IOC Report
be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe

loading gif

Files

File Path
Type
Category
Malicious
be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\StrLocalGate\MmReveals.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\StrLocalGate\is-RISCU.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\154571\Eco.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\Nd
PDP-11 overlaid pure executable
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-5MGM4.tmp\be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-9OEDA.tmp\Setup.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\StrLocalGate\Setup.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\StrLocalGate\is-RI2MT.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\154571\i
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Allah
data
dropped
C:\Users\user\AppData\Local\Temp\April
data
dropped
C:\Users\user\AppData\Local\Temp\Bass
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Temp\Blake
data
dropped
C:\Users\user\AppData\Local\Temp\Category
data
dropped
C:\Users\user\AppData\Local\Temp\Compete
data
dropped
C:\Users\user\AppData\Local\Temp\Compile
data
dropped
C:\Users\user\AppData\Local\Temp\Concentration
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Correctly
data
dropped
C:\Users\user\AppData\Local\Temp\Ever
data
dropped
C:\Users\user\AppData\Local\Temp\Fellowship
data
dropped
C:\Users\user\AppData\Local\Temp\Founder
data
dropped
C:\Users\user\AppData\Local\Temp\Glasses
data
dropped
C:\Users\user\AppData\Local\Temp\Humor
ASCII text, with very long lines (408), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Humor.cmd
ASCII text, with very long lines (408), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Hz
data
dropped
C:\Users\user\AppData\Local\Temp\Intro
data
dropped
C:\Users\user\AppData\Local\Temp\Located
data
dropped
C:\Users\user\AppData\Local\Temp\Lt
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Miniature
data
dropped
C:\Users\user\AppData\Local\Temp\Optimize
data
dropped
C:\Users\user\AppData\Local\Temp\Pepper
data
dropped
C:\Users\user\AppData\Local\Temp\Pontiac
data
dropped
C:\Users\user\AppData\Local\Temp\Precipitation
data
dropped
C:\Users\user\AppData\Local\Temp\Previously
data
dropped
C:\Users\user\AppData\Local\Temp\Purchasing
data
dropped
C:\Users\user\AppData\Local\Temp\Scary
data
dropped
C:\Users\user\AppData\Local\Temp\Se
data
dropped
C:\Users\user\AppData\Local\Temp\Seek
data
dropped
C:\Users\user\AppData\Local\Temp\Sic
data
dropped
C:\Users\user\AppData\Local\Temp\Technologies
data
dropped
C:\Users\user\AppData\Local\Temp\Tion
data
dropped
C:\Users\user\AppData\Local\Temp\Tranny
data
dropped
C:\Users\user\AppData\Local\Temp\is-M0QJK.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-SR5HU.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe
"C:\Users\user\Desktop\be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe"
malicious
C:\StrLocalGate\MmReveals.exe
"C:\StrLocalGate\MmReveals.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Humor Humor.cmd & Humor.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 154571
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "TRUEANALOGMINDOC" Pepper
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Lt + Blake + Tranny + Category 154571\i
malicious
C:\Users\user\AppData\Local\Temp\154571\Eco.pif
154571\Eco.pif 154571\i
malicious
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\is-5MGM4.tmp\be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.tmp
"C:\Users\user\AppData\Local\Temp\is-5MGM4.tmp\be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.tmp" /SL5="$10422,3479677,781312,C:\Users\user\Desktop\be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe"
C:\Program Files (x86)\StrLocalGate\Setup.exe
"C:\Program Files (x86)\StrLocalGate\Setup.exe"
C:\Users\user\AppData\Local\Temp\is-9OEDA.tmp\Setup.tmp
"C:\Users\user\AppData\Local\Temp\is-9OEDA.tmp\Setup.tmp" /SL5="$20426,920064,920064,C:\Program Files (x86)\StrLocalGate\Setup.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 5
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.140.147.183:12245
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://www.remobjects.com/ps
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
https://www.innosetup.com/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://www.autodesk.com/0http://www.autodesk.com/0http://www.autodesk.com/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
WTYoyXMgGLmyIq.WTYoyXMgGLmyIq
unknown

IPs

IP
Domain
Country
Malicious
45.140.147.183
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4EC8000
trusted library allocation
page read and write
malicious
48DC000
trusted library allocation
page read and write
malicious
4823000
trusted library allocation
page read and write
malicious
497F000
trusted library allocation
page read and write
malicious
702000
remote allocation
page execute and read and write
malicious
4821000
trusted library allocation
page read and write
malicious
3F2B000
trusted library allocation
page read and write
malicious
48DC000
trusted library allocation
page read and write
malicious
4A21000
trusted library allocation
page read and write
malicious
4A6B000
trusted library allocation
page read and write
malicious
4A21000
trusted library allocation
page read and write
malicious
4EDB000
trusted library allocation
page read and write
malicious
497F000
trusted library allocation
page read and write
malicious
3EA2000
trusted library allocation
page read and write
malicious
48DC000
trusted library allocation
page read and write
malicious
4A21000
trusted library allocation
page read and write
malicious
486B000
trusted library allocation
page read and write
malicious
4821000
trusted library allocation
page read and write
malicious
497F000
trusted library allocation
page read and write
malicious
497F000
trusted library allocation
page read and write
malicious
4861000
trusted library allocation
page read and write
malicious
48DC000
trusted library allocation
page read and write
malicious
D05000
trusted library allocation
page execute and read and write
4A7E000
trusted library allocation
page read and write
8AD000
heap
page read and write
66AC000
stack
page read and write
224E000
stack
page read and write
4B6C000
trusted library allocation
page read and write
869000
heap
page read and write
D4B000
heap
page read and write
782000
heap
page read and write
3EA0000
trusted library allocation
page read and write
4821000
trusted library allocation
page read and write
C9A000
direct allocation
page read and write
4BD000
unkown
page read and write
1278000
heap
page read and write
880000
heap
page read and write
22D0000
direct allocation
page read and write
841000
heap
page read and write
351E000
heap
page read and write
34B0000
direct allocation
page read and write
15AF000
heap
page read and write
3EE0000
trusted library allocation
page read and write
14C7000
heap
page read and write
85E000
heap
page read and write
491C000
trusted library allocation
page read and write
4D00000
heap
page read and write
6810000
trusted library allocation
page read and write
3BF1000
heap
page read and write
3BF1000
heap
page read and write
3BF1000
heap
page read and write
BAE000
stack
page read and write
A8E000
stack
page read and write
289D000
trusted library allocation
page read and write
4730000
heap
page read and write
895000
heap
page read and write
B34000
heap
page read and write
C19000
direct allocation
page read and write
11FD000
stack
page read and write
2341000
direct allocation
page read and write
94B000
heap
page read and write
4D30000
trusted library allocation
page read and write
D3D000
heap
page read and write
2CDE000
trusted library allocation
page read and write
221E000
direct allocation
page read and write
3F2B000
trusted library allocation
page read and write
372F000
trusted library allocation
page read and write
46CE000
stack
page read and write
4E22000
trusted library allocation
page read and write
148F000
heap
page read and write
4ECA000
trusted library allocation
page read and write
3BF1000
heap
page read and write
500000
heap
page read and write
84C000
heap
page read and write
408000
unkown
page readonly
2319000
direct allocation
page read and write
2C86000
trusted library allocation
page read and write
2893000
heap
page read and write
6AEF000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
40B000
unkown
page read and write
898000
heap
page read and write
75A8000
direct allocation
page read and write
48CD000
trusted library allocation
page read and write
37D8000
direct allocation
page read and write
869000
heap
page read and write
1523000
heap
page read and write
2339000
direct allocation
page read and write
86E000
heap
page read and write
D07000
trusted library allocation
page execute and read and write
4BB0000
trusted library allocation
page read and write
1408000
heap
page read and write
D67000
heap
page read and write
95A000
heap
page read and write
58DB000
heap
page read and write
6BE0000
trusted library allocation
page read and write
2070000
direct allocation
page execute and read and write
2331000
direct allocation
page read and write
CF2000
trusted library allocation
page read and write
4C4000
unkown
page readonly
48C6000
trusted library allocation
page read and write
BD0000
heap
page read and write
4A6B000
trusted library allocation
page read and write
504F000
stack
page read and write
6851000
heap
page read and write
1255000
heap
page read and write
1242000
heap
page read and write
1244000
heap
page read and write
CEA000
direct allocation
page read and write
3BF1000
heap
page read and write
594A000
heap
page read and write
2C79000
trusted library allocation
page read and write
610000
heap
page read and write
2894000
heap
page read and write
615000
heap
page read and write
143C000
heap
page read and write
4875000
trusted library allocation
page read and write
84C000
heap
page read and write
37AA000
direct allocation
page read and write
350F000
stack
page read and write
34D4000
direct allocation
page read and write
CF0000
trusted library allocation
page read and write
869000
heap
page read and write
2CC5000
trusted library allocation
page read and write
3F4D000
trusted library allocation
page read and write
6EAE000
stack
page read and write
2B9A000
trusted library allocation
page read and write
49D1000
trusted library allocation
page read and write
248B000
direct allocation
page read and write
841000
heap
page read and write
14B9000
heap
page read and write
14D1000
heap
page read and write
286B000
trusted library allocation
page read and write
4D20000
trusted library allocation
page execute and read and write
D02000
trusted library allocation
page read and write
730000
heap
page read and write
D3F000
heap
page read and write
D42000
heap
page read and write
7C0000
heap
page read and write
3F2B000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
2898000
heap
page read and write
50D0000
trusted library allocation
page read and write
84C000
heap
page read and write
229D000
direct allocation
page read and write
6867000
heap
page read and write
84C000
heap
page read and write
3799000
trusted library allocation
page read and write
860000
heap
page read and write
41F000
unkown
page read and write
12AF000
heap
page read and write
1E0000
heap
page read and write
B88000
heap
page read and write
84C000
heap
page read and write
84C000
heap
page read and write
35E1000
heap
page read and write
4820000
trusted library allocation
page read and write
592D000
heap
page read and write
6A43000
trusted library allocation
page read and write
15D6000
heap
page read and write
4E27000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
12F0000
heap
page read and write
959000
heap
page read and write
BCE000
stack
page read and write
6C7000
unkown
page write copy
652F000
stack
page read and write
C20000
direct allocation
page read and write
4C7E000
trusted library allocation
page read and write
22C9000
direct allocation
page read and write
1E4000
heap
page read and write
4C2000
unkown
page write copy
2299000
direct allocation
page read and write
CD0000
trusted library allocation
page read and write
1597000
heap
page read and write
49DA000
trusted library allocation
page read and write
715000
unkown
page readonly
6BC0000
trusted library allocation
page execute and read and write
4821000
trusted library allocation
page read and write
1604000
heap
page read and write
4EBA000
trusted library allocation
page read and write
289F000
heap
page read and write
6DE000
unkown
page readonly
2CB9000
trusted library allocation
page read and write
14D1000
heap
page read and write
383C000
heap
page read and write
1228000
heap
page read and write
869000
heap
page read and write
4E000
unkown
page readonly
24BE000
stack
page read and write
1AEF000
stack
page read and write
700000
remote allocation
page execute and read and write
510000
unkown
page readonly
59CC000
heap
page read and write
51A0000
trusted library allocation
page execute and read and write
6C70000
trusted library allocation
page read and write
AAE000
stack
page read and write
486A000
trusted library allocation
page read and write
26F0000
trusted library allocation
page read and write
127B000
heap
page read and write
CCD000
direct allocation
page read and write
EC0000
heap
page read and write
3CF0000
trusted library allocation
page read and write
959000
heap
page read and write
3BF1000
heap
page read and write
24AA000
direct allocation
page read and write
137C000
heap
page read and write
86E000
stack
page read and write
327E000
stack
page read and write
128F000
heap
page read and write
129B000
heap
page read and write
D5C000
heap
page read and write
3BF1000
heap
page read and write
371E000
stack
page read and write
70E000
stack
page read and write
4C0000
unkown
page read and write
1408000
heap
page read and write
6C5000
unkown
page read and write
4E23000
trusted library allocation
page read and write
78E000
heap
page read and write
C50000
direct allocation
page read and write
5072000
trusted library allocation
page read and write
B0F000
stack
page read and write
12FE000
heap
page read and write
257F000
direct allocation
page read and write
4E6000
unkown
page readonly
2890000
heap
page read and write
84C000
heap
page read and write
49BF000
trusted library allocation
page read and write
A40000
heap
page read and write
94F000
heap
page read and write
1290000
heap
page read and write
1602000
heap
page read and write
24DD000
direct allocation
page read and write
4821000
trusted library allocation
page read and write
84C000
heap
page read and write
CD4000
direct allocation
page read and write
28A5000
heap
page read and write
7FE14000
direct allocation
page read and write
3F3E000
trusted library allocation
page read and write
3BF1000
heap
page read and write
59D0000
trusted library allocation
page execute and read and write
2376000
direct allocation
page read and write
15EC000
heap
page read and write
3763000
trusted library allocation
page read and write
3FDE000
stack
page read and write
6F54000
heap
page read and write
841000
heap
page read and write
2AD7000
trusted library allocation
page read and write
841000
heap
page read and write
AD4000
heap
page read and write
27C0000
heap
page read and write
2893000
heap
page read and write
3782000
direct allocation
page read and write
3BF1000
heap
page read and write
CA3000
heap
page read and write
4ED0000
trusted library allocation
page read and write
34C2000
direct allocation
page read and write
34E1000
heap
page read and write
4ED0000
trusted library allocation
page read and write
892000
heap
page read and write
1253000
heap
page read and write
3BF1000
heap
page read and write
5931000
heap
page read and write
493C000
trusted library allocation
page read and write
49C9000
trusted library allocation
page read and write
2210000
direct allocation
page read and write
4A21000
trusted library allocation
page read and write
68B8000
heap
page read and write
51C0000
trusted library allocation
page read and write
400000
unkown
page readonly
852000
heap
page read and write
153F000
heap
page read and write
3F56000
trusted library allocation
page read and write
3BF1000
heap
page read and write
CFA000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
3797000
direct allocation
page read and write
22AC000
direct allocation
page read and write
4B0C000
trusted library allocation
page read and write
2358000
direct allocation
page read and write
BB5000
heap
page read and write
22D7000
direct allocation
page read and write
2B48000
trusted library allocation
page read and write
36E0000
direct allocation
page read and write
5CF000
unkown
page write copy
22F4000
direct allocation
page read and write
49DA000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
2534000
direct allocation
page read and write
2899000
heap
page read and write
15A5000
heap
page read and write
1597000
heap
page read and write
493C000
trusted library allocation
page read and write
920000
heap
page read and write
3BF1000
heap
page read and write
841000
heap
page read and write
5DA0000
trusted library allocation
page execute and read and write
2BBB000
trusted library allocation
page read and write
B8F000
stack
page read and write
6F4000
unkown
page readonly
7660000
direct allocation
page read and write
3EDB000
trusted library allocation
page read and write
2510000
direct allocation
page read and write
34E6000
direct allocation
page read and write
954000
heap
page read and write
2CB0000
trusted library allocation
page read and write
288F000
trusted library allocation
page read and write
13F7000
heap
page read and write
2AF1000
trusted library allocation
page read and write
4A21000
trusted library allocation
page read and write
401000
unkown
page execute read
12D1000
heap
page read and write
84C000
heap
page read and write
5987000
heap
page read and write
4C7000
unkown
page readonly
3BF1000
heap
page read and write
135D000
heap
page read and write
758000
heap
page read and write
34DB000
direct allocation
page read and write
2892000
heap
page read and write
1536000
heap
page read and write
754000
heap
page read and write
764000
heap
page read and write
5942000
heap
page read and write
4EB1000
trusted library allocation
page read and write
1409000
heap
page read and write
3BF1000
heap
page read and write
4AE5000
trusted library allocation
page read and write
4760000
heap
page read and write
37CE000
direct allocation
page read and write
130D000
heap
page read and write
468F000
stack
page read and write
D0B000
trusted library allocation
page execute and read and write
850000
heap
page read and write
4F4000
unkown
page readonly
B60000
heap
page read and write
894000
heap
page read and write
2586000
direct allocation
page read and write
4821000
trusted library allocation
page read and write
3EA0000
trusted library allocation
page read and write
12FE000
heap
page read and write
50B0000
trusted library allocation
page read and write
1E4000
heap
page read and write
14ED000
heap
page read and write
82F000
stack
page read and write
5C9E000
stack
page read and write
497F000
trusted library allocation
page read and write
959000
heap
page read and write
4BAF000
trusted library allocation
page read and write
2760000
direct allocation
page read and write
508A000
trusted library allocation
page read and write
841000
heap
page read and write
400000
unkown
page readonly
2893000
heap
page read and write
869000
heap
page read and write
77F000
heap
page read and write
6A46000
trusted library allocation
page read and write
22D6000
direct allocation
page read and write
6D9000
unkown
page write copy
6C5000
unkown
page write copy
238C000
direct allocation
page read and write
2CEC000
trusted library allocation
page read and write
511000
unkown
page execute read
841000
heap
page read and write
401000
unkown
page execute read
2891000
heap
page read and write
4B7000
unkown
page write copy
12BF000
heap
page read and write
7608000
direct allocation
page read and write
4BB0000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
3BF1000
heap
page read and write
22EC000
direct allocation
page read and write
1527000
heap
page read and write
93B000
heap
page read and write
4906000
trusted library allocation
page read and write
154A000
heap
page read and write
CA0000
heap
page read and write
C38000
direct allocation
page read and write
D50000
trusted library allocation
page execute and read and write
497F000
trusted library allocation
page read and write
6AEA000
trusted library allocation
page read and write
21CF000
stack
page read and write
8AF000
stack
page read and write
84C000
heap
page read and write
4F09000
trusted library allocation
page read and write
84D000
heap
page read and write
4A21000
trusted library allocation
page read and write
48B8000
trusted library allocation
page read and write
50AB000
trusted library allocation
page read and write
4B7000
unkown
page read and write
49CE000
trusted library allocation
page read and write
C7D000
direct allocation
page read and write
6FB000
unkown
page readonly
6C7000
unkown
page read and write
12FF000
heap
page read and write
15A5000
heap
page read and write
84C000
heap
page read and write
4C85000
trusted library allocation
page read and write
77D000
heap
page read and write
12A4000
heap
page read and write
1452000
heap
page read and write
2893000
heap
page read and write
662F000
stack
page read and write
27DA000
direct allocation
page read and write
CD0000
heap
page read and write
4F4C000
trusted library allocation
page read and write
24B9000
direct allocation
page read and write
2510000
heap
page read and write
15E5000
heap
page read and write
3F71000
trusted library allocation
page read and write
75BE000
direct allocation
page read and write
9B000
stack
page read and write
23A1000
direct allocation
page read and write
87E000
stack
page read and write
3F71000
trusted library allocation
page read and write
4E6F000
stack
page read and write
6A70000
trusted library allocation
page read and write
14B7000
heap
page read and write
146F000
heap
page read and write
3BA000
stack
page read and write
5CF000
unkown
page read and write
841000
heap
page read and write
4D50000
heap
page read and write
4B0D000
trusted library allocation
page read and write
92F000
heap
page read and write
4E26000
trusted library allocation
page read and write
4CD3000
trusted library allocation
page read and write
147D000
heap
page read and write
80A000
heap
page read and write
882000
heap
page read and write
1604000
heap
page read and write
1566000
heap
page read and write
780000
heap
page read and write
3BF1000
heap
page read and write
1589000
heap
page read and write
D4C000
heap
page read and write
22B3000
direct allocation
page read and write
3BF1000
heap
page read and write
869000
heap
page read and write
6332000
heap
page read and write
560000
heap
page read and write
4A21000
trusted library allocation
page read and write
869000
heap
page read and write
C66000
direct allocation
page read and write
5061000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
1602000
heap
page read and write
2ACD000
trusted library allocation
page read and write
6BAE000
stack
page read and write
6AD9000
trusted library allocation
page read and write
254B000
direct allocation
page read and write
730000
remote allocation
page execute and read and write
2312000
direct allocation
page read and write
92D000
heap
page read and write
2268000
direct allocation
page read and write
3BF1000
heap
page read and write
2BC2000
trusted library allocation
page read and write
497F000
trusted library allocation
page read and write
14C2000
heap
page read and write
4C06000
trusted library allocation
page read and write
505B000
trusted library allocation
page read and write
289D000
heap
page read and write
2CD3000
trusted library allocation
page read and write
461000
unkown
page read and write
251C000
direct allocation
page read and write
735000
remote allocation
page execute and read and write
13F5000
heap
page read and write
2BFD000
trusted library allocation
page read and write
40E000
unkown
page execute read
869000
heap
page read and write
22BA000
direct allocation
page read and write
75F4000
direct allocation
page read and write
3755000
trusted library allocation
page read and write
34C000
stack
page read and write
7FE1B000
direct allocation
page read and write
84C000
heap
page read and write
841000
heap
page read and write
50F0000
heap
page read and write
3F71000
trusted library allocation
page read and write
22C1000
direct allocation
page read and write
BFC000
direct allocation
page read and write
289A000
heap
page read and write
49DA000
trusted library allocation
page read and write
6E0000
unkown
page readonly
237E000
stack
page read and write
34ED000
direct allocation
page read and write
B4E000
stack
page read and write
6876000
heap
page read and write
84C000
heap
page read and write
5C5000
unkown
page readonly
27AE000
stack
page read and write
493C000
trusted library allocation
page read and write
124E000
heap
page read and write
9B000
stack
page read and write
2260000
direct allocation
page read and write
890000
heap
page read and write
14FD000
heap
page read and write
841000
heap
page read and write
3EA2000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
289C000
heap
page read and write
5066000
trusted library allocation
page read and write
226F000
direct allocation
page read and write
4C92000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
132B000
heap
page read and write
2892000
heap
page read and write
869000
heap
page read and write
401000
unkown
page execute read
2620000
trusted library allocation
page read and write
2AC9000
trusted library allocation
page read and write
4D6F000
stack
page read and write
49DA000
trusted library allocation
page read and write
1543000
heap
page read and write
51E0000
trusted library allocation
page execute and read and write
869000
heap
page read and write
2CC8000
trusted library allocation
page read and write
259C000
direct allocation
page read and write
4F48000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
2251000
direct allocation
page read and write
2226000
direct allocation
page read and write
1488000
heap
page read and write
4CC0000
trusted library allocation
page read and write
154A000
heap
page read and write
5934000
heap
page read and write
145D000
heap
page read and write
762000
heap
page read and write
4A20000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
869000
heap
page read and write
2610000
heap
page read and write
4871000
trusted library allocation
page read and write
B84000
heap
page read and write
2B5D000
trusted library allocation
page read and write
869000
heap
page read and write
5B1F000
stack
page read and write
4BDF000
trusted library allocation
page read and write
E9F000
stack
page read and write
351D000
heap
page read and write
5D8000
unkown
page readonly
34BC000
stack
page read and write
77F000
heap
page read and write
877000
heap
page read and write
1433000
heap
page read and write
127C000
heap
page read and write
7588000
direct allocation
page read and write
872000
heap
page read and write
6DE000
unkown
page readonly
953000
heap
page read and write
4E2D000
trusted library allocation
page read and write
1296000
heap
page read and write
6C83000
trusted library allocation
page read and write
2AF8000
trusted library allocation
page read and write
400000
unkown
page readonly
3BF1000
heap
page read and write
CE0000
trusted library allocation
page read and write
223B000
direct allocation
page read and write
15EC000
heap
page read and write
4AFD000
trusted library allocation
page read and write
14DE000
heap
page read and write
3721000
trusted library allocation
page read and write
3741000
trusted library allocation
page read and write
7E0000
heap
page read and write
2FEC000
stack
page read and write
2B88000
trusted library allocation
page read and write
12BE000
heap
page read and write
5120000
trusted library allocation
page read and write
75FD000
direct allocation
page read and write
4C64000
trusted library allocation
page read and write
2891000
heap
page read and write
3BF1000
heap
page read and write
40000
unkown
page readonly
22A5000
direct allocation
page read and write
841000
heap
page read and write
4B0D000
trusted library allocation
page read and write
2285000
direct allocation
page read and write
26C0000
trusted library allocation
page read and write
4EBA000
trusted library allocation
page read and write
49CE000
trusted library allocation
page read and write
3BF1000
heap
page read and write
4C0000
unkown
page read and write
470F000
stack
page read and write
2890000
heap
page read and write
AE1000
heap
page read and write
D3D000
heap
page read and write
96E000
stack
page read and write
6A72000
trusted library allocation
page read and write
C11000
direct allocation
page read and write
CD3000
trusted library allocation
page execute and read and write
4A8B000
trusted library allocation
page read and write
2C65000
trusted library allocation
page read and write
C0A000
direct allocation
page read and write
3BF1000
heap
page read and write
3EC4000
trusted library allocation
page read and write
656C000
stack
page read and write
2890000
heap
page read and write
25A3000
direct allocation
page read and write
4EB6000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
3BF1000
heap
page read and write
79CE000
stack
page read and write
800000
heap
page read and write
6A75000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
11BF000
stack
page read and write
7FE36000
direct allocation
page read and write
337F000
stack
page read and write
591B000
heap
page read and write
400000
unkown
page readonly
918000
heap
page read and write
BF5000
direct allocation
page read and write
1E4000
heap
page read and write
6917000
heap
page read and write
2578000
direct allocation
page read and write
C10000
direct allocation
page execute and read and write
4A21000
trusted library allocation
page read and write
6D4000
unkown
page read and write
6BB0000
trusted library allocation
page read and write
5D8000
unkown
page readonly
323C000
stack
page read and write
4821000
trusted library allocation
page read and write
5B5E000
stack
page read and write
132D000
heap
page read and write
841000
heap
page read and write
CB0000
direct allocation
page read and write
768000
heap
page read and write
787000
heap
page read and write
5A0000
unkown
page readonly
1603000
heap
page read and write
3BF1000
heap
page read and write
49CE000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
1527000
heap
page read and write
7F5000
heap
page read and write
48DC000
trusted library allocation
page read and write
26C0000
heap
page read and write
26D0000
trusted library allocation
page read and write
88F000
heap
page read and write
3BF1000
heap
page read and write
1466000
heap
page read and write
87D000
heap
page read and write
441E000
stack
page read and write
1E4000
heap
page read and write
12EF000
heap
page read and write
493C000
trusted library allocation
page read and write
895000
heap
page read and write
C5C000
direct allocation
page read and write
2050000
heap
page read and write
19D000
stack
page read and write
155C000
heap
page read and write
6C7000
unkown
page read and write
2500000
trusted library allocation
page read and write
BD4000
heap
page read and write
1279000
heap
page read and write
3BF1000
heap
page read and write
80E000
stack
page read and write
2ABA000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
155D000
heap
page read and write
2CCB000
trusted library allocation
page read and write
4D38000
trusted library allocation
page read and write
4865000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
26D0000
direct allocation
page execute and read and write
1597000
heap
page read and write
34CA000
direct allocation
page read and write
3BF1000
heap
page read and write
790000
heap
page read and write
7F6E0000
trusted library allocation
page execute and read and write
1E4000
heap
page read and write
74E000
stack
page read and write
2552000
direct allocation
page read and write
4958000
trusted library allocation
page read and write
141E000
heap
page read and write
4B89000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
289A000
heap
page read and write
1587000
heap
page read and write
CEE000
stack
page read and write
158E000
heap
page read and write
4B60000
heap
page read and write
15CA000
heap
page read and write
888000
heap
page read and write
C84000
direct allocation
page read and write
94B000
heap
page read and write
4C6B000
trusted library allocation
page read and write
1479000
heap
page read and write
6828000
heap
page read and write
48B1000
trusted library allocation
page read and write
8B8000
heap
page read and write
B84000
heap
page read and write
7FE38000
direct allocation
page read and write
2C13000
trusted library allocation
page read and write
7B0000
heap
page read and write
3BF1000
heap
page read and write
1253000
heap
page read and write
2700000
heap
page read and write
255A000
direct allocation
page read and write
481F000
stack
page read and write
14C7000
heap
page read and write
D68000
heap
page read and write
4C58000
trusted library allocation
page read and write
83E6000
heap
page read and write
43DF000
stack
page read and write
CF6000
trusted library allocation
page execute and read and write
D6E000
heap
page read and write
2C21000
trusted library allocation
page read and write
26F5000
trusted library allocation
page read and write
6F86000
heap
page read and write
2217000
direct allocation
page read and write
49DA000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
AAF000
stack
page read and write
493C000
trusted library allocation
page read and write
841000
heap
page read and write
84C000
heap
page read and write
239A000
direct allocation
page read and write
7FB50000
direct allocation
page read and write
2899000
heap
page read and write
76C000
heap
page read and write
6330000
heap
page read and write
25AA000
direct allocation
page read and write
2C28000
trusted library allocation
page read and write
2894000
heap
page read and write
2301000
direct allocation
page read and write
2594000
direct allocation
page read and write
3F4E000
trusted library allocation
page read and write
237D000
direct allocation
page read and write
49C8000
trusted library allocation
page read and write
4AE4000
trusted library allocation
page read and write
A6F000
stack
page read and write
6D6000
unkown
page read and write
3BF1000
heap
page read and write
3F71000
trusted library allocation
page read and write
841000
heap
page read and write
6C9000
unkown
page read and write
8C0000
heap
page read and write
130A000
heap
page read and write
4D3A000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
4C6000
unkown
page readonly
4A21000
trusted library allocation
page read and write
883000
heap
page read and write
4856000
trusted library allocation
page read and write
6D0000
heap
page read and write
2750000
heap
page read and write
2891000
heap
page read and write
3EA2000
trusted library allocation
page read and write
770000
heap
page read and write
4F40000
heap
page execute and read and write
5976000
heap
page read and write
4D12000
trusted library allocation
page read and write
4821000
trusted library allocation
page read and write
35E0000
heap
page read and write
D5C000
heap
page read and write
6AFF000
trusted library allocation
page read and write
251F000
direct allocation
page read and write
75D1000
direct allocation
page read and write
4861000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
12CC000
heap
page read and write
2550000
direct allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
6420000
trusted library allocation
page execute and read and write
4D0E000
stack
page read and write
1602000
heap
page read and write
65AE000
stack
page read and write
2B32000
trusted library allocation
page read and write
B50000
heap
page read and write
841000
heap
page read and write
55E000
stack
page read and write
7F0000
heap
page read and write
75B7000
direct allocation
page read and write
15A5000
heap
page read and write
C92000
direct allocation
page read and write
6F57000
heap
page read and write
130F000
heap
page read and write
2AE3000
trusted library allocation
page read and write
491C000
trusted library allocation
page read and write
14D4000
heap
page read and write
841000
heap
page read and write
1524000
heap
page read and write
5922000
heap
page read and write
2320000
direct allocation
page read and write
49DA000
trusted library allocation
page read and write
84E000
heap
page read and write
4D10000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
37C5000
direct allocation
page read and write
289B000
heap
page read and write
1E4000
heap
page read and write
49C8000
trusted library allocation
page read and write
3EA2000
trusted library allocation
page read and write
6B6D000
stack
page read and write
3EA2000
trusted library allocation
page read and write
A90000
heap
page read and write
892000
heap
page read and write
2368000
direct allocation
page read and write
84C000
heap
page read and write
3BF1000
heap
page read and write
4C81000
trusted library allocation
page read and write
50AE000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
791000
heap
page read and write
24D5000
direct allocation
page read and write
8BE000
stack
page read and write
3BF1000
heap
page read and write
6D1000
unkown
page read and write
841000
heap
page read and write
4C60000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
88B000
heap
page read and write
3BF1000
heap
page read and write
58D0000
heap
page read and write
4F20000
trusted library allocation
page read and write
48DC000
trusted library allocation
page read and write
1520000
heap
page read and write
782000
heap
page read and write
2BAD000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
646C000
stack
page read and write
6C4B000
stack
page read and write
C6F000
stack
page read and write
1428000
heap
page read and write
1220000
heap
page read and write
D29000
heap
page read and write
6CC000
unkown
page read and write
247E000
stack
page read and write
12BC000
heap
page read and write
CD9000
heap
page read and write
2480000
direct allocation
page read and write
7FB30000
direct allocation
page read and write
49DA000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
C6D000
direct allocation
page read and write
234A000
direct allocation
page read and write
159C000
heap
page read and write
133C000
heap
page read and write
6AFA000
trusted library allocation
page read and write
8FE000
stack
page read and write
5130000
trusted library allocation
page execute and read and write
3BF1000
heap
page read and write
14EF000
heap
page read and write
1E4000
heap
page read and write
870000
heap
page read and write
4F1E000
stack
page read and write
A98000
heap
page read and write
1408000
heap
page read and write
6D7000
unkown
page write copy
38C000
stack
page read and write
6F7000
stack
page read and write
80E000
heap
page read and write
2308000
direct allocation
page read and write
C00000
heap
page read and write
3792000
direct allocation
page read and write
32DE000
stack
page read and write
15DF000
heap
page read and write
B18000
heap
page read and write
1451000
heap
page read and write
6A60000
trusted library allocation
page read and write
6820000
heap
page read and write
1454000
heap
page read and write
130C000
heap
page read and write
57A000
heap
page read and write
1535000
heap
page read and write
32F8000
heap
page read and write
50A0000
trusted library allocation
page read and write
11CE000
stack
page read and write
2C07000
trusted library allocation
page read and write
510000
unkown
page readonly
841000
heap
page read and write
7FE1D000
direct allocation
page read and write
75C000
heap
page read and write
49DA000
trusted library allocation
page read and write
3EA0000
trusted library allocation
page read and write
959000
heap
page read and write
BC0000
direct allocation
page read and write
5E0000
heap
page read and write
3BF1000
heap
page read and write
1604000
heap
page read and write
27B4000
trusted library allocation
page read and write
74D000
heap
page read and write
95C000
heap
page read and write
84C000
heap
page read and write
1589000
heap
page read and write
83D000
heap
page read and write
6CC000
unkown
page write copy
6A40000
trusted library allocation
page read and write
4A61000
trusted library allocation
page read and write
6AF5000
trusted library allocation
page read and write
1313000
heap
page read and write
15D1000
heap
page read and write
4A81000
trusted library allocation
page read and write
689A000
heap
page read and write
A70000
heap
page read and write
12B9000
heap
page read and write
6F50000
heap
page read and write
49DA000
trusted library allocation
page read and write
491C000
trusted library allocation
page read and write
86E000
heap
page read and write
65E000
stack
page read and write
4EC0000
trusted library allocation
page read and write
1461000
heap
page read and write
134C000
heap
page read and write
3AA2000
trusted library allocation
page read and write
59B6000
heap
page read and write
3750000
trusted library allocation
page read and write
481C000
stack
page read and write
32E0000
heap
page read and write
22A1000
direct allocation
page read and write
2897000
trusted library allocation
page read and write
358E000
stack
page read and write
14C2000
heap
page read and write
A30000
trusted library allocation
page read and write
84C000
heap
page read and write
12F7000
heap
page read and write
4F4000
unkown
page readonly
D30000
heap
page read and write
24F0000
direct allocation
page read and write
BE8000
heap
page read and write
3F71000
trusted library allocation
page read and write
C03000
direct allocation
page read and write
B80000
heap
page read and write
3BF1000
heap
page read and write
1602000
heap
page read and write
2BF9000
trusted library allocation
page read and write
841000
heap
page read and write
CC6000
direct allocation
page read and write
265C000
direct allocation
page read and write
40B000
unkown
page write copy
8D6000
heap
page read and write
142C000
heap
page read and write
5C5000
unkown
page readonly
48DB000
trusted library allocation
page read and write
2249000
direct allocation
page read and write
773000
heap
page read and write
94B000
heap
page read and write
AEA000
stack
page read and write
15A8000
heap
page read and write
6F20000
heap
page read and write
EA0000
heap
page read and write
1E4000
heap
page read and write
1537000
heap
page read and write
96F000
stack
page read and write
403000
unkown
page execute read
8D3000
heap
page read and write
D5C000
heap
page read and write
128F000
heap
page read and write
838000
heap
page read and write
400000
unkown
page readonly
493C000
trusted library allocation
page read and write
4AFD000
trusted library allocation
page read and write
4B48000
trusted library allocation
page read and write
3EA2000
trusted library allocation
page read and write
34E0000
heap
page read and write
841000
heap
page read and write
159E000
heap
page read and write
2234000
direct allocation
page read and write
764000
heap
page read and write
12E3000
heap
page read and write
CDC000
direct allocation
page read and write
24C7000
direct allocation
page read and write
6400000
heap
page read and write
4D8000
unkown
page readonly
800000
heap
page read and write
49BF000
trusted library allocation
page read and write
261E000
stack
page read and write
51B0000
trusted library allocation
page execute and read and write
3F2F000
trusted library allocation
page read and write
28A1000
heap
page read and write
4DA000
unkown
page readonly
49CA000
trusted library allocation
page read and write
19B000
stack
page read and write
2873000
trusted library allocation
page read and write
BD8000
direct allocation
page read and write
787000
heap
page read and write
3F0000
heap
page read and write
738000
heap
page read and write
24FB000
direct allocation
page read and write
CD5000
heap
page read and write
6FF000
unkown
page readonly
D28000
heap
page read and write
1251000
heap
page read and write
4871000
trusted library allocation
page read and write
841000
heap
page read and write
487D000
trusted library allocation
page read and write
1287000
heap
page read and write
8D0000
heap
page read and write
2A20000
trusted library allocation
page read and write
4F0000
heap
page read and write
2258000
direct allocation
page read and write
15A5000
heap
page read and write
2030000
heap
page read and write
5A1E000
stack
page read and write
2CBB000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
CED000
trusted library allocation
page execute and read and write
4A21000
trusted library allocation
page read and write
13E1000
heap
page read and write
1568000
heap
page read and write
720000
heap
page read and write
93000
stack
page read and write
3290000
heap
page read and write
841000
heap
page read and write
841000
heap
page read and write
3BF1000
heap
page read and write
22FA000
direct allocation
page read and write
888000
heap
page read and write
51E000
stack
page read and write
4D4F000
stack
page read and write
1579000
heap
page read and write
932000
heap
page read and write
14FD000
heap
page read and write
D6E000
heap
page read and write
22DD000
direct allocation
page read and write
2703000
heap
page read and write
4A21000
trusted library allocation
page read and write
888000
heap
page read and write
12DB000
heap
page read and write
5050000
trusted library allocation
page read and write
1244000
heap
page read and write
50C0000
trusted library allocation
page read and write
95C000
heap
page read and write
12D8000
heap
page read and write
14C2000
heap
page read and write
4924000
trusted library allocation
page read and write
78E000
heap
page read and write
130A000
heap
page read and write
1277000
heap
page read and write
1E4000
heap
page read and write
84C000
heap
page read and write
4B9000
unkown
page read and write
CCE000
stack
page read and write
959000
heap
page read and write
127B000
heap
page read and write
12C2000
heap
page read and write
5960000
heap
page read and write
72C000
stack
page read and write
B16000
heap
page read and write
79C000
heap
page read and write
13E0000
heap
page read and write
49DA000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1E4000
heap
page read and write
124E000
heap
page read and write
12C3000
heap
page read and write
133B000
heap
page read and write
79E000
stack
page read and write
1E4000
heap
page read and write
4A21000
trusted library allocation
page read and write
744000
remote allocation
page execute and read and write
400000
unkown
page readonly
2760000
direct allocation
page read and write
5D9F000
stack
page read and write
6C80000
trusted library allocation
page read and write
D66000
heap
page read and write
C2E000
stack
page read and write
5091000
trusted library allocation
page read and write
95C000
heap
page read and write
830000
heap
page read and write
4821000
trusted library allocation
page read and write
84C000
heap
page read and write
263A000
direct allocation
page read and write
2898000
heap
page read and write
34D0000
direct allocation
page read and write
2440000
heap
page read and write
6816000
trusted library allocation
page read and write
568000
heap
page read and write
2C54000
trusted library allocation
page read and write
CF1000
direct allocation
page read and write
12D2000
heap
page read and write
4A21000
trusted library allocation
page read and write
14C2000
heap
page read and write
1E4000
heap
page read and write
6A64000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
34B0000
heap
page read and write
88F000
heap
page read and write
75B9000
direct allocation
page read and write
1602000
heap
page read and write
2ACF000
trusted library allocation
page read and write
26EE000
trusted library allocation
page read and write
852000
heap
page read and write
124A000
heap
page read and write
4A96000
trusted library allocation
page read and write
8A5000
heap
page read and write
4AFC000
trusted library allocation
page read and write
1E4000
heap
page read and write
48B7000
trusted library allocation
page read and write
4B9000
unkown
page write copy
23A8000
direct allocation
page read and write
BE6000
direct allocation
page read and write
22B8000
direct allocation
page read and write
3F71000
trusted library allocation
page read and write
84C000
heap
page read and write
141C000
heap
page read and write
132B000
heap
page read and write
15F9000
heap
page read and write
289C000
heap
page read and write
1255000
heap
page read and write
9B000
stack
page read and write
2BA2000
trusted library allocation
page read and write
129C000
heap
page read and write
2896000
heap
page read and write
6C7000
unkown
page write copy
48CD000
trusted library allocation
page read and write
84C000
heap
page read and write
AC9000
heap
page read and write
2550000
direct allocation
page read and write
24C0000
direct allocation
page read and write
550000
heap
page read and write
1604000
heap
page read and write
48CC000
trusted library allocation
page read and write
C90000
heap
page read and write
84C000
heap
page read and write
CA1000
direct allocation
page read and write
CE3000
direct allocation
page read and write
28B4000
trusted library allocation
page read and write
AC0000
heap
page read and write
1E4000
heap
page read and write
4CB000
unkown
page readonly
19B000
stack
page read and write
26E0000
trusted library allocation
page read and write
50A5000
trusted library allocation
page read and write
5C5E000
stack
page read and write
51F0000
trusted library allocation
page read and write
4D35000
trusted library allocation
page read and write
2351000
direct allocation
page read and write
24CE000
direct allocation
page read and write
5D3000
unkown
page write copy
262B000
direct allocation
page read and write
12B5000
heap
page read and write
50E0000
trusted library allocation
page read and write
158D000
heap
page read and write
22E5000
direct allocation
page read and write
2202000
direct allocation
page read and write
4C8D000
trusted library allocation
page read and write
1E4000
heap
page read and write
4A61000
trusted library allocation
page read and write
5970000
heap
page read and write
2502000
direct allocation
page read and write
94E000
heap
page read and write
D6E000
heap
page read and write
134C000
heap
page read and write
850000
heap
page read and write
22EC000
direct allocation
page read and write
1479000
heap
page read and write
869000
heap
page read and write
24F0000
direct allocation
page read and write
3EA2000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
841000
heap
page read and write
869000
heap
page read and write
1589000
heap
page read and write
3F4E000
trusted library allocation
page read and write
D60000
heap
page read and write
21E9000
direct allocation
page read and write
890000
heap
page read and write
4B7000
unkown
page write copy
33BC000
stack
page read and write
4F1C000
trusted library allocation
page read and write
1313000
heap
page read and write
2721000
trusted library allocation
page read and write
4E2D000
trusted library allocation
page read and write
2291000
direct allocation
page read and write
869000
heap
page read and write
4B7000
unkown
page read and write
49CC000
trusted library allocation
page read and write
841000
heap
page read and write
4851000
trusted library allocation
page read and write
520000
heap
page read and write
59A3000
heap
page read and write
D6E000
heap
page read and write
7D0000
heap
page read and write
2893000
heap
page read and write
7FE16000
direct allocation
page read and write
66EE000
stack
page read and write
6BD0000
trusted library allocation
page read and write
6EC000
stack
page read and write
15DF000
heap
page read and write
1520000
heap
page read and write
22F3000
direct allocation
page read and write
2B97000
trusted library allocation
page read and write
1602000
heap
page read and write
1589000
heap
page read and write
4F30000
trusted library allocation
page read and write
4D0000
heap
page read and write
4E28000
trusted library allocation
page read and write
285F000
stack
page read and write
49DA000
trusted library allocation
page read and write
6AE8000
trusted library allocation
page read and write
5081000
trusted library allocation
page read and write
4A61000
trusted library allocation
page read and write
2641000
direct allocation
page read and write
1E4000
heap
page read and write
67ED000
stack
page read and write
4821000
trusted library allocation
page read and write
6C50000
trusted library allocation
page execute and read and write
2393000
direct allocation
page read and write
3BF1000
heap
page read and write
6DC000
unkown
page readonly
2509000
direct allocation
page read and write
590000
heap
page read and write
4E3000
unkown
page readonly
AB6000
heap
page read and write
BAF000
stack
page read and write
3BF1000
heap
page read and write
3BF0000
heap
page read and write
18C000
stack
page read and write
2B56000
trusted library allocation
page read and write
3BF1000
heap
page read and write
49CB000
trusted library allocation
page read and write
132E000
heap
page read and write
3EA2000
trusted library allocation
page read and write
351B000
heap
page read and write
CF8000
direct allocation
page read and write
BED000
direct allocation
page read and write
258D000
direct allocation
page read and write
1531000
heap
page read and write
84C000
heap
page read and write
86E000
stack
page read and write
2544000
direct allocation
page read and write
24FB000
stack
page read and write
1E4000
heap
page read and write
401000
unkown
page execute read
34E3000
direct allocation
page read and write
4871000
trusted library allocation
page read and write
1E4000
heap
page read and write
84C000
heap
page read and write
59BE000
heap
page read and write
6E4000
unkown
page readonly
2242000
direct allocation
page read and write
507E000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
841000
heap
page read and write
4A8D000
trusted library allocation
page read and write
25B8000
direct allocation
page read and write
3BF1000
heap
page read and write
12D1000
heap
page read and write
497E000
trusted library allocation
page read and write
27C3000
heap
page read and write
3BF1000
heap
page read and write
4873000
trusted library allocation
page read and write
3749000
trusted library allocation
page read and write
4821000
trusted library allocation
page read and write
236F000
direct allocation
page read and write
3BF1000
heap
page read and write
14C3000
heap
page read and write
870E000
stack
page read and write
C27000
direct allocation
page read and write
93C000
heap
page read and write
15E3000
heap
page read and write
22AA000
direct allocation
page read and write
22DE000
direct allocation
page read and write
2821000
trusted library allocation
page read and write
84C000
heap
page read and write
48B8000
trusted library allocation
page read and write
131C000
heap
page read and write
49BF000
trusted library allocation
page read and write
12D1000
heap
page read and write
94B000
heap
page read and write
21DE000
stack
page read and write
6DA000
heap
page read and write
E5E000
stack
page read and write
14D1000
heap
page read and write
2209000
direct allocation
page read and write
33F0000
heap
page read and write
C5F000
direct allocation
page read and write
5DD0000
trusted library allocation
page read and write
2303000
direct allocation
page read and write
22CF000
direct allocation
page read and write
4B9000
unkown
page read and write
3F55000
trusted library allocation
page read and write
2080000
heap
page read and write
49C8000
trusted library allocation
page read and write
750000
heap
page read and write
3BF1000
heap
page read and write
230B000
direct allocation
page read and write
500000
heap
page read and write
75C7000
direct allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
8B0000
heap
page read and write
6C60000
trusted library allocation
page execute and read and write
869000
heap
page read and write
1540000
heap
page read and write
11DD000
stack
page read and write
770000
heap
page read and write
12D1000
heap
page read and write
14EE000
heap
page read and write
92D000
heap
page read and write
252D000
direct allocation
page read and write
1520000
heap
page read and write
869000
heap
page read and write
32F0000
heap
page read and write
77C000
heap
page read and write
CBF000
direct allocation
page read and write
145D000
heap
page read and write
4868000
trusted library allocation
page read and write
885000
heap
page read and write
49D0000
trusted library allocation
page read and write
D6E000
heap
page read and write
1479000
heap
page read and write
CD4000
trusted library allocation
page read and write
D20000
heap
page read and write
14FF000
heap
page read and write
4BE0000
trusted library allocation
page read and write
49BF000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
869000
heap
page read and write
127B000
heap
page read and write
68C6000
heap
page read and write
22B1000
direct allocation
page read and write
25B1000
direct allocation
page read and write
2891000
heap
page read and write
131D000
heap
page read and write
4C2000
unkown
page write copy
84C000
heap
page read and write
123F000
heap
page read and write
157C000
heap
page read and write
408000
unkown
page readonly
4E21000
trusted library allocation
page read and write
3BF1000
heap
page read and write
2871000
trusted library allocation
page read and write
289A000
heap
page read and write
42000
unkown
page readonly
3943000
trusted library allocation
page read and write
93000
stack
page read and write
2710000
heap
page execute and read and write
BB0000
heap
page read and write
12A3000
heap
page read and write
1331000
heap
page read and write
D5C000
heap
page read and write
8D6000
heap
page read and write
6F1000
unkown
page readonly
222D000
direct allocation
page read and write
6B00000
trusted library allocation
page read and write
4C4000
unkown
page readonly
C49000
direct allocation
page read and write
511000
unkown
page execute read
6CE000
unkown
page read and write
4AE5000
trusted library allocation
page read and write
769000
heap
page read and write
3BF1000
heap
page read and write
841000
heap
page read and write
830000
heap
page read and write
497F000
trusted library allocation
page read and write
3F55000
trusted library allocation
page read and write
4E1000
unkown
page readonly
2894000
heap
page read and write
491C000
trusted library allocation
page read and write
2893000
trusted library allocation
page read and write
C8B000
direct allocation
page read and write
C8E000
stack
page read and write
6F3000
unkown
page readonly
2898000
heap
page read and write
6F90000
heap
page read and write
7DE000
stack
page read and write
D20000
heap
page read and write
2526000
direct allocation
page read and write
95C000
heap
page read and write
34FF000
direct allocation
page read and write
890000
heap
page read and write
1E4000
heap
page read and write
354E000
stack
page read and write
D25000
heap
page read and write
1586000
heap
page read and write
68AB000
heap
page read and write
19C000
stack
page read and write
9FF000
stack
page read and write
13A1000
heap
page read and write
3BF1000
heap
page read and write
75EF000
direct allocation
page read and write
3F2B000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
129B000
heap
page read and write
49DA000
trusted library allocation
page read and write
1313000
heap
page read and write
3F2A000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
6AD2000
trusted library allocation
page read and write
2276000
direct allocation
page read and write
2897000
heap
page read and write
3BF1000
heap
page read and write
5A0000
unkown
page readonly
84C000
heap
page read and write
83D0000
heap
page read and write
4821000
trusted library allocation
page read and write
599D000
heap
page read and write
14D0000
heap
page read and write
142A000
heap
page read and write
22FB000
direct allocation
page read and write
48B8000
trusted library allocation
page read and write
49DA000
trusted library allocation
page read and write
869000
heap
page read and write
7CE000
stack
page read and write
3BF1000
heap
page read and write
4EC0000
trusted library allocation
page read and write
874000
heap
page read and write
2ABE000
trusted library allocation
page read and write
37B5000
direct allocation
page read and write
22C8000
direct allocation
page read and write
CB8000
direct allocation
page read and write
37A0000
direct allocation
page read and write
2890000
heap
page read and write
869000
heap
page read and write
12A6000
heap
page read and write
24B2000
direct allocation
page read and write
2270000
heap
page read and write
51D0000
trusted library allocation
page read and write
6AD5000
trusted library allocation
page read and write
D38000
heap
page read and write
1597000
heap
page read and write
1324000
heap
page read and write
88E000
heap
page read and write
88B000
heap
page read and write
5909000
heap
page read and write
40C000
unkown
page execute read
2384000
direct allocation
page read and write
75DB000
direct allocation
page read and write
CAE000
stack
page read and write
4C86000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
22E4000
direct allocation
page read and write
84C000
heap
page read and write
84C000
heap
page read and write
12FE000
heap
page read and write
2638000
direct allocation
page read and write
882000
heap
page read and write
7FE07000
direct allocation
page read and write
6CF000
unkown
page read and write
2B23000
trusted library allocation
page read and write
139C000
heap
page read and write
3F4E000
trusted library allocation
page read and write
D6E000
heap
page read and write
3BF1000
heap
page read and write
841000
heap
page read and write
75F000
stack
page read and write
58D4000
heap
page read and write
4B0D000
trusted library allocation
page read and write
76C000
heap
page read and write
49CF000
trusted library allocation
page read and write
493C000
trusted library allocation
page read and write
683A000
heap
page read and write
34D0000
direct allocation
page read and write
869000
heap
page read and write
2829000
trusted library allocation
page read and write
BE0000
heap
page read and write
910000
heap
page read and write
4821000
trusted library allocation
page read and write
688A000
heap
page read and write
78D000
stack
page read and write
2628000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
227D000
direct allocation
page read and write
288F000
stack
page read and write
152F000
heap
page read and write
2B2F000
trusted library allocation
page read and write
5954000
heap
page read and write
1451000
heap
page read and write
There are 1458 hidden memdumps, click here to show them.