IOC Report
Fedex-shipping_Document_NB289-KB2025.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps1510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
Fedex-shipping_Document_NB289-KB2025.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\build.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\snails\hepatoduodenostomy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hepatoduodenostomy.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut83.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autCD5D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD6A4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\preinhered
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fedex-shipping_Document_NB289-KB2025.exe
"C:\Users\user\Desktop\Fedex-shipping_Document_NB289-KB2025.exe"
malicious
C:\Users\user\AppData\Local\snails\hepatoduodenostomy.exe
"C:\Users\user\Desktop\Fedex-shipping_Document_NB289-KB2025.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Fedex-shipping_Document_NB289-KB2025.exe"
malicious
C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe
"C:\Users\user\AppData\Local\Temp\Origin_rawfile.exe"
malicious
C:\Users\user\AppData\Local\Temp\build.exe
"C:\Users\user\AppData\Local\Temp\build.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hepatoduodenostomy.vbs"
malicious
C:\Users\user\AppData\Local\snails\hepatoduodenostomy.exe
"C:\Users\user\AppData\Local\snails\hepatoduodenostomy.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\snails\hepatoduodenostomy.exe"
malicious

URLs

Name
IP
Malicious
204.10.161.147:7082
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://xma0.com
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://ip-api.com
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.t.co
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://x1.c.lencr.orgwYd
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://r10.o.lencr.org0#
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://r10.c.lencr.org/111.crl0
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://r10.i.lencr.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xma0.com
51.195.65.154
malicious
mail.xma0.com
unknown
malicious
ip-api.com
208.95.112.1
ax-0001.ax-msedge.net
150.171.27.10
tse1.mm.bing.net
unknown

IPs

IP
Domain
Country
Malicious
204.10.161.147
unknown
Canada
malicious
51.195.65.154
xma0.com
France
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Origin_rawfile_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7430000
trusted library section
page read and write
malicious
FB2000
unkown
page readonly
malicious
6D41000
trusted library allocation
page read and write
malicious
6C05000
trusted library allocation
page read and write
malicious
8260000
trusted library section
page read and write
malicious
4800000
heap
page read and write
malicious
5E05000
trusted library allocation
page read and write
malicious
8200000
heap
page read and write
malicious
60BF000
trusted library allocation
page read and write
malicious
DD2000
unkown
page readonly
malicious
7320000
trusted library section
page read and write
malicious
3406000
trusted library allocation
page read and write
malicious
3181000
trusted library allocation
page read and write
malicious
5E39000
trusted library allocation
page read and write
malicious
8150000
trusted library section
page read and write
malicious
5F41000
trusted library allocation
page read and write
malicious
3131000
trusted library allocation
page read and write
malicious
5600000
heap
page read and write
malicious
7400000
heap
page read and write
malicious
454A000
trusted library allocation
page read and write
5D9E000
stack
page read and write
F01C7EA000
stack
page read and write
812000
heap
page read and write
1115000
heap
page read and write
7510000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
8232000
trusted library allocation
page read and write
4E39000
trusted library allocation
page read and write
247623C0000
heap
page read and write
36C5000
heap
page read and write
44E2000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
117C000
heap
page read and write
FFC000
stack
page read and write
36AF000
heap
page read and write
820000
heap
page read and write
8390000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
C54000
heap
page read and write
3503000
trusted library allocation
page read and write
11B1000
heap
page read and write
882000
heap
page read and write
4550000
trusted library allocation
page read and write
452A000
trusted library allocation
page read and write
13DF000
heap
page read and write
15F0000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
36D0000
trusted library allocation
page read and write
76C2000
heap
page read and write
3A7B000
trusted library allocation
page read and write
5837000
trusted library allocation
page execute and read and write
7500000
trusted library allocation
page read and write
3C91000
trusted library allocation
page read and write
453E000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
6590000
trusted library allocation
page read and write
74C0000
heap
page read and write
3790000
heap
page read and write
15B0000
heap
page read and write
1E5F000
stack
page read and write
44A3000
trusted library allocation
page read and write
82D000
heap
page read and write
5E9F000
stack
page read and write
880000
heap
page read and write
24762460000
heap
page read and write
3BB0000
trusted library allocation
page read and write
86FE000
stack
page read and write
7FA70000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
5207000
heap
page read and write
4359000
direct allocation
page read and write
3A72000
trusted library allocation
page read and write
168B000
heap
page read and write
43A3000
trusted library allocation
page read and write
9BF000
stack
page read and write
47FD000
trusted library allocation
page read and write
4090000
direct allocation
page read and write
7703000
heap
page read and write
45DB000
trusted library allocation
page read and write
45E5000
trusted library allocation
page read and write
3791000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
3723000
direct allocation
page read and write
30C2000
trusted library allocation
page read and write
1DF000
unkown
page readonly
73F0000
trusted library allocation
page read and write
20E000
unkown
page write copy
24762390000
heap
page read and write
34CA000
trusted library allocation
page read and write
3C6B000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
6DA6000
trusted library allocation
page read and write
1099000
stack
page read and write
3712000
heap
page read and write
3676000
trusted library allocation
page read and write
4802000
trusted library allocation
page read and write
339D000
stack
page read and write
400000
system
page execute and read and write
36DB000
trusted library allocation
page read and write
3C96000
trusted library allocation
page read and write
73E4000
trusted library allocation
page read and write
480E000
trusted library allocation
page read and write
10F6000
heap
page read and write
3647000
trusted library allocation
page read and write
1603000
trusted library allocation
page execute and read and write
2F4E000
stack
page read and write
2F90000
trusted library allocation
page execute and read and write
37A0000
direct allocation
page read and write
8235000
trusted library allocation
page read and write
3689000
heap
page read and write
4898000
trusted library allocation
page read and write
8218000
trusted library allocation
page read and write
4401000
heap
page read and write
37A0000
direct allocation
page read and write
9FC000
stack
page read and write
4425000
trusted library allocation
page read and write
3220000
heap
page read and write
13FE000
stack
page read and write
7290000
heap
page read and write
72E2000
trusted library allocation
page read and write
681E000
heap
page read and write
6C90000
heap
page read and write
5B62000
trusted library allocation
page read and write
6C3D000
trusted library allocation
page read and write
4E1E000
trusted library allocation
page read and write
7BFC000
stack
page read and write
3D7B000
trusted library allocation
page read and write
30D7000
trusted library allocation
page execute and read and write
4880000
trusted library allocation
page read and write
389B000
trusted library allocation
page read and write
1DE0000
heap
page read and write
5860000
heap
page execute and read and write
8330000
trusted library allocation
page read and write
4490000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4889000
trusted library allocation
page read and write
852000
heap
page read and write
69DD000
stack
page read and write
10EA000
heap
page read and write
484D000
trusted library allocation
page read and write
326F000
stack
page read and write
3859000
trusted library allocation
page read and write
B14000
heap
page read and write
5815000
trusted library allocation
page read and write
3AD0000
trusted library allocation
page read and write
1789000
heap
page read and write
37A0000
direct allocation
page read and write
84E0000
heap
page read and write
17AE000
heap
page read and write
16B8000
heap
page read and write
7C3E000
stack
page read and write
3794000
heap
page read and write
72A2000
trusted library allocation
page read and write
15C0000
heap
page read and write
204000
unkown
page readonly
3642000
trusted library allocation
page read and write
4846000
trusted library allocation
page read and write
3324000
trusted library allocation
page read and write
59F0000
trusted library allocation
page execute and read and write
3493000
trusted library allocation
page read and write
36E0000
direct allocation
page read and write
83E000
heap
page read and write
6C20000
trusted library allocation
page read and write
7EEE000
stack
page read and write
457A000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
43FA000
trusted library allocation
page execute and read and write
30C6000
trusted library allocation
page execute and read and write
8520000
trusted library allocation
page read and write
AB000
stack
page read and write
38C2000
trusted library allocation
page read and write
4299000
direct allocation
page read and write
3B75000
trusted library allocation
page read and write
39D9000
trusted library allocation
page read and write
3FC0000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
36C9000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
4593000
trusted library allocation
page read and write
675E000
stack
page read and write
368B000
heap
page read and write
1632000
trusted library allocation
page read and write
4513000
trusted library allocation
page read and write
5B7D000
stack
page read and write
317D000
trusted library allocation
page read and write
88B000
heap
page read and write
1DF000
unkown
page readonly
33F0000
heap
page read and write
7720000
trusted library allocation
page read and write
803F000
stack
page read and write
4538000
trusted library allocation
page read and write
36F7000
trusted library allocation
page read and write
67E1000
heap
page read and write
55E6000
trusted library allocation
page read and write
4A7E000
stack
page read and write
30A4000
trusted library allocation
page read and write
3A68000
trusted library allocation
page read and write
1626000
trusted library allocation
page execute and read and write
15B7000
heap
page read and write
1346000
heap
page read and write
38A7000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
140E000
stack
page read and write
204000
unkown
page readonly
120000
heap
page read and write
CEE000
heap
page execute and read and write
30D2000
trusted library allocation
page read and write
CE7000
heap
page read and write
32D5000
trusted library allocation
page read and write
169F000
stack
page read and write
6D90000
trusted library allocation
page execute and read and write
88A000
heap
page read and write
3B0B000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
44C1000
trusted library allocation
page read and write
39A9000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
3540000
direct allocation
page read and write
158E000
stack
page read and write
1789000
heap
page read and write
45CB000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
3FB6000
trusted library allocation
page read and write
85F5000
trusted library allocation
page read and write
404D000
trusted library allocation
page read and write
65A0000
trusted library allocation
page execute and read and write
43CE000
direct allocation
page read and write
6560000
trusted library allocation
page execute and read and write
67B9000
heap
page read and write
11B6000
heap
page read and write
43D0000
trusted library allocation
page read and write
43CD000
trusted library allocation
page read and write
5E0000
heap
page read and write
456E000
trusted library allocation
page read and write
3600000
heap
page read and write
3C8A000
trusted library allocation
page read and write
7405000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
3540000
direct allocation
page read and write
5EF0000
trusted library allocation
page read and write
217000
unkown
page readonly
A801000
heap
page read and write
E8000
stack
page read and write
305F000
heap
page read and write
470000
unkown
page readonly
7C0E000
stack
page read and write
3F2A000
trusted library allocation
page read and write
43CE000
direct allocation
page read and write
43C2000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
4A02000
trusted library allocation
page read and write
68F9000
heap
page read and write
7330000
trusted library allocation
page read and write
B50000
heap
page read and write
6580000
trusted library allocation
page read and write
3CB2000
trusted library allocation
page read and write
3D74000
trusted library allocation
page read and write
390000
heap
page read and write
4E60000
trusted library allocation
page read and write
52E000
unkown
page write copy
2FE8000
stack
page read and write
43FA000
trusted library allocation
page read and write
7C4E000
stack
page read and write
3734000
heap
page read and write
43BB000
trusted library allocation
page read and write
3C5E000
trusted library allocation
page read and write
4407000
trusted library allocation
page read and write
44A6000
trusted library allocation
page read and write
593C000
stack
page read and write
6AD0000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
3765000
trusted library allocation
page read and write
247627A0000
heap
page read and write
3D9C000
trusted library allocation
page read and write
1476000
heap
page read and write
1668000
heap
page read and write
483B000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
5400000
heap
page read and write
3643000
heap
page read and write
1300000
heap
page read and write
8204000
trusted library allocation
page read and write
45AD000
trusted library allocation
page read and write
212000
unkown
page write copy
8DD000
heap
page read and write
84D0000
heap
page read and write
6550000
trusted library allocation
page read and write
107D000
stack
page read and write
4E41000
trusted library allocation
page read and write
5212000
heap
page read and write
7500000
trusted library allocation
page read and write
2C1E000
stack
page read and write
24763F60000
heap
page read and write
5955000
trusted library allocation
page read and write
30D5000
trusted library allocation
page execute and read and write
3189000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
F01D2FF000
stack
page read and write
362B000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
41D2000
trusted library allocation
page read and write
67B4000
heap
page read and write
430E000
direct allocation
page read and write
44B5000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
4E1A000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
4299000
direct allocation
page read and write
170000
heap
page read and write
45D0000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
537000
unkown
page readonly
6FCE000
stack
page read and write
1770000
heap
page execute and read and write
116D000
heap
page read and write
400000
system
page execute and read and write
3198000
trusted library allocation
page read and write
4B8000
system
page execute and read and write
4E26000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
9B0000
heap
page read and write
7305000
trusted library allocation
page read and write
67A5000
heap
page read and write
47EA000
trusted library allocation
page read and write
3809000
direct allocation
page read and write
7760000
trusted library allocation
page read and write
76FF000
stack
page read and write
7708000
heap
page read and write
39CF000
trusted library allocation
page read and write
4170000
direct allocation
page read and write
835C000
stack
page read and write
16B0000
heap
page read and write
524000
unkown
page readonly
247627AE000
heap
page read and write
75D0000
trusted library allocation
page read and write
4892000
trusted library allocation
page read and write
3C7F000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
1647000
heap
page read and write
10E8000
heap
page read and write
875000
heap
page read and write
EAA000
stack
page read and write
398E000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
C35000
heap
page read and write
34E7000
trusted library allocation
page read and write
4612000
heap
page read and write
36E0000
direct allocation
page read and write
140000
heap
page read and write
247623A0000
heap
page read and write
36E0000
direct allocation
page read and write
83A0000
trusted library allocation
page read and write
3723000
direct allocation
page read and write
4469000
trusted library allocation
page read and write
435D000
direct allocation
page read and write
7310000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
429D000
direct allocation
page read and write
4FF000
unkown
page readonly
5E01000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
8229000
trusted library allocation
page read and write
445D000
trusted library allocation
page read and write
6997000
heap
page read and write
2EED000
stack
page read and write
84A000
heap
page read and write
5B56000
trusted library allocation
page read and write
471000
unkown
page execute read
1353000
heap
page read and write
7420000
trusted library allocation
page read and write
B10000
heap
page read and write
3540000
direct allocation
page read and write
2000000
direct allocation
page read and write
7416000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
1410000
heap
page read and write
85FE000
stack
page read and write
8370000
trusted library allocation
page read and write
8338000
trusted library allocation
page read and write
8340000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
81CD000
stack
page read and write
8560000
trusted library allocation
page read and write
581E000
stack
page read and write
47FF000
trusted library allocation
page read and write
4754000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
537000
unkown
page readonly
1210000
heap
page read and write
730F000
trusted library allocation
page read and write
5B01000
heap
page execute and read and write
3636000
trusted library allocation
page read and write
BF3000
heap
page read and write
610A000
trusted library allocation
page read and write
44F4000
trusted library allocation
page read and write
33DE000
stack
page read and write
20E000
unkown
page read and write
57B0000
trusted library allocation
page read and write
446E000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
34EB000
trusted library allocation
page read and write
65D0000
trusted library allocation
page execute and read and write
72BD000
trusted library allocation
page read and write
39FE000
stack
page read and write
8880000
trusted library allocation
page execute and read and write
83F0000
trusted library allocation
page read and write
393E000
direct allocation
page read and write
4600000
heap
page read and write
646A000
heap
page read and write
36B8000
heap
page read and write
247627A5000
heap
page read and write
387E000
direct allocation
page read and write
883000
heap
page read and write
4533000
trusted library allocation
page read and write
5A40000
heap
page execute and read and write
85C0000
trusted library allocation
page read and write
4230000
direct allocation
page read and write
69AD000
stack
page read and write
36CB000
heap
page read and write
4090000
direct allocation
page read and write
4371000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
863000
heap
page read and write
4400000
trusted library allocation
page read and write
44DB000
trusted library allocation
page read and write
11A9000
heap
page execute and read and write
678E000
heap
page read and write
10B4000
heap
page read and write
8360000
trusted library allocation
page read and write
16EF000
heap
page read and write
6F8E000
stack
page read and write
37A5000
trusted library allocation
page read and write
C27000
heap
page read and write
8380000
trusted library allocation
page read and write
3663000
direct allocation
page read and write
9D0000
heap
page read and write
8600000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
18B0000
heap
page read and write
F01CEFE000
stack
page read and write
4170000
direct allocation
page read and write
72E9000
trusted library allocation
page read and write
4E43000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
8306000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
3652000
heap
page read and write
5108000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
470000
unkown
page readonly
566C000
stack
page read and write
34A2000
trusted library allocation
page read and write
745E000
stack
page read and write
1470000
heap
page read and write
1E0000
heap
page read and write
3599000
heap
page read and write
30BD000
trusted library allocation
page execute and read and write
57DD000
trusted library allocation
page read and write
5B4B000
trusted library allocation
page read and write
FDB000
stack
page read and write
36FC000
heap
page read and write
BFB000
heap
page read and write
143C000
stack
page read and write
1755000
heap
page read and write
3A80000
direct allocation
page read and write
683B000
heap
page read and write
4413000
trusted library allocation
page read and write
435D000
direct allocation
page read and write
3480000
direct allocation
page read and write
24762467000
heap
page read and write
57BB000
trusted library allocation
page read and write
67D0000
heap
page read and write
30A0000
trusted library allocation
page read and write
43DE000
trusted library allocation
page read and write
440A000
trusted library allocation
page read and write
1310000
heap
page read and write
5C46000
trusted library allocation
page read and write
380D000
direct allocation
page read and write
38CD000
direct allocation
page read and write
5803000
trusted library allocation
page execute and read and write
8580000
trusted library allocation
page read and write
7A7E000
stack
page read and write
4E2B000
trusted library allocation
page read and write
771C000
heap
page read and write
3A1F000
trusted library allocation
page read and write
4BD0000
heap
page execute and read and write
1610000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
4172000
trusted library allocation
page read and write
8206000
trusted library allocation
page read and write
3C78000
trusted library allocation
page read and write
14C0000
heap
page read and write
17AF000
heap
page read and write
45B4000
trusted library allocation
page read and write
14C5000
heap
page read and write
700E000
stack
page read and write
32A000
stack
page read and write
18F0000
heap
page read and write
3600000
direct allocation
page read and write
67C1000
heap
page read and write
36E8000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
F01CAFE000
stack
page read and write
6C28000
trusted library allocation
page read and write
362A000
heap
page read and write
30B0000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
24762438000
heap
page read and write
85B0000
trusted library allocation
page read and write
CEF000
heap
page read and write
487A000
trusted library allocation
page read and write
3B8D000
trusted library allocation
page read and write
10BD000
heap
page read and write
435D000
direct allocation
page read and write
168B000
heap
page read and write
4E5A000
trusted library allocation
page read and write
51B0000
heap
page read and write
6C8D000
stack
page read and write
7729000
trusted library allocation
page read and write
43AE000
trusted library allocation
page read and write
43D4000
trusted library allocation
page read and write
1197000
stack
page read and write
43E0000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
51A0000
heap
page read and write
84F000
heap
page read and write
8F2000
heap
page read and write
2F00000
trusted library allocation
page read and write
8ED000
heap
page read and write
72E5000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
7280000
heap
page read and write
74E0000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
2020000
heap
page read and write
44FE000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
F01CDFF000
stack
page read and write
3350000
heap
page readonly
80E0000
heap
page execute and read and write
8214000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
4359000
direct allocation
page read and write
8330000
trusted library allocation
page read and write
3FD0000
direct allocation
page read and write
6858000
heap
page read and write
387E000
direct allocation
page read and write
7540000
trusted library allocation
page read and write
4416000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
3B54000
trusted library allocation
page read and write
912000
heap
page read and write
5C1C000
trusted library allocation
page read and write
160D000
trusted library allocation
page execute and read and write
36E4000
heap
page read and write
877E000
stack
page read and write
6F4C000
stack
page read and write
3BF3000
direct allocation
page read and write
5C39000
trusted library allocation
page read and write
1098000
heap
page read and write
3663000
direct allocation
page read and write
793E000
stack
page read and write
665D000
stack
page read and write
4578000
trusted library allocation
page read and write
169A000
heap
page read and write
3AA1000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
3360000
heap
page execute and read and write
4A07000
trusted library allocation
page execute and read and write
384F000
trusted library allocation
page read and write
471000
unkown
page execute read
36E8000
heap
page read and write
326D000
trusted library allocation
page read and write
724E000
stack
page read and write
161E000
stack
page read and write
7750000
heap
page read and write
8390000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
67EB000
heap
page read and write
3624000
trusted library allocation
page read and write
38A2000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
20E000
unkown
page write copy
11C6000
heap
page read and write
6802000
heap
page read and write
8559000
trusted library allocation
page read and write
749E000
stack
page read and write
83C0000
trusted library allocation
page read and write
84FF000
stack
page read and write
524000
unkown
page readonly
6C30000
trusted library allocation
page read and write
448A000
trusted library allocation
page read and write
6804000
heap
page read and write
40F3000
direct allocation
page read and write
5830000
heap
page execute and read and write
41B3000
direct allocation
page read and write
5C0E000
trusted library allocation
page read and write
4827000
trusted library allocation
page read and write
141B000
stack
page read and write
1630000
trusted library allocation
page read and write
4170000
direct allocation
page read and write
AAE0000
trusted library allocation
page read and write
4501000
heap
page read and write
8351000
trusted library allocation
page read and write
12F0000
heap
page read and write
7787000
heap
page read and write
327A000
trusted library allocation
page read and write
4E58000
trusted library allocation
page read and write
74D6000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page execute and read and write
5890000
trusted library allocation
page read and write
8891000
trusted library allocation
page read and write
3C3F000
trusted library allocation
page read and write
4575000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
16B8000
heap
page read and write
74F0000
trusted library allocation
page read and write
10E7000
heap
page read and write
177A000
heap
page read and write
6C1E000
stack
page read and write
FE7000
unkown
page readonly
36B0000
heap
page read and write
1400000
heap
page read and write
F01D0FE000
stack
page read and write
472C000
trusted library allocation
page read and write
FF6000
unkown
page readonly
5960000
heap
page read and write
4858000
trusted library allocation
page read and write
3FB2000
trusted library allocation
page read and write
144B000
stack
page read and write
4479000
trusted library allocation
page read and write
4129000
trusted library allocation
page read and write
714C000
stack
page read and write
5F00000
trusted library allocation
page execute and read and write
47F9000
trusted library allocation
page read and write
76FC000
heap
page read and write
4101000
trusted library allocation
page read and write
36B1000
heap
page read and write
1CE000
stack
page read and write
5B3E000
stack
page read and write
161D000
trusted library allocation
page execute and read and write
59EC000
stack
page read and write
36B2000
heap
page read and write
36CD000
heap
page read and write
36F1000
trusted library allocation
page read and write
86C000
heap
page read and write
3402000
heap
page read and write
5ECB000
trusted library allocation
page read and write
82B000
heap
page read and write
4E46000
trusted library allocation
page read and write
47DD000
trusted library allocation
page read and write
10E9000
heap
page read and write
40F3000
direct allocation
page read and write
8E9000
heap
page read and write
73DE000
stack
page read and write
B0E000
stack
page read and write
72A0000
trusted library allocation
page read and write
76DB000
heap
page read and write
16C5000
heap
page read and write
6D8C000
stack
page read and write
4563000
trusted library allocation
page read and write
4536000
trusted library allocation
page read and write
7400000
trusted library allocation
page execute and read and write
7314000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
7ABE000
stack
page read and write
8EB000
heap
page read and write
55EB000
trusted library allocation
page read and write
57E2000
trusted library allocation
page read and write
3D86000
trusted library allocation
page read and write
4863000
trusted library allocation
page read and write
217000
unkown
page readonly
884000
heap
page read and write
7780000
trusted library allocation
page read and write
8402000
heap
page read and write
4212000
trusted library allocation
page read and write
45FC000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
4568000
trusted library allocation
page read and write
1635000
trusted library allocation
page execute and read and write
4A20000
trusted library allocation
page read and write
3649000
heap
page read and write
77D0000
trusted library allocation
page read and write
34ED000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
11AA000
heap
page read and write
4E52000
trusted library allocation
page read and write
4431000
trusted library allocation
page read and write
38C9000
direct allocation
page read and write
88A0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
371C000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
40F3000
direct allocation
page read and write
4D01000
heap
page execute and read and write
3AB3000
trusted library allocation
page read and write
5963000
heap
page read and write
36D1000
heap
page read and write
16B8000
heap
page read and write
689E000
stack
page read and write
5A3E000
stack
page read and write
13BB000
heap
page read and write
37C1000
trusted library allocation
page read and write
4BBE000
stack
page read and write
3D29000
trusted library allocation
page read and write
4395000
trusted library allocation
page read and write
677A000
heap
page read and write
5DE0000
heap
page read and write
3C9B000
trusted library allocation
page read and write
5C7E000
stack
page read and write
4230000
direct allocation
page read and write
217000
unkown
page readonly
773E000
heap
page read and write
821E000
trusted library allocation
page read and write
8340000
trusted library allocation
page read and write
38FE000
stack
page read and write
F01CBFF000
stack
page read and write
7710000
trusted library allocation
page read and write
7F1F0000
trusted library allocation
page execute and read and write
7EF6000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
699B000
heap
page read and write
443E000
trusted library allocation
page read and write
3D48000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
583B000
trusted library allocation
page execute and read and write
72FA000
trusted library allocation
page read and write
57DE000
stack
page read and write
5C3D000
trusted library allocation
page read and write
3600000
direct allocation
page read and write
36C0000
direct allocation
page read and write
88A0000
trusted library allocation
page read and write
43D4000
trusted library allocation
page read and write
3FAA000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
3CE0000
trusted library allocation
page read and write
843000
heap
page read and write
7780000
heap
page read and write
1470000
heap
page read and write
1683000
heap
page read and write
3261000
trusted library allocation
page read and write
4566000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
59BE000
stack
page read and write
900000
heap
page read and write
67C4000
heap
page read and write
16B9000
heap
page read and write
481A000
trusted library allocation
page read and write
43D3000
trusted library allocation
page execute and read and write
820E000
trusted library allocation
page read and write
81D0000
heap
page read and write
35AD000
trusted library allocation
page read and write
3A79000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
6ADE000
stack
page read and write
45A0000
trusted library allocation
page read and write
24762493000
heap
page read and write
83B0000
trusted library allocation
page read and write
80F0000
trusted library allocation
page read and write
7C8E000
stack
page read and write
3229000
trusted library allocation
page read and write
1590000
heap
page read and write
7760000
heap
page read and write
357E000
trusted library allocation
page read and write
8D9000
heap
page read and write
319A000
trusted library allocation
page read and write
F01D4FB000
stack
page read and write
F01D3FF000
stack
page read and write
4464000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
546B000
stack
page read and write
43F7000
trusted library allocation
page execute and read and write
460A000
trusted library allocation
page read and write
C29000
heap
page read and write
39BD000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
7260000
heap
page read and write
380D000
direct allocation
page read and write
18AF000
stack
page read and write
8320000
trusted library allocation
page read and write
7521000
trusted library allocation
page read and write
362D000
heap
page read and write
37D8000
trusted library allocation
page read and write
10E9000
heap
page read and write
17AD000
heap
page read and write
BFB000
heap
page read and write
362D000
trusted library allocation
page read and write
3600000
direct allocation
page read and write
16E4000
heap
page read and write
CFF000
heap
page read and write
4543000
trusted library allocation
page read and write
43DD000
trusted library allocation
page execute and read and write
4602000
trusted library allocation
page read and write
174A000
heap
page read and write
5C2B000
trusted library allocation
page read and write
103A000
stack
page read and write
5B71000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
6ADB000
trusted library allocation
page read and write
399E000
trusted library allocation
page read and write
41F2000
trusted library allocation
page read and write
145E000
stack
page read and write
75F0000
trusted library allocation
page read and write
CC9000
heap
page read and write
3786000
trusted library allocation
page read and write
3651000
heap
page read and write
3983000
trusted library allocation
page read and write
39D4000
trusted library allocation
page read and write
7C90000
trusted library allocation
page execute and read and write
8226000
trusted library allocation
page read and write
3663000
direct allocation
page read and write
3FC6000
trusted library allocation
page read and write
3A86000
heap
page read and write
682C000
heap
page read and write
35A2000
trusted library allocation
page read and write
45BF000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
3730000
heap
page read and write
6B1E000
stack
page read and write
4E5C000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
486D000
trusted library allocation
page read and write
43E4000
trusted library allocation
page read and write
85F0000
trusted library allocation
page read and write
8332000
trusted library allocation
page read and write
68FB000
heap
page read and write
39C8000
trusted library allocation
page read and write
430E000
direct allocation
page read and write
6856000
heap
page read and write
43C0000
trusted library allocation
page read and write
2B1E000
stack
page read and write
36CB000
heap
page read and write
30F0000
heap
page read and write
7F3E000
stack
page read and write
4230000
direct allocation
page read and write
4FF000
unkown
page readonly
5C54000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
3A87000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
67D6000
heap
page read and write
8500000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
103E000
stack
page read and write
63FB000
stack
page read and write
44AE000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
541F000
heap
page read and write
3FBC000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7DEE000
stack
page read and write
7700000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
A800000
heap
page read and write
1640000
heap
page read and write
34EF000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
169A000
heap
page read and write
1620000
trusted library allocation
page read and write
602000
heap
page read and write
5820000
trusted library allocation
page read and write
6760000
heap
page read and write
7560000
trusted library allocation
page read and write
685D000
heap
page read and write
4E20000
trusted library allocation
page read and write
4B7E000
stack
page read and write
8370000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
6460000
heap
page read and write
710E000
stack
page read and write
24762430000
heap
page read and write
3D33000
trusted library allocation
page read and write
151000
unkown
page execute read
4045000
trusted library allocation
page read and write
368C000
heap
page read and write
4873000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
34E5000
trusted library allocation
page read and write
5301000
heap
page read and write
68A0000
heap
page read and write
38CD000
direct allocation
page read and write
6825000
heap
page read and write
7D9D000
stack
page read and write
77F0000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
783E000
stack
page read and write
4042000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
30AD000
trusted library allocation
page execute and read and write
3BAB000
trusted library allocation
page read and write
C28000
heap
page read and write
5F10000
trusted library allocation
page read and write
64AD000
stack
page read and write
399C000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
4E22000
trusted library allocation
page read and write
41B3000
direct allocation
page read and write
5EC5000
trusted library allocation
page read and write
581D000
trusted library allocation
page execute and read and write
366D000
heap
page read and write
3890000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
204000
unkown
page readonly
4192000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
5ECE000
trusted library allocation
page read and write
CE6000
heap
page execute and read and write
5DBF000
stack
page read and write
3270000
heap
page read and write
5200000
heap
page read and write
5C43000
trusted library allocation
page read and write
44CE000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
3723000
direct allocation
page read and write
731E000
stack
page read and write
81E0000
heap
page read and write
379E000
trusted library allocation
page read and write
66F0000
trusted library allocation
page execute and read and write
57D1000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
4605000
trusted library allocation
page read and write
4C01000
heap
page read and write
580E000
trusted library allocation
page read and write
8350000
trusted library allocation
page read and write
204000
unkown
page readonly
4560000
trusted library allocation
page read and write
1767000
heap
page read and write
316E000
trusted library allocation
page read and write
36CF000
heap
page read and write
376A000
trusted library allocation
page read and write
7BBE000
stack
page read and write
6999000
heap
page read and write
72F8000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
3FD0000
direct allocation
page read and write
8890000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
679D000
stack
page read and write
3240000
heap
page read and write
3861000
trusted library allocation
page read and write
5A3E000
stack
page read and write
3373000
trusted library allocation
page read and write
724C000
stack
page read and write
5B7A000
trusted library allocation
page read and write
C26000
heap
page read and write
30B0000
trusted library allocation
page read and write
7680000
heap
page read and write
88FE000
stack
page read and write
162A000
trusted library allocation
page execute and read and write
1604000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
387E000
direct allocation
page read and write
17CF000
stack
page read and write
38AC000
trusted library allocation
page read and write
C28000
heap
page read and write
714B000
stack
page read and write
8250000
trusted library allocation
page read and write
3ADB000
trusted library allocation
page read and write
C26000
heap
page read and write
8550000
trusted library allocation
page read and write
FBE000
stack
page read and write
74F0000
trusted library allocation
page read and write
37BC000
trusted library allocation
page read and write
77C5000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
887E000
stack
page read and write
1750000
heap
page read and write
5EB1000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
4E3B000
trusted library allocation
page read and write
1622000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
430E000
direct allocation
page read and write
3CA7000
trusted library allocation
page read and write
1650000
heap
page read and write
1F0000
heap
page read and write
51F0000
trusted library allocation
page read and write
212000
unkown
page write copy
45EC000
trusted library allocation
page read and write
4527000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
7710000
heap
page read and write
3B9F000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
822D000
trusted library allocation
page read and write
5880000
heap
page read and write
58A0000
trusted library allocation
page execute and read and write
10BD000
heap
page read and write
8221000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
426000
system
page execute and read and write
74A0000
trusted library allocation
page execute and read and write
10E7000
heap
page read and write
3D55000
trusted library allocation
page read and write
3784000
trusted library allocation
page read and write
18A0000
heap
page read and write
854000
heap
page read and write
2FAA000
stack
page read and write
151000
unkown
page execute read
FE2000
unkown
page readonly
150000
unkown
page readonly
4557000
trusted library allocation
page read and write
820C000
trusted library allocation
page read and write
41B2000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
4901000
heap
page read and write
4090000
direct allocation
page read and write
5CBE000
stack
page read and write
879000
heap
page read and write
488D000
trusted library allocation
page read and write
38C9000
direct allocation
page read and write
8B8000
heap
page read and write
1DF000
unkown
page readonly
6C40000
trusted library allocation
page read and write
363D000
heap
page read and write
5814000
trusted library allocation
page read and write
3FD0000
direct allocation
page read and write
5C5A000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
3AC0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
F01D1FE000
stack
page read and write
73D0000
trusted library allocation
page read and write
3FDF000
heap
page read and write
180000
heap
page readonly
74F0000
trusted library allocation
page read and write
59AF000
stack
page read and write
4E1C000
trusted library allocation
page read and write
429D000
direct allocation
page read and write
449A000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
3269000
trusted library allocation
page read and write
7CB0000
heap
page read and write
4232000
trusted library allocation
page read and write
334C000
stack
page read and write
1778000
heap
page execute and read and write
178D000
heap
page read and write
1350000
heap
page read and write
4BE0000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
455A000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
30AE000
stack
page read and write
5830000
trusted library allocation
page read and write
393A000
trusted library allocation
page read and write
45C6000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
4884000
trusted library allocation
page read and write
BD8000
heap
page read and write
38F1000
trusted library allocation
page read and write
FCE000
stack
page read and write
47D3000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6D4E000
stack
page read and write
426000
system
page execute and read and write
3D62000
trusted library allocation
page read and write
56A0000
heap
page read and write
6CB0000
trusted library allocation
page execute and read and write
4509000
trusted library allocation
page read and write
3620000
heap
page read and write
75B0000
trusted library allocation
page read and write
4610000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
8190000
heap
page read and write
CE7000
heap
page read and write
3486000
heap
page read and write
3AA8000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
4A30000
heap
page execute and read and write
175A000
heap
page read and write
10E8000
heap
page read and write
67E9000
heap
page read and write
5412000
heap
page read and write
8BF000
heap
page read and write
776C000
heap
page read and write
3612000
heap
page read and write
681B000
heap
page read and write
3160000
heap
page read and write
9C0000
heap
page read and write
3B9F000
stack
page read and write
4410000
trusted library allocation
page read and write
45F9000
trusted library allocation
page read and write
94A000
stack
page read and write
7740000
trusted library allocation
page read and write
3C01000
direct allocation
page read and write
DD0000
unkown
page readonly
57D6000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
3809000
direct allocation
page read and write
36F9000
heap
page read and write
7500000
trusted library allocation
page read and write
217000
unkown
page readonly
55E0000
trusted library allocation
page read and write
429D000
direct allocation
page read and write
4452000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
5B90000
heap
page read and write
55F2000
trusted library allocation
page read and write
3B72000
trusted library allocation
page read and write
57CE000
trusted library allocation
page read and write
150000
unkown
page readonly
4E01000
trusted library allocation
page read and write
4784000
trusted library allocation
page read and write
863E000
stack
page read and write
7560000
trusted library allocation
page read and write
16B8000
heap
page read and write
3AC4000
trusted library allocation
page read and write
BD0000
heap
page read and write
3B94000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
3575000
trusted library allocation
page read and write
441E000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
52E000
unkown
page read and write
6ADE000
trusted library allocation
page read and write
6540000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
151000
unkown
page execute read
4853000
trusted library allocation
page read and write
814E000
stack
page read and write
44A8000
trusted library allocation
page read and write
3179000
trusted library allocation
page read and write
461F000
heap
page read and write
730A000
trusted library allocation
page read and write
FB0000
unkown
page readonly
17AD000
heap
page read and write
147E000
heap
page read and write
7570000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
797E000
stack
page read and write
364C000
trusted library allocation
page read and write
44F9000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
6E08000
trusted library allocation
page read and write
6C01000
trusted library allocation
page read and write
5C9E000
stack
page read and write
CFC000
heap
page read and write
43E9000
trusted library allocation
page read and write
877000
heap
page read and write
9CE000
stack
page read and write
8330000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
30CA000
trusted library allocation
page execute and read and write
5C26000
trusted library allocation
page read and write
4299000
direct allocation
page read and write
6400000
trusted library allocation
page read and write
83A0000
trusted library allocation
page read and write
5CE000
stack
page read and write
83C000
heap
page read and write
159B000
stack
page read and write
8F6000
heap
page read and write
44ED000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
1090000
heap
page read and write
4E24000
trusted library allocation
page read and write
5701000
heap
page read and write
3944000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
36E4000
heap
page read and write
5C56000
trusted library allocation
page read and write
195E000
stack
page read and write
3058000
heap
page read and write
1D5E000
stack
page read and write
38CD000
direct allocation
page read and write
3D69000
trusted library allocation
page read and write
645E000
stack
page read and write
20E000
unkown
page read and write
81D7000
heap
page read and write
3C50000
trusted library allocation
page read and write
81A5000
heap
page read and write
4359000
direct allocation
page read and write
16BE000
heap
page read and write
4808000
trusted library allocation
page read and write
38C9000
direct allocation
page read and write
43CE000
direct allocation
page read and write
4E5E000
trusted library allocation
page read and write
11B0000
heap
page read and write
150000
unkown
page readonly
6907000
heap
page read and write
8610000
trusted library allocation
page read and write
8CF000
heap
page read and write
332E000
trusted library allocation
page read and write
151000
unkown
page execute read
75CE000
stack
page read and write
154C000
stack
page read and write
695C000
stack
page read and write
83EE000
stack
page read and write
6778000
heap
page read and write
8260000
trusted library allocation
page read and write
C27000
heap
page read and write
4615000
trusted library allocation
page read and write
393E000
direct allocation
page read and write
873F000
stack
page read and write
3888000
trusted library allocation
page read and write
6AAC000
stack
page read and write
55FE000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
16E4000
heap
page read and write
4587000
trusted library allocation
page read and write
3140000
trusted library allocation
page execute and read and write
16F1000
heap
page read and write
8590000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
34E1000
trusted library allocation
page read and write
380D000
direct allocation
page read and write
9DB000
stack
page read and write
36ED000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
163B000
trusted library allocation
page execute and read and write
47E3000
trusted library allocation
page read and write
5690000
heap
page read and write
7730000
trusted library allocation
page read and write
8F0000
heap
page read and write
5C5E000
trusted library allocation
page read and write
30DB000
trusted library allocation
page execute and read and write
529D000
stack
page read and write
83C0000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
41B3000
direct allocation
page read and write
150000
unkown
page readonly
1DF000
unkown
page readonly
1319000
heap
page read and write
5693000
heap
page read and write
7CA0000
trusted library allocation
page execute and read and write
3BC6000
trusted library allocation
page read and write
43F2000
trusted library allocation
page read and write
68F4000
heap
page read and write
37B7000
trusted library allocation
page read and write
739D000
stack
page read and write
5B51000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
3E0000
heap
page read and write
51C0000
heap
page read and write
81F0000
trusted library allocation
page read and write
886000
heap
page read and write
4A0B000
trusted library allocation
page execute and read and write
8FD0000
trusted library allocation
page read and write
3654000
heap
page read and write
3150000
trusted library allocation
page read and write
67F5000
heap
page read and write
4483000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
532000
unkown
page write copy
4E56000
trusted library allocation
page read and write
81A1000
heap
page read and write
12F5000
heap
page read and write
387B000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
B80000
heap
page read and write
73E0000
trusted library allocation
page read and write
36BE000
heap
page read and write
5800000
trusted library allocation
page read and write
3809000
direct allocation
page read and write
7260000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
488F000
trusted library allocation
page read and write
174B000
heap
page read and write
393E000
direct allocation
page read and write
5D0000
heap
page read and write
1660000
heap
page read and write
313E000
stack
page read and write
7590000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
888000
heap
page read and write
3562000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
80CE000
stack
page read and write
36D0000
heap
page read and write
7766000
heap
page read and write
3377000
trusted library allocation
page read and write
4B8000
system
page execute and read and write
14BE000
stack
page read and write
131E000
heap
page read and write
7250000
trusted library allocation
page read and write
1771000
heap
page read and write
6C47000
trusted library allocation
page read and write
9B5000
heap
page read and write
580D000
trusted library allocation
page execute and read and write
2F8C000
stack
page read and write
2FA0000
heap
page execute and read and write
3674000
heap
page read and write
915F000
stack
page read and write
75A0000
trusted library allocation
page read and write
FA9000
stack
page read and write
5826000
trusted library allocation
page execute and read and write
59FE000
stack
page read and write
3663000
heap
page read and write
86A000
heap
page read and write
437F000
trusted library allocation
page read and write
9EF000
stack
page read and write
4530000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
58AE000
stack
page read and write
3652000
trusted library allocation
page read and write
5A01000
heap
page read and write
6750000
trusted library allocation
page execute and read and write
6852000
heap
page read and write
673C000
stack
page read and write
76CF000
heap
page read and write
37CC000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
582A000
trusted library allocation
page execute and read and write
13CF000
stack
page read and write
800000
heap
page read and write
36B4000
heap
page read and write
3595000
heap
page read and write
7520000
trusted library allocation
page read and write
4608000
trusted library allocation
page read and write
15B0000
heap
page read and write
3DE000
stack
page read and write
3807000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
1637000
trusted library allocation
page execute and read and write
44A0000
trusted library allocation
page read and write
138E000
heap
page read and write
43F3000
trusted library allocation
page read and write
30D4000
trusted library allocation
page read and write
8630000
trusted library allocation
page read and write
3685000
heap
page read and write
47F4000
trusted library allocation
page read and write
1699000
heap
page read and write
4391000
trusted library allocation
page read and write
4050000
trusted library allocation
page read and write
6F9E000
stack
page read and write
4520000
trusted library allocation
page read and write
67B0000
heap
page read and write
72B0000
trusted library allocation
page execute and read and write
55FA000
trusted library allocation
page read and write
680E000
heap
page read and write
3BBB000
trusted library allocation
page read and write
36CB000
heap
page read and write
7B0F000
stack
page read and write
7790000
trusted library allocation
page read and write
30A3000
trusted library allocation
page execute and read and write
3B65000
trusted library allocation
page read and write
There are 1363 hidden memdumps, click here to show them.