IOC Report
SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\UTiPLNuHYu.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mpTrle.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fp1sv2r.cpb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ahlsree.45x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jbromjj5.gi1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jr4hcp0y.n5l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpDED0.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp
XML 1.0 document, ASCII text
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpA5DD.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PackedNET.738.1574.9831.exe"
malicious
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpBDCA.tmp"
malicious
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
"C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
malicious
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
"C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
malicious
C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe
"C:\Users\user\AppData\Roaming\UTiPLNuHYu.exe"
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpDED0.tmp"
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTiPLNuHYu" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1F.tmp"
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
malicious
C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://us2.smtp.mailhostbox.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.198.143
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
208.91.198.143
us2.smtp.mailhostbox.com
United States
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mpTrle
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\UTiPLNuHYu_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mpTrle_RASMANCS
FileDirectory
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32BC000
trusted library allocation
page read and write
malicious
2EEC000
trusted library allocation
page read and write
malicious
347A000
trusted library allocation
page read and write
malicious
3DBA000
trusted library allocation
page read and write
malicious
2ED1000
trusted library allocation
page read and write
malicious
4179000
trusted library allocation
page read and write
malicious
2EFC000
trusted library allocation
page read and write
malicious
42A9000
trusted library allocation
page read and write
malicious
2EC1000
trusted library allocation
page read and write
malicious
2FF1000
trusted library allocation
page read and write
malicious
303A000
trusted library allocation
page read and write
malicious
3291000
trusted library allocation
page read and write
malicious
6BB7000
trusted library allocation
page read and write
2ED7000
trusted library allocation
page read and write
28C0000
heap
page read and write
2FCD000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
66A0000
heap
page read and write
8BCF000
stack
page read and write
8B7E000
stack
page read and write
2ED1000
trusted library allocation
page read and write
2D70000
heap
page read and write
5CCB000
stack
page read and write
537000
stack
page read and write
6F2D000
stack
page read and write
2FD7000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
541E000
stack
page read and write
E86000
heap
page read and write
45EB000
stack
page read and write
3E99000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
58B0000
trusted library section
page read and write
2F57000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
68FE000
stack
page read and write
57D5000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
64CE000
stack
page read and write
2F73000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
2CEE000
stack
page read and write
70D0000
trusted library allocation
page execute and read and write
143E000
stack
page read and write
2EA7000
trusted library allocation
page read and write
2EA9000
trusted library allocation
page read and write
2E60000
heap
page read and write
5766000
trusted library allocation
page read and write
11CD000
trusted library allocation
page execute and read and write
2E4C000
stack
page read and write
943C000
stack
page read and write
1756000
trusted library allocation
page execute and read and write
636D000
stack
page read and write
49A0000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
897D000
stack
page read and write
909E000
stack
page read and write
42F000
remote allocation
page execute and read and write
5340000
heap
page read and write
2EAB000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
3230000
heap
page read and write
674D000
stack
page read and write
2EF6000
trusted library allocation
page read and write
5860000
trusted library allocation
page execute and read and write
42C000
remote allocation
page execute and read and write
2FA0000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
1350000
heap
page read and write
437000
remote allocation
page execute and read and write
C90000
unkown
page readonly
67DD000
stack
page read and write
2E91000
trusted library allocation
page read and write
1443000
heap
page read and write
14FD000
trusted library allocation
page execute and read and write
1220000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
6E2E000
stack
page read and write
4FC0000
trusted library allocation
page read and write
69EE000
stack
page read and write
59C9000
trusted library allocation
page read and write
13DE000
stack
page read and write
68BF000
stack
page read and write
12E6000
trusted library allocation
page execute and read and write
4119000
trusted library allocation
page read and write
433000
remote allocation
page execute and read and write
1150000
heap
page read and write
2F51000
trusted library allocation
page read and write
7FDD0000
trusted library allocation
page execute and read and write
3000000
heap
page execute and read and write
2F90000
trusted library allocation
page read and write
6A8E000
stack
page read and write
67C0000
trusted library allocation
page read and write
6B9D000
trusted library allocation
page read and write
8CBE000
stack
page read and write
16FE000
stack
page read and write
169E000
stack
page read and write
6A1E000
stack
page read and write
147D000
stack
page read and write
577C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2F0C000
trusted library allocation
page read and write
408000
remote allocation
page execute and read and write
5CCE000
stack
page read and write
307A000
stack
page read and write
5FAE000
stack
page read and write
15A8000
trusted library allocation
page read and write
404000
remote allocation
page execute and read and write
17EB000
trusted library allocation
page execute and read and write
13C0000
heap
page read and write
2E9B000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
2150000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
56A0000
heap
page read and write
6F70000
heap
page read and write
160D000
trusted library allocation
page execute and read and write
6B00000
trusted library allocation
page read and write
2C40000
heap
page execute and read and write
2F4B000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
4BF0000
heap
page read and write
57CF000
trusted library allocation
page read and write
2F37000
trusted library allocation
page read and write
2E95000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
4031000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
590000
heap
page read and write
2F8B000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
FE0000
heap
page read and write
13C0000
heap
page read and write
532E000
stack
page read and write
1133000
trusted library allocation
page execute and read and write
2DF0000
trusted library allocation
page read and write
8B6E000
stack
page read and write
6C60000
trusted library allocation
page read and write
2FC3000
trusted library allocation
page read and write
22CF000
stack
page read and write
2F35000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
850000
heap
page read and write
444E000
stack
page read and write
6F40000
heap
page read and write
2EC1000
trusted library allocation
page read and write
6ADE000
stack
page read and write
669F000
stack
page read and write
4C00000
trusted library allocation
page read and write
5A1F000
stack
page read and write
53C0000
trusted library allocation
page read and write
6A5E000
stack
page read and write
1760000
heap
page read and write
957E000
stack
page read and write
5580000
heap
page read and write
2EFD000
trusted library allocation
page read and write
670E000
stack
page read and write
2FCF000
trusted library allocation
page read and write
4E78000
trusted library allocation
page read and write
43A000
stack
page read and write
53E0000
trusted library allocation
page read and write
FB8000
heap
page read and write
240F000
stack
page read and write
436000
remote allocation
page execute and read and write
3E71000
trusted library allocation
page read and write
1346000
heap
page read and write
55A0000
trusted library allocation
page execute and read and write
4269000
trusted library allocation
page read and write
11FB000
trusted library allocation
page execute and read and write
162A000
trusted library allocation
page execute and read and write
922E000
stack
page read and write
2EAF000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
13E0000
heap
page read and write
2EE1000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
62E9000
heap
page read and write
15D3000
heap
page read and write
1030000
heap
page read and write
4956000
trusted library allocation
page read and write
6AB0000
heap
page read and write
5CD0000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
405000
remote allocation
page execute and read and write
5412000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
116B000
trusted library allocation
page execute and read and write
74EC000
stack
page read and write
6E40000
trusted library allocation
page execute and read and write
541C000
stack
page read and write
11C0000
heap
page read and write
161D000
trusted library allocation
page execute and read and write
7F4000
trusted library allocation
page read and write
1318000
heap
page read and write
2F7F000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
587E000
stack
page read and write
8F1C000
stack
page read and write
632E000
stack
page read and write
12A0000
heap
page read and write
5420000
trusted library allocation
page read and write
FD9000
heap
page read and write
579E000
trusted library allocation
page read and write
12D0000
heap
page read and write
4E0C000
heap
page read and write
3330000
heap
page read and write
30EA000
heap
page read and write
E3A000
stack
page read and write
2ED5000
trusted library allocation
page read and write
54FE000
stack
page read and write
2C5C000
stack
page read and write
6F36000
heap
page read and write
44EB000
stack
page read and write
70C0000
heap
page read and write
2F85000
trusted library allocation
page read and write
158B000
heap
page read and write
13A5000
heap
page read and write
1143000
trusted library allocation
page read and write
8E0E000
stack
page read and write
17E0000
trusted library allocation
page read and write
53E3000
heap
page read and write
41F000
remote allocation
page execute and read and write
3100000
heap
page execute and read and write
13C0000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
40C000
remote allocation
page execute and read and write
31EE000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
FB0000
heap
page read and write
32BA000
trusted library allocation
page read and write
5A20000
heap
page read and write
258D000
stack
page read and write
822000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
4E04000
heap
page read and write
1310000
heap
page read and write
1440000
heap
page read and write
5EE000
heap
page read and write
1640000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
32C4000
trusted library allocation
page read and write
66E6000
heap
page read and write
570000
heap
page read and write
2F6D000
trusted library allocation
page read and write
1820000
trusted library allocation
page execute and read and write
2F55000
trusted library allocation
page read and write
6B70000
trusted library allocation
page execute and read and write
587C000
stack
page read and write
2F1F000
trusted library allocation
page read and write
57A0000
trusted library section
page read and write
6C69000
trusted library allocation
page read and write
6DAE000
stack
page read and write
4F7B000
stack
page read and write
2EAD000
trusted library allocation
page read and write
584E000
stack
page read and write
F38000
stack
page read and write
6BA5000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
2EEF000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
1710000
trusted library allocation
page execute and read and write
3241000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
63B4000
heap
page read and write
736F000
stack
page read and write
2F92000
trusted library allocation
page read and write
12CE000
stack
page read and write
1410000
heap
page read and write
7FB20000
trusted library allocation
page execute and read and write
2FED000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page read and write
F90000
heap
page read and write
879000
heap
page read and write
2154000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
40B000
remote allocation
page execute and read and write
12D0000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
29DE000
stack
page read and write
4BB0000
trusted library allocation
page execute and read and write
2930000
heap
page read and write
4951000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
55FE000
stack
page read and write
6B80000
trusted library allocation
page read and write
2D4F000
stack
page read and write
2FEF000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
1407000
heap
page read and write
2EB3000
trusted library allocation
page read and write
12F7000
trusted library allocation
page execute and read and write
1360000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
5774000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
63E9000
heap
page read and write
1760000
heap
page read and write
1140000
trusted library allocation
page read and write
42D000
remote allocation
page execute and read and write
9030000
heap
page read and write
71B0000
heap
page read and write
E10000
heap
page read and write
25B0000
heap
page read and write
1215000
heap
page read and write
68DF000
stack
page read and write
32EE000
unkown
page read and write
2B10000
heap
page read and write
6DC7000
trusted library allocation
page read and write
E79000
heap
page read and write
439000
remote allocation
page execute and read and write
115A000
trusted library allocation
page execute and read and write
6999000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
11C4000
trusted library allocation
page read and write
8F5D000
stack
page read and write
429000
remote allocation
page execute and read and write
5520000
heap
page read and write
4970000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
902D000
stack
page read and write
2140000
trusted library allocation
page read and write
D9E000
stack
page read and write
2EEA000
trusted library allocation
page read and write
1324000
heap
page read and write
2F2F000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
509D000
stack
page read and write
5590000
trusted library allocation
page read and write
12CA000
heap
page read and write
5791000
trusted library allocation
page read and write
141F000
heap
page read and write
2EFC000
trusted library allocation
page read and write
59A0000
heap
page execute and read and write
2ED9000
trusted library allocation
page read and write
500E000
stack
page read and write
4136000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
7310000
heap
page read and write
257D000
stack
page read and write
130E000
stack
page read and write
EDE000
heap
page read and write
1840000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
1140000
heap
page read and write
2FF7000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
847D000
stack
page read and write
7F0000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
8BBD000
stack
page read and write
2F0B000
trusted library allocation
page read and write
67DE000
stack
page read and write
5401000
trusted library allocation
page read and write
89CF000
stack
page read and write
5401000
trusted library allocation
page read and write
81A000
trusted library allocation
page execute and read and write
2F8D000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
16A0000
trusted library allocation
page execute and read and write
576E000
trusted library allocation
page read and write
619E000
stack
page read and write
2FB5000
trusted library allocation
page read and write
3D59000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
2E88000
trusted library allocation
page read and write
21C0000
heap
page execute and read and write
5412000
trusted library allocation
page read and write
1490000
heap
page read and write
6A00000
heap
page read and write
2A1A000
heap
page read and write
13D0000
trusted library allocation
page execute and read and write
125A000
stack
page read and write
659E000
stack
page read and write
578D000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
287E000
unkown
page read and write
2F93000
trusted library allocation
page read and write
614F000
stack
page read and write
144A000
heap
page read and write
655F000
stack
page read and write
2F1D000
trusted library allocation
page read and write
1130000
heap
page read and write
2F47000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
712E000
stack
page read and write
FCE000
heap
page read and write
3376000
trusted library allocation
page read and write
698E000
stack
page read and write
1134000
trusted library allocation
page read and write
5E0000
heap
page read and write
6C20000
trusted library allocation
page execute and read and write
6210000
trusted library section
page read and write
1770000
trusted library allocation
page read and write
5835000
trusted library allocation
page read and write
1370000
heap
page read and write
1800000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
4A13000
heap
page read and write
140E000
heap
page read and write
6C1E000
stack
page read and write
2E00000
heap
page execute and read and write
2FD9000
trusted library allocation
page read and write
725E000
stack
page read and write
2F7D000
trusted library allocation
page read and write
5530000
heap
page execute and read and write
1434000
heap
page read and write
11B4000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
1733000
trusted library allocation
page execute and read and write
2B4F000
stack
page read and write
640E000
stack
page read and write
15FF000
stack
page read and write
11DD000
trusted library allocation
page execute and read and write
2D5B000
trusted library allocation
page read and write
2EC7000
trusted library allocation
page read and write
1850000
heap
page read and write
283F000
stack
page read and write
6D00000
trusted library allocation
page read and write
13F0000
heap
page read and write
1500000
trusted library allocation
page read and write
FE4000
heap
page read and write
15B0000
heap
page read and write
1772000
trusted library allocation
page read and write
64B0000
heap
page read and write
3110000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
11E2000
trusted library allocation
page read and write
9180000
heap
page read and write
2D9A000
trusted library allocation
page read and write
531C000
stack
page read and write
2FFF000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
13B3000
heap
page read and write
2FE9000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
8998000
heap
page read and write
6B90000
trusted library allocation
page read and write
51F0000
trusted library allocation
page execute and read and write
2FF5000
trusted library allocation
page read and write
6B4E000
stack
page read and write
1660000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
62EE000
stack
page read and write
11B6000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
91FE000
stack
page read and write
5450000
heap
page read and write
766E000
stack
page read and write
59C0000
trusted library allocation
page read and write
111F000
stack
page read and write
5350000
trusted library allocation
page read and write
134C000
stack
page read and write
434000
remote allocation
page execute and read and write
2F81000
trusted library allocation
page read and write
677E000
stack
page read and write
2FC0000
trusted library allocation
page read and write
1392000
trusted library allocation
page read and write
CF7000
stack
page read and write
803000
trusted library allocation
page read and write
2160000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
59CE000
stack
page read and write
216F000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
581E000
stack
page read and write
4DCE000
stack
page read and write
5376000
trusted library allocation
page read and write
1499000
heap
page read and write
327F000
trusted library allocation
page read and write
56EE000
stack
page read and write
F80000
heap
page read and write
12F2000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
1544000
heap
page read and write
2F09000
trusted library allocation
page read and write
588C000
stack
page read and write
57A2000
trusted library allocation
page read and write
70C0000
trusted library allocation
page execute and read and write
2F27000
trusted library allocation
page read and write
1420000
heap
page read and write
6CBE000
stack
page read and write
332A000
trusted library allocation
page read and write
577A000
trusted library allocation
page read and write
2880000
heap
page read and write
2E8D000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
982E000
stack
page read and write
52DE000
stack
page read and write
11C5000
heap
page read and write
6B60000
heap
page read and write
6BFD000
stack
page read and write
1400000
heap
page read and write
6B07000
trusted library allocation
page read and write
905E000
stack
page read and write
2FFB000
trusted library allocation
page read and write
6E0D000
trusted library allocation
page read and write
71DE000
stack
page read and write
2F03000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
8CD0000
heap
page read and write
11C3000
trusted library allocation
page execute and read and write
13E5000
heap
page read and write
8F2F000
stack
page read and write
2EDD000
trusted library allocation
page read and write
56D0000
trusted library allocation
page execute and read and write
2F25000
trusted library allocation
page read and write
57EC000
stack
page read and write
1480000
heap
page read and write
2E71000
trusted library allocation
page read and write
299F000
unkown
page read and write
11E0000
trusted library allocation
page read and write
32B8000
trusted library allocation
page read and write
6B85000
trusted library allocation
page read and write
3EDA000
trusted library allocation
page read and write
3EE9000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
DD9000
stack
page read and write
13B2000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
6C3E000
stack
page read and write
1620000
trusted library allocation
page read and write
191F000
stack
page read and write
55C0000
heap
page read and write
105A000
heap
page read and write
2F21000
trusted library allocation
page read and write
11BD000
trusted library allocation
page execute and read and write
537D000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
4111000
trusted library allocation
page read and write
5248000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
659D000
stack
page read and write
6F50000
heap
page read and write
FE6000
heap
page read and write
1384000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
691E000
stack
page read and write
6A89000
heap
page read and write
7F2C0000
trusted library allocation
page execute and read and write
59E0000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
7531000
trusted library allocation
page read and write
7370000
heap
page read and write
3EA9000
trusted library allocation
page read and write
55BE000
stack
page read and write
919E000
stack
page read and write
2457000
trusted library allocation
page read and write
6B8E000
stack
page read and write
12DD000
trusted library allocation
page execute and read and write
2EF9000
trusted library allocation
page read and write
DE0000
heap
page read and write
7E0000
trusted library allocation
page read and write
1775000
trusted library allocation
page execute and read and write
7F4C0000
trusted library allocation
page execute and read and write
2FFD000
trusted library allocation
page read and write
12F5000
trusted library allocation
page execute and read and write
53F0000
heap
page read and write
575B000
stack
page read and write
2FA3000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
4DEA000
heap
page read and write
2940000
heap
page read and write
5850000
heap
page read and write
2EE3000
trusted library allocation
page read and write
11A0000
heap
page read and write
2F67000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
2EDF000
trusted library allocation
page read and write
406000
remote allocation
page execute and read and write
45A9000
trusted library allocation
page read and write
599E000
stack
page read and write
5E0F000
stack
page read and write
1390000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
6DF7000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
452C000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page execute and read and write
303D000
stack
page read and write
6BA0000
trusted library allocation
page read and write
12E2000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
1637000
trusted library allocation
page execute and read and write
8980000
heap
page read and write
4460000
trusted library allocation
page execute and read and write
2F5F000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
65BD000
stack
page read and write
F40000
heap
page read and write
13AB000
trusted library allocation
page execute and read and write
2F81000
trusted library allocation
page read and write
7F9E0000
trusted library allocation
page execute and read and write
2F6F000
trusted library allocation
page read and write
572E000
stack
page read and write
2C70000
heap
page read and write
2900000
heap
page read and write
2F2D000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
2FCB000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
56A0000
heap
page read and write
593E000
stack
page read and write
40B9000
trusted library allocation
page read and write
8CCD000
stack
page read and write
5770000
trusted library allocation
page read and write
598E000
stack
page read and write
4F11000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
2FF3000
trusted library allocation
page read and write
6C10000
trusted library allocation
page execute and read and write
2EF7000
trusted library allocation
page read and write
2411000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
647E000
stack
page read and write
1604000
trusted library allocation
page read and write
5343000
heap
page read and write
2F69000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
2E8F000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
4975000
trusted library allocation
page read and write
7F2A0000
trusted library allocation
page execute and read and write
53E0000
trusted library allocation
page read and write
1140000
heap
page read and write
11B4000
trusted library allocation
page read and write
40A000
remote allocation
page execute and read and write
6BC0000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
288B000
heap
page read and write
4CCE000
stack
page read and write
688E000
stack
page read and write
14F8000
heap
page read and write
2F65000
trusted library allocation
page read and write
150A000
trusted library allocation
page execute and read and write
2EC5000
trusted library allocation
page read and write
11E6000
trusted library allocation
page execute and read and write
13A7000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
5A20000
heap
page read and write
905E000
stack
page read and write
6FC0000
trusted library allocation
page read and write
568D000
trusted library allocation
page read and write
66A0000
heap
page read and write
14E4000
trusted library allocation
page read and write
253E000
unkown
page read and write
5860000
heap
page read and write
1456000
heap
page read and write
2EC3000
trusted library allocation
page read and write
57DE000
stack
page read and write
7010000
heap
page read and write
5880000
trusted library allocation
page execute and read and write
691E000
stack
page read and write
1857000
heap
page read and write
1130000
trusted library allocation
page read and write
812000
trusted library allocation
page read and write
407000
remote allocation
page execute and read and write
557C000
stack
page read and write
645D000
stack
page read and write
1810000
heap
page read and write
11F5000
trusted library allocation
page execute and read and write
890000
heap
page read and write
3FB5000
trusted library allocation
page read and write
7651000
trusted library allocation
page read and write
2E7F000
stack
page read and write
28D0000
heap
page read and write
1740000
trusted library allocation
page read and write
2F11000
trusted library allocation
page read and write
5C1E000
stack
page read and write
139E000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
5910000
heap
page read and write
5440000
heap
page read and write
294A000
heap
page read and write
E83000
heap
page read and write
6CBF000
stack
page read and write
2156000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
2FBB000
trusted library allocation
page read and write
4A00000
heap
page execute and read and write
2FA1000
trusted library allocation
page read and write
2830000
heap
page read and write
527E000
stack
page read and write
53FA000
trusted library allocation
page read and write
6431000
heap
page read and write
2C80000
heap
page execute and read and write
13A5000
trusted library allocation
page execute and read and write
6FE0000
trusted library allocation
page read and write
2EB5000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
145E000
stack
page read and write
151E000
heap
page read and write
2EA3000
trusted library allocation
page read and write
494E000
trusted library allocation
page read and write
99F000
stack
page read and write
2F3B000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
60DE000
stack
page read and write
2E9D000
trusted library allocation
page read and write
59BE000
stack
page read and write
409000
remote allocation
page execute and read and write
337E000
stack
page read and write
291E000
stack
page read and write
7FD000
trusted library allocation
page execute and read and write
652000
heap
page read and write
2EBF000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
580000
heap
page read and write
2F75000
trusted library allocation
page read and write
6C67000
trusted library allocation
page read and write
5970000
heap
page read and write
3FD000
stack
page read and write
604F000
stack
page read and write
2D85000
trusted library allocation
page read and write
1734000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
332F000
unkown
page read and write
5980000
heap
page execute and read and write
5426000
trusted library allocation
page read and write
1506000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
62A5000
trusted library allocation
page read and write
17E2000
trusted library allocation
page read and write
1537000
heap
page read and write
6290000
trusted library allocation
page read and write
43A000
stack
page read and write
F88000
stack
page read and write
7580000
heap
page read and write
53E6000
trusted library allocation
page read and write
752D000
stack
page read and write
6BA7000
trusted library allocation
page read and write
6A53000
heap
page read and write
800000
trusted library allocation
page read and write
5BCC000
stack
page read and write
126E000
stack
page read and write
2EA7000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
53EE000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
5A80000
heap
page read and write
3001000
trusted library allocation
page read and write
8ACE000
stack
page read and write
2EFB000
trusted library allocation
page read and write
138B000
trusted library allocation
page read and write
84BE000
stack
page read and write
5A61000
trusted library allocation
page read and write
2FE3000
trusted library allocation
page read and write
1220000
heap
page read and write
655E000
stack
page read and write
2F4F000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
95ED000
stack
page read and write
1769000
heap
page read and write
1650000
heap
page execute and read and write
2EED000
trusted library allocation
page read and write
17DE000
stack
page read and write
4A10000
heap
page read and write
58FE000
stack
page read and write
2EF3000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
493B000
trusted library allocation
page read and write
5433000
heap
page read and write
7080000
trusted library allocation
page read and write
62F6000
heap
page read and write
2FA7000
trusted library allocation
page read and write
2EFA000
trusted library allocation
page read and write
3220000
heap
page execute and read and write
5760000
trusted library allocation
page read and write
667D000
stack
page read and write
428000
remote allocation
page execute and read and write
2FAD000
trusted library allocation
page read and write
9830000
trusted library allocation
page read and write
95AC000
stack
page read and write
49F0000
trusted library allocation
page read and write
5797000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
17DE000
stack
page read and write
2DEE000
stack
page read and write
6B5E000
stack
page read and write
28BF000
unkown
page read and write
5A36000
heap
page read and write
2BAE000
stack
page read and write
11F0000
trusted library allocation
page read and write
6D10000
heap
page read and write
5A40000
trusted library allocation
page execute and read and write
2ECD000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
2B4F000
stack
page read and write
2F2E000
stack
page read and write
4960000
trusted library allocation
page read and write
1552000
heap
page read and write
1502000
trusted library allocation
page read and write
DD9000
stack
page read and write
2F4B000
stack
page read and write
776E000
stack
page read and write
2F90000
heap
page read and write
53FE000
trusted library allocation
page read and write
5630000
heap
page execute and read and write
91A0000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
4139000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
5781000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
113D000
trusted library allocation
page execute and read and write
55BE000
stack
page read and write
3007000
trusted library allocation
page read and write
E6E000
heap
page read and write
6450000
trusted library allocation
page read and write
14BD000
heap
page read and write
137D000
trusted library allocation
page execute and read and write
133A000
heap
page read and write
762E000
stack
page read and write
3203000
heap
page read and write
51E0000
trusted library allocation
page read and write
EF6000
heap
page read and write
53EB000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page read and write
5784000
trusted library allocation
page read and write
310E000
stack
page read and write
1409000
heap
page read and write
6A49000
trusted library allocation
page read and write
4E4C000
stack
page read and write
2EBD000
trusted library allocation
page read and write
11C0000
heap
page read and write
620000
heap
page read and write
585000
heap
page read and write
6739000
heap
page read and write
114D000
trusted library allocation
page execute and read and write
2546000
trusted library allocation
page read and write
1396000
trusted library allocation
page execute and read and write
96EE000
stack
page read and write
12D5000
heap
page read and write
1650000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
6F2F000
stack
page read and write
5781000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
62A0000
trusted library allocation
page read and write
5772000
trusted library allocation
page read and write
6C2E000
stack
page read and write
1052000
heap
page read and write
126D000
stack
page read and write
82B000
trusted library allocation
page execute and read and write
163B000
trusted library allocation
page execute and read and write
932E000
stack
page read and write
403C000
trusted library allocation
page read and write
5473000
heap
page read and write
536A000
trusted library allocation
page read and write
7320000
trusted library allocation
page execute and read and write
58BE000
stack
page read and write
66BD000
heap
page read and write
44AE000
stack
page read and write
1410000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
63FE000
stack
page read and write
4934000
trusted library allocation
page read and write
11B3000
trusted library allocation
page execute and read and write
257F000
unkown
page read and write
567D000
stack
page read and write
615000
heap
page read and write
577E000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
6A3000
heap
page read and write
D50000
heap
page read and write
61DE000
stack
page read and write
30FE000
stack
page read and write
230E000
stack
page read and write
13A0000
heap
page read and write
4DE0000
heap
page read and write
177B000
trusted library allocation
page execute and read and write
2FEB000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
2FBD000
trusted library allocation
page read and write
5787000
trusted library allocation
page read and write
DF0000
heap
page read and write
13A6000
trusted library allocation
page read and write
11EA000
trusted library allocation
page execute and read and write
1687000
heap
page read and write
2FF1000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
2F29000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
173D000
trusted library allocation
page execute and read and write
3210000
trusted library allocation
page execute and read and write
55D9000
heap
page read and write
1750000
trusted library allocation
page read and write
8F5E000
stack
page read and write
4A0000
heap
page read and write
67C000
heap
page read and write
4F80000
trusted library allocation
page read and write
2F19000
trusted library allocation
page read and write
72F0000
heap
page read and write
66F6000
heap
page read and write
3419000
trusted library allocation
page read and write
1644000
trusted library allocation
page read and write
4009000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
53DC000
stack
page read and write
4241000
trusted library allocation
page read and write
3FC9000
trusted library allocation
page read and write
10B0000
heap
page read and write
2910000
heap
page read and write
2FC5000
trusted library allocation
page read and write
1042000
heap
page read and write
12AE000
stack
page read and write
6A9B000
heap
page read and write
947D000
stack
page read and write
62D0000
heap
page read and write
53FA000
trusted library allocation
page read and write
17E7000
trusted library allocation
page execute and read and write
5FF000
heap
page read and write
8F0F000
stack
page read and write
438000
remote allocation
page execute and read and write
1387000
stack
page read and write
46A2000
trusted library allocation
page read and write
2F6C000
stack
page read and write
1344000
heap
page read and write
1270000
trusted library allocation
page execute and read and write
669E000
stack
page read and write
1405000
heap
page read and write
7F3000
trusted library allocation
page execute and read and write
53F2000
trusted library allocation
page read and write
880000
trusted library allocation
page execute and read and write
138A000
heap
page read and write
53F2000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
827000
trusted library allocation
page execute and read and write
2F01000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
5D0E000
stack
page read and write
2FBF000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
41B2000
trusted library allocation
page read and write
10F7000
stack
page read and write
65CE000
stack
page read and write
577C000
stack
page read and write
2FDD000
trusted library allocation
page read and write
5290000
trusted library allocation
page execute and read and write
1454000
heap
page read and write
11D0000
trusted library allocation
page read and write
92FE000
stack
page read and write
6A1E000
heap
page read and write
1613000
trusted library allocation
page read and write
14D8000
heap
page read and write
576B000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
30D0000
heap
page read and write
1790000
trusted library allocation
page read and write
597E000
stack
page read and write
2EEB000
trusted library allocation
page read and write
877E000
stack
page read and write
2EB7000
trusted library allocation
page read and write
590B000
stack
page read and write
F2F000
heap
page read and write
151A000
heap
page read and write
2F3F000
trusted library allocation
page read and write
5550000
heap
page read and write
5680000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
5840000
heap
page read and write
51D0000
heap
page read and write
135F000
trusted library allocation
page read and write
6D05000
trusted library allocation
page read and write
1485000
heap
page read and write
6BB0000
trusted library allocation
page read and write
1365000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page execute and read and write
2820000
heap
page read and write
2F23000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
6370000
heap
page read and write
DDE000
stack
page read and write
1603000
trusted library allocation
page execute and read and write
1680000
heap
page read and write
14E3000
trusted library allocation
page execute and read and write
53E0000
heap
page read and write
2F13000
trusted library allocation
page read and write
25BA000
stack
page read and write
2F31000
trusted library allocation
page read and write
139A000
trusted library allocation
page execute and read and write
4E30000
heap
page read and write
6BAD000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
4626000
trusted library allocation
page read and write
69DE000
stack
page read and write
11F7000
trusted library allocation
page execute and read and write
2F86000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
5540000
heap
page execute and read and write
25CA000
stack
page read and write
67BD000
stack
page read and write
531C000
stack
page read and write
2FB0000
trusted library allocation
page read and write
30E0000
heap
page read and write
6E00000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
2FC1000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
7F6C0000
trusted library allocation
page execute and read and write
6D17000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
1626000
trusted library allocation
page execute and read and write
3277000
trusted library allocation
page read and write
5A40000
heap
page read and write
4249000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
6C00000
heap
page read and write
43B000
remote allocation
page execute and read and write
622000
heap
page read and write
536E000
trusted library allocation
page read and write
8D2E000
stack
page read and write
5789000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
9F9000
stack
page read and write
2F5B000
trusted library allocation
page read and write
14F3000
trusted library allocation
page read and write
1217000
heap
page read and write
2F3D000
trusted library allocation
page read and write
6BA7000
trusted library allocation
page read and write
25FE000
stack
page read and write
1190000
heap
page read and write
2C60000
heap
page read and write
1720000
trusted library allocation
page read and write
3157000
trusted library allocation
page read and write
4B0000
heap
page read and write
8E2E000
stack
page read and write
6B50000
heap
page read and write
2F83000
trusted library allocation
page read and write
1064000
heap
page read and write
2E8B000
trusted library allocation
page read and write
649E000
stack
page read and write
CD9000
stack
page read and write
55DF000
heap
page read and write
3281000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
E50000
heap
page read and write
1290000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
1145000
heap
page read and write
6E8D000
stack
page read and write
1427000
heap
page read and write
3241000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
1622000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
33BF000
stack
page read and write
3200000
heap
page read and write
3042000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
80D000
trusted library allocation
page execute and read and write
4269000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
6F30000
heap
page read and write
12E0000
trusted library allocation
page read and write
128A000
stack
page read and write
6B70000
trusted library allocation
page execute and read and write
2EE8000
trusted library allocation
page read and write
520C000
stack
page read and write
1156000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
2D59000
trusted library allocation
page read and write
54BC000
stack
page read and write
11F2000
trusted library allocation
page read and write
6A1E000
stack
page read and write
553E000
stack
page read and write
1162000
trusted library allocation
page read and write
6D2E000
stack
page read and write
540D000
trusted library allocation
page read and write
4962000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
5853000
heap
page read and write
E8A000
stack
page read and write
4930000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
644E000
stack
page read and write
1777000
trusted library allocation
page execute and read and write
1360000
trusted library allocation
page read and write
175A000
trusted library allocation
page execute and read and write
73EC000
stack
page read and write
5685000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
57BE000
stack
page read and write
2F7B000
trusted library allocation
page read and write
42EE000
trusted library allocation
page read and write
6455000
trusted library allocation
page read and write
94AC000
stack
page read and write
6AFD000
trusted library allocation
page read and write
68DE000
stack
page read and write
14BC000
heap
page read and write
11A0000
trusted library allocation
page read and write
5850000
heap
page read and write
84D0000
heap
page read and write
867E000
stack
page read and write
3009000
trusted library allocation
page read and write
1058000
heap
page read and write
6A2D000
stack
page read and write
53EB000
trusted library allocation
page read and write
13C9000
heap
page read and write
5DE000
stack
page read and write
2C98000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
21BE000
stack
page read and write
13AD000
trusted library allocation
page read and write
645D000
stack
page read and write
2DF6000
trusted library allocation
page read and write
5430000
heap
page read and write
1501000
heap
page read and write
2C0E000
stack
page read and write
1400000
heap
page read and write
684E000
stack
page read and write
3F2E000
trusted library allocation
page read and write
6B3E000
stack
page read and write
2F1B000
trusted library allocation
page read and write
6A6E000
stack
page read and write
16B0000
heap
page read and write
12FB000
trusted library allocation
page execute and read and write
2F95000
trusted library allocation
page read and write
DF5000
heap
page read and write
1497000
heap
page read and write
933B000
stack
page read and write
2FAF000
trusted library allocation
page read and write
2F53000
trusted library allocation
page read and write
57C0000
heap
page execute and read and write
6C0F000
stack
page read and write
4980000
trusted library allocation
page read and write
1428000
heap
page read and write
2FE5000
trusted library allocation
page read and write
143E000
heap
page read and write
972E000
stack
page read and write
6E20000
trusted library allocation
page read and write
51B0000
heap
page execute and read and write
64FF000
stack
page read and write
295E000
unkown
page read and write
2F41000
trusted library allocation
page read and write
6390000
heap
page read and write
2F97000
trusted library allocation
page read and write
1510000
heap
page read and write
3130000
heap
page read and write
1374000
trusted library allocation
page read and write
69FE000
stack
page read and write
6BA0000
trusted library allocation
page read and write
6CAE000
stack
page read and write
1100000
heap
page read and write
8E1B000
stack
page read and write
2FDF000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
3D79000
trusted library allocation
page read and write
5A2B000
heap
page read and write
42B000
remote allocation
page execute and read and write
5430000
trusted library allocation
page read and write
149E000
heap
page read and write
56A3000
heap
page read and write
8B2E000
stack
page read and write
787E000
stack
page read and write
12D7000
heap
page read and write
870000
heap
page read and write
2F6B000
trusted library allocation
page read and write
4F7E000
stack
page read and write
1610000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page read and write
2EAF000
trusted library allocation
page read and write
1589000
heap
page read and write
44A5000
trusted library allocation
page read and write
1477000
heap
page read and write
12F0000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
1550000
heap
page read and write
14F9000
heap
page read and write
441E000
trusted library allocation
page read and write
14CC000
heap
page read and write
1460000
trusted library allocation
page execute and read and write
9430000
heap
page read and write
42A9000
trusted library allocation
page read and write
168A000
heap
page read and write
2FED000
trusted library allocation
page read and write
3460000
heap
page read and write
13F0000
trusted library allocation
page read and write
431000
remote allocation
page execute and read and write
1730000
trusted library allocation
page read and write
1190000
trusted library allocation
page execute and read and write
2D97000
trusted library allocation
page read and write
54B0000
heap
page read and write
13A1000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
609E000
stack
page read and write
30C0000
heap
page read and write
6B95000
trusted library allocation
page read and write
4521000
trusted library allocation
page read and write
7F060000
trusted library allocation
page execute and read and write
9591000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
495D000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
66C0000
heap
page read and write
5620000
heap
page read and write
2FD6000
trusted library allocation
page read and write
5E8000
heap
page read and write
1752000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
3439000
trusted library allocation
page read and write
2170000
heap
page read and write
3411000
trusted library allocation
page read and write
5470000
heap
page read and write
7020000
trusted library allocation
page execute and read and write
2F43000
trusted library allocation
page read and write
30FE000
stack
page read and write
31FF000
stack
page read and write
887E000
stack
page read and write
57E0000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
816000
trusted library allocation
page execute and read and write
660E000
stack
page read and write
2FB1000
trusted library allocation
page read and write
174D000
trusted library allocation
page execute and read and write
C92000
unkown
page readonly
49E0000
heap
page read and write
1380000
trusted library allocation
page read and write
E58000
heap
page read and write
2FA1000
trusted library allocation
page read and write
5C7E000
stack
page read and write
2EB9000
trusted library allocation
page read and write
1373000
trusted library allocation
page execute and read and write
175E000
stack
page read and write
1150000
trusted library allocation
page read and write
1359000
stack
page read and write
2F5D000
trusted library allocation
page read and write
1210000
heap
page read and write
6C55000
trusted library allocation
page read and write
1210000
heap
page read and write
13A0000
trusted library allocation
page read and write
2ED3000
trusted library allocation
page read and write
10E0000
heap
page read and write
681000
heap
page read and write
5890000
trusted library section
page read and write
2A10000
heap
page read and write
1145000
heap
page read and write
57B0000
trusted library allocation
page read and write
There are 1296 hidden memdumps, click here to show them.