IOC Report
Remittance0098876.exe

loading gif

Files

File Path
Type
Category
Malicious
Remittance0098876.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp2210.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Remittance0098876.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mGhKPypbwIo.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ammft43e.pe4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dznnix5z.apb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itsbgjtk.kku.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oq0nhm5d.pb0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3162.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Remittance0098876.exe
"C:\Users\user\Desktop\Remittance0098876.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mGhKPypbwIo" /XML "C:\Users\user\AppData\Local\Temp\tmp2210.tmp"
malicious
C:\Users\user\Desktop\Remittance0098876.exe
"C:\Users\user\Desktop\Remittance0098876.exe"
malicious
C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe
C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mGhKPypbwIo" /XML "C:\Users\user\AppData\Local\Temp\tmp3162.tmp"
malicious
C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe
"C:\Users\user\AppData\Roaming\mGhKPypbwIo.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://r3.o.lencr.org0
unknown
http://mail.gadik-tr.com
unknown
https://api.ipify.org
unknown
http://gadik-tr.com
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.gadik-tr.com
unknown
malicious
api.ipify.org
172.67.74.152
gadik-tr.com
195.54.163.133

IPs

IP
Domain
Country
Malicious
195.54.163.133
gadik-tr.com
Ukraine
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Remittance0098876_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\mGhKPypbwIo_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
44AE000
trusted library allocation
page read and write
malicious
2ACB000
trusted library allocation
page read and write
malicious
41D000
remote allocation
page execute and read and write
malicious
292B000
trusted library allocation
page read and write
malicious
8B88000
heap
page read and write
12A8000
heap
page read and write
3ACF000
trusted library allocation
page read and write
73D2000
trusted library allocation
page read and write
7304000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
72D2000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
609E000
stack
page read and write
7398000
trusted library allocation
page read and write
3560000
heap
page read and write
2DA3000
trusted library allocation
page read and write
72A2000
trusted library allocation
page read and write
75A6000
trusted library allocation
page read and write
AA5000
heap
page read and write
B90C000
stack
page read and write
2D88000
trusted library allocation
page read and write
733C000
trusted library allocation
page read and write
8DD0000
trusted library section
page read and write
2F3D000
trusted library allocation
page read and write
7479000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
935F000
heap
page read and write
E55000
trusted library allocation
page execute and read and write
43C3000
trusted library allocation
page read and write
146E000
stack
page read and write
6425000
heap
page read and write
3B2F000
trusted library allocation
page read and write
7519000
trusted library allocation
page read and write
CF0000
trusted library allocation
page execute and read and write
740F000
trusted library allocation
page read and write
2F8F000
stack
page read and write
2E3A000
trusted library allocation
page read and write
4A88000
trusted library allocation
page read and write
E8E000
unkown
page read and write
3477000
trusted library allocation
page read and write
3B8F000
trusted library allocation
page read and write
7362000
trusted library allocation
page read and write
17DD000
trusted library allocation
page execute and read and write
671C000
stack
page read and write
74DF000
trusted library allocation
page read and write
7556000
trusted library allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
32C0000
heap
page execute and read and write
5BB0000
heap
page read and write
3C0E000
trusted library allocation
page read and write
8DC0000
trusted library section
page read and write
14D3000
trusted library allocation
page execute and read and write
72D8000
trusted library allocation
page read and write
517B000
stack
page read and write
74BF000
trusted library allocation
page read and write
11A7000
heap
page read and write
75A8000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
5130000
heap
page read and write
3458000
trusted library allocation
page read and write
5A40000
heap
page read and write
13A0000
heap
page read and write
FF0000
trusted library allocation
page read and write
77DE000
stack
page read and write
2E31000
trusted library allocation
page read and write
721D000
trusted library allocation
page read and write
1360000
heap
page read and write
57E0000
heap
page read and write
757C000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
74C7000
trusted library allocation
page read and write
3324000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
720D000
trusted library allocation
page read and write
73B2000
trusted library allocation
page read and write
BA2B000
stack
page read and write
75BE000
trusted library allocation
page read and write
11A0000
heap
page read and write
B7CE000
stack
page read and write
5810000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
B98E000
stack
page read and write
1830000
trusted library allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
29A2000
trusted library allocation
page read and write
746A000
trusted library allocation
page read and write
5B1D000
stack
page read and write
525C000
stack
page read and write
56CC000
stack
page read and write
72E8000
trusted library allocation
page read and write
4149000
trusted library allocation
page read and write
4D2E000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
7587000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
8F9000
stack
page read and write
2D3F000
trusted library allocation
page read and write
6CD0000
heap
page read and write
FFE000
trusted library allocation
page read and write
74CB000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page execute and read and write
AD0000
heap
page read and write
3AEE000
trusted library allocation
page read and write
9EE000
stack
page read and write
10D0000
trusted library allocation
page read and write
644B000
heap
page read and write
7394000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
5C6A000
heap
page read and write
1650000
trusted library allocation
page read and write
719B000
trusted library allocation
page read and write
5240000
heap
page execute and read and write
3250000
trusted library allocation
page read and write
1144000
trusted library allocation
page read and write
B58E000
stack
page read and write
5230000
trusted library allocation
page read and write
B36000
trusted library allocation
page execute and read and write
70E0000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
8DF0000
trusted library allocation
page execute and read and write
3BCE000
trusted library allocation
page read and write
63B4000
heap
page read and write
7411000
trusted library allocation
page read and write
1652000
trusted library allocation
page read and write
399F000
trusted library allocation
page read and write
1367000
heap
page read and write
E52000
trusted library allocation
page read and write
6464000
heap
page read and write
4D20000
trusted library allocation
page read and write
1867000
heap
page read and write
3AAF000
trusted library allocation
page read and write
63D4000
heap
page read and write
FD6000
trusted library allocation
page read and write
75A3000
trusted library allocation
page read and write
6EE0000
heap
page read and write
5B3E000
stack
page read and write
7396000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
6B6C000
stack
page read and write
930000
heap
page read and write
74A9000
trusted library allocation
page read and write
B9EE000
stack
page read and write
FB8000
heap
page read and write
6310000
heap
page read and write
71B3000
trusted library allocation
page read and write
736B000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
6459000
heap
page read and write
EEB000
stack
page read and write
529E000
stack
page read and write
739C000
trusted library allocation
page read and write
72D4000
trusted library allocation
page read and write
72E2000
trusted library allocation
page read and write
B8EE000
stack
page read and write
55D6000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
6720000
heap
page read and write
B79000
heap
page read and write
77CF000
stack
page read and write
73EE000
trusted library allocation
page read and write
BC1000
heap
page read and write
74FF000
trusted library allocation
page read and write
74E3000
trusted library allocation
page read and write
73E6000
trusted library allocation
page read and write
1300000
heap
page read and write
73F6000
trusted library allocation
page read and write
F8D000
heap
page read and write
B30000
trusted library allocation
page read and write
7382000
trusted library allocation
page read and write
79BC000
stack
page read and write
739E000
stack
page read and write
2B3D000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
C60000
heap
page read and write
71CF000
trusted library allocation
page read and write
7376000
trusted library allocation
page read and write
74A3000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
45A1000
trusted library allocation
page read and write
728A000
trusted library allocation
page read and write
73A8000
trusted library allocation
page read and write
7197000
trusted library allocation
page read and write
5A30000
heap
page read and write
7567000
trusted library allocation
page read and write
74B7000
trusted library allocation
page read and write
1690000
heap
page read and write
7191000
trusted library allocation
page read and write
7292000
trusted library allocation
page read and write
63DF000
heap
page read and write
133E000
heap
page read and write
28AF000
stack
page read and write
2917000
trusted library allocation
page read and write
2F4E000
stack
page read and write
71D5000
trusted library allocation
page read and write
74C1000
trusted library allocation
page read and write
1350000
heap
page read and write
324B000
stack
page read and write
6EDBD000
unkown
page read and write
B2D000
trusted library allocation
page execute and read and write
92F7000
heap
page read and write
5760000
trusted library allocation
page execute and read and write
5770000
trusted library allocation
page read and write
73BC000
trusted library allocation
page read and write
92E0000
heap
page read and write
7254000
trusted library allocation
page read and write
14BE000
stack
page read and write
314F000
stack
page read and write
1657000
trusted library allocation
page execute and read and write
5124000
heap
page read and write
630E000
stack
page read and write
7366000
trusted library allocation
page read and write
B86000
heap
page read and write
6EDBF000
unkown
page readonly
9D69000
heap
page read and write
596C000
stack
page read and write
5CAE000
stack
page read and write
6817000
trusted library allocation
page read and write
501B000
stack
page read and write
719D000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
7389000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
64CE000
stack
page read and write
74D7000
trusted library allocation
page read and write
3B1E000
trusted library allocation
page read and write
56C0000
trusted library allocation
page execute and read and write
F24000
heap
page read and write
5CA000
stack
page read and write
7090000
heap
page read and write
E60000
unkown
page readonly
7177000
trusted library allocation
page read and write
E42000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
71A5000
trusted library allocation
page read and write
5BB5000
heap
page read and write
71D1000
trusted library allocation
page read and write
71C7000
trusted library allocation
page read and write
73C4000
trusted library allocation
page read and write
7352000
trusted library allocation
page read and write
134F000
heap
page read and write
726E000
heap
page read and write
75AA000
trusted library allocation
page read and write
92EB000
heap
page read and write
12A0000
heap
page read and write
304E000
stack
page read and write
75B9000
trusted library allocation
page read and write
635E000
stack
page read and write
E4A000
stack
page read and write
74E0000
trusted library allocation
page execute and read and write
B940000
trusted library allocation
page execute and read and write
50BE000
trusted library allocation
page read and write
74ED000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
3B6E000
trusted library allocation
page read and write
7288000
trusted library allocation
page read and write
639C000
heap
page read and write
71B5000
trusted library allocation
page read and write
738B000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
3AA9000
trusted library allocation
page read and write
30F0000
heap
page read and write
2C43000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
4DC0000
heap
page read and write
3B4E000
trusted library allocation
page read and write
72CE000
trusted library allocation
page read and write
4358000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
65CE000
stack
page read and write
7335000
trusted library allocation
page read and write
74E1000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
7473000
trusted library allocation
page read and write
7372000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page read and write
164A000
trusted library allocation
page execute and read and write
3BAF000
trusted library allocation
page read and write
8DE0000
trusted library allocation
page execute and read and write
734F000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
73A6000
trusted library allocation
page read and write
3B6F000
trusted library allocation
page read and write
2A7E000
stack
page read and write
137C000
heap
page read and write
AEBC000
stack
page read and write
7577000
trusted library allocation
page read and write
5D8B000
stack
page read and write
57D0000
heap
page read and write
71DD000
trusted library allocation
page read and write
75DA000
trusted library allocation
page read and write
1360000
heap
page read and write
6461000
heap
page read and write
6EDBD000
unkown
page read and write
7193000
trusted library allocation
page read and write
7EF70000
trusted library allocation
page execute and read and write
5A1E000
stack
page read and write
9365000
heap
page read and write
5A10000
trusted library allocation
page read and write
394F000
trusted library allocation
page read and write
6394000
heap
page read and write
7354000
trusted library allocation
page read and write
E13000
trusted library allocation
page execute and read and write
398F000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
9CE2000
heap
page read and write
E0D000
stack
page read and write
50AB000
trusted library allocation
page read and write
9CCB000
heap
page read and write
729E000
trusted library allocation
page read and write
9FA000
stack
page read and write
17E0000
trusted library allocation
page read and write
BB2C000
stack
page read and write
931B000
heap
page read and write
6EF0000
heap
page read and write
13EE000
heap
page read and write
42D9000
trusted library allocation
page read and write
749E000
stack
page read and write
2E71000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
72CC000
trusted library allocation
page read and write
88DB000
stack
page read and write
6EDA1000
unkown
page execute read
71BB000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
5C5C000
stack
page read and write
5F8D000
stack
page read and write
749D000
trusted library allocation
page read and write
74FB000
trusted library allocation
page read and write
4D2B000
trusted library allocation
page read and write
717D000
trusted library allocation
page read and write
8D90000
trusted library allocation
page read and write
73D6000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
7269000
trusted library allocation
page read and write
3160000
heap
page read and write
B4B000
trusted library allocation
page execute and read and write
2D99000
trusted library allocation
page read and write
939D000
heap
page read and write
7471000
trusted library allocation
page read and write
1000000
heap
page read and write
5C60000
heap
page read and write
9F0000
heap
page read and write
7348000
trusted library allocation
page read and write
B2AE000
stack
page read and write
2B8C000
trusted library allocation
page read and write
12E8000
heap
page read and write
2F80000
heap
page read and write
74D9000
trusted library allocation
page read and write
3370000
heap
page read and write
402000
remote allocation
page execute and read and write
A50000
heap
page read and write
63F4000
heap
page read and write
3290000
trusted library allocation
page read and write
6EDBD000
unkown
page read and write
D70000
heap
page read and write
73F0000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
72B4000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
73F2000
trusted library allocation
page read and write
749F000
trusted library allocation
page read and write
71C1000
trusted library allocation
page read and write
71C9000
trusted library allocation
page read and write
327F000
unkown
page read and write
2B32000
trusted library allocation
page read and write
6736000
trusted library allocation
page read and write
72C6000
trusted library allocation
page read and write
73AE000
trusted library allocation
page read and write
B66E000
stack
page read and write
75DD000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
EBE000
stack
page read and write
6480000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
102F000
stack
page read and write
56D7000
trusted library allocation
page read and write
515C000
stack
page read and write
5645000
trusted library allocation
page read and write
650E000
unkown
page read and write
7337000
trusted library allocation
page read and write
71DF000
trusted library allocation
page read and write
5E8D000
stack
page read and write
7346000
trusted library allocation
page read and write
1338000
heap
page read and write
1413000
heap
page read and write
71B1000
trusted library allocation
page read and write
933C000
heap
page read and write
7820000
trusted library allocation
page read and write
B57000
heap
page read and write
9D26000
heap
page read and write
625E000
stack
page read and write
1415000
heap
page read and write
7424000
trusted library allocation
page read and write
74CF000
trusted library allocation
page read and write
E25000
heap
page read and write
C78000
heap
page read and write
4C1D000
stack
page read and write
39EF000
trusted library allocation
page read and write
643C000
heap
page read and write
72D0000
trusted library allocation
page read and write
4233000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
719F000
trusted library allocation
page read and write
71B9000
trusted library allocation
page read and write
17D3000
trusted library allocation
page execute and read and write
E4A000
trusted library allocation
page execute and read and write
CF9000
stack
page read and write
417000
remote allocation
page execute and read and write
EC0000
heap
page read and write
74F0000
trusted library allocation
page read and write
746F000
trusted library allocation
page read and write
E57000
trusted library allocation
page execute and read and write
FD0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
73B6000
trusted library allocation
page read and write
2F1E000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
12F7000
stack
page read and write
55C0000
trusted library allocation
page read and write
4D5B000
stack
page read and write
748C000
trusted library allocation
page read and write
4F10000
heap
page execute and read and write
7175000
trusted library allocation
page read and write
397F000
trusted library allocation
page read and write
4DD0000
heap
page read and write
EE0000
heap
page execute and read and write
5604000
trusted library allocation
page read and write
685D000
stack
page read and write
7535000
trusted library allocation
page read and write
1633000
trusted library allocation
page read and write
56B0000
heap
page read and write
6AF0000
trusted library allocation
page read and write
721F000
trusted library allocation
page read and write
7332000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
74F5000
trusted library allocation
page read and write
9D05000
heap
page read and write
71AD000
trusted library allocation
page read and write
7449000
trusted library allocation
page read and write
17FA000
trusted library allocation
page execute and read and write
28E1000
trusted library allocation
page read and write
568C000
stack
page read and write
728E000
trusted library allocation
page read and write
7EFD0000
trusted library allocation
page execute and read and write
4D41000
trusted library allocation
page read and write
71CB000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
7296000
trusted library allocation
page read and write
1250000
heap
page read and write
6D20000
heap
page read and write
419000
remote allocation
page execute and read and write
71A1000
trusted library allocation
page read and write
74F3000
trusted library allocation
page read and write
1310000
heap
page read and write
72B8000
trusted library allocation
page read and write
73BA000
trusted library allocation
page read and write
E1D000
trusted library allocation
page execute and read and write
7501000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
1370000
heap
page read and write
7440000
trusted library allocation
page read and write
FD4000
trusted library allocation
page read and write
72BC000
trusted library allocation
page read and write
74BD000
trusted library allocation
page read and write
5239000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
8D94000
trusted library allocation
page read and write
7573000
trusted library allocation
page read and write
73FA000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
65FD000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
73EC000
trusted library allocation
page read and write
6607000
trusted library allocation
page read and write
F22000
heap
page read and write
14E0000
heap
page read and write
7591000
trusted library allocation
page read and write
6475000
heap
page read and write
74AD000
trusted library allocation
page read and write
B47000
trusted library allocation
page execute and read and write
29AA000
trusted library allocation
page read and write
B6F000
heap
page read and write
74B9000
trusted library allocation
page read and write
57F0000
heap
page read and write
5626000
trusted library allocation
page read and write
7185000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
31D0000
trusted library allocation
page execute and read and write
3295000
trusted library allocation
page read and write
728C000
trusted library allocation
page read and write
A4E000
stack
page read and write
B14000
trusted library allocation
page read and write
B76E000
stack
page read and write
7189000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
6330000
heap
page read and write
56DD000
trusted library allocation
page read and write
71D7000
trusted library allocation
page read and write
6EDB6000
unkown
page readonly
7199000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
3A2F000
trusted library allocation
page read and write
72A8000
trusted library allocation
page read and write
72A4000
trusted library allocation
page read and write
EF0000
heap
page read and write
7507000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
37D0000
trusted library allocation
page read and write
7475000
trusted library allocation
page read and write
C70000
heap
page read and write
7368000
trusted library allocation
page read and write
93A000
stack
page read and write
7523000
trusted library allocation
page read and write
74E5000
trusted library allocation
page read and write
73AA000
trusted library allocation
page read and write
BC2E000
stack
page read and write
2E46000
trusted library allocation
page read and write
415000
remote allocation
page execute and read and write
4D9C000
stack
page read and write
668E000
stack
page read and write
548C000
stack
page read and write
7593000
trusted library allocation
page read and write
6468000
heap
page read and write
50AE000
trusted library allocation
page read and write
5E9D000
stack
page read and write
30CE000
stack
page read and write
3B4F000
trusted library allocation
page read and write
74DD000
trusted library allocation
page read and write
1364000
heap
page read and write
72BA000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
5780000
heap
page execute and read and write
72C8000
trusted library allocation
page read and write
4D1C000
stack
page read and write
53CC000
stack
page read and write
3282000
trusted library allocation
page read and write
72C0000
trusted library allocation
page read and write
73E8000
trusted library allocation
page read and write
8D8F000
stack
page read and write
511C000
stack
page read and write
9CE6000
heap
page read and write
B68E000
stack
page read and write
162E000
stack
page read and write
14DD000
trusted library allocation
page execute and read and write
7370000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
50CD000
trusted library allocation
page read and write
63D9000
heap
page read and write
2C0E000
trusted library allocation
page read and write
74B5000
trusted library allocation
page read and write
CAE000
stack
page read and write
1840000
trusted library allocation
page read and write
41C000
remote allocation
page execute and read and write
3254000
trusted library allocation
page read and write
739A000
trusted library allocation
page read and write
73FC000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
74CD000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
E62000
unkown
page readonly
4525000
trusted library allocation
page read and write
9CC0000
heap
page read and write
4DB0000
heap
page read and write
759D000
trusted library allocation
page read and write
31AE000
stack
page read and write
5A14000
trusted library allocation
page read and write
C29000
heap
page read and write
560B000
trusted library allocation
page read and write
39AF000
trusted library allocation
page read and write
7558000
trusted library allocation
page read and write
9CEA000
heap
page read and write
2E5C000
trusted library allocation
page read and write
73DA000
trusted library allocation
page read and write
2E36000
trusted library allocation
page read and write
7505000
trusted library allocation
page read and write
73CA000
trusted library allocation
page read and write
7358000
trusted library allocation
page read and write
5A1C000
trusted library allocation
page read and write
74C3000
trusted library allocation
page read and write
66EE000
stack
page read and write
67EF000
stack
page read and write
781D000
stack
page read and write
9D7D000
heap
page read and write
71DB000
trusted library allocation
page read and write
71BD000
trusted library allocation
page read and write
74C9000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
14AE000
stack
page read and write
B7AE000
stack
page read and write
71B7000
trusted library allocation
page read and write
72A6000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
3A8F000
trusted library allocation
page read and write
5A50000
heap
page read and write
3BCF000
trusted library allocation
page read and write
6380000
heap
page read and write
5C1D000
stack
page read and write
3B8E000
trusted library allocation
page read and write
71CD000
trusted library allocation
page read and write
1850000
trusted library allocation
page read and write
7477000
trusted library allocation
page read and write
FA2000
heap
page read and write
1697000
heap
page read and write
6440000
heap
page read and write
7426000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
442B000
trusted library allocation
page read and write
71BF000
trusted library allocation
page read and write
769E000
stack
page read and write
1630000
trusted library allocation
page read and write
12AE000
heap
page read and write
99BE000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
4D46000
trusted library allocation
page read and write
73C2000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
5830000
heap
page execute and read and write
403000
remote allocation
page execute and read and write
7260000
heap
page read and write
735B000
trusted library allocation
page read and write
9D63000
heap
page read and write
3C0F000
trusted library allocation
page read and write
74B3000
trusted library allocation
page read and write
41B000
remote allocation
page execute and read and write
9D12000
heap
page read and write
2CEF000
trusted library allocation
page read and write
4393000
trusted library allocation
page read and write
EEA000
stack
page read and write
5BC0000
heap
page read and write
71F2000
trusted library allocation
page read and write
748A000
trusted library allocation
page read and write
323E000
unkown
page read and write
EC0000
trusted library allocation
page execute and read and write
7380000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
7284000
trusted library allocation
page read and write
73B4000
trusted library allocation
page read and write
44A9000
trusted library allocation
page read and write
F97000
heap
page read and write
75DB000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
745E000
trusted library allocation
page read and write
1357000
heap
page read and write
74D1000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
9CBF000
stack
page read and write
54CE000
stack
page read and write
1820000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
4D4D000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
50B2000
trusted library allocation
page read and write
635A000
heap
page read and write
6D00000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
1007000
heap
page read and write
B32000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
75B6000
trusted library allocation
page read and write
1646000
trusted library allocation
page execute and read and write
2E73000
trusted library allocation
page read and write
63FF000
heap
page read and write
49DD000
stack
page read and write
3A4F000
trusted library allocation
page read and write
1372000
heap
page read and write
B00000
trusted library allocation
page read and write
7553000
trusted library allocation
page read and write
73A2000
trusted library allocation
page read and write
6600000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
9D91000
heap
page read and write
61CE000
stack
page read and write
7581000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
756E000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
9369000
heap
page read and write
717F000
trusted library allocation
page read and write
71D3000
trusted library allocation
page read and write
73CE000
trusted library allocation
page read and write
73BE000
trusted library allocation
page read and write
CEC000
stack
page read and write
7181000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
750D000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
F0D000
heap
page read and write
73D0000
trusted library allocation
page read and write
759B000
trusted library allocation
page read and write
3B0E000
trusted library allocation
page read and write
758F000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
5813000
heap
page read and write
561E000
trusted library allocation
page read and write
6946000
trusted library allocation
page read and write
57C0000
trusted library section
page readonly
2912000
trusted library allocation
page read and write
16CF000
stack
page read and write
580B000
stack
page read and write
560C000
stack
page read and write
4D52000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
28D0000
heap
page execute and read and write
3909000
trusted library allocation
page read and write
63C2000
heap
page read and write
72E0000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
63E3000
heap
page read and write
8C8E000
stack
page read and write
BA8E000
stack
page read and write
17CE000
stack
page read and write
72DA000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
D07000
heap
page read and write
29A6000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
68DC000
stack
page read and write
73DC000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
72FA000
trusted library allocation
page read and write
7374000
trusted library allocation
page read and write
4421000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
72C2000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page read and write
72B6000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
55CE000
stack
page read and write
B80C000
stack
page read and write
43C000
remote allocation
page execute and read and write
2B8E000
trusted library allocation
page read and write
72EE000
trusted library allocation
page read and write
FE0000
heap
page read and write
E40000
trusted library allocation
page read and write
75DF000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
71A3000
trusted library allocation
page read and write
65F3000
trusted library allocation
page read and write
59B0000
trusted library section
page readonly
3BEE000
trusted library allocation
page read and write
3130000
heap
page execute and read and write
65F8000
trusted library allocation
page read and write
75B4000
trusted library allocation
page read and write
134E000
heap
page read and write
73F8000
trusted library allocation
page read and write
73E2000
trusted library allocation
page read and write
72DE000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
647E000
heap
page read and write
7187000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
723F000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
4327000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
8AD2000
heap
page read and write
ECF000
unkown
page read and write
E14000
trusted library allocation
page read and write
74A7000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
9305000
heap
page read and write
729A000
trusted library allocation
page read and write
74A5000
trusted library allocation
page read and write
727C000
trusted library allocation
page read and write
9D8D000
heap
page read and write
29B2000
trusted library allocation
page read and write
7565000
trusted library allocation
page read and write
6930000
heap
page read and write
71F0000
trusted library allocation
page read and write
737C000
trusted library allocation
page read and write
9A0000
heap
page read and write
2D75000
trusted library allocation
page read and write
B54F000
stack
page read and write
71C5000
trusted library allocation
page read and write
66DF000
stack
page read and write
12D5000
heap
page read and write
43CD000
trusted library allocation
page read and write
5A35000
heap
page read and write
10AB000
stack
page read and write
5120000
heap
page read and write
180B000
trusted library allocation
page execute and read and write
EF8000
heap
page read and write
6B10000
heap
page read and write
718D000
trusted library allocation
page read and write
72EA000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
60CD000
stack
page read and write
99B6000
trusted library allocation
page read and write
17F2000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
13D6000
heap
page read and write
B56E000
stack
page read and write
6EB0000
heap
page read and write
5F9E000
stack
page read and write
71C3000
trusted library allocation
page read and write
564D000
stack
page read and write
73F4000
trusted library allocation
page read and write
73BE000
trusted library allocation
page read and write
A9E000
stack
page read and write
754D000
trusted library allocation
page read and write
74A1000
trusted library allocation
page read and write
8B07000
heap
page read and write
15EE000
stack
page read and write
65E0000
trusted library allocation
page execute and read and write
106C000
unkown
page read and write
73C0000
trusted library section
page read and write
D4C000
unkown
page read and write
73FE000
trusted library allocation
page read and write
73AC000
trusted library allocation
page read and write
73B8000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
3B0F000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
B21E000
stack
page read and write
74B1000
trusted library allocation
page read and write
13AA000
heap
page read and write
5B6D000
stack
page read and write
B31E000
stack
page read and write
7250000
trusted library allocation
page read and write
731B000
trusted library allocation
page read and write
68EE000
stack
page read and write
4D32000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
F18000
heap
page read and write
2F7E000
stack
page read and write
17D4000
trusted library allocation
page read and write
6160000
heap
page read and write
50A0000
trusted library allocation
page read and write
758C000
trusted library allocation
page read and write
B46E000
stack
page read and write
6489000
trusted library allocation
page read and write
7314000
trusted library allocation
page read and write
9CC6000
heap
page read and write
2C5B000
trusted library allocation
page read and write
E8B000
stack
page read and write
32BE000
stack
page read and write
1417000
heap
page read and write
F18000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
9BD000
stack
page read and write
2A28000
trusted library allocation
page read and write
709A000
heap
page read and write
720F000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
753C000
trusted library allocation
page read and write
F9A000
stack
page read and write
112C000
stack
page read and write
727E000
trusted library allocation
page read and write
C60000
trusted library allocation
page read and write
1642000
trusted library allocation
page read and write
726B000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
72C4000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
2C9D000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
9354000
heap
page read and write
74EF000
trusted library allocation
page read and write
B84000
heap
page read and write
1640000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
32D1000
trusted library allocation
page read and write
7CDC000
stack
page read and write
7585000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
9CC4000
heap
page read and write
5640000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
7517000
trusted library allocation
page read and write
12C8000
heap
page read and write
6EDA0000
unkown
page readonly
6A9B000
stack
page read and write
8DA0000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
8B50000
heap
page read and write
12E6000
heap
page read and write
3A6F000
trusted library allocation
page read and write
7316000
trusted library allocation
page read and write
1160000
heap
page read and write
2C88000
trusted library allocation
page read and write
6416000
heap
page read and write
72AE000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
74AB000
trusted library allocation
page read and write
72AA000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
1330000
heap
page read and write
717B000
trusted library allocation
page read and write
74F7000
trusted library allocation
page read and write
73EA000
trusted library allocation
page read and write
664D000
stack
page read and write
8BB7000
heap
page read and write
75B9000
trusted library allocation
page read and write
5810000
heap
page read and write
7294000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
71AF000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
757A000
trusted library allocation
page read and write
73D4000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
4EFE000
stack
page read and write
71AB000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
55D0000
trusted library allocation
page read and write
74F1000
trusted library allocation
page read and write
71A7000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
73E4000
trusted library allocation
page read and write
3500000
heap
page read and write
7252000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
41A000
remote allocation
page execute and read and write
99B9000
trusted library allocation
page read and write
74AF000
trusted library allocation
page read and write
38E1000
trusted library allocation
page read and write
74F9000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
7387000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
FE7000
stack
page read and write
2C53000
trusted library allocation
page read and write
163D000
trusted library allocation
page execute and read and write
6402000
heap
page read and write
B50000
heap
page read and write
356B000
heap
page read and write
6EDBD000
unkown
page read and write
74D3000
trusted library allocation
page read and write
5DC0000
trusted library section
page read and write
70D0000
heap
page read and write
2AAC000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
B8AE000
stack
page read and write
2C86000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
14D4000
trusted library allocation
page read and write
72CA000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
5630000
trusted library allocation
page read and write
74FD000
trusted library allocation
page read and write
75D9000
trusted library allocation
page read and write
640E000
heap
page read and write
E20000
heap
page read and write
74BB000
trusted library allocation
page read and write
5750000
heap
page read and write
7179000
trusted library allocation
page read and write
73A4000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
1802000
trusted library allocation
page read and write
5360000
heap
page read and write
7195000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
7422000
trusted library allocation
page read and write
736D000
trusted library allocation
page read and write
14E0000
heap
page read and write
72D6000
trusted library allocation
page read and write
E46000
trusted library allocation
page execute and read and write
72B2000
trusted library allocation
page read and write
72AC000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
72E6000
trusted library allocation
page read and write
8DC0000
trusted library allocation
page read and write
55F3000
heap
page read and write
718B000
trusted library allocation
page read and write
6B00000
trusted library allocation
page execute and read and write
7173000
trusted library allocation
page read and write
608E000
stack
page read and write
73C6000
trusted library allocation
page read and write
165B000
trusted library allocation
page execute and read and write
14F0000
heap
page read and write
742E000
trusted library allocation
page read and write
50D2000
trusted library allocation
page read and write
7298000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
718F000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
1260000
heap
page read and write
753A000
trusted library allocation
page read and write
4DB4000
heap
page read and write
5BD0000
heap
page read and write
5CC0000
heap
page read and write
743E000
trusted library allocation
page read and write
729C000
trusted library allocation
page read and write
2F90000
heap
page read and write
9D46000
heap
page read and write
74D5000
trusted library allocation
page read and write
739E000
trusted library allocation
page read and write
6170000
heap
page read and write
7183000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
31C0000
trusted library allocation
page read and write
1322000
heap
page read and write
E5B000
trusted library allocation
page execute and read and write
2927000
trusted library allocation
page read and write
73BC000
trusted library allocation
page read and write
1680000
trusted library allocation
page execute and read and write
32FF000
stack
page read and write
17E3000
trusted library allocation
page read and write
133E000
heap
page read and write
74C5000
trusted library allocation
page read and write
7258000
trusted library allocation
page read and write
73C8000
trusted library allocation
page read and write
5A60000
heap
page read and write
179E000
stack
page read and write
17ED000
trusted library allocation
page execute and read and write
74DB000
trusted library allocation
page read and write
E4C000
stack
page read and write
511D000
stack
page read and write
7384000
trusted library allocation
page read and write
73BA000
trusted library allocation
page read and write
50C1000
trusted library allocation
page read and write
7286000
trusted library allocation
page read and write
73D8000
trusted library allocation
page read and write
72BE000
trusted library allocation
page read and write
291F000
trusted library allocation
page read and write
7256000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
308E000
stack
page read and write
758A000
trusted library allocation
page read and write
73CC000
trusted library allocation
page read and write
EB0000
heap
page read and write
780E000
stack
page read and write
71A9000
trusted library allocation
page read and write
699C000
stack
page read and write
72F8000
trusted library allocation
page read and write
7597000
trusted library allocation
page read and write
62CB000
stack
page read and write
1860000
heap
page read and write
74E9000
trusted library allocation
page read and write
7F630000
trusted library allocation
page execute and read and write
B45000
trusted library allocation
page execute and read and write
72DC000
trusted library allocation
page read and write
7525000
trusted library allocation
page read and write
138A000
heap
page read and write
75A1000
trusted library allocation
page read and write
680D000
trusted library allocation
page read and write
9301000
heap
page read and write
8AC0000
heap
page read and write
1807000
trusted library allocation
page execute and read and write
7203000
trusted library allocation
page read and write
7509000
trusted library allocation
page read and write
B44E000
stack
page read and write
7282000
trusted library allocation
page read and write
74EB000
trusted library allocation
page read and write
B6CE000
stack
page read and write
6810000
trusted library allocation
page read and write
527C000
stack
page read and write
32B7000
trusted library allocation
page read and write
AA0000
heap
page read and write
658E000
stack
page read and write
55F0000
heap
page read and write
74E7000
trusted library allocation
page read and write
71D9000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
4375000
trusted library allocation
page read and write
52DC000
stack
page read and write
737A000
trusted library allocation
page read and write
8AC6000
heap
page read and write
B42000
trusted library allocation
page read and write
7205000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
D00000
heap
page read and write
59F0000
trusted library allocation
page execute and read and write
17F6000
trusted library allocation
page execute and read and write
732C000
trusted library allocation
page read and write
73DE000
trusted library allocation
page read and write
There are 1088 hidden memdumps, click here to show them.