
409000
unkown
page execute read
912E000
stack
page read and write
332F000
stack
page read and write
116D000
heap
page read and write
400000
unkown
page readonly
3591000
heap
page read and write
1094000
heap
page read and write
158E000
unkown
page readonly
3591000
heap
page read and write
7AC42000
direct allocation
page read and write
2F91000
heap
page read and write
1162000
heap
page read and write
45E000
unkown
page execute read
3591000
heap
page read and write
1005000
heap
page read and write
8582000
trusted library allocation
page read and write
3591000
heap
page read and write
2DB5000
direct allocation
page read and write
37F0000
heap
page read and write
95DE000
stack
page read and write
5060000
trusted library allocation
page read and write
CCA000
unkown
page read and write
3591000
heap
page read and write
2C60000
direct allocation
page read and write
7F0000
unkown
page execute read
2E0D000
direct allocation
page read and write
985E000
stack
page read and write
33C7000
direct allocation
page read and write
3591000
heap
page read and write
9779000
heap
page read and write
1162000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
299E000
stack
page read and write
5289000
unkown
page read and write
12053000
unkown
page readonly
7FAB0000
direct allocation
page read and write
3591000
heap
page read and write
8572000
trusted library allocation
page read and write
2F91000
heap
page read and write
8523000
trusted library allocation
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
500E000
stack
page read and write
4F76000
heap
page read and write
2F91000
heap
page read and write
1E5000
heap
page read and write
52A5000
unkown
page read and write
66AF000
stack
page read and write
D69000
unkown
page read and write
1E4000
heap
page read and write
855C000
trusted library allocation
page read and write
1004000
heap
page read and write
7FE16000
direct allocation
page read and write
2F91000
heap
page read and write
991D000
stack
page read and write
896F000
stack
page read and write
1595000
heap
page read and write
D0C000
unkown
page read and write
D4A000
unkown
page read and write
14BF000
unkown
page readonly
84A6000
trusted library allocation
page read and write
7FCF0000
direct allocation
page read and write
1169000
heap
page read and write
2824000
unkown
page read and write
1113F000
unkown
page write copy
4E30000
heap
page read and write
6A9E000
stack
page read and write
7FE1F000
direct allocation
page read and write
959F000
stack
page read and write
1203F000
unkown
page readonly
8542000
trusted library allocation
page read and write
3591000
heap
page read and write
17B1000
heap
page read and write
5630000
heap
page read and write
85AB000
trusted library allocation
page read and write
3396000
direct allocation
page read and write
9748000
heap
page read and write
3384000
direct allocation
page read and write
3592000
heap
page read and write
1094000
heap
page read and write
2DF1000
heap
page read and write
59DF000
direct allocation
page read and write
5120000
heap
page read and write
7FD67000
direct allocation
page read and write
7EF4E000
direct allocation
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
462B000
direct allocation
page read and write
1790000
heap
page read and write
3591000
heap
page read and write
7FE4B000
direct allocation
page read and write
1165000
heap
page read and write
3591000
heap
page read and write
473A000
direct allocation
page read and write
859B000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
50AE000
stack
page read and write
3591000
heap
page read and write
3810000
heap
page read and write
182E000
stack
page read and write
6DCF000
stack
page read and write
6EEE000
stack
page read and write
3334000
direct allocation
page read and write
6D5BA000
direct allocation
page read and write
2D70000
direct allocation
page read and write
119C000
unkown
page read and write
3591000
heap
page read and write
37CF000
stack
page read and write
7FE1F000
direct allocation
page read and write
5ACE000
direct allocation
page read and write
CC9000
unkown
page read and write
3591000
heap
page read and write
AE8000
unkown
page execute and read and write
5AE9000
direct allocation
page read and write
3428000
direct allocation
page read and write
6CEF000
stack
page read and write
3591000
heap
page read and write
7F930000
direct allocation
page read and write
85F1000
trusted library allocation
page read and write
7E7A0000
direct allocation
page read and write
2E60000
heap
page read and write
1162000
heap
page read and write
8588000
trusted library allocation
page read and write
CE5000
unkown
page read and write
7FC90000
direct allocation
page read and write
5074000
heap
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
9A1F000
stack
page read and write
61CE000
stack
page read and write
154E000
unkown
page readonly
176C000
heap
page read and write
2E00000
direct allocation
page read and write
3591000
heap
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
1984000
unkown
page execute and read and write
8526000
trusted library allocation
page read and write
57F0000
heap
page read and write
85DE000
trusted library allocation
page read and write
8598000
trusted library allocation
page read and write
2DF1000
heap
page read and write
A1DF000
stack
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
1759000
heap
page read and write
17C8000
heap
page read and write
6D1F3000
direct allocation
page read and write
1162000
heap
page read and write
121B000
unkown
page read and write
8500000
trusted library allocation
page read and write
116D000
heap
page read and write
560F000
stack
page read and write
1094000
heap
page read and write
9C5F000
stack
page read and write
1162000
heap
page read and write
5AAB000
direct allocation
page read and write
1580000
heap
page read and write
97E6000
heap
page read and write
CDA000
unkown
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
1724000
heap
page read and write
1162000
heap
page read and write
8516000
trusted library allocation
page read and write
3591000
heap
page read and write
1288000
heap
page read and write
3591000
heap
page read and write
84F3000
trusted library allocation
page read and write
3591000
heap
page read and write
861E000
heap
page read and write
1162000
heap
page read and write
8850000
remote allocation
page read and write
7FDF0000
direct allocation
page read and write
3591000
heap
page read and write
463D000
direct allocation
page read and write
3591000
heap
page read and write
7DCD0000
direct allocation
page read and write
57AC000
heap
page read and write
33F4000
direct allocation
page read and write
B5DF000
stack
page read and write
1255000
heap
page read and write
17C8000
heap
page read and write
119A000
unkown
page read and write
11F4000
unkown
page read and write
46BC000
direct allocation
page read and write
1756000
heap
page read and write
2F91000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
1172000
heap
page read and write
3591000
heap
page read and write
8952000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
7FE09000
direct allocation
page read and write
7FD40000
direct allocation
page read and write
1170000
heap
page read and write
D7D000
unkown
page readonly
A17000
unkown
page execute and read and write
85CC000
trusted library allocation
page read and write
177B000
heap
page read and write
1574000
unkown
page readonly
3591000
heap
page read and write
3591000
heap
page read and write
460000
unkown
page execute read
3591000
heap
page read and write
2F91000
heap
page read and write
18B4000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
11E0000
unkown
page read and write
6D6B1000
direct allocation
page read and write
4724000
direct allocation
page read and write
7EE1E000
direct allocation
page read and write
19EF000
stack
page read and write
2F91000
heap
page read and write
15F0000
unkown
page readonly
1547000
unkown
page readonly
9B5F000
stack
page read and write
16FE000
heap
page read and write
129B000
heap
page read and write
84D6000
trusted library allocation
page read and write
5340000
direct allocation
page read and write
510F000
stack
page read and write
1164000
heap
page read and write
853F000
trusted library allocation
page read and write
7C850000
direct allocation
page read and write
A49E000
stack
page read and write
340A000
direct allocation
page read and write
981E000
stack
page read and write
2DF0000
heap
page read and write
3444000
direct allocation
page read and write
6D6AD000
direct allocation
page read and write
2DF1000
heap
page read and write
D54000
unkown
page read and write
7FE0C000
direct allocation
page read and write
1165000
unkown
page read and write
2B6F000
heap
page read and write
2F91000
heap
page read and write
8EEF000
stack
page read and write
2F91000
heap
page read and write
2E56000
direct allocation
page read and write
8519000
trusted library allocation
page read and write
A0DF000
stack
page read and write
1162000
heap
page read and write
6D6F4000
direct allocation
page read and write
48D0000
heap
page read and write
8565000
trusted library allocation
page read and write
8CEF000
stack
page read and write
3591000
heap
page read and write
2E81000
direct allocation
page read and write
852C000
trusted library allocation
page read and write
9779000
heap
page read and write
1162000
heap
page read and write
177D000
heap
page read and write
3591000
heap
page read and write
14FA000
unkown
page readonly
9F9E000
stack
page read and write
3591000
heap
page read and write
1736000
heap
page read and write
2DF1000
heap
page read and write
7FA9E000
direct allocation
page read and write
2DF1000
heap
page read and write
1570000
unkown
page readonly
898F000
heap
page read and write
175C000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
9E9F000
stack
page read and write
3591000
heap
page read and write
7FD6A000
direct allocation
page read and write
6BA10000
direct allocation
page read and write
16D0000
heap
page read and write
84D9000
trusted library allocation
page read and write
3823000
heap
page read and write
1744000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
ADDF000
stack
page read and write
15A4000
unkown
page readonly
7FCB0000
direct allocation
page read and write
7DA9E000
direct allocation
page read and write
9C5000
unkown
page execute read
4E27000
heap
page read and write
854C000
trusted library allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3873000
heap
page read and write
9814000
heap
page read and write
5637000
heap
page read and write
54CE000
stack
page read and write
2E73000
direct allocation
page read and write
14EE000
stack
page read and write
59B1000
direct allocation
page read and write
84BE000
stack
page read and write
2DF1000
heap
page read and write
AF9E000
stack
page read and write
3591000
heap
page read and write
6D6C2000
direct allocation
page read and write
46DB000
direct allocation
page read and write
85A5000
trusted library allocation
page read and write
AF1E000
stack
page read and write
7BEDA000
direct allocation
page read and write
CC5000
unkown
page read and write
294E000
stack
page read and write
118B000
unkown
page read and write
4FE000
unkown
page execute read
115C000
heap
page read and write
2F91000
heap
page read and write
2F91000
heap
page read and write
49C8000
direct allocation
page read and write
3591000
heap
page read and write
7EAE0000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
D73000
unkown
page read and write
1020000
heap
page read and write
3591000
heap
page read and write
1094000
heap
page read and write
3591000
heap
page read and write
85FE000
stack
page read and write
3591000
heap
page read and write
CBA000
unkown
page read and write
3453000
direct allocation
page read and write
1162000
heap
page read and write
8592000
trusted library allocation
page read and write
17C0000
heap
page read and write
2F91000
heap
page read and write
6D729000
direct allocation
page read and write
9759000
heap
page read and write
3820000
heap
page read and write
1162000
heap
page read and write
2E4F000
direct allocation
page read and write
46EA000
direct allocation
page read and write
4716000
direct allocation
page read and write
CBD000
unkown
page read and write
7C210000
direct allocation
page read and write
3591000
heap
page read and write
7FDE0000
direct allocation
page read and write
93A0000
heap
page read and write
D5F000
unkown
page read and write
19B000
stack
page read and write
7EC70000
direct allocation
page read and write
4890000
direct allocation
page read and write
A45E000
stack
page read and write
7EFCE000
direct allocation
page read and write
8503000
trusted library allocation
page read and write
B49F000
stack
page read and write
2830000
heap
page read and write
1165000
heap
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
400000
unkown
page readonly
3591000
heap
page read and write
47E0000
heap
page read and write
1162000
heap
page read and write
2DF1000
heap
page read and write
1220000
unkown
page read and write
1169000
heap
page read and write
AEDF000
stack
page read and write
ACDE000
stack
page read and write
16F0000
heap
page read and write
CBF000
unkown
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
1163000
heap
page read and write
116D000
heap
page read and write
2DF8000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
2DF1000
heap
page read and write
A61E000
stack
page read and write
3591000
heap
page read and write
980B000
heap
page read and write
3591000
heap
page read and write
3920000
heap
page read and write
2F91000
heap
page read and write
84B0000
trusted library allocation
page read and write
19D000
stack
page read and write
1756000
heap
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
1BD5000
heap
page read and write
153B000
unkown
page readonly
3346000
direct allocation
page read and write
128D000
heap
page read and write
1114000
heap
page read and write
1162000
heap
page read and write
B19F000
stack
page read and write
B860000
heap
page read and write
1162000
heap
page read and write
7FDF0000
direct allocation
page read and write
14F3000
unkown
page readonly
2C50000
direct allocation
page read and write
9800000
heap
page read and write
3591000
heap
page read and write
4E39000
heap
page read and write
4733000
direct allocation
page read and write
893E000
heap
page read and write
1169000
heap
page read and write
3591000
heap
page read and write
8FEF000
stack
page read and write
8555000
trusted library allocation
page read and write
844E000
stack
page read and write
3591000
heap
page read and write
C8E000
unkown
page execute read
2F91000
heap
page read and write
2F91000
heap
page read and write
2E7A000
direct allocation
page read and write
15A5000
heap
page read and write
7EF40000
direct allocation
page read and write
7FD40000
direct allocation
page read and write
6D6E8000
direct allocation
page read and write
337D000
direct allocation
page read and write
7C610000
direct allocation
page read and write
D65000
unkown
page read and write
15ED000
unkown
page readonly
2DE0000
direct allocation
page read and write
3591000
heap
page read and write
8562000
trusted library allocation
page read and write
851F000
trusted library allocation
page read and write
1004000
heap
page read and write
1164000
heap
page read and write
7FE00000
direct allocation
page read and write
7FD40000
direct allocation
page read and write
6D6D2000
direct allocation
page read and write
3591000
heap
page read and write
B29F000
stack
page read and write
980F000
heap
page read and write
1165000
unkown
page read and write
1273000
heap
page read and write
4E30000
heap
page read and write
893B000
heap
page read and write
7FCBE000
direct allocation
page read and write
85E4000
trusted library allocation
page read and write
1156000
heap
page read and write
3591000
heap
page read and write
7DA50000
direct allocation
page read and write
1004000
heap
page read and write
18A0000
heap
page read and write
4F20000
heap
page read and write
1266000
unkown
page readonly
116F000
heap
page read and write
6D6B4000
direct allocation
page read and write
345A000
direct allocation
page read and write
116D000
heap
page read and write
4708000
direct allocation
page read and write
35C6000
heap
page read and write
4FCE000
stack
page read and write
12001000
unkown
page execute read
5780000
heap
page read and write
1004000
heap
page read and write
A2DF000
stack
page read and write
116D000
heap
page read and write
7FE09000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
84E3000
trusted library allocation
page read and write
4F70000
heap
page read and write
2E14000
direct allocation
page read and write
6D6DB000
direct allocation
page read and write
4873000
heap
page read and write
984E000
heap
page read and write
6D6DF000
direct allocation
page read and write
9864000
heap
page read and write
3591000
heap
page read and write
2F90000
heap
page read and write
17CF000
heap
page read and write
84E6000
trusted library allocation
page read and write
3365000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
645C000
stack
page read and write
67FE000
stack
page read and write
3591000
heap
page read and write
A59000
unkown
page execute and read and write
125C000
unkown
page read and write
116B000
heap
page read and write
7E83E000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
1183000
unkown
page read and write
7FA4E000
direct allocation
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
70E0000
heap
page read and write
4750000
direct allocation
page execute and read and write
3591000
heap
page read and write
9839000
heap
page read and write
8AAE000
stack
page read and write
2DF1000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
9761000
heap
page read and write
2DF1000
heap
page read and write
3591000
heap
page read and write
1715000
heap
page read and write
118F000
unkown
page read and write
1162000
heap
page read and write
699E000
stack
page read and write
3591000
heap
page read and write
5145000
heap
page read and write
118F000
unkown
page read and write
70DE000
stack
page read and write
4760000
heap
page read and write
2F91000
heap
page read and write
A91F000
stack
page read and write
2950000
heap
page read and write
6D740000
direct allocation
page read and write
1004000
heap
page read and write
1166000
heap
page read and write
9D0000
unkown
page execute and read and write
976E000
heap
page read and write
1245000
unkown
page read and write
7FDB3000
direct allocation
page read and write
5298000
unkown
page read and write
630E000
stack
page read and write
8595000
trusted library allocation
page read and write
625C000
stack
page read and write
FD0000
heap
page read and write
6D769000
direct allocation
page read and write
8967000
heap
page read and write
85C8000
trusted library allocation
page read and write
1090000
heap
page read and write
534E000
stack
page read and write
4F20000
heap
page read and write
3591000
heap
page read and write
35A2000
heap
page read and write
2F91000
heap
page read and write
116B000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
9D9F000
stack
page read and write
18A5000
heap
page read and write
1162000
heap
page read and write
18B4000
heap
page read and write
3591000
heap
page read and write
7FDE3000
direct allocation
page read and write
35AC000
heap
page read and write
3591000
heap
page read and write
17CA000
unkown
page execute and write copy
1004000
heap
page read and write
5610000
heap
page read and write
3591000
heap
page read and write
1214000
unkown
page read and write
115D000
heap
page read and write
6D765000
direct allocation
page read and write
2DF1000
heap
page read and write
1169000
heap
page read and write
3591000
heap
page read and write
2DAD000
direct allocation
page read and write
1162000
heap
page read and write
578D000
heap
page read and write
5330000
trusted library allocation
page read and write
3591000
heap
page read and write
5C5D000
stack
page read and write
A41F000
stack
page read and write
2CA8000
direct allocation
page read and write
1170000
heap
page read and write
10C0000
heap
page read and write
96DF000
stack
page read and write
2F91000
heap
page read and write
9761000
heap
page read and write
5334000
direct allocation
page read and write
8513000
trusted library allocation
page read and write
116D000
heap
page read and write
172A000
heap
page read and write
58E5000
direct allocation
page read and write
7C210000
direct allocation
page read and write
85D4000
trusted library allocation
page read and write
3591000
heap
page read and write
1185000
unkown
page read and write
84D0000
trusted library allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
1756000
heap
page read and write
927000
unkown
page execute read
544F000
stack
page read and write
2DF1000
heap
page read and write
1196000
unkown
page read and write
33E0000
direct allocation
page read and write
1094000
heap
page read and write
2DF1000
heap
page read and write
A62000
unkown
page execute and read and write
115F000
heap
page read and write
14E1000
unkown
page readonly
3591000
heap
page read and write
1255000
unkown
page read and write
33B7000
direct allocation
page read and write
1162000
heap
page read and write
19FB000
unkown
page write copy
115E000
stack
page read and write
159B000
unkown
page readonly
3591000
heap
page read and write
1163000
heap
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
97FB000
heap
page read and write
8913000
heap
page read and write
11146000
unkown
page read and write
2F91000
heap
page read and write
503F000
stack
page read and write
2E5D000
direct allocation
page read and write
A31E000
stack
page read and write
7CDDF000
direct allocation
page read and write
507E000
stack
page read and write
7FDE8000
direct allocation
page read and write
14FF000
unkown
page readonly
2F91000
heap
page read and write
9740000
heap
page read and write
1165000
unkown
page write copy
84F9000
trusted library allocation
page read and write
1162000
heap
page read and write
9F5E000
stack
page read and write
5AA7000
direct allocation
page read and write
7EC9E000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
85A8000
trusted library allocation
page read and write
6D746000
direct allocation
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
85F4000
trusted library allocation
page read and write
400000
unkown
page readonly
7EC50000
direct allocation
page read and write
1204F000
unkown
page read and write
8618000
heap
page read and write
1004000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
684E000
stack
page read and write
1531000
unkown
page readonly
118B000
unkown
page read and write
1167000
heap
page read and write
19B000
stack
page read and write
1004000
heap
page read and write
2F91000
heap
page read and write
2DF1000
heap
page read and write
3591000
heap
page read and write
2F91000
heap
page read and write
2F91000
heap
page read and write
6D707000
direct allocation
page read and write
33D0000
direct allocation
page read and write
84E0000
trusted library allocation
page read and write
D6E000
unkown
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
2B30000
direct allocation
page execute and read and write
1094000
heap
page read and write
7FCB8000
direct allocation
page read and write
119C000
unkown
page read and write
7FD40000
direct allocation
page read and write
3591000
heap
page read and write
CBD000
unkown
page read and write
7EB6E000
direct allocation
page read and write
1168000
heap
page read and write
3591000
heap
page read and write
492F000
stack
page read and write
116B000
heap
page read and write
7ECDE000
direct allocation
page read and write
18B4000
heap
page read and write
3591000
heap
page read and write
4E60000
direct allocation
page execute and read and write
1162000
heap
page read and write
9775000
heap
page read and write
10D0000
heap
page read and write
3591000
heap
page read and write
B09D000
stack
page read and write
84AD000
trusted library allocation
page read and write
2BB0000
direct allocation
page read and write
4F3E000
stack
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
7FDF0000
direct allocation
page read and write
6D726000
direct allocation
page read and write
2D8D000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
6D6BE000
direct allocation
page read and write
2E06000
direct allocation
page read and write
CEA000
unkown
page read and write
AA9F000
stack
page read and write
3591000
heap
page read and write
46F1000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
655E000
stack
page read and write
11001000
unkown
page execute read
7FC30000
direct allocation
page read and write
14D9000
unkown
page readonly
616F000
stack
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
892F000
heap
page read and write
3591000
heap
page read and write
111E000
stack
page read and write
17BB000
heap
page read and write
1290000
heap
page read and write
4748000
direct allocation
page read and write
2F91000
heap
page read and write
3591000
heap
page read and write
7FA20000
direct allocation
page read and write
1168000
heap
page read and write
401000
unkown
page execute read
971E000
heap
page read and write
2F91000
heap
page read and write
1094000
heap
page read and write
8506000
trusted library allocation
page read and write
2BDE000
direct allocation
page read and write
851C000
trusted library allocation
page read and write
3591000
heap
page read and write
6D6C6000
direct allocation
page read and write
7CB10000
direct allocation
page read and write
926E000
stack
page read and write
A33000
unkown
page execute and read and write
3384000
direct allocation
page read and write
3591000
heap
page read and write
5B5E000
stack
page read and write
1094000
heap
page read and write
1162000
heap
page read and write
5ADD000
direct allocation
page read and write
1162000
heap
page read and write
3591000
heap
page read and write
84B6000
trusted library allocation
page read and write
35B2000
heap
page read and write
114D000
unkown
page execute read
2E00000
heap
page read and write
3590000
heap
page read and write
461E000
direct allocation
page read and write
4FA000
unkown
page execute read
5800000
heap
page read and write
1185000
unkown
page read and write
65AE000
stack
page read and write
2DF1000
heap
page read and write
17BA000
heap
page read and write
113B000
heap
page read and write
1209000
unkown
page read and write
2AEF000
stack
page read and write
3591000
heap
page read and write
2E1B000
direct allocation
page read and write
897C000
heap
page read and write
401000
unkown
page execute and read and write
3591000
heap
page read and write
A5DE000
stack
page read and write
2DF1000
heap
page read and write
1256000
unkown
page write copy
1094000
heap
page read and write
4B5C000
stack
page read and write
7FDCF000
direct allocation
page read and write
52BD000
stack
page read and write
7EDF0000
direct allocation
page read and write
3591000
heap
page read and write
1183000
unkown
page read and write
33FB000
direct allocation
page read and write
2E88000
direct allocation
page read and write
2F91000
heap
page read and write
7FDCD000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
892C000
heap
page read and write
33D0000
direct allocation
page read and write
2F91000
heap
page read and write
33BE000
direct allocation
page read and write
2B48000
heap
page read and write
126F000
heap
page read and write
1169000
heap
page read and write
1168000
unkown
page read and write
11E3000
heap
page read and write
1204D000
unkown
page write copy
2D7E000
direct allocation
page read and write
1234000
unkown
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
69DE000
stack
page read and write
7EE90000
direct allocation
page read and write
A13000
unkown
page execute and read and write
939000
unkown
page execute read
A52000
unkown
page execute and read and write
2AF0000
heap
page read and write
2C7B000
direct allocation
page read and write
1729000
heap
page read and write
517F000
stack
page read and write
15B2000
unkown
page readonly
18B4000
heap
page read and write
1162000
heap
page read and write
29E6000
heap
page read and write
1004000
heap
page read and write
7EDB0000
direct allocation
page read and write
D6A000
unkown
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
5250000
direct allocation
page read and write
606E000
stack
page read and write
178F000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
AC9F000
stack
page read and write
9F5000
unkown
page execute and read and write
1570000
direct allocation
page execute and read and write
3468000
direct allocation
page read and write
2F91000
heap
page read and write
11C2000
unkown
page read and write
9FDE000
stack
page read and write
CE1000
unkown
page read and write
4F60000
direct allocation
page read and write
84A3000
trusted library allocation
page read and write
33E0000
direct allocation
page read and write
850F000
trusted library allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
7B230000
direct allocation
page read and write
853C000
trusted library allocation
page read and write
3591000
heap
page read and write
14EE000
unkown
page readonly
7BF29000
direct allocation
page read and write
3358000
direct allocation
page read and write
1E4000
heap
page read and write
67BF000
stack
page read and write
7FDD2000
direct allocation
page read and write
311F000
stack
page read and write
3591000
heap
page read and write
1094000
heap
page read and write
19F0000
heap
page read and write
35A1000
heap
page read and write
1169000
heap
page read and write
177E000
heap
page read and write
46CB000
direct allocation
page read and write
1094000
heap
page read and write
A95E000
stack
page read and write
850C000
trusted library allocation
page read and write
1168000
unkown
page read and write
3591000
heap
page read and write
1192000
unkown
page read and write
917000
unkown
page execute read
3591000
heap
page read and write
116D000
heap
page read and write
6D6AB000
direct allocation
page read and write
3591000
heap
page read and write
150A000
unkown
page readonly
9771000
heap
page read and write
8568000
trusted library allocation
page read and write
7EF20000
direct allocation
page read and write
CDE000
unkown
page read and write
3591000
heap
page read and write
116B000
heap
page read and write
7FDF0000
direct allocation
page read and write
711E0000
direct allocation
page read and write
7FBA0000
direct allocation
page read and write
90EF000
stack
page read and write
84C3000
trusted library allocation
page read and write
1170000
heap
page read and write
7FDE0000
direct allocation
page read and write
1792000
heap
page read and write
2DF1000
heap
page read and write
3591000
heap
page read and write
528C000
stack
page read and write
2F91000
heap
page read and write
E01000
unkown
page execute read
2F91000
heap
page read and write
3350000
direct allocation
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
AB9F000
stack
page read and write
CDE000
unkown
page read and write
116A000
unkown
page read and write
9F1E000
stack
page read and write
8731000
trusted library allocation
page read and write
7FD70000
direct allocation
page read and write
629E000
stack
page read and write
4658000
direct allocation
page read and write
3591000
heap
page read and write
1162000
heap
page read and write
2F91000
heap
page read and write
1988000
unkown
page write copy
981A000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
11E3000
unkown
page read and write
3591000
heap
page read and write
49A6000
direct allocation
page read and write
51AF000
stack
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
7FDCD000
direct allocation
page read and write
2C47000
direct allocation
page read and write
116D000
heap
page read and write
57B0000
heap
page read and write
116B000
heap
page read and write
3591000
heap
page read and write
972B000
heap
page read and write
177A000
heap
page read and write
6D790000
direct allocation
page read and write
116D000
heap
page read and write
CC5000
unkown
page read and write
1162000
heap
page read and write
46E2000
direct allocation
page read and write
5EED000
stack
page read and write
9729000
heap
page read and write
3591000
heap
page read and write
3591000
heap
page read and write
116B000
heap
page read and write
9717000
heap
page read and write
339D000
direct allocation
page read and write
2F91000
heap
page read and write
7FE0C000
direct allocation
page read and write
3591000
heap
page read and write
49BB000
direct allocation
page read and write
3591000
heap
page read and write
84FC000
trusted library allocation
page read and write
6AEC000
stack
page read and write
2F91000
heap
page read and write
1744000
heap
page read and write
8BEE000
stack
page read and write
2F91000
heap
page read and write
5030000
heap
page read and write
1781000
heap
page read and write
2C91000
direct allocation
page read and write
591C000
direct allocation
page read and write
CE7000
unkown
page read and write
B39F000
stack
page read and write
33B0000
direct allocation
page read and write
7ABFA000
direct allocation
page read and write
11000000
unkown
page readonly
3591000
heap
page read and write
78E70000
direct allocation
page read and write
3591000
heap
page read and write
6D73C000
direct allocation
page read and write
3365000
direct allocation
page read and write
468B000
direct allocation
page read and write
19B000
stack
page read and write
6D6EF000
direct allocation
page read and write
550E000
stack
page read and write
3591000
heap
page read and write
10D5000
unkown
page execute read
972C000
heap
page read and write
3591000
heap
page read and write
471D000
direct allocation
page read and write
1255000
unkown
page read and write
170A000
heap
page read and write
There are 1649 hidden memdumps, click here to show them.