IOC Report
PO-Zam#U00f3wienie zakupu-8837837849-pl-.exe

loading gif

Files

File Path
Type
Category
Malicious
PO-Zam#U00f3wienie zakupu-8837837849-pl-.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\FieldNames.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\FieldNames.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FieldNames.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\LogfirebirdULzauCAPrOnmUabaculus
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\WebData
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO-Zam#U00f3wienie zakupu-8837837849-pl-.exe
"C:\Users\user\Desktop\PO-Zam#U00f3wienie zakupu-8837837849-pl-.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FieldNames.vbs"
malicious
C:\Users\user\AppData\Roaming\FieldNames.exe
"C:\Users\user\AppData\Roaming\FieldNames.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
http://showip.net/dF
unknown
http://showip.net/#(
unknown
http://127.0.0.1:
unknown
https://erkasera.com
unknown
https://fundingchoicesmessages.google.com/i/pub-8790158038613050?ers=1
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://showip.net/X
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://showip.neta
unknown
http://showip.net#
unknown
http://showip.netF
unknown
https://github.com/mgravell/protobuf-net
unknown
http://showip.net/%Y
unknown
https://erkasera.com/ruurew/Cwfuvfaf.wav1B4MrP3veGRoRMM0tnPgU/Q==
unknown
https://erkasera.com/ruurew/Cwfuvfaf.wav
188.132.193.46
http://showip.net/;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://showip.net/h
unknown
http://showip.net/
unknown
http://showip.net
unknown
http://showip.netth
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
showip.net
162.55.60.2
erkasera.com
188.132.193.46

IPs

IP
Domain
Country
Malicious
188.132.193.46
erkasera.com
Turkey
162.55.60.2
showip.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO-Zam#U00f3wienie zakupu-8837837849-pl-_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FieldNames_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4018000
trusted library allocation
page read and write
malicious
401000
remote allocation
page execute and read and write
malicious
30AC000
trusted library allocation
page read and write
malicious
412F000
trusted library allocation
page read and write
malicious
44D7000
trusted library allocation
page read and write
malicious
4227000
trusted library allocation
page read and write
malicious
2E9C000
trusted library allocation
page read and write
malicious
45DF000
trusted library allocation
page read and write
malicious
6D80000
trusted library section
page read and write
malicious
36ED000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
1188000
heap
page read and write
2600000
heap
page read and write
2F84000
trusted library allocation
page read and write
69B0000
trusted library allocation
page execute and read and write
17F4AB70000
heap
page read and write
3183000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
2570000
heap
page read and write
36A7000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
61AD000
stack
page read and write
F65000
heap
page read and write
331A000
trusted library allocation
page read and write
41D000
remote allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
910000
heap
page read and write
348A000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
674D000
stack
page read and write
139B000
trusted library allocation
page execute and read and write
6B50000
trusted library allocation
page read and write
33A4000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
31E7000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
36E9000
trusted library allocation
page read and write
34C4000
trusted library allocation
page read and write
612E000
stack
page read and write
31E2000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
424000
remote allocation
page execute and read and write
426000
remote allocation
page execute and read and write
470A000
trusted library allocation
page read and write
34BC000
trusted library allocation
page read and write
1145000
heap
page read and write
30FB000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
5F80000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
321A000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
3437000
trusted library allocation
page read and write
5C9E000
stack
page read and write
3221000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
5510000
heap
page execute and read and write
31CC000
trusted library allocation
page read and write
41E9000
trusted library allocation
page read and write
2EBE000
stack
page read and write
2E40000
heap
page read and write
1282000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
459000
remote allocation
page execute and read and write
31C5000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
3496000
trusted library allocation
page read and write
33A8000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
B3A000
stack
page read and write
3263000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
3204000
trusted library allocation
page read and write
A5C000
heap
page read and write
68C0000
heap
page read and write
33D5000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
10CE000
stack
page read and write
340D000
trusted library allocation
page read and write
58DF000
stack
page read and write
3206000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
5B1E000
stack
page read and write
600E000
stack
page read and write
1370000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
7700000
heap
page read and write
304D000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
362C000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
652C000
stack
page read and write
A48000
heap
page read and write
3337000
trusted library allocation
page read and write
6B45000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
3706000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
6690000
heap
page read and write
422000
remote allocation
page execute and read and write
54F0000
trusted library allocation
page read and write
565F000
stack
page read and write
321B000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
6965000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
6725000
heap
page read and write
591D000
stack
page read and write
6DAE000
stack
page read and write
3374000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
32CF000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
6CB0000
trusted library section
page read and write
3051000
trusted library allocation
page read and write
333E000
trusted library allocation
page read and write
3066000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
116A000
heap
page read and write
349E000
trusted library allocation
page read and write
35CF000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
59B000
stack
page read and write
1364000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
2FDB000
trusted library allocation
page read and write
1230000
heap
page read and write
31BA000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
3546000
trusted library allocation
page read and write
3529000
trusted library allocation
page read and write
138A000
trusted library allocation
page execute and read and write
35D3000
trusted library allocation
page read and write
45A000
remote allocation
page execute and read and write
32F3000
trusted library allocation
page read and write
3354000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
34E5000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
4659000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
D37000
heap
page read and write
13F7000
heap
page read and write
3744000
trusted library allocation
page read and write
63CE000
stack
page read and write
3780000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
49D579A000
stack
page read and write
3454000
trusted library allocation
page read and write
15E0000
trusted library allocation
page execute and read and write
6975000
trusted library allocation
page read and write
3108000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
5F0000
heap
page read and write
561E000
stack
page read and write
3149000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
54ED000
stack
page read and write
31AA000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
45C000
remote allocation
page execute and read and write
5B9D000
stack
page read and write
C70000
heap
page read and write
2FA1000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
35FF000
stack
page read and write
6E70000
trusted library allocation
page execute and read and write
673B000
heap
page read and write
3662000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
376E000
stack
page read and write
321D000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
13C0000
trusted library allocation
page execute and read and write
3452000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page read and write
34D3000
trusted library allocation
page read and write
5F6E000
stack
page read and write
3308000
trusted library allocation
page read and write
622E000
stack
page read and write
6C02000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
34CC000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
DA7000
heap
page read and write
31FD000
trusted library allocation
page read and write
350A000
trusted library allocation
page read and write
A95000
heap
page read and write
35C5000
trusted library allocation
page read and write
F37000
stack
page read and write
355B000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
5A1D000
stack
page read and write
55B0000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
45B000
remote allocation
page execute and read and write
1180000
heap
page read and write
2F8C000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
2F50000
heap
page read and write
3236000
trusted library allocation
page read and write
322C000
stack
page read and write
3346000
trusted library allocation
page read and write
457000
remote allocation
page execute and read and write
3752000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
1087000
heap
page read and write
3502000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
2E1C000
stack
page read and write
666E000
stack
page read and write
34B1000
trusted library allocation
page read and write
3674000
heap
page read and write
3708000
trusted library allocation
page read and write
D0F000
heap
page read and write
3257000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
3763000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
31B0000
heap
page read and write
30D2000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
362A000
trusted library allocation
page read and write
5D9F000
stack
page read and write
307F000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
376B000
trusted library allocation
page read and write
3198000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
49D62FE000
stack
page read and write
6B85000
trusted library allocation
page read and write
17F4ABDA000
heap
page read and write
1189000
heap
page read and write
364C000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
1118000
heap
page read and write
4561000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page execute and read and write
354A000
trusted library allocation
page read and write
2FF8000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
5F2C000
stack
page read and write
2F3E000
stack
page read and write
32A8000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
36F1000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
CB1000
heap
page read and write
2577000
heap
page read and write
3702000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
34EB000
trusted library allocation
page read and write
370E000
trusted library allocation
page read and write
31F7000
trusted library allocation
page read and write
D70000
heap
page read and write
3064000
trusted library allocation
page read and write
355F000
trusted library allocation
page read and write
130E000
stack
page read and write
F60000
heap
page read and write
43CF000
trusted library allocation
page read and write
419B000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
2FFA000
trusted library allocation
page read and write
DED000
stack
page read and write
30B9000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
1610000
heap
page read and write
313C000
trusted library allocation
page read and write
17F4AC6C000
heap
page read and write
33C1000
trusted library allocation
page read and write
27E0000
heap
page read and write
33AC000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
35EA000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
5A5E000
stack
page read and write
3102000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
54AE000
stack
page read and write
3322000
trusted library allocation
page read and write
1363000
trusted library allocation
page execute and read and write
3371000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
374C000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
4FED000
stack
page read and write
CC4000
heap
page read and write
428000
remote allocation
page execute and read and write
313A000
trusted library allocation
page read and write
3352000
trusted library allocation
page read and write
455000
remote allocation
page execute and read and write
3049000
trusted library allocation
page read and write
45D9000
trusted library allocation
page read and write
3206000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
3FB9000
trusted library allocation
page read and write
121A000
heap
page read and write
6B60000
trusted library allocation
page read and write
8FB000
stack
page read and write
31B9000
heap
page read and write
3232000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
10F7000
stack
page read and write
13D0000
trusted library allocation
page read and write
453000
remote allocation
page execute and read and write
31E0000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
374A000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
15DE000
stack
page read and write
12B0000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
458000
remote allocation
page execute and read and write
327E000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
36F6000
trusted library allocation
page read and write
312C000
trusted library allocation
page read and write
49D5EFF000
stack
page read and write
CC6000
heap
page read and write
33DE000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
A30000
heap
page read and write
33A2000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
34FD000
stack
page read and write
6C00000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
CBE000
heap
page read and write
30F7000
trusted library allocation
page read and write
670B000
heap
page read and write
F80000
heap
page read and write
2EFD000
stack
page read and write
30E1000
trusted library allocation
page read and write
C78000
unkown
page readonly
36B7000
trusted library allocation
page read and write
6C50000
trusted library allocation
page execute and read and write
31CA000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
4061000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
575E000
stack
page read and write
32A4000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
1292000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
436000
remote allocation
page execute and read and write
3544000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
C30000
trusted library allocation
page execute read
361C000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
C8C000
heap
page read and write
34C0000
trusted library allocation
page read and write
136D000
trusted library allocation
page execute and read and write
338C000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
36D8000
trusted library allocation
page read and write
571E000
stack
page read and write
376E000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
365E000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
3458000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
2F00000
heap
page read and write
36B5000
trusted library allocation
page read and write
C70000
unkown
page readonly
3216000
trusted library allocation
page read and write
34CE000
trusted library allocation
page read and write
3637000
trusted library allocation
page read and write
1080000
heap
page read and write
614E000
stack
page read and write
3494000
trusted library allocation
page read and write
3492000
trusted library allocation
page read and write
13E0000
heap
page execute and read and write
A92000
heap
page read and write
2830000
heap
page read and write
32B5000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
444C000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
17F4ABB0000
heap
page read and write
642C000
stack
page read and write
3009000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page execute and read and write
2FA7000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
149E000
stack
page read and write
33E6000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
3072000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
D17000
heap
page read and write
3202000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
336E000
stack
page read and write
31F4000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
3660000
heap
page read and write
41A000
remote allocation
page execute and read and write
33D7000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
AD8000
heap
page read and write
32AA000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
3028000
trusted library allocation
page read and write
1617000
heap
page read and write
B16000
heap
page read and write
1260000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
127D000
trusted library allocation
page execute and read and write
2F8A000
trusted library allocation
page read and write
5B5E000
stack
page read and write
305F000
stack
page read and write
30F1000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
17F4ABB8000
heap
page read and write
43C7000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
515E000
stack
page read and write
307D000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
31A8000
trusted library allocation
page read and write
49D5AFE000
stack
page read and write
321E000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
35F3000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
6C32000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
3ECF000
trusted library allocation
page read and write
69DD000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
49D64FB000
stack
page read and write
2573000
heap
page read and write
31AD000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
32B3000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
4681000
trusted library allocation
page read and write
38D0000
heap
page read and write
1110000
heap
page read and write
3194000
trusted library allocation
page read and write
421000
remote allocation
page execute and read and write
30A2000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
6BF9000
trusted library allocation
page read and write
33AF000
stack
page read and write
360F000
trusted library allocation
page read and write
74C0000
trusted library allocation
page execute and read and write
35EE000
trusted library allocation
page read and write
2E70000
heap
page read and write
35D8000
trusted library allocation
page read and write
64CE000
stack
page read and write
30C4000
trusted library allocation
page read and write
120E000
heap
page read and write
302C000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
B04000
heap
page read and write
30B5000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
2810000
heap
page read and write
3296000
trusted library allocation
page read and write
1060000
heap
page read and write
307B000
trusted library allocation
page read and write
2DDE000
stack
page read and write
1360000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
3357000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
D80000
heap
page read and write
5F5000
heap
page read and write
2CDE000
stack
page read and write
340F000
trusted library allocation
page read and write
6723000
heap
page read and write
30D0000
trusted library allocation
page read and write
137D000
trusted library allocation
page execute and read and write
289E000
stack
page read and write
339F000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
5A1E000
stack
page read and write
1350000
trusted library allocation
page read and write
342C000
trusted library allocation
page read and write
2540000
trusted library allocation
page execute read
6BD0000
trusted library allocation
page execute and read and write
425000
remote allocation
page execute and read and write
3456000
trusted library allocation
page read and write
36CC000
trusted library allocation
page read and write
6C36000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
372F000
stack
page read and write
3172000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
559E000
stack
page read and write
303D000
stack
page read and write
36EB000
trusted library allocation
page read and write
17F4ABE5000
heap
page read and write
546E000
stack
page read and write
33DC000
trusted library allocation
page read and write
309C000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
5D7E000
stack
page read and write
AC1000
heap
page read and write
11A2000
heap
page read and write
129B000
trusted library allocation
page execute and read and write
6970000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
33A6000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
6B0D000
trusted library allocation
page read and write
17F4AD25000
heap
page read and write
303B000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
1386000
trusted library allocation
page execute and read and write
339D000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
3619000
trusted library allocation
page read and write
D47000
heap
page read and write
6950000
trusted library allocation
page read and write
66B2000
heap
page read and write
3331000
trusted library allocation
page read and write
3405000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
3617000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
664E000
stack
page read and write
423000
remote allocation
page execute and read and write
3200000
trusted library allocation
page read and write
2F30000
heap
page read and write
33B1000
trusted library allocation
page read and write
6705000
heap
page read and write
3088000
trusted library allocation
page read and write
57DD000
stack
page read and write
2FEE000
trusted library allocation
page read and write
34C6000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
6680000
heap
page read and write
DA0000
heap
page read and write
12C0000
heap
page read and write
4068000
trusted library allocation
page read and write
34F0000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
119C000
heap
page read and write
33CF000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
334C000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
2850000
heap
page read and write
3367000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
122E000
heap
page read and write
370C000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
1160000
heap
page read and write
3403000
trusted library allocation
page read and write
367B000
trusted library allocation
page read and write
35B8000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
3070000
heap
page read and write
C72000
unkown
page readonly
32FF000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
30C8000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
36E7000
trusted library allocation
page read and write
36D0000
trusted library allocation
page read and write
47E9000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
3055000
trusted library allocation
page read and write
48E1000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
628D000
stack
page read and write
3163000
trusted library allocation
page read and write
159F000
stack
page read and write
316E000
trusted library allocation
page read and write
36D4000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
56DF000
stack
page read and write
34ED000
trusted library allocation
page read and write
35B4000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
36A4000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
55D0000
heap
page execute and read and write
49D63FE000
stack
page read and write
32FD000
trusted library allocation
page read and write
6930000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
25D0000
heap
page read and write
352B000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
345C000
trusted library allocation
page read and write
3664000
trusted library allocation
page read and write
31FE000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
49D5BFE000
stack
page read and write
318E000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
E3C000
stack
page read and write
31AF000
trusted library allocation
page read and write
1151000
heap
page read and write
353E000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
34AC000
stack
page read and write
33DA000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
49D60FE000
stack
page read and write
33AE000
stack
page read and write
2FF4000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
461F000
trusted library allocation
page read and write
33BF000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
362E000
stack
page read and write
326E000
stack
page read and write
C40000
heap
page read and write
33E6000
trusted library allocation
page read and write
3443000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
324B000
trusted library allocation
page read and write
D0C000
stack
page read and write
2F75000
trusted library allocation
page read and write
36CA000
trusted library allocation
page read and write
60EE000
stack
page read and write
327A000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
3668000
trusted library allocation
page read and write
17F4AC12000
heap
page read and write
36B9000
trusted library allocation
page read and write
5E2D000
stack
page read and write
1263000
trusted library allocation
page execute and read and write
660C000
stack
page read and write
11CA000
heap
page read and write
3E51000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
339B000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
69CB000
trusted library allocation
page read and write
35CD000
trusted library allocation
page read and write
35EE000
stack
page read and write
3E58000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
67AE000
stack
page read and write
36E3000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
34F2000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
2FDE000
trusted library allocation
page read and write
5C5E000
stack
page read and write
3359000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
74E0000
heap
page read and write
30F9000
trusted library allocation
page read and write
110E000
stack
page read and write
34D8000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
126D000
trusted library allocation
page execute and read and write
2F97000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
6760000
heap
page read and write
3218000
trusted library allocation
page read and write
4085000
trusted library allocation
page read and write
63ED000
stack
page read and write
320D000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
1297000
trusted library allocation
page execute and read and write
B28000
heap
page read and write
305A000
trusted library allocation
page read and write
35E8000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
62AD000
stack
page read and write
315B000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
A3B000
stack
page read and write
6FD0000
trusted library section
page read and write
4744000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
604E000
stack
page read and write
1280000
trusted library allocation
page read and write
3681000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
31FA000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
6C07000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
3024000
trusted library allocation
page read and write
D5D000
heap
page read and write
694A000
heap
page read and write
33F0000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
6932000
heap
page read and write
113E000
stack
page read and write
2F82000
trusted library allocation
page read and write
440E000
trusted library allocation
page read and write
369E000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
76E0000
trusted library allocation
page execute and read and write
309A000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
30DF000
trusted library allocation
page read and write
2813000
heap
page read and write
2FC0000
trusted library allocation
page read and write
11DF000
heap
page read and write
1150000
trusted library allocation
page read and write
34AF000
stack
page read and write
3405000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
3214000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
25C0000
heap
page read and write
35B6000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
371F000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
3080000
heap
page read and write
36D6000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
17F4C600000
heap
page read and write
2FC2000
trusted library allocation
page read and write
3506000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
C00000
heap
page read and write
33CD000
trusted library allocation
page read and write
3EA7000
trusted library allocation
page read and write
6938000
heap
page read and write
2DFC000
stack
page read and write
1264000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
68AE000
stack
page read and write
3112000
trusted library allocation
page read and write
11F6000
heap
page read and write
334E000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
365C000
trusted library allocation
page read and write
5E7E000
stack
page read and write
17F4AB50000
heap
page read and write
33EA000
trusted library allocation
page read and write
5FEE000
stack
page read and write
33A6000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
3746000
trusted library allocation
page read and write
3611000
trusted library allocation
page read and write
A97000
heap
page read and write
1392000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
367F000
trusted library allocation
page read and write
638D000
stack
page read and write
31D8000
trusted library allocation
page read and write
1286000
trusted library allocation
page execute and read and write
2E51000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
35C9000
trusted library allocation
page read and write
AE4000
heap
page read and write
31E3000
trusted library allocation
page read and write
4E58000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
2FA9000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
5B5C000
stack
page read and write
30BD000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
6FCE000
stack
page read and write
6670000
heap
page read and write
69C0000
trusted library allocation
page read and write
3180000
heap
page read and write
32E2000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
17F4AD20000
heap
page read and write
2F39000
heap
page read and write
58DD000
stack
page read and write
3363000
trusted library allocation
page read and write
3615000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
1397000
trusted library allocation
page execute and read and write
31E5000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
2817000
heap
page read and write
3390000
trusted library allocation
page read and write
5F0E000
stack
page read and write
CF1000
heap
page read and write
6AE0000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
A81000
heap
page read and write
3090000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
11D6000
heap
page read and write
59DE000
stack
page read and write
6765000
heap
page read and write
315F000
trusted library allocation
page read and write
2FAC000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
536E000
stack
page read and write
3424000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
343D000
trusted library allocation
page read and write
6925000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
34E7000
trusted library allocation
page read and write
49D61FE000
stack
page read and write
650C000
stack
page read and write
2E50000
heap
page execute and read and write
656D000
stack
page read and write
3420000
trusted library allocation
page read and write
68ED000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
116E000
heap
page read and write
1310000
heap
page read and write
6750000
heap
page read and write
3488000
trusted library allocation
page read and write
312F000
stack
page read and write
31C7000
trusted library allocation
page read and write
C78000
heap
page read and write
33BE000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
CDC000
heap
page read and write
3388000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
14FF000
stack
page read and write
33BC000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
13F0000
heap
page read and write
34FC000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
2580000
heap
page read and write
111E000
heap
page read and write
454000
remote allocation
page execute and read and write
325B000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
5C9E000
stack
page read and write
36BD000
trusted library allocation
page read and write
6C9E000
stack
page read and write
34EE000
stack
page read and write
3144000
trusted library allocation
page read and write
35BF000
trusted library allocation
page read and write
17F4AA70000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
C45000
heap
page read and write
345A000
trusted library allocation
page read and write
3567000
trusted library allocation
page read and write
3178000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
34E1000
trusted library allocation
page read and write
6973000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
69C0000
trusted library section
page read and write
325F000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
128A000
trusted library allocation
page execute and read and write
310A000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
41B000
remote allocation
page execute and read and write
2E3E000
stack
page read and write
62ED000
stack
page read and write
2FF0000
trusted library allocation
page read and write
49D5DFF000
stack
page read and write
2610000
trusted library allocation
page read and write
2D50000
heap
page read and write
386F000
stack
page read and write
3769000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
28B0000
heap
page read and write
4589000
trusted library allocation
page read and write
There are 1016 hidden memdumps, click here to show them.