IOC Report
RFQ-B2M8938-MATERIALS&SPECIFICATIONS-PO893873.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps1510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
RFQ-B2M8938-MATERIALS&SPECIFICATIONS-PO893873.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\build.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hypopygidium.vbs
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Glagolitic
data
modified
C:\Users\user\AppData\Local\Temp\aut88D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD568.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autDA3A.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ-B2M8938-MATERIALS&SPECIFICATIONS-PO893873.exe
"C:\Users\user\Desktop\RFQ-B2M8938-MATERIALS&SPECIFICATIONS-PO893873.exe"
malicious
C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe
"C:\Users\user\Desktop\RFQ-B2M8938-MATERIALS&SPECIFICATIONS-PO893873.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\RFQ-B2M8938-MATERIALS&SPECIFICATIONS-PO893873.exe"
malicious
C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe
"C:\Users\user~1\AppData\Local\Temp\Origin_rawfile.exe"
malicious
C:\Users\user\AppData\Local\Temp\build.exe
"C:\Users\user~1\AppData\Local\Temp\build.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hypopygidium.vbs"
malicious
C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe
"C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe"
malicious
C:\Windows\System32\sppsvc.exe
C:\Windows\system32\sppsvc.exe

URLs

Name
IP
Malicious
204.10.161.147:7082
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://xma0.com
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xma0.com
51.195.65.154
malicious
mail.xma0.com
unknown
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
204.10.161.147
unknown
Canada
malicious
51.195.65.154
xma0.com
France
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
ServiceSessionId
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
8300000
trusted library section
page read and write
malicious
8000000
heap
page read and write
malicious
6B05000
trusted library allocation
page read and write
malicious
8050000
trusted library section
page read and write
malicious
502000
unkown
page readonly
malicious
5200000
heap
page read and write
malicious
8000000
trusted library section
page read and write
malicious
7E00000
trusted library section
page read and write
malicious
7E00000
heap
page read and write
malicious
6739000
trusted library allocation
page read and write
malicious
6841000
trusted library allocation
page read and write
malicious
28C1000
trusted library allocation
page read and write
malicious
962000
unkown
page readonly
malicious
69BF000
trusted library allocation
page read and write
malicious
5600000
heap
page read and write
malicious
2E26000
trusted library allocation
page read and write
malicious
6705000
trusted library allocation
page read and write
malicious
6C41000
trusted library allocation
page read and write
malicious
2FDB000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
12CB000
trusted library allocation
page read and write
7A6B000
stack
page read and write
8170000
trusted library allocation
page read and write
16FD000
heap
page execute and read and write
30CC000
heap
page read and write
80C0000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
1326C000
stack
page read and write
4013000
direct allocation
page read and write
719E000
stack
page read and write
70DE000
trusted library allocation
page read and write
861E000
stack
page read and write
3100000
heap
page read and write
39D8000
trusted library allocation
page read and write
105F000
heap
page read and write
82EE000
stack
page read and write
76A6000
heap
page read and write
F6E000
stack
page read and write
6FF0000
trusted library allocation
page read and write
7708000
trusted library allocation
page read and write
13A5000
heap
page read and write
3BD8000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
5B5B000
stack
page read and write
5B58000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
6E11000
heap
page read and write
115A000
trusted library allocation
page execute and read and write
3FF3000
direct allocation
page read and write
1436000
heap
page read and write
B87000
heap
page read and write
5093000
trusted library allocation
page execute and read and write
6FE0000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
509D000
trusted library allocation
page execute and read and write
6120000
heap
page read and write
7FB0000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
4E01000
heap
page read and write
4D7B000
trusted library allocation
page execute and read and write
1601000
heap
page read and write
3ED0000
direct allocation
page read and write
4D21000
trusted library allocation
page read and write
AD5D000
heap
page read and write
5301000
heap
page read and write
7F60000
trusted library allocation
page read and write
12A0000
heap
page read and write
7FD0000
trusted library allocation
page read and write
61AB000
heap
page read and write
6B01000
trusted library allocation
page read and write
85AD000
stack
page read and write
4070000
direct allocation
page read and write
22A41150000
heap
page read and write
7DF0000
trusted library allocation
page read and write
61BF000
heap
page read and write
3998000
trusted library allocation
page read and write
2460000
heap
page read and write
66BC000
stack
page read and write
400000
system
page execute and read and write
AC4000
unkown
page readonly
7FFC0C611000
unkown
page execute read
425D000
direct allocation
page read and write
6701000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
22A412C4000
heap
page read and write
40B3000
direct allocation
page read and write
83E9000
trusted library allocation
page read and write
5775000
trusted library allocation
page read and write
5242000
trusted library allocation
page read and write
101F000
stack
page read and write
A10000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
15F0000
heap
page read and write
DC0000
heap
page read and write
81B0000
trusted library allocation
page read and write
5751000
trusted library allocation
page read and write
8008000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
1167000
trusted library allocation
page execute and read and write
8130000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
4013000
direct allocation
page read and write
64BC000
stack
page read and write
B60000
heap
page read and write
22A41260000
heap
page read and write
F118CFE000
stack
page read and write
8110000
trusted library allocation
page read and write
2E02000
heap
page read and write
64D6000
trusted library allocation
page read and write
636D000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
920000
heap
page read and write
5230000
heap
page read and write
6B40000
trusted library allocation
page read and write
61D6000
heap
page read and write
81F0000
trusted library allocation
page execute and read and write
50A4000
trusted library allocation
page read and write
D7F000
unkown
page readonly
25D0000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
6FC3000
heap
page read and write
143E000
heap
page read and write
2F94000
trusted library allocation
page read and write
114D000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
302C000
heap
page read and write
8400000
trusted library allocation
page read and write
41B9000
direct allocation
page read and write
50CB000
trusted library allocation
page execute and read and write
307D000
heap
page read and write
427D000
direct allocation
page read and write
427D000
direct allocation
page read and write
80E0000
trusted library allocation
page read and write
6E41000
heap
page read and write
CF1000
unkown
page execute read
8004000
trusted library allocation
page read and write
3F7A000
heap
page read and write
22A412AF000
heap
page read and write
3485000
heap
page read and write
3317000
trusted library allocation
page read and write
3000000
heap
page read and write
DB7000
unkown
page readonly
CF1000
unkown
page execute read
169E000
heap
page execute and read and write
5B54000
trusted library allocation
page read and write
22A412B1000
heap
page read and write
8410000
trusted library allocation
page read and write
AD7000
unkown
page readonly
D7E000
stack
page read and write
A9F000
unkown
page readonly
ACE000
unkown
page write copy
8190000
trusted library allocation
page read and write
42CE000
direct allocation
page read and write
AC3A000
heap
page read and write
84C0000
trusted library allocation
page read and write
363E000
stack
page read and write
143D000
heap
page execute and read and write
7F80000
trusted library allocation
page read and write
2770000
trusted library allocation
page execute and read and write
AC24000
heap
page read and write
5770000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
81A0000
trusted library allocation
page read and write
8022000
trusted library allocation
page read and write
6DC5000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
3462000
heap
page read and write
E0E000
stack
page read and write
50C7000
trusted library allocation
page execute and read and write
12C4000
trusted library allocation
page read and write
788E000
stack
page read and write
82FF000
stack
page read and write
527A000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
1C0E000
stack
page read and write
3F90000
direct allocation
page read and write
121B000
stack
page read and write
5400000
heap
page read and write
3E10000
direct allocation
page read and write
6B3E000
stack
page read and write
39F8000
trusted library allocation
page read and write
63D0000
trusted library allocation
page execute and read and write
265E000
stack
page read and write
7F60000
trusted library allocation
page read and write
5270000
heap
page read and write
8721000
trusted library allocation
page read and write
F118AF9000
stack
page read and write
420E000
direct allocation
page read and write
13EF000
stack
page read and write
1696000
heap
page read and write
3E30000
heap
page read and write
763D000
stack
page read and write
3474000
heap
page read and write
ACFA000
heap
page read and write
50AD000
trusted library allocation
page execute and read and write
25F2000
trusted library allocation
page read and write
54CE000
stack
page read and write
4B8000
system
page execute and read and write
AD2000
unkown
page write copy
AD7000
unkown
page readonly
83E0000
trusted library allocation
page read and write
120E000
stack
page read and write
3A09000
trusted library allocation
page read and write
B16000
heap
page read and write
7B3C000
stack
page read and write
25DD000
trusted library allocation
page execute and read and write
3400000
heap
page read and write
5BDC000
stack
page read and write
73C40000
unkown
page readonly
4DF0000
trusted library allocation
page execute and read and write
4090000
direct allocation
page read and write
1074000
heap
page read and write
3480000
heap
page read and write
A77000
heap
page read and write
16F3000
heap
page read and write
288E000
stack
page read and write
3328000
trusted library allocation
page read and write
4D6A000
trusted library allocation
page execute and read and write
22A412C4000
heap
page read and write
7FF6000
trusted library allocation
page read and write
6CB0000
heap
page read and write
3100000
heap
page read and write
4DA0000
heap
page execute and read and write
F1192FE000
stack
page read and write
2B28000
stack
page read and write
5739000
trusted library allocation
page read and write
3078000
stack
page read and write
81E0000
trusted library allocation
page read and write
1ECE000
stack
page read and write
3021000
heap
page read and write
2750000
heap
page read and write
5790000
trusted library allocation
page read and write
4199000
direct allocation
page read and write
73C5D000
unkown
page read and write
CDA000
stack
page read and write
7130000
trusted library allocation
page read and write
42EE000
direct allocation
page read and write
419D000
direct allocation
page read and write
3FB0000
direct allocation
page read and write
577B000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
7EA6000
trusted library allocation
page read and write
6870000
heap
page read and write
8480000
trusted library allocation
page read and write
6B43000
trusted library allocation
page read and write
F118BFE000
stack
page read and write
143D000
heap
page read and write
A30000
heap
page read and write
8019000
trusted library allocation
page read and write
137B000
heap
page read and write
A801000
heap
page read and write
4B8000
system
page execute and read and write
50C0000
trusted library allocation
page read and write
7F40000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
38B9000
trusted library allocation
page read and write
6C9D000
stack
page read and write
25F5000
trusted library allocation
page execute and read and write
2B95000
trusted library allocation
page read and write
8122000
trusted library allocation
page read and write
1348000
heap
page read and write
41B9000
direct allocation
page read and write
3305000
trusted library allocation
page read and write
F1191FD000
stack
page read and write
120E000
stack
page read and write
70D0000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
61B4000
heap
page read and write
501F000
heap
page read and write
5040000
heap
page read and write
143E000
heap
page read and write
5275000
trusted library allocation
page read and write
1661000
heap
page read and write
5726000
trusted library allocation
page read and write
618A000
heap
page read and write
303C000
heap
page read and write
3A98000
trusted library allocation
page read and write
116B000
trusted library allocation
page execute and read and write
2BF0000
heap
page read and write
5EE0000
trusted library allocation
page execute and read and write
50B6000
trusted library allocation
page execute and read and write
621D000
heap
page read and write
8F8000
stack
page read and write
50B2000
trusted library allocation
page read and write
7FDE000
stack
page read and write
5360000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
4199000
direct allocation
page read and write
1040000
heap
page read and write
5350000
heap
page read and write
5743000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
CF0000
unkown
page readonly
3AF8000
trusted library allocation
page read and write
D57000
stack
page read and write
2F6D000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
AD10000
heap
page read and write
7FFC0C630000
unkown
page read and write
8050000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
39E9000
heap
page read and write
4DB0000
heap
page execute and read and write
425D000
direct allocation
page read and write
3023000
trusted library allocation
page read and write
4D0E000
trusted library allocation
page read and write
618B000
heap
page read and write
647E000
stack
page read and write
6DA5000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
12ED000
trusted library allocation
page read and write
1608000
heap
page read and write
6FBD000
heap
page read and write
6200000
trusted library allocation
page execute and read and write
1082000
heap
page read and write
4CF0000
heap
page read and write
7FF0000
trusted library allocation
page read and write
77DE000
stack
page read and write
12FAB000
stack
page read and write
A11000
unkown
page execute read
5F80000
trusted library allocation
page execute and read and write
12EAB000
stack
page read and write
11CE000
heap
page read and write
3462000
heap
page read and write
4FBC000
stack
page read and write
30E5000
heap
page read and write
5B69000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
3512000
heap
page read and write
6207000
heap
page read and write
39B8000
trusted library allocation
page read and write
A10000
unkown
page readonly
6E55000
heap
page read and write
16FE000
heap
page read and write
7FF9000
trusted library allocation
page read and write
4150000
direct allocation
page read and write
4070000
direct allocation
page read and write
2DB0000
trusted library allocation
page read and write
ABB2000
heap
page read and write
1600000
heap
page read and write
4CEF000
stack
page read and write
D7F000
unkown
page readonly
64D0000
trusted library allocation
page read and write
34B9000
heap
page read and write
1128000
heap
page read and write
91AC000
stack
page read and write
683C000
stack
page read and write
3074000
heap
page read and write
73C5F000
unkown
page readonly
DB7000
unkown
page readonly
111A000
heap
page read and write
A93000
heap
page read and write
992000
unkown
page readonly
3112000
heap
page read and write
307B000
heap
page read and write
74C0000
trusted library allocation
page execute and read and write
64B0000
trusted library allocation
page execute and read and write
8150000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
34E5000
heap
page read and write
3420000
heap
page read and write
5B9C000
stack
page read and write
3FF3000
direct allocation
page read and write
6E00000
heap
page read and write
12E6000
trusted library allocation
page read and write
74BE000
stack
page read and write
340E000
stack
page read and write
4259000
direct allocation
page read and write
2F33000
trusted library allocation
page read and write
3E30000
direct allocation
page read and write
70B0000
trusted library allocation
page execute and read and write
63C0000
heap
page read and write
2F62000
trusted library allocation
page read and write
1712000
heap
page read and write
2891000
trusted library allocation
page read and write
5F50000
trusted library allocation
page execute and read and write
52F0000
trusted library allocation
page read and write
5701000
heap
page read and write
750E000
stack
page read and write
7EC0000
trusted library allocation
page read and write
4090000
direct allocation
page read and write
3B98000
trusted library allocation
page read and write
3B45000
heap
page read and write
6155000
heap
page read and write
73C5D000
unkown
page read and write
51F0000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
4D1A000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
422E000
direct allocation
page read and write
6137000
heap
page read and write
D30000
heap
page read and write
ACE000
unkown
page write copy
5B52000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
5250000
heap
page read and write
330C000
trusted library allocation
page read and write
7FFC0C626000
unkown
page readonly
40B3000
direct allocation
page read and write
15CE000
stack
page read and write
73C41000
unkown
page execute read
2120000
direct allocation
page read and write
6DA2000
trusted library allocation
page read and write
950000
heap
page read and write
7F80000
trusted library allocation
page read and write
61B3000
heap
page read and write
304A000
heap
page read and write
2ED7000
trusted library allocation
page read and write
AD7000
unkown
page readonly
422E000
direct allocation
page read and write
2F4D000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
AD73000
heap
page read and write
1372000
heap
page read and write
40F1000
direct allocation
page read and write
80A0000
trusted library allocation
page read and write
13BE000
stack
page read and write
12DE000
trusted library allocation
page read and write
22A41317000
heap
page read and write
6DB8000
trusted library allocation
page read and write
30AE000
heap
page read and write
A11000
unkown
page execute read
4DC0000
heap
page read and write
AD2000
unkown
page write copy
40D3000
direct allocation
page read and write
3D91000
trusted library allocation
page read and write
30C9000
heap
page read and write
3F90000
direct allocation
page read and write
52E0000
heap
page execute and read and write
8720000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
7EEE0000
trusted library allocation
page execute and read and write
7FC0000
trusted library allocation
page read and write
7EF1000
trusted library allocation
page read and write
4013000
direct allocation
page read and write
81B0000
trusted library allocation
page read and write
871F000
stack
page read and write
7F80000
trusted library allocation
page read and write
22A412B2000
heap
page read and write
15F5000
heap
page read and write
30BD000
heap
page read and write
3A7F000
stack
page read and write
64A3000
trusted library allocation
page read and write
8CDE000
stack
page read and write
11FE000
stack
page read and write
15F5000
heap
page read and write
AD08000
heap
page read and write
78DD000
stack
page read and write
22A41289000
heap
page read and write
22A412C4000
heap
page read and write
5B43000
trusted library allocation
page read and write
4D12000
trusted library allocation
page read and write
61A1000
heap
page read and write
F118EFF000
stack
page read and write
2BE0000
heap
page read and write
7B80000
heap
page read and write
3B78000
trusted library allocation
page read and write
22A412AC000
heap
page read and write
39E2000
heap
page read and write
81D0000
trusted library allocation
page read and write
20D6000
heap
page read and write
2ED5000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
F70000
heap
page read and write
1066000
heap
page read and write
6A0A000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
A11000
unkown
page execute read
60F7000
heap
page read and write
573B000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
1312C000
stack
page read and write
73C5F000
unkown
page readonly
5901000
heap
page execute and read and write
513E000
stack
page read and write
13FC000
stack
page read and write
550E000
stack
page read and write
2780000
heap
page execute and read and write
5DA000
stack
page read and write
5742000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
73C56000
unkown
page readonly
3DB1000
trusted library allocation
page read and write
4CE0000
heap
page read and write
7D90000
trusted library allocation
page read and write
9A6000
unkown
page readonly
6DA9000
trusted library allocation
page read and write
1156000
trusted library allocation
page execute and read and write
82AE000
stack
page read and write
DB0000
heap
page read and write
3482000
heap
page read and write
346D000
heap
page read and write
5270000
trusted library allocation
page read and write
800E000
trusted library allocation
page read and write
611C000
stack
page read and write
8040000
trusted library allocation
page read and write
E39000
stack
page read and write
6C67000
heap
page read and write
61C2000
heap
page read and write
22A41410000
heap
page read and write
73C5F000
unkown
page readonly
4D44000
trusted library allocation
page read and write
3FB0000
direct allocation
page read and write
56FF000
stack
page read and write
61D9000
heap
page read and write
5080000
trusted library allocation
page read and write
111E000
heap
page read and write
339C000
trusted library allocation
page read and write
5510000
heap
page read and write
511D000
stack
page read and write
2CEB000
trusted library allocation
page read and write
80F0000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
DE0000
heap
page read and write
E45000
heap
page read and write
303F000
heap
page read and write
164F000
heap
page read and write
852E000
stack
page read and write
5EDE000
stack
page read and write
7ED0000
trusted library allocation
page read and write
269C000
stack
page read and write
11C0000
heap
page read and write
6DE0000
heap
page read and write
3F70000
direct allocation
page read and write
2B60000
heap
page read and write
4D00000
heap
page read and write
ABB0000
heap
page read and write
7F30000
trusted library allocation
page read and write
DAE000
unkown
page write copy
2C24000
trusted library allocation
page read and write
D0B000
stack
page read and write
2C19000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
2C75000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
22A4128A000
heap
page read and write
7ED0000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
25EA000
trusted library allocation
page execute and read and write
5B60000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
7690000
heap
page read and write
11B0000
trusted library allocation
page execute and read and write
373F000
stack
page read and write
16F6000
heap
page read and write
3039000
stack
page read and write
572B000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
41BD000
direct allocation
page read and write
12E1000
trusted library allocation
page read and write
3FF3000
direct allocation
page read and write
15C5000
heap
page read and write
5752000
trusted library allocation
page read and write
DA4000
unkown
page readonly
2BBE000
stack
page read and write
2B80000
heap
page read and write
3AB8000
trusted library allocation
page read and write
501E000
stack
page read and write
7F40000
trusted library allocation
page read and write
1444000
heap
page read and write
419D000
direct allocation
page read and write
6199000
heap
page read and write
426000
system
page execute and read and write
73C41000
unkown
page execute read
4D2D000
trusted library allocation
page read and write
84B0000
trusted library allocation
page read and write
3B38000
trusted library allocation
page read and write
4070000
direct allocation
page read and write
61AE000
heap
page read and write
50C2000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
6FE5000
trusted library allocation
page read and write
4BEE000
stack
page read and write
776B000
stack
page read and write
3B58000
trusted library allocation
page read and write
4E8C000
stack
page read and write
61C7000
heap
page read and write
5754000
trusted library allocation
page read and write
EE0000
heap
page read and write
83A0000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
667C000
stack
page read and write
5B46000
trusted library allocation
page read and write
26A0000
heap
page read and write
6DBA000
trusted library allocation
page read and write
6173000
heap
page read and write
80F6000
trusted library allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
25FB000
trusted library allocation
page execute and read and write
33BA000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
130EB000
stack
page read and write
6C3C000
stack
page read and write
5310000
trusted library allocation
page read and write
307F000
heap
page read and write
3891000
trusted library allocation
page read and write
FF0000
heap
page read and write
3EF0000
direct allocation
page read and write
C5A000
stack
page read and write
1140000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
42EE000
direct allocation
page read and write
83C0000
trusted library allocation
page read and write
F1193FF000
stack
page read and write
10E8000
heap
page read and write
2D2C000
trusted library allocation
page read and write
13C4000
heap
page read and write
2F7E000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
4D72000
trusted library allocation
page read and write
15CC000
heap
page read and write
420E000
direct allocation
page read and write
2A83000
trusted library allocation
page read and write
2F5A000
trusted library allocation
page read and write
13A4000
heap
page read and write
5801000
heap
page read and write
7F00000
trusted library allocation
page read and write
330E000
stack
page read and write
25E0000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
1322B000
stack
page read and write
4CD0000
trusted library allocation
page read and write
4D67000
trusted library allocation
page execute and read and write
104E000
heap
page read and write
6DBF000
trusted library allocation
page read and write
619D000
heap
page read and write
4130000
direct allocation
page read and write
8140000
trusted library allocation
page read and write
5D9E000
stack
page read and write
60DC000
stack
page read and write
8180000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
6E77000
heap
page read and write
6184000
heap
page read and write
571E000
stack
page read and write
57F0000
trusted library allocation
page read and write
1162000
trusted library allocation
page read and write
297C000
trusted library allocation
page read and write
5260000
trusted library allocation
page execute and read and write
3054000
heap
page read and write
81E0000
trusted library allocation
page read and write
6142000
heap
page read and write
1340000
heap
page read and write
1697000
heap
page execute and read and write
66FC000
stack
page read and write
30E2000
heap
page read and write
8160000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
15F5000
heap
page read and write
3A38000
trusted library allocation
page read and write
709E000
stack
page read and write
4DEE000
stack
page read and write
22A41415000
heap
page read and write
5253000
heap
page read and write
34C8000
heap
page read and write
50F0000
heap
page execute and read and write
7EC0000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
15F6000
heap
page read and write
2B09000
trusted library allocation
page read and write
30B0000
heap
page read and write
6DCA000
trusted library allocation
page read and write
AC4B000
heap
page read and write
34B2000
heap
page read and write
8170000
trusted library allocation
page read and write
15DB000
stack
page read and write
625E000
stack
page read and write
AC4000
unkown
page readonly
343E000
heap
page read and write
5800000
trusted library allocation
page read and write
63BD000
stack
page read and write
1454000
heap
page read and write
3938000
trusted library allocation
page read and write
4030000
direct allocation
page read and write
7DA0000
trusted library allocation
page read and write
2100000
heap
page read and write
22A412BE000
heap
page read and write
6370000
trusted library allocation
page read and write
3488000
heap
page read and write
50E0000
trusted library allocation
page read and write
4090000
direct allocation
page read and write
5F60000
trusted library allocation
page read and write
34C3000
heap
page read and write
1651000
heap
page read and write
DA4000
unkown
page readonly
4CE3000
heap
page read and write
302E000
heap
page read and write
426000
system
page execute and read and write
4D60000
trusted library allocation
page read and write
25F7000
trusted library allocation
page execute and read and write
40D3000
direct allocation
page read and write
124E000
stack
page read and write
52DC000
stack
page read and write
4279000
direct allocation
page read and write
571E000
trusted library allocation
page read and write
3BB8000
trusted library allocation
page read and write
7FFE000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
5094000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
40E3000
direct allocation
page read and write
422E000
direct allocation
page read and write
5F90000
trusted library allocation
page execute and read and write
500000
unkown
page readonly
5F40000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
5412000
heap
page read and write
5240000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
DC0000
heap
page read and write
81F0000
trusted library allocation
page read and write
3080000
heap
page read and write
25E2000
trusted library allocation
page read and write
1620000
heap
page read and write
25F0000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
A50000
heap
page read and write
3073000
heap
page read and write
8110000
trusted library allocation
page read and write
169F000
heap
page read and write
6FE2000
trusted library allocation
page read and write
A10000
unkown
page readonly
575A000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
1310000
heap
page read and write
AD61000
heap
page read and write
DAE000
unkown
page read and write
616A000
heap
page read and write
22A4141E000
heap
page read and write
2DB4000
trusted library allocation
page read and write
1336B000
stack
page read and write
3ED0000
direct allocation
page read and write
348A000
heap
page read and write
5B20000
trusted library allocation
page read and write
1435000
heap
page execute and read and write
5E9F000
stack
page read and write
1655000
heap
page read and write
38F8000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
5501000
heap
page execute and read and write
7EE90000
trusted library allocation
page execute and read and write
61C4000
heap
page read and write
8011000
trusted library allocation
page read and write
15F5000
heap
page read and write
5139000
heap
page read and write
83D0000
trusted library allocation
page read and write
63E0000
trusted library allocation
page execute and read and write
4DD0000
heap
page read and write
22A41296000
heap
page read and write
83B0000
trusted library allocation
page read and write
61CE000
heap
page read and write
616A000
heap
page read and write
609C000
stack
page read and write
3958000
trusted library allocation
page read and write
22A41272000
heap
page read and write
30AF000
heap
page read and write
427D000
direct allocation
page read and write
1270000
heap
page execute and read and write
2F40000
trusted library allocation
page read and write
12CAB000
stack
page read and write
8016000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
1560000
heap
page read and write
4D62000
trusted library allocation
page read and write
7D8E000
stack
page read and write
5030000
heap
page read and write
6109000
heap
page read and write
2F28000
trusted library allocation
page read and write
4F01000
heap
page read and write
1160000
trusted library allocation
page read and write
11C7000
heap
page read and write
73C5D000
unkown
page read and write
3B49000
heap
page read and write
2BC0000
heap
page readonly
5212000
heap
page read and write
3940000
heap
page read and write
25E6000
trusted library allocation
page execute and read and write
6A70000
trusted library allocation
page execute and read and write
A11000
unkown
page execute read
419D000
direct allocation
page read and write
4150000
direct allocation
page read and write
7F90000
trusted library allocation
page read and write
308E000
heap
page read and write
71A0000
trusted library allocation
page execute and read and write
5207000
heap
page read and write
612A000
heap
page read and write
16F6000
heap
page read and write
5401000
heap
page read and write
6E0A000
heap
page read and write
AC0A000
heap
page read and write
41BD000
direct allocation
page read and write
605B000
unkown
page read and write
73C40000
unkown
page readonly
3EF0000
direct allocation
page read and write
304B000
heap
page read and write
7F50000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
878E000
stack
page read and write
7FFC0C610000
unkown
page readonly
7680000
heap
page read and write
5760000
trusted library allocation
page read and write
620C000
heap
page read and write
3EF6000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
ABD5000
heap
page read and write
61E1000
heap
page read and write
5ED0000
trusted library allocation
page execute and read and write
81A0000
trusted library allocation
page read and write
6FC1000
heap
page read and write
15F3000
heap
page read and write
1165000
trusted library allocation
page execute and read and write
A10000
unkown
page readonly
6890000
heap
page read and write
3087000
heap
page read and write
5B1B000
stack
page read and write
2610000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
1190000
heap
page read and write
12ED000
stack
page read and write
8730000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
561F000
stack
page read and write
AD7000
unkown
page readonly
85DF000
stack
page read and write
ACE000
unkown
page read and write
1654000
heap
page read and write
A5E000
heap
page read and write
5B09000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
34E5000
heap
page read and write
397E000
stack
page read and write
1372000
heap
page read and write
575E000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
541F000
heap
page read and write
97AB000
stack
page read and write
4D43000
trusted library allocation
page execute and read and write
5A1B000
stack
page read and write
6360000
trusted library allocation
page read and write
13DB000
stack
page read and write
84A0000
trusted library allocation
page read and write
81DE000
stack
page read and write
571C000
trusted library allocation
page read and write
204F000
stack
page read and write
8170000
trusted library allocation
page read and write
30D0000
heap
page read and write
15A8000
heap
page read and write
5720000
trusted library allocation
page read and write
4279000
direct allocation
page read and write
22A412BD000
heap
page read and write
5741000
trusted library allocation
page read and write
42CE000
direct allocation
page read and write
619A000
heap
page read and write
F80000
heap
page read and write
4D00000
trusted library allocation
page read and write
8135000
trusted library allocation
page read and write
613A000
heap
page read and write
5724000
trusted library allocation
page read and write
1033000
trusted library allocation
page execute and read and write
6C60000
heap
page read and write
5000000
heap
page read and write
7F30000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
B80000
heap
page read and write
7FA0000
trusted library allocation
page read and write
B19000
heap
page read and write
61E7000
heap
page read and write
7EB0000
trusted library allocation
page read and write
6DED000
heap
page read and write
3F35000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
103D000
trusted library allocation
page execute and read and write
801D000
trusted library allocation
page read and write
4130000
direct allocation
page read and write
6182000
heap
page read and write
30E9000
heap
page read and write
5720000
trusted library allocation
page read and write
34CC000
heap
page read and write
30EF000
heap
page read and write
3A58000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
84DE000
stack
page read and write
30E0000
heap
page read and write
849F000
stack
page read and write
73C5D000
unkown
page read and write
61A7000
heap
page read and write
12DAB000
stack
page read and write
AC4000
unkown
page readonly
21A0000
heap
page read and write
39D4000
heap
page read and write
5736000
trusted library allocation
page read and write
3051000
heap
page read and write
6113000
heap
page read and write
4DAC000
stack
page read and write
3EF0000
direct allocation
page read and write
1310000
heap
page read and write
16F5000
heap
page execute and read and write
5746000
trusted library allocation
page read and write
15BF000
stack
page read and write
2F74000
trusted library allocation
page read and write
624C000
stack
page read and write
33B5000
trusted library allocation
page read and write
5F1F000
stack
page read and write
11CA000
heap
page read and write
1654000
heap
page read and write
CCC000
stack
page read and write
634C000
stack
page read and write
25CD000
trusted library allocation
page execute and read and write
A9F000
unkown
page readonly
12F0000
heap
page read and write
121AB000
stack
page read and write
32F8000
trusted library allocation
page read and write
39D0000
heap
page read and write
5EBE000
stack
page read and write
8DFE000
stack
page read and write
3376000
trusted library allocation
page read and write
A5B000
heap
page read and write
3ED0000
direct allocation
page read and write
7F00000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
6E3B000
heap
page read and write
5B5E000
trusted library allocation
page read and write
6CA0000
heap
page read and write
50B0000
trusted library allocation
page read and write
83EE000
stack
page read and write
5758000
trusted library allocation
page read and write
61B9000
heap
page read and write
34D4000
heap
page read and write
5B5A000
trusted library allocation
page read and write
DBE000
stack
page read and write
22CF000
stack
page read and write
3083000
heap
page read and write
162C000
heap
page read and write
8030000
trusted library allocation
page read and write
5AFF000
stack
page read and write
73C40000
unkown
page readonly
8128000
trusted library allocation
page read and write
1654000
heap
page read and write
33BF000
trusted library allocation
page read and write
15FC000
stack
page read and write
13A0000
heap
page read and write
3075000
heap
page read and write
8150000
trusted library allocation
page read and write
1654000
heap
page read and write
1374000
heap
page read and write
12FEC000
stack
page read and write
6E5B000
heap
page read and write
6E6A000
heap
page read and write
3333000
trusted library allocation
page read and write
50BA000
trusted library allocation
page execute and read and write
60E0000
heap
page read and write
1D9E000
stack
page read and write
E40000
heap
page read and write
960000
unkown
page readonly
2D8E000
stack
page read and write
425D000
direct allocation
page read and write
7C30000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
34FA000
heap
page read and write
3412000
heap
page read and write
6E37000
heap
page read and write
8CFC000
stack
page read and write
3478000
heap
page read and write
3012000
heap
page read and write
5020000
heap
page read and write
7FFC000
trusted library allocation
page read and write
61ED000
heap
page read and write
7FF0000
trusted library allocation
page read and write
A9F000
unkown
page readonly
5B2B000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
61D0000
heap
page read and write
342D000
heap
page read and write
3EC6000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
4199000
direct allocation
page read and write
6B46000
trusted library allocation
page read and write
4259000
direct allocation
page read and write
8420000
trusted library allocation
page read and write
73C41000
unkown
page execute read
342A000
heap
page read and write
7C20000
heap
page execute and read and write
AC1B000
heap
page read and write
22A41230000
heap
page read and write
3476000
heap
page read and write
4D0B000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
1698000
heap
page read and write
8100000
trusted library allocation
page read and write
3AE4000
heap
page read and write
3AD8000
trusted library allocation
page read and write
B67000
heap
page read and write
34E9000
heap
page read and write
BCC000
stack
page read and write
712B000
stack
page read and write
4D44000
trusted library allocation
page read and write
F1194FB000
stack
page read and write
3B18000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
6377000
trusted library allocation
page read and write
6E5E000
heap
page read and write
4279000
direct allocation
page read and write
170E000
heap
page read and write
7150000
heap
page read and write
26B0000
trusted library allocation
page read and write
796B000
stack
page read and write
5701000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
22A41296000
heap
page read and write
7FFC0C632000
unkown
page readonly
8485000
trusted library allocation
page read and write
61F5000
heap
page read and write
7DE0000
heap
page read and write
57A0000
trusted library allocation
page read and write
41BD000
direct allocation
page read and write
5756000
trusted library allocation
page read and write
8025000
trusted library allocation
page read and write
15EF000
heap
page read and write
8141000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
3AE0000
heap
page read and write
3B30000
heap
page read and write
5B3D000
trusted library allocation
page read and write
25C3000
trusted library allocation
page execute and read and write
81AE000
stack
page read and write
7B70000
heap
page read and write
4D4D000
trusted library allocation
page execute and read and write
925000
heap
page read and write
3202000
heap
page read and write
6850000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
E0D000
stack
page read and write
526C000
stack
page read and write
3443000
heap
page read and write
20D9000
heap
page read and write
3454000
heap
page read and write
3F90000
direct allocation
page read and write
498D000
stack
page read and write
4259000
direct allocation
page read and write
842E000
stack
page read and write
3FB0000
direct allocation
page read and write
648C000
stack
page read and write
169F000
heap
page read and write
4D54000
trusted library allocation
page read and write
7FF4000
trusted library allocation
page read and write
3B34000
heap
page read and write
1C4E000
stack
page read and write
6BBC000
stack
page read and write
5301000
heap
page read and write
41B9000
direct allocation
page read and write
5C1C000
stack
page read and write
7B6B000
stack
page read and write
786C000
stack
page read and write
40D3000
direct allocation
page read and write
673B000
stack
page read and write
7C3D000
stack
page read and write
1363000
heap
page read and write
A800000
heap
page read and write
8490000
trusted library allocation
page read and write
4150000
direct allocation
page read and write
6DD4000
trusted library allocation
page read and write
6DF3000
heap
page read and write
22A412C4000
heap
page read and write
3052000
heap
page read and write
AD54000
heap
page read and write
7FE0000
trusted library allocation
page read and write
572B000
trusted library allocation
page read and write
AD6C000
heap
page read and write
8FFE000
stack
page read and write
CC9000
stack
page read and write
64A0000
trusted library allocation
page read and write
DB2000
unkown
page write copy
81D0000
trusted library allocation
page read and write
12BB000
stack
page read and write
16B5000
heap
page read and write
3D9F000
trusted library allocation
page read and write
8440000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
5F5C000
stack
page read and write
13A4000
heap
page read and write
139F000
heap
page read and write
4D26000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
5012000
heap
page read and write
144E000
heap
page read and write
42EE000
direct allocation
page read and write
7FFC0C635000
unkown
page readonly
6B7D000
stack
page read and write
7F70000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
219E000
stack
page read and write
420E000
direct allocation
page read and write
7FF0000
trusted library allocation
page read and write
3449000
heap
page read and write
638D000
stack
page read and write
7F20000
trusted library allocation
page read and write
4D1E000
trusted library allocation
page read and write
5050000
heap
page read and write
4D06000
trusted library allocation
page read and write
40B3000
direct allocation
page read and write
31E0000
heap
page readonly
997000
unkown
page readonly
16A5000
heap
page read and write
5B56000
trusted library allocation
page read and write
4D77000
trusted library allocation
page execute and read and write
A9F000
unkown
page readonly
25C4000
trusted library allocation
page read and write
ABC2000
heap
page read and write
8130000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
6BFC000
stack
page read and write
42CE000
direct allocation
page read and write
5761000
trusted library allocation
page read and write
4115000
trusted library allocation
page read and write
1624000
heap
page read and write
15A0000
heap
page read and write
8190000
trusted library allocation
page read and write
3E1B000
heap
page read and write
876C000
stack
page read and write
7DE6000
trusted library allocation
page read and write
ABCA000
heap
page read and write
1034000
trusted library allocation
page read and write
614B000
heap
page read and write
1300000
trusted library allocation
page read and write
4130000
direct allocation
page read and write
5200000
heap
page read and write
5B0B000
trusted library allocation
page read and write
123C000
stack
page read and write
52CE000
stack
page read and write
73BE000
stack
page read and write
1680000
heap
page read and write
4D40000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
6DCF000
trusted library allocation
page read and write
2AEB000
stack
page read and write
51F0000
heap
page execute and read and write
8110000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
705D000
stack
page read and write
3483000
heap
page read and write
7C8E000
stack
page read and write
73C56000
unkown
page readonly
81F0000
trusted library allocation
page read and write
AC4000
unkown
page readonly
856B000
stack
page read and write
347D000
heap
page read and write
8430000
trusted library allocation
page read and write
13CE000
stack
page read and write
13A4000
heap
page read and write
400000
system
page execute and read and write
6DA0000
trusted library allocation
page read and write
3A18000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
6127000
heap
page read and write
F118FFF000
stack
page read and write
22A42CD0000
heap
page read and write
7F90000
trusted library allocation
page read and write
22A41360000
heap
page read and write
616F000
heap
page read and write
5130000
heap
page read and write
3A78000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
AA00000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
73C56000
unkown
page readonly
5278000
trusted library allocation
page read and write
34BE000
heap
page read and write
13A4000
heap
page read and write
3043000
heap
page read and write
F2E000
stack
page read and write
61D5000
heap
page read and write
CF0000
unkown
page readonly
635E000
stack
page read and write
33A3000
trusted library allocation
page read and write
3451000
heap
page read and write
ACE000
unkown
page read and write
6EC0000
heap
page read and write
5B26000
trusted library allocation
page read and write
There are 1205 hidden memdumps, click here to show them.