IOC Report
7xonkSJwuY.exe

loading gif

Files

File Path
Type
Category
Malicious
7xonkSJwuY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\arrogatingly\pteropod.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\drawlingly
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7xonkSJwuY.exe
"C:\Users\user\Desktop\7xonkSJwuY.exe"
malicious
C:\Users\user\AppData\Local\arrogatingly\pteropod.exe
"C:\Users\user\Desktop\7xonkSJwuY.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\7xonkSJwuY.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs"
malicious
C:\Users\user\AppData\Local\arrogatingly\pteropod.exe
"C:\Users\user\AppData\Local\arrogatingly\pteropod.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\arrogatingly\pteropod.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
162.251.122.86
unknown
Canada
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
28E1000
trusted library allocation
page read and write
malicious
532000
system
page execute and read and write
malicious
2989000
trusted library allocation
page read and write
malicious
C10000
direct allocation
page read and write
malicious
2EC0000
direct allocation
page read and write
malicious
6BE0000
trusted library section
page read and write
malicious
3C88000
trusted library allocation
page read and write
731A000
trusted library allocation
page read and write
3C83000
heap
page read and write
737E000
trusted library allocation
page read and write
B1A000
heap
page read and write
3C83000
heap
page read and write
3C83000
heap
page read and write
83D0000
heap
page read and write
3DE7000
heap
page read and write
6DF5000
trusted library allocation
page read and write
D97000
trusted library allocation
page execute and read and write
3C7B000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3BA6000
heap
page read and write
3A03000
trusted library allocation
page read and write
6D96000
trusted library allocation
page read and write
105000
heap
page read and write
7390000
trusted library allocation
page read and write
2B42000
trusted library allocation
page read and write
3D86000
heap
page read and write
3BA6000
heap
page read and write
3FC0000
direct allocation
page read and write
2C6C000
trusted library allocation
page read and write
6DBA000
trusted library allocation
page read and write
401000
unkown
page execute read
3F43000
direct allocation
page read and write
3DEF000
heap
page read and write
3E4E000
trusted library allocation
page read and write
3C88000
heap
page read and write
3F43000
direct allocation
page read and write
6075000
heap
page read and write
9E0000
heap
page read and write
3E55000
heap
page read and write
4AB000
unkown
page readonly
2F84000
heap
page read and write
3C5E000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
D82000
trusted library allocation
page read and write
3FC0000
direct allocation
page read and write
2FE0000
heap
page read and write
A40000
heap
page read and write
7315000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
3DE7000
heap
page read and write
7308000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
3C19000
heap
page read and write
3A06000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
3DC7000
heap
page read and write
4FFC000
stack
page read and write
3DE7000
heap
page read and write
2C2F000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3E50000
heap
page read and write
95A9EFB000
stack
page read and write
3C19000
heap
page read and write
416D000
direct allocation
page read and write
8369000
heap
page read and write
3D86000
heap
page read and write
3C83000
heap
page read and write
D8A000
trusted library allocation
page execute and read and write
944000
trusted library allocation
page read and write
40ED000
direct allocation
page read and write
3C83000
heap
page read and write
249F000
trusted library allocation
page read and write
3C34000
trusted library allocation
page read and write
657000
heap
page read and write
4AB000
unkown
page readonly
5700000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
415E000
direct allocation
page read and write
4040000
direct allocation
page read and write
3BA6000
heap
page read and write
53C000
system
page execute and read and write
3C83000
heap
page read and write
2ED0000
heap
page read and write
26D0000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
3A38000
trusted library allocation
page read and write
3C83000
heap
page read and write
3D86000
heap
page read and write
2C6F000
trusted library allocation
page read and write
66DD000
stack
page read and write
39EA000
trusted library allocation
page read and write
3D12000
heap
page read and write
3D12000
heap
page read and write
3C83000
heap
page read and write
3DF4000
heap
page read and write
2460000
heap
page execute and read and write
3C83000
heap
page read and write
2C9B000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
3D86000
heap
page read and write
3D73000
heap
page read and write
4A7000
unkown
page read and write
3DF4000
heap
page read and write
3E55000
heap
page read and write
3C88000
heap
page read and write
1DE74400000
heap
page read and write
3C19000
heap
page read and write
3E20000
direct allocation
page read and write
3C83000
heap
page read and write
2C7A000
trusted library allocation
page read and write
3C19000
heap
page read and write
3D12000
heap
page read and write
3DD9000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3E55000
heap
page read and write
3984000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3BD3000
trusted library allocation
page read and write
D64000
trusted library allocation
page read and write
3E50000
heap
page read and write
3D73000
trusted library allocation
page read and write
3D73000
heap
page read and write
400000
unkown
page readonly
7060000
trusted library allocation
page read and write
3E8B000
heap
page read and write
83C1000
heap
page read and write
8B4000
stack
page read and write
3DE7000
heap
page read and write
3BF5000
trusted library allocation
page read and write
778E000
stack
page read and write
6D80000
trusted library allocation
page read and write
3DEF000
heap
page read and write
4AB000
unkown
page readonly
3D86000
trusted library allocation
page read and write
401000
unkown
page execute read
40E9000
direct allocation
page read and write
6E80000
trusted library allocation
page execute and read and write
3BA6000
heap
page read and write
3C83000
heap
page read and write
2480000
heap
page read and write
7030000
trusted library allocation
page read and write
1DE72BC5000
heap
page read and write
2CC5000
trusted library allocation
page read and write
3C19000
heap
page read and write
73A0000
trusted library allocation
page execute and read and write
3D12000
heap
page read and write
2DF6000
trusted library allocation
page read and write
3CB2000
trusted library allocation
page read and write
23AF000
stack
page read and write
2BC9000
trusted library allocation
page read and write
713B000
stack
page read and write
3E8C000
heap
page read and write
3CB7000
trusted library allocation
page read and write
2E23000
trusted library allocation
page read and write
416D000
direct allocation
page read and write
3D73000
heap
page read and write
3DEF000
heap
page read and write
3D12000
heap
page read and write
3DF4000
heap
page read and write
3D86000
heap
page read and write
9D1000
heap
page read and write
2D62000
trusted library allocation
page read and write
930000
heap
page read and write
39AC000
trusted library allocation
page read and write
9A000
stack
page read and write
39F5000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
4EFF000
stack
page read and write
2ED1000
trusted library allocation
page read and write
3D12000
heap
page read and write
415E000
direct allocation
page read and write
3DEF000
heap
page read and write
D50000
trusted library allocation
page read and write
3FC0000
direct allocation
page read and write
3C83000
heap
page read and write
3C83000
heap
page read and write
100000
heap
page read and write
3C19000
heap
page read and write
3DEF000
heap
page read and write
3DE7000
heap
page read and write
83A0000
heap
page read and write
649E000
stack
page read and write
3BA6000
heap
page read and write
970000
heap
page read and write
3E20000
direct allocation
page read and write
2FE5000
heap
page read and write
89F000
stack
page read and write
3BA6000
heap
page read and write
3BA6000
heap
page read and write
3C19000
heap
page read and write
3C88000
heap
page read and write
3C83000
heap
page read and write
415E000
direct allocation
page read and write
3D73000
heap
page read and write
3E50000
heap
page read and write
3E50000
heap
page read and write
6DFB000
trusted library allocation
page read and write
3C88000
heap
page read and write
490000
unkown
page read and write
4DB9000
trusted library allocation
page read and write
2DFA000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
372E000
stack
page read and write
730A000
trusted library allocation
page read and write
3C85000
trusted library allocation
page read and write
3D77000
heap
page read and write
2450000
trusted library allocation
page execute and read and write
3E20000
direct allocation
page read and write
2E94000
trusted library allocation
page read and write
3E50000
heap
page read and write
3C3F000
trusted library allocation
page read and write
B0E000
stack
page read and write
2ED8000
trusted library allocation
page read and write
3D86000
heap
page read and write
3E55000
heap
page read and write
3C83000
heap
page read and write
3C88000
heap
page read and write
3C88000
heap
page read and write
3D86000
heap
page read and write
D7D000
trusted library allocation
page execute and read and write
4F7000
stack
page read and write
3C83000
heap
page read and write
940000
heap
page read and write
3D47000
trusted library allocation
page read and write
3DEF000
heap
page read and write
1DE72AF0000
heap
page read and write
D90000
trusted library allocation
page read and write
D10000
heap
page read and write
100000
heap
page read and write
3E50000
heap
page read and write
3D6C000
trusted library allocation
page read and write
699A000
stack
page read and write
3D40000
heap
page read and write
3C83000
heap
page read and write
B60000
heap
page read and write
3E7B000
heap
page read and write
3CAC000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
1DE72B10000
heap
page read and write
2C08000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
3C83000
heap
page read and write
3DE7000
heap
page read and write
4169000
direct allocation
page read and write
6BDF000
stack
page read and write
3C19000
heap
page read and write
2C21000
trusted library allocation
page read and write
7166000
trusted library allocation
page read and write
3E4D000
heap
page read and write
3D86000
heap
page read and write
1FB000
stack
page read and write
4040000
direct allocation
page read and write
2E33000
heap
page read and write
3D73000
heap
page read and write
3C83000
heap
page read and write
7077000
trusted library allocation
page read and write
3C83000
heap
page read and write
B0A000
heap
page read and write
3E50000
heap
page read and write
3D73000
heap
page read and write
4CFE000
stack
page read and write
83B6000
heap
page read and write
3E4A000
heap
page read and write
3D30000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3D12000
heap
page read and write
4169000
direct allocation
page read and write
3CDF000
trusted library allocation
page read and write
83B000
stack
page read and write
3E53000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
3D86000
heap
page read and write
4040000
direct allocation
page read and write
3DEF000
heap
page read and write
D63000
trusted library allocation
page execute and read and write
71D0000
trusted library allocation
page read and write
7180000
heap
page read and write
3DE7000
heap
page read and write
A5E000
stack
page read and write
40E9000
direct allocation
page read and write
867F000
stack
page read and write
4925000
trusted library allocation
page read and write
3DEF000
heap
page read and write
490000
unkown
page write copy
625D000
stack
page read and write
2D90000
trusted library allocation
page read and write
3C83000
heap
page read and write
3E20000
direct allocation
page read and write
3D73000
heap
page read and write
3D86000
heap
page read and write
40ED000
direct allocation
page read and write
2C60000
trusted library allocation
page read and write
1DE72A54000
heap
page read and write
3BA6000
heap
page read and write
3E6C000
trusted library allocation
page read and write
8330000
heap
page read and write
970000
heap
page read and write
72F5000
trusted library allocation
page read and write
3DEF000
heap
page read and write
2BD1000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
3C83000
heap
page read and write
3D86000
heap
page read and write
6DA2000
trusted library allocation
page read and write
3C88000
heap
page read and write
3E50000
heap
page read and write
3D1F000
trusted library allocation
page read and write
3DE7000
heap
page read and write
70E0000
trusted library allocation
page execute and read and write
966000
trusted library allocation
page execute and read and write
3C88000
heap
page read and write
A59000
heap
page read and write
4040000
direct allocation
page read and write
838F000
heap
page read and write
3DEF000
heap
page read and write
3C19000
heap
page read and write
3BA6000
heap
page read and write
3C83000
heap
page read and write
D70000
trusted library allocation
page read and write
3C9F000
stack
page read and write
6C7E000
stack
page read and write
621D000
stack
page read and write
3A2C000
trusted library allocation
page read and write
3C19000
heap
page read and write
834F000
heap
page read and write
3C83000
heap
page read and write
3C00000
heap
page read and write
3C19000
heap
page read and write
3C6A000
trusted library allocation
page read and write
3DF4000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
6E00000
trusted library allocation
page read and write
3E4A000
heap
page read and write
395D000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3D79000
trusted library allocation
page read and write
3D86000
heap
page read and write
3DE7000
heap
page read and write
4084000
direct allocation
page read and write
482000
unkown
page readonly
2D01000
trusted library allocation
page read and write
3D12000
heap
page read and write
2ECF000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
60C5000
heap
page read and write
3C0B000
heap
page read and write
3D73000
heap
page read and write
2F3E000
trusted library allocation
page read and write
415E000
direct allocation
page read and write
A78000
heap
page read and write
1590000
heap
page read and write
56BE000
stack
page read and write
3D78000
heap
page read and write
3C19000
heap
page read and write
2C93000
trusted library allocation
page read and write
C40000
heap
page read and write
3DF4000
heap
page read and write
3DEF000
heap
page read and write
ECE000
stack
page read and write
3C0B000
heap
page read and write
954000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3C83000
heap
page read and write
8349000
heap
page read and write
3C19000
heap
page read and write
3FC3000
direct allocation
page read and write
3C83000
heap
page read and write
3DE7000
heap
page read and write
3FC0000
direct allocation
page read and write
8372000
heap
page read and write
6EF0000
trusted library allocation
page read and write
3154000
heap
page read and write
3C19000
heap
page read and write
97E000
stack
page read and write
490000
unkown
page read and write
96A000
trusted library allocation
page execute and read and write
28CC000
stack
page read and write
99A000
heap
page read and write
3EA0000
direct allocation
page read and write
60BB000
heap
page read and write
3E50000
heap
page read and write
40E9000
direct allocation
page read and write
3E20000
direct allocation
page read and write
ABC000
heap
page read and write
3E55000
heap
page read and write
3D12000
heap
page read and write
3DE7000
heap
page read and write
3A26000
trusted library allocation
page read and write
3E55000
heap
page read and write
3BA6000
heap
page read and write
40E9000
direct allocation
page read and write
3BC5000
trusted library allocation
page read and write
910000
heap
page read and write
3DF4000
heap
page read and write
3D86000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
645D000
stack
page read and write
3DEF000
heap
page read and write
400000
unkown
page readonly
2EC2000
trusted library allocation
page read and write
2EB0000
heap
page read and write
4AB000
unkown
page readonly
3B59000
heap
page read and write
990000
trusted library allocation
page read and write
3DF4000
heap
page read and write
2CF8000
trusted library allocation
page read and write
3BA6000
heap
page read and write
2B24000
trusted library allocation
page read and write
6F00000
trusted library allocation
page execute and read and write
3E55000
heap
page read and write
3D86000
heap
page read and write
3D86000
heap
page read and write
83AA000
heap
page read and write
3E8B000
heap
page read and write
7320000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
5070000
heap
page execute and read and write
4AB000
unkown
page readonly
3E55000
heap
page read and write
3C70000
trusted library allocation
page read and write
389E000
stack
page read and write
3C19000
heap
page read and write
7070000
trusted library allocation
page read and write
3C19000
heap
page read and write
3C83000
heap
page read and write
3E49000
heap
page execute and read and write
4D6A000
stack
page read and write
5280000
heap
page read and write
3D0B000
trusted library allocation
page read and write
8FE000
stack
page read and write
3DEF000
heap
page read and write
2E2F000
stack
page read and write
8395000
heap
page read and write
3EA9000
heap
page read and write
3D12000
heap
page read and write
3DF4000
heap
page read and write
3D86000
heap
page read and write
685E000
stack
page read and write
3D73000
heap
page read and write
3DEF000
heap
page read and write
3E48000
heap
page read and write
2EDC000
trusted library allocation
page read and write
580000
heap
page read and write
3C88000
heap
page read and write
9C6000
heap
page read and write
3E55000
heap
page read and write
3D86000
heap
page read and write
2C85000
trusted library allocation
page read and write
3C88000
heap
page read and write
3BA5000
heap
page execute and read and write
5FA0000
heap
page read and write
3C83000
heap
page read and write
95A96FE000
stack
page read and write
8358000
heap
page read and write
3D73000
heap
page read and write
3E50000
heap
page read and write
3BFA000
heap
page read and write
C4E000
heap
page read and write
3DEF000
heap
page read and write
3DE7000
heap
page read and write
2BA8000
trusted library allocation
page read and write
3E8B000
heap
page execute and read and write
3E35000
trusted library allocation
page read and write
8AF000
stack
page read and write
1DE72A25000
heap
page read and write
A90000
heap
page read and write
2C36000
trusted library allocation
page read and write
3D12000
heap
page read and write
399D000
trusted library allocation
page read and write
3E48000
heap
page read and write
3A3E000
trusted library allocation
page read and write
3C19000
heap
page read and write
3D73000
heap
page read and write
8FE000
stack
page read and write
3D12000
heap
page read and write
3C88000
heap
page read and write
3C77000
trusted library allocation
page read and write
3FC3000
direct allocation
page read and write
7310000
trusted library allocation
page read and write
8FE000
stack
page read and write
3C83000
heap
page read and write
3DF4000
heap
page read and write
2BB0000
trusted library allocation
page read and write
3C63000
trusted library allocation
page read and write
9E0000
heap
page read and write
611E000
stack
page read and write
49AE000
stack
page read and write
145000
heap
page read and write
482000
unkown
page readonly
53FE000
stack
page read and write
8841000
heap
page read and write
95A99FE000
stack
page read and write
3C19000
heap
page read and write
95A9BFD000
stack
page read and write
2F4C000
trusted library allocation
page read and write
3DE7000
heap
page read and write
2E10000
heap
page read and write
B65000
heap
page read and write
3EA0000
direct allocation
page read and write
2FBD000
heap
page read and write
3FC0000
direct allocation
page read and write
394D000
trusted library allocation
page read and write
3D86000
heap
page read and write
3C19000
heap
page read and write
3C88000
heap
page read and write
3C19000
heap
page read and write
5FB0000
heap
page read and write
3BFB000
trusted library allocation
page read and write
3C83000
heap
page read and write
3FF0000
direct allocation
page read and write
3971000
trusted library allocation
page read and write
D0E000
stack
page read and write
3C19000
heap
page read and write
26C0000
trusted library allocation
page read and write
3C19000
heap
page read and write
28D0000
heap
page execute and read and write
5410000
trusted library allocation
page execute and read and write
3DEF000
heap
page read and write
162E000
stack
page read and write
575000
heap
page read and write
A10000
heap
page read and write
3C83000
heap
page read and write
3BA6000
heap
page read and write
3D73000
heap
page read and write
3D86000
heap
page read and write
401000
unkown
page execute read
3CE2000
heap
page read and write
3C19000
heap
page read and write
3DF4000
heap
page read and write
3C19000
heap
page read and write
938000
stack
page read and write
3E50000
heap
page read and write
3FC0000
direct allocation
page read and write
3DC9000
heap
page read and write
3EA0000
direct allocation
page read and write
3DEF000
heap
page read and write
3D86000
heap
page read and write
3D06000
trusted library allocation
page read and write
40ED000
direct allocation
page read and write
3E55000
heap
page read and write
3DE7000
heap
page read and write
3D86000
heap
page read and write
3C37000
trusted library allocation
page read and write
3DF4000
heap
page read and write
3000000
heap
page read and write
3DF4000
heap
page read and write
3DEF000
heap
page read and write
3B4F000
stack
page read and write
3BA6000
heap
page read and write
2E60000
trusted library allocation
page read and write
3E55000
heap
page read and write
3DE7000
heap
page read and write
4A7000
unkown
page read and write
40A000
system
page execute and read and write
3C83000
heap
page read and write
4169000
direct allocation
page read and write
89F000
stack
page read and write
95A94FA000
stack
page read and write
3D33000
trusted library allocation
page read and write
3D12000
heap
page read and write
44CE000
stack
page read and write
26B0000
trusted library allocation
page execute and read and write
3DF4000
heap
page read and write
4FB2000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
3C83000
heap
page read and write
9A000
stack
page read and write
3BA6000
heap
page read and write
3D73000
heap
page read and write
3E50000
heap
page read and write
2D6C000
trusted library allocation
page read and write
3E55000
heap
page read and write
3D86000
heap
page read and write
3D23000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
3DE7000
heap
page read and write
9BE000
stack
page read and write
1DE729F8000
heap
page read and write
2DE3000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
3DF4000
heap
page read and write
4A9E000
stack
page read and write
6E40000
trusted library allocation
page read and write
671E000
stack
page read and write
490000
unkown
page write copy
1DE72A88000
heap
page read and write
3005000
heap
page read and write
3DE4000
trusted library allocation
page read and write
9C0000
heap
page read and write
3BB2000
trusted library allocation
page read and write
3CCF000
trusted library allocation
page read and write
40ED000
direct allocation
page read and write
3B2F000
stack
page read and write
3DE7000
heap
page read and write
6DAE000
trusted library allocation
page read and write
3DF2000
trusted library allocation
page read and write
3E50000
heap
page read and write
3BBA000
trusted library allocation
page read and write
482000
unkown
page readonly
8BF000
stack
page read and write
3E55000
heap
page read and write
3DE7000
heap
page read and write
3BA6000
heap
page read and write
415E000
direct allocation
page read and write
3E50000
heap
page read and write
3E90000
heap
page read and write
3D86000
heap
page read and write
1CE000
stack
page read and write
3989000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
496E000
stack
page read and write
8366000
heap
page read and write
3DE7000
heap
page read and write
3E55000
heap
page read and write
3BA6000
heap
page read and write
3C88000
heap
page read and write
695E000
stack
page read and write
3D12000
heap
page read and write
3C88000
heap
page read and write
4169000
direct allocation
page read and write
4AB000
unkown
page readonly
3BA6000
heap
page read and write
920000
trusted library allocation
page read and write
395B000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
18E000
stack
page read and write
AC9000
heap
page read and write
3DEF000
heap
page read and write
3E55000
heap
page read and write
3D2D000
trusted library allocation
page read and write
3DF4000
heap
page read and write
3E50000
heap
page read and write
3DE7000
heap
page read and write
4ADE000
stack
page read and write
40E9000
direct allocation
page read and write
3C88000
heap
page read and write
3C19000
heap
page read and write
3DF4000
heap
page read and write
3E50000
heap
page read and write
40ED000
direct allocation
page read and write
2BFC000
trusted library allocation
page read and write
3BA6000
heap
page read and write
4DC0000
trusted library allocation
page read and write
490000
unkown
page read and write
3E50000
heap
page read and write
3084000
heap
page read and write
4A7000
unkown
page read and write
3E55000
heap
page read and write
A2E000
stack
page read and write
3D12000
heap
page read and write
3D12000
heap
page read and write
3DCE000
trusted library allocation
page read and write
1660000
heap
page read and write
3DFD000
trusted library allocation
page read and write
3150000
heap
page read and write
3C19000
heap
page read and write
3D12000
heap
page read and write
60D2000
heap
page read and write
3D12000
heap
page read and write
4040000
direct allocation
page read and write
4FAD000
trusted library allocation
page read and write
A00000
heap
page read and write
8AF000
stack
page read and write
110000
heap
page read and write
3DE7000
heap
page read and write
6A97000
stack
page read and write
3E50000
heap
page read and write
27EE000
stack
page read and write
3BE5000
trusted library allocation
page read and write
3D86000
heap
page read and write
3A19000
trusted library allocation
page read and write
3D86000
heap
page read and write
2F35000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
3E50000
heap
page read and write
401000
unkown
page execute read
2C72000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3D86000
heap
page read and write
3CC4000
trusted library allocation
page read and write
4DAE000
stack
page read and write
A5E000
heap
page read and write
415E000
direct allocation
page read and write
2B98000
trusted library allocation
page read and write
95A9CFE000
stack
page read and write
3E50000
heap
page read and write
530000
system
page execute and read and write
482000
unkown
page readonly
3DE7000
heap
page read and write
3C88000
heap
page read and write
3E50000
heap
page read and write
3C19000
heap
page read and write
3C19000
heap
page read and write
943000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
D95000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
62A000
heap
page read and write
73FE000
stack
page read and write
833C000
heap
page read and write
3E50000
heap
page read and write
6DFE000
trusted library allocation
page read and write
3A5E000
trusted library allocation
page read and write
3E50000
heap
page read and write
3E20000
direct allocation
page read and write
3E50000
heap
page read and write
416D000
direct allocation
page read and write
3C83000
heap
page read and write
6D91000
trusted library allocation
page read and write
3D86000
heap
page read and write
D6D000
trusted library allocation
page execute and read and write
5FD0000
heap
page read and write
3DE7000
heap
page read and write
3DE7000
heap
page read and write
977000
trusted library allocation
page execute and read and write
9CE000
stack
page read and write
3D86000
heap
page read and write
DC7000
heap
page read and write
4169000
direct allocation
page read and write
3990000
trusted library allocation
page read and write
394B000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
D9B000
trusted library allocation
page execute and read and write
3E50000
heap
page read and write
3C8B000
trusted library allocation
page read and write
95A9DFE000
stack
page read and write
2E28000
heap
page read and write
3FC3000
direct allocation
page read and write
3D86000
heap
page read and write
39E4000
trusted library allocation
page read and write
15EE000
stack
page read and write
415E000
direct allocation
page read and write
3D12000
heap
page read and write
3B7F000
trusted library allocation
page read and write
3C83000
heap
page read and write
3DE7000
heap
page read and write
3EA9000
heap
page read and write
3E50000
heap
page read and write
5F8000
heap
page read and write
3C88000
heap
page read and write
3B30000
heap
page read and write
93E000
stack
page read and write
D92000
trusted library allocation
page read and write
3D73000
heap
page read and write
A14000
heap
page read and write
2FE0000
heap
page read and write
100000
heap
page read and write
1E0000
heap
page read and write
3FC3000
direct allocation
page read and write
3C19000
heap
page read and write
3E50000
heap
page read and write
3BF1000
trusted library allocation
page read and write
3D73000
heap
page read and write
3DE7000
heap
page read and write
3F43000
direct allocation
page read and write
3C83000
heap
page read and write
3BA6000
heap
page read and write
7330000
trusted library allocation
page read and write
27F8000
trusted library allocation
page read and write
8AF000
stack
page read and write
3CDC000
trusted library allocation
page read and write
49DC000
stack
page read and write
3C84000
heap
page read and write
3C83000
heap
page read and write
3C58000
trusted library allocation
page read and write
3D12000
heap
page read and write
3C83000
heap
page read and write
3C88000
heap
page read and write
4DD3000
heap
page read and write
3A47000
trusted library allocation
page read and write
ABE000
heap
page read and write
B80000
heap
page read and write
8389000
heap
page read and write
3DF4000
heap
page read and write
2470000
trusted library allocation
page read and write
3E50000
heap
page read and write
3E27000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
3D73000
heap
page read and write
3E50000
heap
page read and write
C20000
direct allocation
page read and write
4BF0000
heap
page execute and read and write
2B38000
trusted library allocation
page read and write
3E7B000
heap
page read and write
3C4B000
trusted library allocation
page read and write
3BA6000
heap
page read and write
3E50000
heap
page read and write
3C19000
heap
page read and write
1DE729F0000
heap
page read and write
6E70000
trusted library allocation
page read and write
3E71000
heap
page read and write
3C19000
heap
page read and write
9D0000
heap
page read and write
53BE000
stack
page read and write
3E55000
heap
page read and write
3DEF000
heap
page read and write
3965000
trusted library allocation
page read and write
83F4000
heap
page read and write
140000
heap
page read and write
A45000
heap
page read and write
3C93000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
3D12000
heap
page read and write
6D8B000
trusted library allocation
page read and write
3C19000
heap
page read and write
400000
unkown
page readonly
2A37000
trusted library allocation
page read and write
3D12000
trusted library allocation
page read and write
3E1D000
trusted library allocation
page read and write
3D86000
heap
page read and write
3CE7000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
3BA6000
heap
page read and write
3C19000
heap
page read and write
416D000
direct allocation
page read and write
60E000
heap
page read and write
374E000
stack
page read and write
3E50000
heap
page read and write
D73000
trusted library allocation
page read and write
3C83000
heap
page read and write
3C83000
heap
page read and write
3D86000
heap
page read and write
3E50000
heap
page read and write
3E59000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
3E50000
heap
page read and write
3D86000
heap
page read and write
26AE000
stack
page read and write
731F000
trusted library allocation
page read and write
C76000
heap
page read and write
3A00000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3E50000
heap
page read and write
A6A000
heap
page read and write
7F630000
trusted library allocation
page execute and read and write
2B12000
trusted library allocation
page read and write
3E71000
heap
page read and write
3DF4000
heap
page read and write
570000
heap
page read and write
7370000
trusted library allocation
page read and write
3DEF000
heap
page read and write
4DFE000
stack
page read and write
56E1000
trusted library allocation
page read and write
7174000
trusted library allocation
page read and write
3D73000
heap
page read and write
3D73000
heap
page read and write
3D54000
trusted library allocation
page read and write
3E55000
heap
page read and write
3C83000
heap
page read and write
3D73000
heap
page read and write
3C19000
heap
page read and write
3DF4000
heap
page read and write
6022000
heap
page read and write
3D86000
heap
page read and write
3E0C000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
9A000
stack
page read and write
3CF3000
trusted library allocation
page read and write
3E55000
heap
page read and write
3DEF000
heap
page read and write
3C9F000
trusted library allocation
page read and write
3BFF000
trusted library allocation
page read and write
3C83000
heap
page read and write
83AF000
heap
page read and write
3DE7000
heap
page read and write
6C22000
trusted library section
page read and write
490000
unkown
page write copy
2F56000
trusted library allocation
page read and write
99E000
heap
page read and write
3C19000
heap
page read and write
2C0B000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
3C19000
heap
page read and write
8B4000
stack
page read and write
3DEF000
heap
page read and write
3D12000
heap
page read and write
3E50000
heap
page read and write
990000
heap
page read and write
3E50000
heap
page read and write
3C83000
heap
page read and write
3DE7000
heap
page read and write
143F000
stack
page read and write
8830000
heap
page read and write
3C83000
heap
page read and write
3D86000
heap
page read and write
45CE000
stack
page read and write
7169000
trusted library allocation
page read and write
41DE000
direct allocation
page read and write
3F43000
direct allocation
page read and write
5050000
trusted library allocation
page read and write
3D86000
heap
page read and write
3DEF000
heap
page read and write
3D73000
heap
page read and write
3DE7000
heap
page read and write
4040000
direct allocation
page read and write
3C88000
heap
page read and write
3C27000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
3EA0000
direct allocation
page read and write
3BA6000
heap
page read and write
C75000
heap
page read and write
3BEA000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3E2A000
trusted library allocation
page read and write
3DF4000
heap
page read and write
7020000
trusted library allocation
page read and write
72F2000
trusted library allocation
page read and write
3C88000
heap
page read and write
3BA6000
heap
page read and write
3D86000
heap
page read and write
3D73000
heap
page read and write
3C31000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
3E50000
heap
page read and write
3E60000
trusted library allocation
page read and write
8340000
heap
page read and write
7160000
trusted library allocation
page read and write
5279000
stack
page read and write
3D73000
heap
page read and write
41DE000
direct allocation
page read and write
3C88000
heap
page read and write
9DE000
heap
page read and write
3E20000
direct allocation
page read and write
4BEF000
stack
page read and write
118F000
stack
page read and write
3E50000
heap
page read and write
3D66000
trusted library allocation
page read and write
3E50000
heap
page read and write
6D7F000
stack
page read and write
3DE7000
heap
page read and write
2B27000
trusted library allocation
page read and write
1DE72BCE000
heap
page read and write
3D41000
heap
page read and write
61B000
heap
page read and write
3C19000
heap
page read and write
3D5A000
trusted library allocation
page read and write
3C83000
heap
page read and write
2A14000
trusted library allocation
page read and write
3D86000
heap
page read and write
2B63000
trusted library allocation
page read and write
9C5000
heap
page read and write
55BF000
stack
page read and write
635E000
stack
page read and write
3DEF000
heap
page read and write
3DF4000
heap
page read and write
9CE000
heap
page read and write
73B0000
trusted library allocation
page read and write
AC1000
heap
page read and write
3E50000
heap
page read and write
B2E000
heap
page read and write
3E19000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3E55000
heap
page read and write
3DF4000
heap
page read and write
3D86000
heap
page read and write
3E50000
heap
page read and write
3C83000
heap
page read and write
400000
unkown
page readonly
C4A000
heap
page read and write
3E50000
heap
page read and write
3EA9000
heap
page read and write
3E50000
heap
page read and write
3E55000
heap
page read and write
3D18000
trusted library allocation
page read and write
89F000
stack
page read and write
3E50000
heap
page read and write
2EC6000
trusted library allocation
page read and write
3DA2000
heap
page read and write
3DE7000
heap
page read and write
72F9000
trusted library allocation
page read and write
3DFF000
trusted library allocation
page read and write
3C19000
heap
page read and write
9CE000
stack
page read and write
3BA2000
trusted library allocation
page read and write
40E9000
direct allocation
page read and write
40E9000
direct allocation
page read and write
3B59000
heap
page read and write
2D97000
trusted library allocation
page read and write
6DB1000
trusted library allocation
page read and write
95A98FF000
stack
page read and write
3CD9000
trusted library allocation
page read and write
B70000
heap
page read and write
3C19000
heap
page read and write
2DE1000
trusted library allocation
page read and write
681C000
stack
page read and write
3C83000
heap
page read and write
3C83000
heap
page read and write
3E55000
heap
page read and write
3D86000
heap
page read and write
3E55000
heap
page read and write
3DEF000
heap
page read and write
3E50000
heap
page read and write
4F79000
stack
page read and write
4F8B000
trusted library allocation
page read and write
3A45000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
3DEF000
heap
page read and write
83E8000
heap
page read and write
3C88000
heap
page read and write
65DC000
stack
page read and write
8334000
heap
page read and write
400000
unkown
page readonly
3D5F000
trusted library allocation
page read and write
3C83000
heap
page read and write
3DEF000
heap
page read and write
95A9AF8000
stack
page read and write
3DEF000
heap
page read and write
3FC0000
direct allocation
page read and write
7140000
trusted library allocation
page execute and read and write
3E50000
heap
page read and write
3DEF000
heap
page read and write
38E1000
trusted library allocation
page read and write
5CE000
stack
page read and write
482000
unkown
page readonly
3C19000
heap
page read and write
60D5000
heap
page read and write
3FC3000
direct allocation
page read and write
39B2000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
3DF4000
heap
page read and write
3D86000
heap
page read and write
3DE7000
heap
page read and write
DC0000
heap
page read and write
95A95FF000
stack
page read and write
3BFA000
heap
page read and write
128F000
stack
page read and write
2D32000
trusted library allocation
page read and write
3F43000
direct allocation
page read and write
62DE000
stack
page read and write
3D86000
heap
page read and write
6E90000
trusted library allocation
page execute and read and write
40ED000
direct allocation
page read and write
3E7B000
heap
page read and write
2F63000
heap
page read and write
3E13000
trusted library allocation
page read and write
3EA0000
direct allocation
page read and write
3E8C000
heap
page read and write
401000
unkown
page execute read
3EA9000
heap
page read and write
2D77000
trusted library allocation
page read and write
26E0000
heap
page read and write
3DEF000
heap
page read and write
41DE000
direct allocation
page read and write
39AF000
trusted library allocation
page read and write
1F0000
heap
page read and write
9CE000
heap
page read and write
3BA6000
heap
page read and write
72EE000
stack
page read and write
158E000
stack
page read and write
2E52000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
6ADE000
stack
page read and write
3C19000
heap
page read and write
3D12000
heap
page read and write
2CDF000
trusted library allocation
page read and write
3C88000
heap
page read and write
416D000
direct allocation
page read and write
2F74000
heap
page read and write
3D86000
heap
page read and write
3C19000
heap
page read and write
4169000
direct allocation
page read and write
631E000
stack
page read and write
2C62000
trusted library allocation
page read and write
400000
unkown
page readonly
3D12000
heap
page read and write
3D12000
heap
page read and write
3E50000
heap
page read and write
7340000
trusted library allocation
page execute and read and write
3C88000
heap
page read and write
3EA0000
direct allocation
page read and write
3E65000
trusted library allocation
page read and write
3D03000
heap
page read and write
A40000
heap
page read and write
4FA6000
trusted library allocation
page read and write
3C19000
heap
page read and write
A48000
heap
page read and write
2B96000
trusted library allocation
page read and write
3BA6000
heap
page read and write
38F1000
trusted library allocation
page read and write
3DE7000
heap
page read and write
71CE000
stack
page read and write
3DEF000
heap
page read and write
3491000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
3E50000
heap
page read and write
3DE7000
heap
page read and write
39C5000
trusted library allocation
page read and write
3DEF000
heap
page read and write
659D000
stack
page read and write
517D000
stack
page read and write
504E000
stack
page read and write
482000
unkown
page readonly
56D0000
heap
page read and write
6DF0000
trusted library allocation
page read and write
3996000
trusted library allocation
page read and write
3DEF000
heap
page read and write
2B33000
trusted library allocation
page read and write
3C88000
heap
page read and write
9DE000
stack
page read and write
3D73000
heap
page read and write
3E71000
heap
page read and write
3D86000
heap
page read and write
7170000
trusted library allocation
page read and write
A98000
heap
page read and write
3DEF000
heap
page read and write
3D86000
heap
page read and write
2B2A000
trusted library allocation
page read and write
8849000
heap
page read and write
3DEF000
heap
page read and write
3E50000
heap
page read and write
3E40000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3C83000
heap
page read and write
6DE1000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
3C83000
heap
page read and write
97B000
trusted library allocation
page execute and read and write
3C19000
heap
page read and write
2F20000
heap
page read and write
3C19000
heap
page read and write
1DE72910000
heap
page read and write
6C35000
trusted library allocation
page read and write
3D86000
heap
page read and write
3DE7000
heap
page read and write
9D7000
heap
page read and write
3C19000
heap
page read and write
3ED1000
heap
page read and write
3BDE000
trusted library allocation
page read and write
3DA1000
heap
page read and write
2491000
trusted library allocation
page read and write
A75000
heap
page read and write
2E54000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
3DE7000
heap
page read and write
4F9E000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
8B4000
stack
page read and write
3DEF000
heap
page read and write
ACB000
heap
page read and write
416D000
direct allocation
page read and write
3DF0000
heap
page read and write
3D73000
heap
page read and write
3E2D000
trusted library allocation
page read and write
3E55000
heap
page read and write
9D0000
heap
page read and write
3CBE000
trusted library allocation
page read and write
3C19000
heap
page read and write
3D12000
heap
page read and write
3BA9000
heap
page read and write
5D0000
heap
page read and write
3D86000
heap
page read and write
3E50000
heap
page read and write
2B35000
trusted library allocation
page read and write
629E000
stack
page read and write
3DF4000
heap
page read and write
71DD000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3D86000
heap
page read and write
4D20000
trusted library allocation
page read and write
920000
heap
page read and write
3CA0000
heap
page read and write
2CD1000
trusted library allocation
page read and write
3909000
trusted library allocation
page read and write
39D8000
trusted library allocation
page read and write
1DE72BCC000
heap
page read and write
3D73000
heap
page read and write
AC9000
heap
page read and write
3FC3000
direct allocation
page read and write
AC2000
heap
page read and write
7150000
trusted library allocation
page read and write
3A4F000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3E51000
heap
page read and write
3C83000
heap
page read and write
3D86000
heap
page read and write
3D66000
heap
page read and write
3DE7000
heap
page read and write
3DE7000
heap
page read and write
3C19000
heap
page read and write
B16000
heap
page read and write
2BBB000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3F43000
direct allocation
page read and write
3DEF000
heap
page read and write
4AE0000
heap
page read and write
3C83000
heap
page read and write
130000
heap
page read and write
6DD0000
trusted library allocation
page read and write
614000
heap
page read and write
3DEF000
heap
page read and write
1DE72BC0000
heap
page read and write
3A31000
trusted library allocation
page read and write
3BA6000
heap
page read and write
110000
heap
page read and write
3D00000
heap
page read and write
3D73000
heap
page read and write
7380000
trusted library allocation
page execute and read and write
3E50000
heap
page read and write
3D00000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3CCB000
trusted library allocation
page read and write
D86000
trusted library allocation
page execute and read and write
7040000
trusted library allocation
page execute and read and write
3DF4000
heap
page read and write
3BD8000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
5710000
trusted library allocation
page execute and read and write
3901000
trusted library allocation
page read and write
3E50000
heap
page read and write
3E55000
heap
page read and write
6C3A000
trusted library allocation
page read and write
3D86000
heap
page read and write
2F80000
heap
page read and write
3DE7000
heap
page read and write
3E07000
trusted library allocation
page read and write
5DDE000
stack
page read and write
3DE7000
heap
page read and write
3E48000
heap
page read and write
183E000
stack
page read and write
3DEF000
heap
page read and write
3E71000
heap
page read and write
3F43000
direct allocation
page read and write
4DD0000
heap
page read and write
7079000
trusted library allocation
page read and write
3C0C000
heap
page read and write
3BA6000
heap
page read and write
3DE7000
heap
page read and write
3D86000
heap
page read and write
3DEF000
heap
page read and write
3D86000
heap
page read and write
40ED000
direct allocation
page read and write
397E000
trusted library allocation
page read and write
3DEF000
heap
page read and write
2C0E000
trusted library allocation
page read and write
A1E000
stack
page read and write
3C19000
heap
page read and write
3D7F000
trusted library allocation
page read and write
3DE7000
heap
page read and write
2B56000
trusted library allocation
page read and write
3DE7000
heap
page read and write
3DE7000
heap
page read and write
3DEF000
heap
page read and write
There are 1246 hidden memdumps, click here to show them.