IOC Report
swift_copy_MTC87365-PNG00197736-HH.txt

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps1510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
swift_copy_MTC87365-PNG00197736-HH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\build.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hypopygidium.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Glagolitic
data
dropped
C:\Users\user\AppData\Local\Temp\aut2B83.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3094.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut603F.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\swift_copy_MTC87365-PNG00197736-HH.exe
"C:\Users\user\Desktop\swift_copy_MTC87365-PNG00197736-HH.exe"
malicious
C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe
"C:\Users\user\Desktop\swift_copy_MTC87365-PNG00197736-HH.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\swift_copy_MTC87365-PNG00197736-HH.exe"
malicious
C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe
"C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe"
malicious
C:\Users\user\AppData\Local\Temp\build.exe
"C:\Users\user\AppData\Local\Temp\build.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hypopygidium.vbs"
malicious
C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe
"C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\flexuosely\hypopygidium.exe"
malicious

URLs

Name
IP
Malicious
204.10.161.147:7082
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://xma0.com
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://ip-api.com
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xma0.com
51.195.65.154
malicious
mail.xma0.com
unknown
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
204.10.161.147
unknown
Canada
malicious
51.195.65.154
xma0.com
France
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
FD2000
unkown
page readonly
malicious
6841000
trusted library allocation
page read and write
malicious
7E00000
heap
page read and write
malicious
6839000
trusted library allocation
page read and write
malicious
7C50000
trusted library section
page read and write
malicious
5200000
heap
page read and write
malicious
5400000
heap
page read and write
malicious
3461000
trusted library allocation
page read and write
malicious
7F40000
trusted library section
page read and write
malicious
8100000
trusted library section
page read and write
malicious
6941000
trusted library allocation
page read and write
malicious
6805000
trusted library allocation
page read and write
malicious
348E000
trusted library allocation
page read and write
malicious
7C00000
heap
page read and write
malicious
7E00000
trusted library section
page read and write
malicious
6ABF000
trusted library allocation
page read and write
malicious
432000
unkown
page readonly
malicious
6705000
trusted library allocation
page read and write
malicious
2836000
trusted library allocation
page read and write
malicious
51F0000
trusted library allocation
page execute and read and write
81E0000
trusted library allocation
page read and write
5012000
heap
page read and write
38B3000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
F62000
heap
page read and write
6B0A000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
30C3000
heap
page read and write
1970000
trusted library allocation
page read and write
3C07000
trusted library allocation
page read and write
27F000
unkown
page readonly
5501000
heap
page read and write
825E000
stack
page read and write
7BF0000
trusted library allocation
page read and write
10C90000
trusted library allocation
page read and write
322D000
heap
page read and write
8050000
trusted library allocation
page read and write
38E5000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
11BF000
stack
page read and write
DB17000
trusted library allocation
page read and write
39F8000
trusted library allocation
page read and write
3D08000
trusted library allocation
page read and write
6870000
heap
page read and write
39E0000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
7396000
heap
page read and write
4DAB000
trusted library allocation
page read and write
5ADE000
stack
page read and write
862F000
stack
page read and write
11FC000
stack
page read and write
38C0000
trusted library allocation
page read and write
6F8C000
stack
page read and write
67F9000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
37D4000
heap
page read and write
2B763768000
heap
page read and write
4030000
direct allocation
page read and write
5212000
heap
page read and write
3C12000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
3090000
heap
page read and write
7D90000
trusted library allocation
page read and write
3570000
heap
page read and write
476000
unkown
page readonly
5990000
trusted library allocation
page read and write
3CCF000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
3D24000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
533E000
trusted library allocation
page read and write
10C86000
trusted library allocation
page read and write
5B9D000
heap
page read and write
33D1000
heap
page read and write
6F90000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
3CFE000
trusted library allocation
page read and write
3857000
trusted library allocation
page read and write
F38000
heap
page read and write
14EC000
heap
page read and write
4D40000
trusted library allocation
page read and write
3BC8000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
4099000
direct allocation
page read and write
5756000
trusted library allocation
page read and write
3212000
heap
page read and write
2953000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
5054000
trusted library allocation
page read and write
10C9A000
trusted library allocation
page read and write
10C81000
trusted library allocation
page read and write
821E000
stack
page read and write
3C1E000
trusted library allocation
page read and write
3D3E000
trusted library allocation
page read and write
811E000
stack
page read and write
A1F000
unkown
page readonly
7F10000
trusted library allocation
page read and write
3CE8000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
5043000
trusted library allocation
page execute and read and write
32BF000
heap
page read and write
7D40000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
3C00000
trusted library allocation
page read and write
2E38000
stack
page read and write
80DE000
stack
page read and write
DAC2000
trusted library allocation
page read and write
17BC000
stack
page read and write
4D48000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
158A000
heap
page read and write
A401000
heap
page read and write
4F01000
heap
page read and write
5C24000
heap
page read and write
5350000
trusted library allocation
page read and write
322B000
heap
page read and write
32DF000
heap
page read and write
508F000
stack
page read and write
BEF0000
heap
page read and write
10C68000
trusted library allocation
page read and write
866B000
stack
page read and write
3275000
heap
page read and write
327E000
trusted library allocation
page read and write
3B8D000
direct allocation
page read and write
571E000
trusted library allocation
page read and write
3D82000
trusted library allocation
page read and write
583B000
trusted library allocation
page read and write
8030000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
32D1000
heap
page read and write
30BD000
heap
page read and write
3DD0000
direct allocation
page read and write
7F40000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
3300000
heap
page read and write
3100000
heap
page read and write
3BCD000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
154F000
heap
page read and write
66AD000
stack
page read and write
1533000
heap
page read and write
38CA000
trusted library allocation
page read and write
3D96000
trusted library allocation
page read and write
2C6B000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
940000
heap
page read and write
41CE000
direct allocation
page read and write
3F70000
direct allocation
page read and write
6D0F000
stack
page read and write
5332000
trusted library allocation
page read and write
DB08000
trusted library allocation
page read and write
30CC000
heap
page read and write
7DE0000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
2D50000
heap
page readonly
158F000
heap
page read and write
DAD1000
trusted library allocation
page read and write
3063000
heap
page read and write
3D2D000
trusted library allocation
page read and write
4030000
direct allocation
page read and write
3B82000
trusted library allocation
page read and write
409D000
direct allocation
page read and write
7F00000
trusted library allocation
page read and write
3CD6000
trusted library allocation
page read and write
10C8B000
trusted library allocation
page read and write
BE3E000
heap
page read and write
4CFA000
trusted library allocation
page execute and read and write
392E000
trusted library allocation
page read and write
3FB3000
direct allocation
page read and write
4D91000
trusted library allocation
page read and write
ED2000
trusted library allocation
page read and write
F8C000
heap
page execute and read and write
2B7637C5000
heap
page read and write
4CDD000
trusted library allocation
page execute and read and write
80F0000
trusted library allocation
page read and write
1473000
heap
page read and write
5739000
trusted library allocation
page read and write
467000
unkown
page readonly
3F70000
direct allocation
page read and write
5709000
trusted library allocation
page read and write
BED000
stack
page read and write
DF0000
heap
page execute and read and write
3BAF000
trusted library allocation
page read and write
F53000
heap
page read and write
2C6D000
trusted library allocation
page read and write
2B763771000
heap
page read and write
C92000
trusted library allocation
page read and write
38C7000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
2B7650E0000
heap
page read and write
3C9A000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
1480000
heap
page read and write
4CD4000
trusted library allocation
page read and write
EBE000
trusted library allocation
page read and write
2D0A000
trusted library allocation
page read and write
590000
heap
page read and write
2A36000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
3B89000
direct allocation
page read and write
39EA000
trusted library allocation
page read and write
2B763740000
heap
page read and write
C95000
trusted library allocation
page execute and read and write
81F0000
trusted library allocation
page read and write
8C3E000
stack
page read and write
1111E000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
1990000
heap
page read and write
67BC000
stack
page read and write
34A6000
trusted library allocation
page read and write
697D000
stack
page read and write
D51E000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
5F7D000
stack
page read and write
3A60000
direct allocation
page read and write
39F0000
trusted library allocation
page read and write
2B763789000
heap
page read and write
DE0000
trusted library allocation
page read and write
572B000
trusted library allocation
page read and write
6E3D000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
67C9000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
7D10000
trusted library allocation
page read and write
14A3000
heap
page read and write
3BBF000
trusted library allocation
page read and write
3B8D000
direct allocation
page read and write
2E80000
heap
page read and write
7BF6000
trusted library allocation
page read and write
2FDE000
stack
page read and write
6710000
trusted library allocation
page read and write
5743000
trusted library allocation
page read and write
DAEA000
trusted library allocation
page read and write
7C1D000
trusted library allocation
page read and write
3DB3000
trusted library allocation
page read and write
415D000
direct allocation
page read and write
DADB000
trusted library allocation
page read and write
4DB3000
heap
page read and write
7D20000
trusted library allocation
page read and write
83AE000
stack
page read and write
2C64000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
F94000
heap
page read and write
2B763821000
heap
page read and write
2B763790000
heap
page read and write
6E20000
trusted library allocation
page read and write
328B000
heap
page read and write
13F0000
heap
page read and write
5040000
trusted library allocation
page read and write
1930000
trusted library allocation
page read and write
3C55000
trusted library allocation
page read and write
3C4C000
trusted library allocation
page read and write
142C000
heap
page read and write
303E000
heap
page read and write
84BB000
stack
page read and write
3746000
trusted library allocation
page read and write
7BFC000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
DAF4000
trusted library allocation
page read and write
149E000
heap
page read and write
4D60000
trusted library allocation
page read and write
38C0000
direct allocation
page read and write
6E40000
trusted library allocation
page read and write
520E000
stack
page read and write
A4E000
unkown
page read and write
4CE0000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
7C25000
trusted library allocation
page read and write
500000
heap
page read and write
41CE000
direct allocation
page read and write
3B93000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
9E6000
heap
page read and write
EF0000
heap
page read and write
2C25000
trusted library allocation
page read and write
4D30000
trusted library allocation
page execute and read and write
3254000
heap
page read and write
5CD0000
trusted library allocation
page execute and read and write
327F000
heap
page read and write
5724000
trusted library allocation
page read and write
6E3E000
stack
page read and write
56FE000
stack
page read and write
430000
unkown
page readonly
7EF1000
trusted library allocation
page read and write
388D000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
4DE0000
heap
page read and write
7ED0000
trusted library allocation
page read and write
74CE000
stack
page read and write
426000
system
page execute and read and write
38E0000
heap
page read and write
327E000
heap
page read and write
6DFE000
stack
page read and write
3D2A000
trusted library allocation
page read and write
86AE000
stack
page read and write
10C6D000
trusted library allocation
page read and write
2B76378C000
heap
page read and write
14F2000
heap
page read and write
3C5D000
trusted library allocation
page read and write
4D07000
trusted library allocation
page execute and read and write
7EE0000
trusted library allocation
page read and write
3D54000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
191D000
trusted library allocation
page execute and read and write
5060000
trusted library allocation
page read and write
1532000
heap
page read and write
34FF000
stack
page read and write
2A4D000
trusted library allocation
page read and write
1926000
trusted library allocation
page execute and read and write
FB033FB000
stack
page read and write
3BFE000
direct allocation
page read and write
A4E000
unkown
page write copy
67F5000
trusted library allocation
page read and write
3076000
heap
page read and write
18F0000
trusted library allocation
page read and write
4E12000
heap
page read and write
30CA000
heap
page read and write
994000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
28FC000
trusted library allocation
page read and write
7BF4000
trusted library allocation
page read and write
5BE8000
heap
page read and write
7310000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
3054000
heap
page read and write
59E000
stack
page read and write
680F000
trusted library allocation
page read and write
302D000
heap
page read and write
2B763690000
heap
page read and write
394A000
trusted library allocation
page read and write
3286000
heap
page read and write
7F40000
trusted library allocation
page read and write
5F2C000
stack
page read and write
4D02000
trusted library allocation
page read and write
9B0000
trusted library allocation
page read and write
10AA000
stack
page read and write
2B7637C5000
heap
page read and write
DAC0000
trusted library allocation
page read and write
1820000
heap
page read and write
2967000
trusted library allocation
page read and write
2B763760000
heap
page read and write
3840000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
1547000
heap
page read and write
3B89000
direct allocation
page read and write
410E000
direct allocation
page read and write
2B76374E000
heap
page read and write
462000
unkown
page readonly
39A4000
heap
page read and write
11EF000
stack
page read and write
1458000
heap
page read and write
5321000
trusted library allocation
page read and write
9B2000
trusted library allocation
page read and write
493B000
stack
page read and write
1454000
heap
page read and write
5960000
trusted library allocation
page read and write
35E0000
heap
page read and write
7BFE000
trusted library allocation
page read and write
6808000
trusted library allocation
page read and write
A01000
heap
page read and write
1FED000
stack
page read and write
3B89000
direct allocation
page read and write
A57000
unkown
page readonly
5B1C000
stack
page read and write
34A2000
trusted library allocation
page read and write
13F8000
heap
page read and write
3975000
trusted library allocation
page read and write
5077000
trusted library allocation
page execute and read and write
7D30000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
180B000
unkown
page read and write
10C63000
trusted library allocation
page read and write
5754000
trusted library allocation
page read and write
4159000
direct allocation
page read and write
1F1000
unkown
page execute read
1422000
heap
page read and write
11DB000
stack
page read and write
4F8E000
stack
page read and write
2A41000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
980000
direct allocation
page read and write
D516000
trusted library allocation
page read and write
3BFE000
direct allocation
page read and write
328E000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
1454000
heap
page read and write
8250000
trusted library allocation
page read and write
29D8000
trusted library allocation
page read and write
9BA000
trusted library allocation
page execute and read and write
4DA0000
trusted library allocation
page read and write
3252000
heap
page read and write
2CF0000
heap
page read and write
1530000
heap
page read and write
3282000
heap
page read and write
60FC000
unkown
page read and write
59F0000
trusted library allocation
page execute and read and write
3D1F000
trusted library allocation
page read and write
449A000
trusted library allocation
page read and write
102A000
heap
page read and write
990000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
39E3000
direct allocation
page read and write
3BD3000
trusted library allocation
page read and write
8E01000
heap
page read and write
BDEA000
heap
page read and write
146C000
stack
page read and write
5C01000
heap
page read and write
F94000
heap
page read and write
328A000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
7D28000
trusted library allocation
page read and write
7ED0000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
F62000
heap
page read and write
5722000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
14A4000
heap
page read and write
82AE000
stack
page read and write
30D6000
heap
page read and write
192A000
trusted library allocation
page execute and read and write
6CCD000
stack
page read and write
C97000
trusted library allocation
page execute and read and write
3D8F000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
5072000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
1410000
heap
page read and write
1220000
heap
page read and write
2AD6000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
3279000
heap
page read and write
5E7B000
stack
page read and write
8020000
trusted library allocation
page read and write
30C6000
heap
page read and write
4D30000
heap
page execute and read and write
190D000
trusted library allocation
page execute and read and write
735F000
stack
page read and write
3CE1000
trusted library allocation
page read and write
4D4A000
trusted library allocation
page read and write
1F1000
unkown
page execute read
18CC000
stack
page read and write
6824000
trusted library allocation
page read and write
F94000
heap
page read and write
69AF000
heap
page read and write
3855000
trusted library allocation
page read and write
A44000
unkown
page readonly
78DE000
stack
page read and write
7FB0000
trusted library allocation
page read and write
29EE000
trusted library allocation
page read and write
32F3000
heap
page read and write
2B763745000
heap
page read and write
140BE000
stack
page read and write
30B2000
heap
page read and write
4D20000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
6ACB000
heap
page read and write
9B6000
trusted library allocation
page execute and read and write
60BC000
unkown
page read and write
395A000
trusted library allocation
page read and write
3894000
trusted library allocation
page read and write
3CC2000
trusted library allocation
page read and write
30DB000
heap
page read and write
3DB1000
direct allocation
page read and write
39E3000
direct allocation
page read and write
3A12000
trusted library allocation
page read and write
6D2A000
trusted library allocation
page read and write
2B05000
trusted library allocation
page read and write
39A0000
heap
page read and write
1BEE000
stack
page read and write
5C20000
heap
page read and write
A600000
trusted library allocation
page read and write
A44000
unkown
page readonly
5BB3000
heap
page read and write
3950000
trusted library allocation
page read and write
5C70000
trusted library allocation
page execute and read and write
3C7E000
trusted library allocation
page read and write
3087000
heap
page read and write
6B80000
heap
page read and write
1451000
heap
page read and write
991000
unkown
page execute read
5C40000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
1424000
heap
page read and write
EEF000
stack
page read and write
5701000
heap
page execute and read and write
5EE000
stack
page read and write
4CE0000
heap
page execute and read and write
4D45000
trusted library allocation
page read and write
65AE000
stack
page read and write
7C11000
trusted library allocation
page read and write
3A40000
trusted library allocation
page read and write
306D000
heap
page read and write
391D000
trusted library allocation
page read and write
11119000
trusted library allocation
page read and write
7380000
heap
page read and write
32DD000
heap
page read and write
30C2000
heap
page read and write
BE43000
heap
page read and write
2EB0000
heap
page read and write
38FE000
trusted library allocation
page read and write
193B000
trusted library allocation
page execute and read and write
BD40000
heap
page read and write
409D000
direct allocation
page read and write
4D20000
trusted library allocation
page read and write
39E3000
direct allocation
page read and write
3D5A000
trusted library allocation
page read and write
4D7E000
stack
page read and write
353E000
stack
page read and write
6997000
heap
page read and write
2AE000
unkown
page write copy
8360000
trusted library allocation
page read and write
6BDB000
stack
page read and write
3E90000
direct allocation
page read and write
324A000
heap
page read and write
2B2000
unkown
page write copy
5062000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
5BFD000
heap
page read and write
8370000
trusted library allocation
page read and write
8230000
trusted library allocation
page read and write
1474000
heap
page read and write
154E000
heap
page execute and read and write
2959000
trusted library allocation
page read and write
6A9B000
stack
page read and write
5200000
heap
page read and write
3BFE000
direct allocation
page read and write
680A000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
3220000
heap
page read and write
35F0000
heap
page read and write
7EC0000
trusted library allocation
page read and write
DAFE000
trusted library allocation
page read and write
1F0000
unkown
page readonly
390B000
trusted library allocation
page read and write
5841000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
2D40000
heap
page read and write
7F60000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
FB029FE000
stack
page read and write
1280000
heap
page read and write
39FE000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
279F000
stack
page read and write
6801000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page execute and read and write
2DEE000
stack
page read and write
8060000
trusted library allocation
page read and write
326C000
stack
page read and write
11DB000
stack
page read and write
426000
system
page execute and read and write
581E000
trusted library allocation
page read and write
EA4000
trusted library allocation
page read and write
2B2C000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
FB02AFF000
stack
page read and write
991000
unkown
page execute read
507B000
trusted library allocation
page execute and read and write
8200000
trusted library allocation
page read and write
2B76378F000
heap
page read and write
1997000
heap
page read and write
2BEB000
stack
page read and write
410E000
direct allocation
page read and write
FB030FE000
stack
page read and write
3D38000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
50A0000
heap
page execute and read and write
302A000
heap
page read and write
3C45000
trusted library allocation
page read and write
81A0000
trusted library allocation
page read and write
10C4F000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
3280000
heap
page read and write
363E000
stack
page read and write
3002000
heap
page read and write
AB2000
heap
page read and write
3968000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
3BE6000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
389E000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
5C30000
heap
page read and write
2BDC000
trusted library allocation
page read and write
BEAC000
heap
page read and write
84FC000
stack
page read and write
C90000
trusted library allocation
page read and write
1454000
heap
page read and write
3D45000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page execute and read and write
7EF0000
trusted library allocation
page read and write
763E000
stack
page read and write
5C14000
heap
page read and write
1904000
trusted library allocation
page read and write
9C0000
heap
page read and write
A9A000
heap
page read and write
39D3000
trusted library allocation
page read and write
5F89000
heap
page read and write
2B763796000
heap
page read and write
5970000
heap
page read and write
12E0000
heap
page read and write
6D1E000
stack
page read and write
80C0000
trusted library allocation
page read and write
3494000
trusted library allocation
page read and write
2180000
heap
page read and write
DAE0000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
2A2C000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
A400000
heap
page read and write
DD0000
trusted library allocation
page execute and read and write
7D00000
trusted library allocation
page read and write
3243000
heap
page read and write
8235000
trusted library allocation
page read and write
5BE4000
heap
page read and write
E9C000
stack
page read and write
990000
unkown
page readonly
147A000
heap
page read and write
3020000
heap
page read and write
6EA0000
trusted library allocation
page read and write
1935000
trusted library allocation
page execute and read and write
A52000
unkown
page write copy
84EE000
stack
page read and write
3960000
trusted library allocation
page read and write
2220000
heap
page read and write
8070000
trusted library allocation
page read and write
1B39000
heap
page read and write
A44000
unkown
page readonly
3D69000
trusted library allocation
page read and write
5326000
trusted library allocation
page read and write
38D0000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
5C60000
trusted library allocation
page execute and read and write
5301000
heap
page read and write
36FE000
stack
page read and write
7C04000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
32E8000
heap
page read and write
3DA2000
trusted library allocation
page read and write
FD0000
unkown
page readonly
9AD000
trusted library allocation
page execute and read and write
38C0000
direct allocation
page read and write
2BC2000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
2B7637AD000
heap
page read and write
33D0000
direct allocation
page read and write
4CC0000
trusted library allocation
page read and write
1B3F000
heap
page read and write
7D70000
trusted library allocation
page read and write
11FC000
stack
page read and write
3D33000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
3CEE000
trusted library allocation
page read and write
3080000
heap
page read and write
30D8000
heap
page read and write
DAD6000
trusted library allocation
page read and write
10C7C000
trusted library allocation
page read and write
5A0000
heap
page read and write
7F20000
trusted library allocation
page read and write
6E47000
trusted library allocation
page read and write
7CF6000
trusted library allocation
page read and write
7D22000
trusted library allocation
page read and write
172E000
stack
page read and write
7391000
heap
page read and write
294B000
trusted library allocation
page read and write
AFA000
stack
page read and write
1910000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
A57000
unkown
page readonly
2B7637C5000
heap
page read and write
530F000
stack
page read and write
CB0000
trusted library allocation
page read and write
3276000
heap
page read and write
720B000
stack
page read and write
3F70000
direct allocation
page read and write
99D000
trusted library allocation
page execute and read and write
F2C000
stack
page read and write
14FB000
heap
page read and write
7D50000
trusted library allocation
page read and write
A4E000
unkown
page write copy
3D14000
heap
page read and write
4CF0000
trusted library allocation
page read and write
C63B000
stack
page read and write
FB4000
heap
page read and write
14A3000
heap
page read and write
6FA0000
trusted library allocation
page read and write
FB02FFE000
stack
page read and write
1C20000
heap
page read and write
83EE000
stack
page read and write
A440000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
EF6000
heap
page read and write
714C000
stack
page read and write
14FE000
heap
page read and write
14EB000
heap
page execute and read and write
2B7637B3000
heap
page read and write
2B7000
unkown
page readonly
6EB0000
trusted library allocation
page execute and read and write
3CB5000
trusted library allocation
page read and write
3A60000
direct allocation
page read and write
13FBE000
stack
page read and write
3086000
heap
page read and write
3BA8000
trusted library allocation
page read and write
1525000
heap
page read and write
C9B000
trusted library allocation
page execute and read and write
10C4A000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
FB02CFF000
stack
page read and write
7E00000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
50CE000
stack
page read and write
3939000
trusted library allocation
page read and write
6C0F000
heap
page read and write
F8C000
heap
page read and write
3D58000
trusted library allocation
page read and write
5BB7000
heap
page read and write
37AF000
trusted library allocation
page read and write
11BE000
stack
page read and write
7C30000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
323C000
heap
page read and write
7EC0000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
6720000
heap
page read and write
3C4F000
trusted library allocation
page read and write
10C72000
trusted library allocation
page read and write
38E1000
heap
page read and write
8361000
trusted library allocation
page read and write
38D3000
trusted library allocation
page read and write
F0B000
stack
page read and write
1450000
heap
page read and write
3043000
heap
page read and write
41CE000
direct allocation
page read and write
4159000
direct allocation
page read and write
8DFC000
stack
page read and write
8540000
heap
page read and write
10C59000
trusted library allocation
page read and write
DB0D000
trusted library allocation
page read and write
681A000
trusted library allocation
page read and write
BAE000
stack
page read and write
79DE000
stack
page read and write
1502000
heap
page read and write
66C8000
trusted library allocation
page read and write
3B70000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
4C95000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page read and write
3B89000
direct allocation
page read and write
7F700000
trusted library allocation
page execute and read and write
2BF0000
trusted library allocation
page read and write
83BC000
stack
page read and write
EC6000
trusted library allocation
page read and write
4F01000
heap
page read and write
A52000
unkown
page write copy
39A2000
trusted library allocation
page read and write
3289000
heap
page read and write
10C95000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
5E2E000
stack
page read and write
5BD5000
heap
page read and write
329D000
trusted library allocation
page read and write
4E07000
heap
page read and write
90FE000
stack
page read and write
38D8000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
3B89000
direct allocation
page read and write
7D90000
trusted library allocation
page read and write
3088000
heap
page read and write
102A000
heap
page read and write
6120000
heap
page read and write
3B8D000
direct allocation
page read and write
38D0000
heap
page read and write
2B76378A000
heap
page read and write
328A000
heap
page read and write
3DD0000
direct allocation
page read and write
F64000
heap
page read and write
7D10000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
3D4B000
trusted library allocation
page read and write
823C000
stack
page read and write
7C22000
trusted library allocation
page read and write
3FB3000
direct allocation
page read and write
14A1000
heap
page read and write
2B763670000
heap
page read and write
A1F000
unkown
page readonly
3B77000
trusted library allocation
page read and write
399B000
trusted library allocation
page read and write
837C000
stack
page read and write
5820000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
827C000
stack
page read and write
29FC000
trusted library allocation
page read and write
3BFE000
direct allocation
page read and write
2B76378C000
heap
page read and write
E10000
heap
page read and write
323E000
heap
page read and write
3296000
trusted library allocation
page read and write
3D1B000
trusted library allocation
page read and write
DAEF000
trusted library allocation
page read and write
3B8E000
trusted library allocation
page read and write
2B7637B4000
heap
page read and write
5C50000
trusted library allocation
page read and write
4CED000
trusted library allocation
page execute and read and write
2F90000
heap
page readonly
3282000
trusted library allocation
page read and write
5B6C000
heap
page read and write
156A000
heap
page read and write
1887000
heap
page read and write
575E000
trusted library allocation
page read and write
32F1000
heap
page read and write
8080000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
DAF9000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
317E000
stack
page read and write
5000000
heap
page read and write
13C0000
heap
page read and write
3049000
heap
page read and write
81D0000
trusted library allocation
page read and write
5B6E000
heap
page read and write
993000
trusted library allocation
page execute and read and write
2C18000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
2E60000
heap
page read and write
39BE000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
11A8000
stack
page read and write
7BF0000
trusted library allocation
page read and write
F6B000
heap
page read and write
308A000
heap
page read and write
14F0000
heap
page read and write
3BDA000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
C53B000
stack
page read and write
7D60000
trusted library allocation
page read and write
12E5000
heap
page read and write
1932000
trusted library allocation
page read and write
E5E000
stack
page read and write
3CA3000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
342F000
stack
page read and write
29E4000
trusted library allocation
page read and write
3B4A000
trusted library allocation
page read and write
30AF000
heap
page read and write
3083000
heap
page read and write
39F6000
trusted library allocation
page read and write
4DB0000
heap
page read and write
3929000
trusted library allocation
page read and write
4030000
direct allocation
page read and write
1413000
heap
page read and write
5F80000
heap
page read and write
573D000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
3D75000
trusted library allocation
page read and write
6F4E000
stack
page read and write
8090000
trusted library allocation
page read and write
1420000
heap
page read and write
3A60000
direct allocation
page read and write
1454000
heap
page read and write
14EB000
heap
page read and write
32AF000
heap
page read and write
7D20000
trusted library allocation
page read and write
4DAE000
trusted library allocation
page read and write
DB03000
trusted library allocation
page read and write
3012000
heap
page read and write
4099000
direct allocation
page read and write
6D30000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
3E90000
direct allocation
page read and write
7DE0000
trusted library allocation
page read and write
38F1000
trusted library allocation
page read and write
1903000
trusted library allocation
page execute and read and write
3C8F000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
2C0D000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
13F7E000
stack
page read and write
789D000
stack
page read and write
B60000
heap
page read and write
38BA000
trusted library allocation
page read and write
6815000
trusted library allocation
page read and write
14A3000
heap
page read and write
3963000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
54D000
stack
page read and write
5973000
heap
page read and write
3000000
heap
page read and write
3574000
heap
page read and write
5C17000
heap
page read and write
4CC0000
trusted library allocation
page read and write
7D20000
heap
page execute and read and write
853C000
stack
page read and write
2A25000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
BDEE000
heap
page read and write
38C6000
heap
page read and write
8000000
trusted library allocation
page read and write
7FF9000
trusted library allocation
page read and write
3320000
heap
page read and write
EFE000
stack
page read and write
7D8E000
stack
page read and write
3CA9000
trusted library allocation
page read and write
A4E000
unkown
page read and write
DACC000
trusted library allocation
page read and write
573B000
trusted library allocation
page read and write
47A8000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
80C5000
trusted library allocation
page read and write
2DF0000
heap
page read and write
EA0000
trusted library allocation
page read and write
17C0000
heap
page read and write
9CE000
heap
page read and write
30CA000
heap
page read and write
3E90000
direct allocation
page read and write
7350000
heap
page read and write
4B8000
system
page execute and read and write
3077000
heap
page read and write
7DC0000
trusted library allocation
page read and write
5BA2000
heap
page read and write
2C88000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
38C0000
direct allocation
page read and write
1C4E000
stack
page read and write
3B8D000
direct allocation
page read and write
E00000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
35D0000
heap
page read and write
3DD0000
direct allocation
page read and write
5B7F000
heap
page read and write
1422000
heap
page read and write
8270000
trusted library allocation
page read and write
2E02000
heap
page read and write
835E000
stack
page read and write
2AE000
unkown
page read and write
3DA3000
direct allocation
page read and write
4431000
trusted library allocation
page read and write
38DE000
trusted library allocation
page read and write
3BC5000
trusted library allocation
page read and write
415D000
direct allocation
page read and write
139E000
stack
page read and write
3D15000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
103B000
heap
page read and write
ECD000
trusted library allocation
page read and write
2B7637B1000
heap
page read and write
1922000
trusted library allocation
page read and write
8370000
trusted library allocation
page read and write
3943000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
4DD0000
heap
page execute and read and write
1960000
trusted library allocation
page execute and read and write
30CE000
heap
page read and write
21B0000
heap
page read and write
5030000
trusted library allocation
page read and write
11116000
trusted library allocation
page read and write
FB028FA000
stack
page read and write
D519000
trusted library allocation
page read and write
204D000
stack
page read and write
2D10000
heap
page read and write
8F7000
stack
page read and write
6D7E000
stack
page read and write
294D000
trusted library allocation
page read and write
39E3000
direct allocation
page read and write
990000
unkown
page readonly
A44000
unkown
page readonly
5090000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
3D10000
direct allocation
page read and write
4D10000
heap
page read and write
2BCF000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
2A4000
unkown
page readonly
699C000
stack
page read and write
4CE4000
trusted library allocation
page read and write
7D50000
trusted library allocation
page read and write
3063000
heap
page read and write
14EC000
heap
page read and write
6BE0000
heap
page read and write
2B38000
trusted library allocation
page read and write
8260000
trusted library allocation
page read and write
14E3000
heap
page execute and read and write
7DE6000
trusted library allocation
page read and write
7F410000
trusted library allocation
page execute and read and write
5B70000
heap
page execute and read and write
39B4000
trusted library allocation
page read and write
681F000
trusted library allocation
page read and write
BBA000
stack
page read and write
3966000
trusted library allocation
page read and write
552D000
stack
page read and write
5C7E000
stack
page read and write
EC1000
trusted library allocation
page read and write
3CF0000
direct allocation
page read and write
7F60000
trusted library allocation
page read and write
8040000
trusted library allocation
page read and write
8029000
trusted library allocation
page read and write
504D000
trusted library allocation
page execute and read and write
2D01000
trusted library allocation
page read and write
501F000
heap
page read and write
DAE5000
trusted library allocation
page read and write
51A000
stack
page read and write
32C0000
trusted library allocation
page read and write
67C6000
trusted library allocation
page read and write
6E8D000
stack
page read and write
30B8000
heap
page read and write
7808000
trusted library allocation
page read and write
32E3000
heap
page read and write
37C1000
trusted library allocation
page read and write
3051000
heap
page read and write
39F3000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
7F3E000
stack
page read and write
27F000
unkown
page readonly
10C46000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
3BFE000
direct allocation
page read and write
3EF3000
direct allocation
page read and write
4CF2000
trusted library allocation
page read and write
991000
unkown
page execute read
2AFE000
trusted library allocation
page read and write
33CE000
stack
page read and write
2D39000
trusted library allocation
page read and write
3BBC000
trusted library allocation
page read and write
2FF0000
heap
page read and write
36D4000
trusted library allocation
page read and write
66E0000
trusted library allocation
page execute and read and write
6C35000
heap
page read and write
6990000
heap
page read and write
3D4F000
trusted library allocation
page read and write
291F000
trusted library allocation
page read and write
7480000
trusted library allocation
page execute and read and write
2B763798000
heap
page read and write
39AD000
trusted library allocation
page read and write
2A4000
unkown
page readonly
3B8D000
direct allocation
page read and write
F30000
heap
page read and write
1455000
heap
page read and write
7C16000
trusted library allocation
page read and write
3A60000
direct allocation
page read and write
7F10000
trusted library allocation
page read and write
5BC9000
heap
page read and write
398E000
trusted library allocation
page read and write
550000
heap
page read and write
7DA0000
trusted library allocation
page read and write
410E000
direct allocation
page read and write
10C54000
trusted library allocation
page read and write
DAC7000
trusted library allocation
page read and write
3200000
heap
page read and write
29DC000
trusted library allocation
page read and write
38C0000
direct allocation
page read and write
3278000
heap
page read and write
38D4000
heap
page read and write
3848000
trusted library allocation
page read and write
C8E000
stack
page read and write
5000000
heap
page read and write
2AE4000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
4DBC000
stack
page read and write
1485000
heap
page read and write
3B9E000
trusted library allocation
page read and write
1546000
heap
page execute and read and write
4E00000
heap
page read and write
4E01000
heap
page read and write
348A000
trusted library allocation
page read and write
718E000
stack
page read and write
1920000
trusted library allocation
page read and write
5726000
trusted library allocation
page read and write
5C09000
heap
page read and write
349B000
trusted library allocation
page read and write
3846000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
4CD3000
trusted library allocation
page execute and read and write
5DDC000
stack
page read and write
5A20000
trusted library allocation
page execute and read and write
6E28000
trusted library allocation
page read and write
3B89000
direct allocation
page read and write
415D000
direct allocation
page read and write
331C000
stack
page read and write
BE81000
heap
page read and write
36D8000
trusted library allocation
page read and write
3283000
heap
page read and write
29F1000
trusted library allocation
page read and write
BDEC000
heap
page read and write
3C85000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page read and write
7C08000
trusted library allocation
page read and write
11CE000
stack
page read and write
570B000
trusted library allocation
page read and write
5401000
heap
page read and write
685D000
stack
page read and write
8100000
trusted library allocation
page read and write
4D80000
heap
page read and write
991000
unkown
page execute read
2B10000
trusted library allocation
page read and write
3112000
heap
page read and write
3DAE000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
DCE000
stack
page read and write
1889000
heap
page read and write
30D0000
heap
page read and write
990000
unkown
page readonly
1950000
trusted library allocation
page read and write
3A60000
direct allocation
page read and write
294F000
trusted library allocation
page read and write
39E7000
trusted library allocation
page read and write
3060000
heap
page read and write
3FB3000
direct allocation
page read and write
585C000
trusted library allocation
page read and write
3C58000
trusted library allocation
page read and write
CC0000
heap
page read and write
369E000
trusted library allocation
page read and write
5BBB000
heap
page read and write
5930000
trusted library allocation
page execute and read and write
3312000
heap
page read and write
3C19000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
38D6000
trusted library allocation
page read and write
5B5C000
stack
page read and write
8550000
heap
page read and write
3BFE000
direct allocation
page read and write
6701000
trusted library allocation
page read and write
1542000
heap
page read and write
4D22000
trusted library allocation
page read and write
FB031FE000
stack
page read and write
7DB0000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
5501000
heap
page execute and read and write
7C19000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
69FE000
heap
page read and write
14E4000
heap
page read and write
2A1A000
trusted library allocation
page read and write
11CF000
stack
page read and write
6700000
trusted library allocation
page read and write
5601000
heap
page read and write
3A60000
direct allocation
page read and write
4CA0000
trusted library allocation
page read and write
67F2000
trusted library allocation
page read and write
49A000
stack
page read and write
3924000
trusted library allocation
page read and write
960000
heap
page read and write
852E000
stack
page read and write
F93000
heap
page execute and read and write
409D000
direct allocation
page read and write
2C8C000
trusted library allocation
page read and write
37D0000
heap
page read and write
A1F000
unkown
page readonly
A1F000
unkown
page readonly
7D41000
trusted library allocation
page read and write
73A0000
trusted library allocation
page execute and read and write
EFE000
heap
page read and write
6DBE000
stack
page read and write
2B7000
unkown
page readonly
BE39000
heap
page read and write
38C0000
direct allocation
page read and write
EAB000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
3A37000
trusted library allocation
page read and write
550000
heap
page read and write
3C63000
trusted library allocation
page read and write
2C7A000
stack
page read and write
F95000
heap
page read and write
59E0000
trusted library allocation
page execute and read and write
3261000
heap
page read and write
3C94000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
388D000
trusted library allocation
page read and write
3EF3000
direct allocation
page read and write
5760000
trusted library allocation
page read and write
730B000
stack
page read and write
326D000
heap
page read and write
3EF3000
direct allocation
page read and write
506A000
trusted library allocation
page execute and read and write
7FF0000
trusted library allocation
page read and write
BE97000
heap
page read and write
29F9000
trusted library allocation
page read and write
3C5B000
trusted library allocation
page read and write
75CE000
stack
page read and write
3DA8000
trusted library allocation
page read and write
14CE000
heap
page read and write
4C90000
trusted library allocation
page read and write
10C77000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
400000
system
page execute and read and write
5CBC000
stack
page read and write
69AA000
heap
page read and write
7FD0000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
17C7000
heap
page read and write
1880000
heap
page read and write
3C68000
trusted library allocation
page read and write
51EE000
stack
page read and write
7D80000
trusted library allocation
page read and write
2B763798000
heap
page read and write
370E000
trusted library allocation
page read and write
3D0E000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
93E000
stack
page read and write
3C98000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
1547000
heap
page read and write
39E3000
direct allocation
page read and write
5870000
heap
page read and write
8010000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
3D5D000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
3C8B000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
50EE000
stack
page read and write
14A3000
heap
page read and write
37CA000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
1029000
heap
page read and write
51CF000
stack
page read and write
2D33000
trusted library allocation
page read and write
3D63000
trusted library allocation
page read and write
38C0000
direct allocation
page read and write
FB032FE000
stack
page read and write
4DF0000
heap
page read and write
2C02000
trusted library allocation
page read and write
7E3E000
stack
page read and write
5B0000
heap
page read and write
5822000
trusted library allocation
page read and write
7DDE000
stack
page read and write
1937000
trusted library allocation
page execute and read and write
555000
heap
page read and write
5769000
trusted library allocation
page read and write
396E000
trusted library allocation
page read and write
3D28000
trusted library allocation
page read and write
BF0000
heap
page read and write
2E30000
trusted library allocation
page read and write
813C000
stack
page read and write
14AF000
heap
page read and write
7EC0000
trusted library allocation
page read and write
9F4000
heap
page read and write
80FE000
stack
page read and write
5839000
trusted library allocation
page read and write
4DA5000
trusted library allocation
page read and write
6980000
heap
page read and write
DB12000
trusted library allocation
page read and write
6C80000
trusted library allocation
page execute and read and write
32D7000
heap
page read and write
1490000
heap
page read and write
27A1000
trusted library allocation
page read and write
400000
system
page execute and read and write
4B8000
system
page execute and read and write
699E000
heap
page read and write
37FB000
trusted library allocation
page read and write
990000
unkown
page readonly
6E30000
trusted library allocation
page read and write
7DD5000
trusted library allocation
page read and write
2CB8000
stack
page read and write
6832000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
5067000
trusted library allocation
page execute and read and write
1008000
heap
page read and write
FB02DFE000
stack
page read and write
71CE000
stack
page read and write
3220000
heap
page execute and read and write
1F0000
unkown
page readonly
6835000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
3277000
heap
page read and write
32DF000
heap
page read and write
13E7E000
stack
page read and write
14D0000
heap
page read and write
7DE0000
trusted library allocation
page read and write
327D000
heap
page read and write
1900000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
A57000
unkown
page readonly
8360000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
7C0E000
trusted library allocation
page read and write
3DBE000
trusted library allocation
page read and write
5B40000
heap
page read and write
5A10000
trusted library allocation
page read and write
3B89000
trusted library allocation
page read and write
3BCB000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
6B90000
heap
page read and write
83CE000
stack
page read and write
5970000
trusted library allocation
page read and write
4099000
direct allocation
page read and write
155F000
heap
page read and write
3431000
trusted library allocation
page read and write
39E3000
direct allocation
page read and write
2BE9000
trusted library allocation
page read and write
1B2E000
stack
page read and write
725E000
stack
page read and write
2AF1000
trusted library allocation
page read and write
5A7C000
stack
page read and write
6ADC000
stack
page read and write
6E1E000
stack
page read and write
5720000
trusted library allocation
page read and write
144F000
heap
page read and write
38C0000
direct allocation
page read and write
149D000
heap
page read and write
7FE0000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
2210000
heap
page read and write
5050000
trusted library allocation
page read and write
3C9D000
trusted library allocation
page read and write
4CF6000
trusted library allocation
page execute and read and write
7F80000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
2D9E000
stack
page read and write
3B8D000
direct allocation
page read and write
7340000
heap
page read and write
4159000
direct allocation
page read and write
695F000
stack
page read and write
3C3F000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
3CF3000
trusted library allocation
page read and write
10C5E000
trusted library allocation
page read and write
7EA6000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
3BF3000
trusted library allocation
page read and write
3BB5000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
5746000
trusted library allocation
page read and write
3C23000
trusted library allocation
page read and write
521F000
heap
page read and write
A57000
unkown
page readonly
126E000
stack
page read and write
2BBA000
trusted library allocation
page read and write
5D7B000
stack
page read and write
2B763590000
heap
page read and write
2AC5000
trusted library allocation
page read and write
There are 1356 hidden memdumps, click here to show them.