IOC Report
Drawing specification and June PO #07329.exe

loading gif

Files

File Path
Type
Category
Malicious
Drawing specification and June PO #07329.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Drawing specification and June PO #07329.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Drawing specification and June PO #07329.exe
"C:\Users\user\Desktop\Drawing specification and June PO #07329.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd" /c ping 127.0.0.1 -n 38 > nul && copy "C:\Users\user\Desktop\Drawing specification and June PO #07329.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe" && ping 127.0.0.1 -n 38 > nul && "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 38
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 38
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://www.google.com/4v
unknown
https://api.ipify.org
unknown
https://www.google.com/shopping?hl=en&source=og&tab=wf
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://ocsp.sectigo.com0
unknown
https://csp.withgoogle.com/csp/gws/other-hp
unknown
http://www.google.com
unknown
https://api.ipify.org/t
unknown
http://mail.privateemail.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.google.com/
142.250.74.196
http://purl.oen
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.privateemail.com
198.54.122.135
malicious
www.google.com
142.250.74.196
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
198.54.122.135
mail.privateemail.com
United States
malicious
127.0.0.1
unknown
unknown
malicious
104.26.12.205
api.ipify.org
United States
142.250.74.196
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Drawing specification and June PO #07329_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
27C2000
trusted library allocation
page read and write
malicious
3973000
trusted library allocation
page read and write
malicious
3E99000
trusted library allocation
page read and write
malicious
295E000
trusted library allocation
page read and write
malicious
3FDE000
trusted library allocation
page read and write
malicious
2AAE000
trusted library allocation
page read and write
malicious
802000
remote allocation
page execute and read and write
malicious
6610000
trusted library section
page read and write
malicious
2EAD000
trusted library allocation
page read and write
malicious
3A81000
trusted library allocation
page read and write
malicious
2DDF000
trusted library allocation
page read and write
malicious
27BC000
trusted library allocation
page read and write
malicious
3DB9000
trusted library allocation
page read and write
malicious
2791000
trusted library allocation
page read and write
malicious
B97000
heap
page read and write
2B3C000
trusted library allocation
page read and write
A143000
trusted library allocation
page read and write
9A8000
unkown
page execute read
313E000
trusted library allocation
page read and write
7CE8000
heap
page read and write
2C7D000
trusted library allocation
page read and write
6A3D000
stack
page read and write
2CDB000
trusted library allocation
page read and write
2F1D000
trusted library allocation
page read and write
2C33000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
E13000
heap
page read and write
306A000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
9D0000
unkown
page execute read
601E000
stack
page read and write
2E77000
trusted library allocation
page read and write
B92000
heap
page read and write
2C6E000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
6900000
heap
page read and write
E90000
trusted library allocation
page read and write
B23000
trusted library allocation
page execute and read and write
2C14000
trusted library allocation
page read and write
B55000
trusted library allocation
page execute and read and write
564E000
stack
page read and write
2B5B000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2E2A000
trusted library allocation
page read and write
E54000
heap
page read and write
C80000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
D53000
trusted library allocation
page execute and read and write
50AE000
stack
page read and write
12E0000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
4C91000
trusted library allocation
page read and write
D2A000
heap
page read and write
6172000
heap
page read and write
2C66000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
6130000
heap
page read and write
2C07000
trusted library allocation
page read and write
673D000
trusted library allocation
page read and write
7A8E000
stack
page read and write
7988000
heap
page read and write
2F25000
trusted library allocation
page read and write
B5B000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
2D2E000
trusted library allocation
page read and write
2BBB000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
645C000
stack
page read and write
2B76000
trusted library allocation
page read and write
7ACE000
stack
page read and write
9E7000
unkown
page execute read
3072000
trusted library allocation
page read and write
99D000
unkown
page execute read
2B9C000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
A50000
heap
page read and write
2E6C000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
6A40000
heap
page read and write
D87000
trusted library allocation
page execute and read and write
53AE000
stack
page read and write
942000
unkown
page execute read
E47000
heap
page read and write
2E7E000
trusted library allocation
page read and write
9DC000
unkown
page execute read
2D30000
trusted library allocation
page read and write
65E0000
trusted library section
page readonly
2DC8000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
278D000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
7C20000
heap
page read and write
7C94000
heap
page read and write
7CD6000
heap
page read and write
2C36000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
3931000
trusted library allocation
page read and write
9D6000
unkown
page execute read
E2E000
heap
page read and write
2D78000
trusted library allocation
page read and write
657E000
stack
page read and write
2E67000
trusted library allocation
page read and write
7B0E000
stack
page read and write
A9D000
stack
page read and write
2B6A000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
2A76000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
7A40000
trusted library allocation
page execute and read and write
4F13000
heap
page read and write
2AC5000
trusted library allocation
page read and write
2590000
heap
page read and write
2D13000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
3008000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
2E36000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
5DAE000
stack
page read and write
2C73000
trusted library allocation
page read and write
316F000
heap
page read and write
3134000
trusted library allocation
page read and write
78C0000
heap
page read and write
2D2B000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
7973000
heap
page read and write
496D000
stack
page read and write
7AF0000
heap
page read and write
2E8F000
trusted library allocation
page read and write
1340000
heap
page read and write
D60000
heap
page read and write
C70000
trusted library allocation
page read and write
7F8E000
stack
page read and write
2CCE000
trusted library allocation
page read and write
4C8E000
trusted library allocation
page read and write
2DBE000
trusted library allocation
page read and write
4F10000
heap
page read and write
3106000
trusted library allocation
page read and write
67F0000
heap
page read and write
3038000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
7D90000
trusted library allocation
page execute and read and write
3042000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
B80000
heap
page read and write
2DF4000
trusted library allocation
page read and write
62DE000
stack
page read and write
1090000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
64F0000
heap
page read and write
79C0000
trusted library allocation
page execute and read and write
7FB0000
trusted library section
page read and write
2D74000
trusted library allocation
page read and write
64DE000
stack
page read and write
2F20000
heap
page read and write
30E5000
trusted library allocation
page read and write
942000
unkown
page execute read
AA8000
heap
page read and write
7FE0000
trusted library allocation
page execute and read and write
B30000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
10B7000
trusted library allocation
page execute and read and write
2D17000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
A15000
heap
page read and write
B0E000
stack
page read and write
115C000
stack
page read and write
4C7B000
trusted library allocation
page read and write
119F000
stack
page read and write
2C0F000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
5C4F000
heap
page read and write
1450000
heap
page read and write
1083000
trusted library allocation
page execute and read and write
9AE000
unkown
page execute read
2BA4000
trusted library allocation
page read and write
6500000
heap
page read and write
2D86000
trusted library allocation
page read and write
B4A000
trusted library allocation
page execute and read and write
D7A000
trusted library allocation
page execute and read and write
2D3C000
trusted library allocation
page read and write
5630000
heap
page execute and read and write
132E000
stack
page read and write
7B08000
heap
page read and write
2A8F000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
2A97000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
6AC0000
heap
page read and write
2567000
trusted library allocation
page execute and read and write
1349000
heap
page read and write
2FC4000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
9BB000
unkown
page execute read
311F000
trusted library allocation
page read and write
2C64000
trusted library allocation
page read and write
7CCE000
stack
page read and write
2FAB000
trusted library allocation
page read and write
6A90000
heap
page read and write
7D60000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page read and write
3F83000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
65DC000
stack
page read and write
7B4E000
stack
page read and write
1330000
trusted library allocation
page read and write
C69000
stack
page read and write
4A81000
trusted library allocation
page read and write
991000
unkown
page execute read
68A0000
trusted library allocation
page read and write
66A0000
trusted library allocation
page execute and read and write
3188000
trusted library allocation
page read and write
12CF000
stack
page read and write
C5BD000
stack
page read and write
66A1000
trusted library allocation
page read and write
7DCE000
stack
page read and write
1335000
trusted library allocation
page read and write
61D2000
heap
page read and write
3140000
trusted library allocation
page read and write
A8D000
trusted library allocation
page execute and read and write
5560000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
4C44000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
9F4000
unkown
page readonly
2F36000
trusted library allocation
page read and write
1189000
heap
page read and write
2D7C000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
BA0000
unkown
page readonly
3074000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
2E8F000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
9CB000
unkown
page execute read
F9C000
heap
page read and write
536E000
stack
page read and write
2C60000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
6440000
heap
page read and write
2D23000
trusted library allocation
page read and write
5C3A000
heap
page read and write
801E000
stack
page read and write
2BF1000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
2F5A000
trusted library allocation
page read and write
304D000
trusted library allocation
page read and write
39AE000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
7E0F000
stack
page read and write
31A3000
heap
page read and write
52AE000
stack
page read and write
6010000
heap
page read and write
B8B000
heap
page read and write
3085000
trusted library allocation
page read and write
3C4E000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
2B77000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
A9D000
trusted library allocation
page execute and read and write
2DFA000
trusted library allocation
page read and write
66F0000
trusted library allocation
page execute and read and write
1456000
heap
page read and write
2F0A000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
793C000
heap
page read and write
4C7E000
trusted library allocation
page read and write
7F4E000
stack
page read and write
2C41000
trusted library allocation
page read and write
D990000
heap
page read and write
3165000
heap
page read and write
3AFE000
trusted library allocation
page read and write
6AF6000
heap
page read and write
65A7000
trusted library allocation
page read and write
68D0000
heap
page read and write
300C000
trusted library allocation
page read and write
7A76000
heap
page read and write
2565000
trusted library allocation
page execute and read and write
B2D000
trusted library allocation
page execute and read and write
ED8000
heap
page read and write
308D000
trusted library allocation
page read and write
2BEC000
trusted library allocation
page read and write
319F000
heap
page read and write
504D000
stack
page read and write
62C0000
heap
page read and write
650E000
stack
page read and write
30DA000
trusted library allocation
page read and write
625E000
stack
page read and write
3180000
heap
page read and write
2BB7000
trusted library allocation
page read and write
A40000
heap
page read and write
3769000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
318B000
heap
page read and write
4C76000
trusted library allocation
page read and write
598E000
stack
page read and write
2E8D000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
AA0000
heap
page read and write
65EF000
trusted library section
page readonly
3076000
trusted library allocation
page read and write
2BB9000
trusted library allocation
page read and write
68F5000
heap
page read and write
2C38000
trusted library allocation
page read and write
B96000
heap
page read and write
B20000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
1440000
trusted library allocation
page execute and read and write
2AAC000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
3180000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
3140000
heap
page read and write
2E5B000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
2552000
trusted library allocation
page read and write
614E000
stack
page read and write
2B78000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2AB4000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
2A7A000
trusted library allocation
page read and write
7D60000
trusted library allocation
page execute and read and write
5EAF000
stack
page read and write
77A000
stack
page read and write
30E7000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
2BFE000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
AF7000
stack
page read and write
2BD1000
trusted library allocation
page read and write
2CB2000
trusted library allocation
page read and write
4ACE000
stack
page read and write
2B83000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
4C1C000
stack
page read and write
2E83000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
2A7D000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
B50000
trusted library allocation
page execute and read and write
7934000
heap
page read and write
2D95000
trusted library allocation
page read and write
529000
stack
page read and write
2D59000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
2F32000
trusted library allocation
page read and write
568E000
stack
page read and write
2D9E000
trusted library allocation
page read and write
7D84000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
6470000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
2D66000
trusted library allocation
page read and write
10B5000
trusted library allocation
page execute and read and write
2BFF000
trusted library allocation
page read and write
2E85000
trusted library allocation
page read and write
7CD3000
heap
page read and write
2DDD000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
3AC6000
trusted library allocation
page read and write
7B18000
heap
page read and write
DAED000
stack
page read and write
2F8E000
trusted library allocation
page read and write
B3D000
trusted library allocation
page execute and read and write
300F000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
256B000
trusted library allocation
page execute and read and write
E5F000
heap
page read and write
2C0F000
trusted library allocation
page read and write
2C2C000
trusted library allocation
page read and write
3165000
heap
page read and write
2DC2000
trusted library allocation
page read and write
3187000
heap
page read and write
D50000
trusted library allocation
page read and write
2B5D000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
550E000
stack
page read and write
53B0000
heap
page read and write
2D10000
trusted library allocation
page read and write
2B3A000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
271C000
stack
page read and write
6310000
trusted library allocation
page execute and read and write
D66000
heap
page read and write
317D000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
2CF6000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
2FCB000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
4C9D000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
D98E000
stack
page read and write
27BA000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
5C1D000
heap
page read and write
2CCA000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
6134000
heap
page read and write
3027000
trusted library allocation
page read and write
3176000
heap
page read and write
30D4000
trusted library allocation
page read and write
6A50000
trusted library section
page readonly
30FE000
trusted library allocation
page read and write
6690000
heap
page read and write
573E000
stack
page read and write
2DB8000
trusted library allocation
page read and write
2CBB000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
DDC000
heap
page read and write
7EDE000
stack
page read and write
2C35000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
4748000
trusted library allocation
page read and write
6AD3000
heap
page read and write
2C64000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
6710000
heap
page read and write
DD0000
heap
page read and write
7FC1000
trusted library allocation
page read and write
9C5000
unkown
page execute read
68B0000
heap
page read and write
2F9D000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
63DF000
stack
page read and write
2C87000
trusted library allocation
page read and write
7B0F000
heap
page read and write
255A000
trusted library allocation
page execute and read and write
3108000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
61DF000
heap
page read and write
2A72000
trusted library allocation
page read and write
D6D000
trusted library allocation
page execute and read and write
4F81000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
E3E000
stack
page read and write
2C6E000
trusted library allocation
page read and write
108D000
trusted library allocation
page execute and read and write
65A0000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
2DA0000
heap
page read and write
D67000
stack
page read and write
B5A000
heap
page read and write
2F78000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
7D00000
trusted library allocation
page execute and read and write
2BD6000
trusted library allocation
page read and write
5B90000
heap
page read and write
2CD0000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
7A73000
heap
page read and write
605E000
stack
page read and write
68B5000
heap
page read and write
5550000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
66E0000
trusted library allocation
page execute and read and write
1084000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
ACA000
heap
page read and write
2D8F000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
6ADF000
heap
page read and write
2B0E000
trusted library allocation
page read and write
51ED000
stack
page read and write
2BA7000
trusted library allocation
page read and write
543E000
stack
page read and write
2F92000
trusted library allocation
page read and write
2D62000
trusted library allocation
page read and write
3186000
heap
page read and write
62D1000
trusted library allocation
page read and write
AC7000
heap
page read and write
314C000
heap
page read and write
2C30000
trusted library allocation
page read and write
109D000
trusted library allocation
page execute and read and write
2AB2000
trusted library allocation
page read and write
DE0000
heap
page read and write
2C68000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
D55000
heap
page read and write
30E3000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
2A70000
heap
page execute and read and write
2A5F000
stack
page read and write
F1B000
heap
page read and write
7F0B0000
trusted library allocation
page execute and read and write
7A88000
heap
page read and write
2D4D000
trusted library allocation
page read and write
30C2000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
AD7000
heap
page read and write
E20000
heap
page read and write
3049000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
809E000
stack
page read and write
554D000
stack
page read and write
5230000
heap
page execute and read and write
49BE000
stack
page read and write
3450000
heap
page read and write
5ECE000
stack
page read and write
2C6A000
trusted library allocation
page read and write
101E000
stack
page read and write
3023000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
3093000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
4E8D000
stack
page read and write
2D7A000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
80FE000
stack
page read and write
CB0000
heap
page read and write
2A60000
trusted library allocation
page read and write
2DCF000
trusted library allocation
page read and write
2730000
heap
page execute and read and write
81DE000
stack
page read and write
2FC2000
trusted library allocation
page read and write
FA0000
heap
page read and write
2F58000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
E84000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
6731000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
5D6E000
stack
page read and write
2B89000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
4970000
heap
page read and write
2D0F000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
6770000
trusted library section
page read and write
7F90000
trusted library section
page read and write
315D000
trusted library allocation
page read and write
649F000
heap
page read and write
2E00000
heap
page read and write
4F2C000
stack
page read and write
2DE3000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
A10000
heap
page read and write
600E000
stack
page read and write
60FF000
heap
page read and write
2E68000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
B98000
heap
page read and write
2FC0000
trusted library allocation
page read and write
67B0000
heap
page read and write
2D70000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
64E7000
trusted library allocation
page read and write
DB0000
trusted library allocation
page execute and read and write
2DB0000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
2B98000
trusted library allocation
page read and write
C90000
heap
page execute and read and write
2D92000
trusted library allocation
page read and write
4D20000
heap
page execute and read and write
6680000
heap
page read and write
3149000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
51AE000
stack
page read and write
2CBD000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
6A95000
heap
page read and write
2D80000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
1410000
heap
page execute and read and write
3006000
trusted library allocation
page read and write
10BB000
trusted library allocation
page execute and read and write
800000
remote allocation
page execute and read and write
B90000
trusted library allocation
page read and write
997000
unkown
page execute read
2562000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
52BD000
stack
page read and write
2ED6000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
111F000
stack
page read and write
7D70000
trusted library allocation
page execute and read and write
6904000
heap
page read and write
2E57000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
3059000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
4E14000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
D88E000
stack
page read and write
B42000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
3128000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
CB7000
heap
page read and write
2DBE000
trusted library allocation
page read and write
2B0A000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
4CA2000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
2741000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
B57000
trusted library allocation
page execute and read and write
2C22000
trusted library allocation
page read and write
4C8A000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
DA7000
heap
page read and write
624E000
stack
page read and write
561E000
stack
page read and write
3055000
trusted library allocation
page read and write
2C8B000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
3450000
heap
page read and write
2C19000
trusted library allocation
page read and write
67DD000
heap
page read and write
D40000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
64A0000
trusted library allocation
page execute and read and write
4C60000
heap
page read and write
7A3C000
heap
page read and write
527E000
stack
page read and write
2A78000
trusted library allocation
page read and write
D20000
heap
page read and write
2CD9000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
3174000
heap
page read and write
6890000
heap
page read and write
613C000
heap
page read and write
56A0000
trusted library allocation
page read and write
4A84000
trusted library allocation
page read and write
4D30000
heap
page read and write
2BB8000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
3105000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
4C63000
heap
page read and write
2C37000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
5A0000
heap
page read and write
2B32000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
6010000
heap
page read and write
68E0000
heap
page read and write
2B74000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
D5D000
trusted library allocation
page execute and read and write
4F6E000
stack
page read and write
2F71000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
2B6C000
trusted library allocation
page read and write
2B6E000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
2F02000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
693B000
stack
page read and write
8610000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4EAC000
stack
page read and write
2E9A000
trusted library allocation
page read and write
305E000
trusted library allocation
page read and write
3174000
trusted library allocation
page read and write
AD5000
heap
page read and write
1180000
heap
page read and write
2FDF000
trusted library allocation
page read and write
102D000
stack
page read and write
DA8000
heap
page read and write
2EA2000
trusted library allocation
page read and write
66AB000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
DD7000
heap
page read and write
6A60000
heap
page read and write
2CF8000
trusted library allocation
page read and write
B24000
trusted library allocation
page read and write
3741000
trusted library allocation
page read and write
79C0000
heap
page read and write
2C1E000
trusted library allocation
page read and write
DC0000
heap
page read and write
2B64000
trusted library allocation
page read and write
E62000
heap
page read and write
2C1B000
trusted library allocation
page read and write
308F000
trusted library allocation
page read and write
642B000
heap
page read and write
2E74000
trusted library allocation
page read and write
6320000
trusted library allocation
page execute and read and write
2C62000
trusted library allocation
page read and write
2DF2000
trusted library allocation
page read and write
615E000
stack
page read and write
2BEA000
trusted library allocation
page read and write
2CFE000
stack
page read and write
2C47000
trusted library allocation
page read and write
4ECE000
stack
page read and write
2AED000
trusted library allocation
page read and write
2D0C000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
1338000
trusted library allocation
page read and write
645B000
trusted library allocation
page read and write
2A9C000
trusted library allocation
page read and write
2720000
trusted library allocation
page execute and read and write
2D91000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
68C0000
heap
page read and write
2EE0000
direct allocation
page read and write
2C05000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
660E000
stack
page read and write
10AA000
trusted library allocation
page execute and read and write
2EC8000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
6138000
heap
page read and write
3BAF000
trusted library allocation
page read and write
2ED9000
trusted library allocation
page read and write
7A36000
trusted library allocation
page read and write
D85000
trusted library allocation
page execute and read and write
30C6000
trusted library allocation
page read and write
7C9C000
heap
page read and write
2C85000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
6880000
heap
page read and write
67D0000
heap
page read and write
D72000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
5BB7000
heap
page read and write
2E1B000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
590000
heap
page read and write
2D97000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
D54000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
9BF000
unkown
page execute read
3021000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
5EEE000
stack
page read and write
7B00000
heap
page read and write
2DA9000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
8710000
trusted library allocation
page execute and read and write
D8B000
trusted library allocation
page execute and read and write
2B3E000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
D76000
trusted library allocation
page execute and read and write
4E40000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
2F8C000
trusted library allocation
page read and write
6451000
trusted library allocation
page read and write
6478000
trusted library allocation
page read and write
2F34000
trusted library allocation
page read and write
2D15000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
3A19000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
B4E000
stack
page read and write
6470000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
67C0000
heap
page read and write
8F7000
stack
page read and write
2FDD000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
7975000
heap
page read and write
6660000
trusted library allocation
page read and write
6900000
heap
page read and write
2CD8000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
2D6D000
trusted library allocation
page read and write
5D1F000
stack
page read and write
2B47000
trusted library allocation
page read and write
6148000
heap
page read and write
64E0000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
DA0000
heap
page read and write
307A000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
940000
unkown
page readonly
7D80000
trusted library allocation
page read and write
D9EE000
stack
page read and write
2CC2000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
DF5000
heap
page read and write
3026000
trusted library allocation
page read and write
6AA0000
heap
page read and write
2C89000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
583E000
stack
page read and write
2B49000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
9100000
trusted library allocation
page execute and read and write
2CE5000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
2B9C000
stack
page read and write
311E000
trusted library allocation
page read and write
B46000
trusted library allocation
page execute and read and write
B10000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
ECA000
heap
page read and write
E7C000
stack
page read and write
AC0000
heap
page read and write
2F73000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
B90000
heap
page read and write
37A0000
trusted library allocation
page read and write
B00000
heap
page read and write
2CAF000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
6460000
trusted library section
page readonly
4F86000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
5F0E000
stack
page read and write
523D000
stack
page read and write
2CD6000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
F1D000
stack
page read and write
6760000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
7E9E000
stack
page read and write
2B02000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
4E31000
trusted library allocation
page read and write
3430000
heap
page read and write
2B29000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
2778000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
500D000
stack
page read and write
A55000
heap
page read and write
5620000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
4FC3000
heap
page read and write
2FA5000
trusted library allocation
page read and write
4E36000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
DF0000
heap
page read and write
B04000
heap
page read and write
B70000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
687D000
stack
page read and write
E2A000
heap
page read and write
2C49000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
9B4000
unkown
page execute read
2AE9000
trusted library allocation
page read and write
805F000
stack
page read and write
2C7D000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
3420000
heap
page read and write
2D5D000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
2F6D000
trusted library allocation
page read and write
2A9D000
stack
page read and write
2AB0000
trusted library allocation
page read and write
CFE000
stack
page read and write
2C6C000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
D2E000
heap
page read and write
2E61000
trusted library allocation
page read and write
52C0000
heap
page execute and read and write
6510000
heap
page read and write
2DC6000
trusted library allocation
page read and write
A84000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
B80000
trusted library allocation
page execute and read and write
7E4E000
stack
page read and write
5DA000
stack
page read and write
2FA1000
trusted library allocation
page read and write
2D0A000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
2FA0000
heap
page read and write
611E000
stack
page read and write
2DC0000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
649C000
trusted library allocation
page read and write
2E6A000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
D63000
heap
page read and write
DD6000
heap
page read and write
7E5E000
stack
page read and write
635F000
stack
page read and write
2D75000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
930000
heap
page read and write
302A000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
6690000
heap
page read and write
2DF6000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
5C44000
heap
page read and write
1420000
heap
page read and write
2F00000
trusted library allocation
page read and write
C6BD000
stack
page read and write
302A000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
4FC0000
heap
page read and write
521E000
stack
page read and write
67F2000
heap
page read and write
311B000
trusted library allocation
page read and write
27B8000
trusted library allocation
page read and write
63D0000
heap
page read and write
2C20000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
6670000
heap
page read and write
2D48000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
6AB0000
heap
page read and write
7D0000
heap
page read and write
2B6E000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
10A2000
trusted library allocation
page read and write
7FDF000
stack
page read and write
317B000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
A30000
heap
page read and write
D82000
trusted library allocation
page read and write
8322000
trusted library allocation
page read and write
349F000
heap
page read and write
2D40000
trusted library allocation
page read and write
3174000
heap
page read and write
2B0C000
trusted library allocation
page read and write
6A81000
trusted library allocation
page read and write
3163000
heap
page read and write
4E3D000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
3057000
trusted library allocation
page read and write
533E000
stack
page read and write
2C45000
trusted library allocation
page read and write
EA0000
heap
page read and write
30EF000
trusted library allocation
page read and write
7DCE000
stack
page read and write
6580000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
68F0000
heap
page read and write
6140000
heap
page read and write
5B0000
heap
page read and write
2DC4000
trusted library allocation
page read and write
3073000
trusted library allocation
page read and write
2C27000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
2D8C000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
10A6000
trusted library allocation
page execute and read and write
EA8000
heap
page read and write
5FEF000
stack
page read and write
3AA6000
trusted library allocation
page read and write
317A000
heap
page read and write
3172000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
506E000
stack
page read and write
2FC9000
trusted library allocation
page read and write
2F0C000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
319B000
trusted library allocation
page read and write
673B000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
2A95000
trusted library allocation
page read and write
106E000
stack
page read and write
2FC6000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
140C000
stack
page read and write
10C0000
heap
page read and write
2C09000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
7C8F000
stack
page read and write
2C2E000
trusted library allocation
page read and write
2BBD000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
7FCB000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
25DE000
stack
page read and write
7FD0000
trusted library allocation
page execute and read and write
2B68000
trusted library allocation
page read and write
602E000
stack
page read and write
10B2000
trusted library allocation
page read and write
2F27000
trusted library allocation
page read and write
4CFC000
stack
page read and write
2AAA000
trusted library allocation
page read and write
2BBC000
trusted library allocation
page read and write
2EFE000
trusted library allocation
page read and write
2BD4000
trusted library allocation
page read and write
B52000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
612E000
stack
page read and write
53B3000
heap
page read and write
3104000
trusted library allocation
page read and write
CA5000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
6490000
trusted library allocation
page execute and read and write
2D67000
trusted library allocation
page read and write
8F8000
stack
page read and write
670E000
stack
page read and write
3A5F000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
2DDF000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
2BE8000
trusted library allocation
page read and write
2556000
trusted library allocation
page execute and read and write
61DC000
heap
page read and write
2D3A000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
4C96000
trusted library allocation
page read and write
347F000
heap
page read and write
2E89000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
2C0D000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
48DE000
stack
page read and write
2CE7000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
7E0000
heap
page read and write
593E000
stack
page read and write
67B5000
heap
page read and write
621F000
stack
page read and write
2BD8000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
2DAC000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
55DE000
stack
page read and write
C74000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
A83000
trusted library allocation
page execute and read and write
8700000
trusted library allocation
page execute and read and write
30FC000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
3199000
trusted library allocation
page read and write
A10000
heap
page read and write
2DC6000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
6740000
trusted library allocation
page execute and read and write
7A34000
heap
page read and write
A4D4000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
9E1000
unkown
page execute read
2BBF000
trusted library allocation
page read and write
882E000
stack
page read and write
2B1F000
trusted library allocation
page read and write
26DE000
stack
page read and write
3157000
trusted library allocation
page read and write
C53000
unkown
page execute read
7C2E000
heap
page read and write
2E23000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
819F000
stack
page read and write
2C02000
trusted library allocation
page read and write
3169000
heap
page read and write
2AF4000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
7B8E000
unkown
page read and write
2E59000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
11CF000
stack
page read and write
2C15000
trusted library allocation
page read and write
3C16000
trusted library allocation
page read and write
2E87000
trusted library allocation
page read and write
There are 1266 hidden memdumps, click here to show them.