IOC Report
SecuriteInfo.com.PWSX-gen.32561.14552.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.PWSX-gen.32561.14552.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp5AC0.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\tiucdfZoOi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.PWSX-gen.32561.14552.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tiucdfZoOi.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ig3bnmw.fcy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1k2zn34i.jdo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_roccajcr.unl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_unusszsa.jub.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6B88.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp97D8.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpB88F.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\tiucdfZoOi.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.PWSX-gen.32561.14552.exe
"C:\Users\user\Desktop\SecuriteInfo.com.PWSX-gen.32561.14552.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tiucdfZoOi.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tiucdfZoOi" /XML "C:\Users\user\AppData\Local\Temp\tmp5AC0.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.PWSX-gen.32561.14552.exe
"C:\Users\user\Desktop\SecuriteInfo.com.PWSX-gen.32561.14552.exe"
malicious
C:\Users\user\AppData\Roaming\tiucdfZoOi.exe
C:\Users\user\AppData\Roaming\tiucdfZoOi.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tiucdfZoOi" /XML "C:\Users\user\AppData\Local\Temp\tmp6B88.tmp"
malicious
C:\Users\user\AppData\Roaming\tiucdfZoOi.exe
"C:\Users\user\AppData\Roaming\tiucdfZoOi.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tiucdfZoOi" /XML "C:\Users\user\AppData\Local\Temp\tmp97D8.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tiucdfZoOi" /XML "C:\Users\user\AppData\Local\Temp\tmpB88F.tmp"
malicious
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://mail.clslk.com
unknown
http://www.ctvnews.ca/rss/business/ctv-news-business-headlines-1.867648
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.ctvnews.ca/rss/ctvnews-ca-top-stories-public-rss-1.822009
unknown
http://xml.weather.yahoo.com/ns/rss/1.0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://weather.yahooapis.com/forecastrss?w=4118
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.clslk.com
50.87.253.239
malicious

IPs

IP
Domain
Country
Malicious
50.87.253.239
mail.clslk.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
boqXv

Memdumps

Base Address
Regiontype
Protect
Malicious
2F71000
trusted library allocation
page read and write
malicious
41A6000
trusted library allocation
page read and write
malicious
33CC000
trusted library allocation
page read and write
malicious
2C72000
trusted library allocation
page read and write
malicious
2FE9000
trusted library allocation
page read and write
malicious
4ECF000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
341A000
trusted library allocation
page read and write
malicious
2C21000
trusted library allocation
page read and write
malicious
2A3A000
trusted library allocation
page read and write
malicious
29E1000
trusted library allocation
page read and write
malicious
2FE1000
trusted library allocation
page read and write
malicious
2C7A000
trusted library allocation
page read and write
malicious
3412000
trusted library allocation
page read and write
malicious
2A32000
trusted library allocation
page read and write
malicious
46DF000
trusted library allocation
page read and write
malicious
4E3F000
trusted library allocation
page read and write
malicious
D5CE000
stack
page read and write
3426000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
1637000
trusted library allocation
page execute and read and write
2B90000
heap
page read and write
469F000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
171E000
heap
page read and write
75D0000
trusted library allocation
page read and write
54A000
stack
page read and write
32C9000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
30CE000
stack
page read and write
2E50000
trusted library allocation
page read and write
4ED2000
trusted library allocation
page read and write
5E02000
heap
page read and write
C12000
trusted library allocation
page read and write
1570000
heap
page read and write
333D000
trusted library allocation
page read and write
43E9000
trusted library allocation
page read and write
930000
heap
page read and write
3309000
trusted library allocation
page read and write
3327000
trusted library allocation
page read and write
164E000
stack
page read and write
D36D000
stack
page read and write
1324000
trusted library allocation
page read and write
E68000
heap
page read and write
FE0000
heap
page read and write
3303000
trusted library allocation
page read and write
2A5E000
stack
page read and write
730000
heap
page read and write
4B70000
heap
page read and write
1708000
heap
page read and write
5140000
trusted library allocation
page read and write
27AD000
stack
page read and write
E40000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
6F7E000
stack
page read and write
32F7000
trusted library allocation
page read and write
4CC0000
heap
page read and write
5690000
heap
page read and write
4E8F000
trusted library allocation
page read and write
28C8000
trusted library allocation
page read and write
1323000
trusted library allocation
page execute and read and write
5930000
heap
page read and write
EA0000
heap
page read and write
139D000
heap
page read and write
31E8000
trusted library allocation
page read and write
4E60000
trusted library allocation
page execute and read and write
E3A000
stack
page read and write
1630000
trusted library allocation
page read and write
5B25000
heap
page read and write
1495000
trusted library allocation
page execute and read and write
D12D000
stack
page read and write
1A10000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
3230000
trusted library allocation
page read and write
6E7E000
stack
page read and write
576C000
stack
page read and write
760E000
stack
page read and write
3313000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
2CBE000
stack
page read and write
17C0000
heap
page read and write
50E5000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
2DB0000
heap
page read and write
4BB0000
heap
page read and write
5130000
heap
page read and write
311F000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
1270000
heap
page read and write
74AE000
stack
page read and write
32DD000
trusted library allocation
page read and write
65CF000
stack
page read and write
15B0000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
A1E000
heap
page read and write
6030000
trusted library allocation
page read and write
5C65000
heap
page read and write
6E80000
trusted library allocation
page execute and read and write
32DB000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
54E0000
heap
page execute and read and write
254B000
stack
page read and write
795000
heap
page read and write
965000
heap
page read and write
93E000
heap
page read and write
56AD000
trusted library allocation
page read and write
770F000
stack
page read and write
70BF000
stack
page read and write
762E000
stack
page read and write
8ED000
trusted library allocation
page execute and read and write
50DB000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
1A64000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
6B7E000
stack
page read and write
1137000
stack
page read and write
7690000
trusted library allocation
page read and write
7000000
heap
page read and write
32AF000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
53D0000
heap
page read and write
330B000
trusted library allocation
page read and write
10FA000
stack
page read and write
17B5000
trusted library allocation
page read and write
73AE000
stack
page read and write
3127000
trusted library allocation
page read and write
4F20000
trusted library allocation
page execute and read and write
8F7000
stack
page read and write
31CC000
trusted library allocation
page read and write
162A000
trusted library allocation
page execute and read and write
57BD000
trusted library allocation
page read and write
4D5E000
stack
page read and write
3180000
trusted library allocation
page read and write
2D30000
heap
page read and write
60C0000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
13A4000
trusted library allocation
page read and write
5970000
trusted library allocation
page execute and read and write
1020000
heap
page read and write
2E1A000
trusted library allocation
page read and write
3257000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
2DFF000
stack
page read and write
7260000
trusted library allocation
page execute and read and write
7F790000
trusted library allocation
page execute and read and write
32B0000
heap
page execute and read and write
3275000
trusted library allocation
page read and write
2E5A000
heap
page read and write
12A0000
heap
page read and write
960000
trusted library allocation
page read and write
87D0000
trusted library allocation
page read and write
75EE000
stack
page read and write
3261000
trusted library allocation
page read and write
121B000
trusted library allocation
page execute and read and write
3325000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
176C000
heap
page read and write
31E0000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
27E0000
heap
page read and write
319F000
trusted library allocation
page read and write
6B8E000
stack
page read and write
F3B000
trusted library allocation
page execute and read and write
DBFE000
stack
page read and write
5A5E000
stack
page read and write
3307000
trusted library allocation
page read and write
613D000
stack
page read and write
4B1E000
stack
page read and write
3249000
trusted library allocation
page read and write
412000
unkown
page readonly
74B0000
heap
page read and write
784F000
stack
page read and write
6EF0000
heap
page read and write
11ED000
trusted library allocation
page execute and read and write
53E0000
heap
page read and write
3179000
trusted library allocation
page read and write
5920000
heap
page read and write
3211000
trusted library allocation
page read and write
645F000
stack
page read and write
1010000
heap
page read and write
5550000
trusted library allocation
page read and write
4B89000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
4FE5000
heap
page read and write
5CAE000
stack
page read and write
3273000
trusted library allocation
page read and write
12D5000
heap
page read and write
1632000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
15BE000
stack
page read and write
2E21000
trusted library allocation
page read and write
4DFE000
trusted library allocation
page read and write
5DDE000
stack
page read and write
3321000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
179E000
heap
page read and write
5E1B000
heap
page read and write
ED7000
heap
page read and write
3311000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
FF0000
trusted library allocation
page execute and read and write
4E0D000
trusted library allocation
page read and write
601E000
stack
page read and write
6EFE000
heap
page read and write
146D000
trusted library allocation
page execute and read and write
D77E000
stack
page read and write
49F3000
trusted library allocation
page read and write
7380000
heap
page read and write
127B000
heap
page read and write
312B000
trusted library allocation
page read and write
E97000
heap
page read and write
1333000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
6227000
trusted library allocation
page read and write
900000
heap
page read and write
F2E000
stack
page read and write
2FF0000
trusted library allocation
page read and write
749A000
heap
page read and write
E2A000
heap
page read and write
2933000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
6B90000
heap
page read and write
8E3000
trusted library allocation
page execute and read and write
4B6E000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
12D0000
heap
page read and write
5810000
trusted library allocation
page execute and read and write
5FDD000
stack
page read and write
5910000
heap
page read and write
26D0000
heap
page execute and read and write
4E94000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
1A66000
trusted library allocation
page read and write
AF8000
stack
page read and write
1390000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
2CF0000
heap
page read and write
4C69000
trusted library allocation
page read and write
D86000
heap
page read and write
1A80000
heap
page read and write
32F9000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
1645000
trusted library allocation
page execute and read and write
5800000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
8E4000
trusted library allocation
page read and write
75CE000
stack
page read and write
2670000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
5C80000
heap
page read and write
3123000
trusted library allocation
page read and write
53CC000
stack
page read and write
2FAE000
stack
page read and write
4ECD000
trusted library allocation
page read and write
134A000
trusted library allocation
page execute and read and write
3182000
trusted library allocation
page read and write
26A2000
trusted library allocation
page read and write
5100000
heap
page read and write
57B9000
trusted library allocation
page read and write
12EE000
stack
page read and write
5810000
heap
page read and write
1370000
trusted library allocation
page read and write
2480000
trusted library allocation
page execute and read and write
5DBC000
trusted library allocation
page read and write
950000
trusted library allocation
page execute and read and write
6C0000
heap
page read and write
5DC6000
trusted library allocation
page read and write
4245000
trusted library allocation
page read and write
3022000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
266E000
stack
page read and write
1700000
heap
page read and write
3285000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
73BE000
stack
page read and write
13D1000
heap
page read and write
3231000
trusted library allocation
page read and write
D320000
trusted library allocation
page read and write
2475000
trusted library allocation
page read and write
2938000
trusted library allocation
page read and write
69B0000
heap
page read and write
60FA000
heap
page read and write
635E000
stack
page read and write
4E40000
trusted library allocation
page read and write
7CFE000
stack
page read and write
5874000
trusted library section
page readonly
4BEC000
trusted library allocation
page read and write
898D000
stack
page read and write
5DAE000
stack
page read and write
5700000
heap
page read and write
17B1000
heap
page read and write
586B000
stack
page read and write
5DF0000
trusted library allocation
page execute and read and write
3242000
trusted library allocation
page read and write
1603000
trusted library allocation
page execute and read and write
319B000
trusted library allocation
page read and write
4CD3000
heap
page read and write
7046000
heap
page read and write
27D3000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
30F0000
heap
page read and write
2D60000
heap
page read and write
28BE000
stack
page read and write
3353000
trusted library allocation
page read and write
69C0000
trusted library allocation
page execute and read and write
DDD000
trusted library allocation
page execute and read and write
6537000
trusted library allocation
page read and write
3339000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
5C9C000
stack
page read and write
71FF000
stack
page read and write
5C6E000
stack
page read and write
31F6000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
D4CE000
stack
page read and write
6250000
trusted library allocation
page execute and read and write
1613000
trusted library allocation
page execute and read and write
4DE4000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
7031000
heap
page read and write
4EE1000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
1224000
heap
page read and write
7EF70000
trusted library allocation
page execute and read and write
57D0000
trusted library allocation
page read and write
4E60000
heap
page execute and read and write
4EE6000
trusted library allocation
page read and write
4C90000
trusted library allocation
page execute and read and write
77AE000
stack
page read and write
3219000
trusted library allocation
page read and write
60E0000
trusted library allocation
page execute and read and write
3245000
trusted library allocation
page read and write
79AE000
stack
page read and write
6940000
heap
page read and write
DB5C000
stack
page read and write
7AAE000
stack
page read and write
316D000
trusted library allocation
page read and write
3225000
trusted library allocation
page read and write
4C5C000
stack
page read and write
33F4000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
614F000
heap
page read and write
39A9000
trusted library allocation
page read and write
C16000
trusted library allocation
page execute and read and write
8A8E000
stack
page read and write
320D000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
333F000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
53C0000
heap
page read and write
DF6000
trusted library allocation
page execute and read and write
5B80000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
D36000
heap
page read and write
710000
heap
page read and write
57F0000
trusted library allocation
page read and write
5800000
trusted library section
page readonly
638E000
stack
page read and write
268E000
trusted library allocation
page read and write
1497000
trusted library allocation
page execute and read and write
53C5000
heap
page read and write
4C84000
trusted library allocation
page read and write
A0B000
heap
page read and write
5B90000
heap
page execute and read and write
5D0000
heap
page read and write
11FD000
trusted library allocation
page execute and read and write
27AE000
stack
page read and write
5813000
heap
page read and write
1219000
heap
page read and write
56C0000
heap
page execute and read and write
7024000
heap
page read and write
5B6E000
stack
page read and write
544E000
stack
page read and write
554E000
stack
page read and write
3281000
trusted library allocation
page read and write
1729000
heap
page read and write
58AF000
stack
page read and write
3132000
trusted library allocation
page read and write
163A000
trusted library allocation
page execute and read and write
DB9D000
stack
page read and write
4342000
trusted library allocation
page read and write
14C0000
trusted library allocation
page execute and read and write
D540000
heap
page read and write
4EB0000
heap
page read and write
2CE0000
heap
page read and write
2D7E000
stack
page read and write
6230000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
318E000
stack
page read and write
6500000
heap
page read and write
1A70000
heap
page read and write
5116000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
1604000
trusted library allocation
page read and write
652D000
stack
page read and write
29D0000
heap
page execute and read and write
40BE000
trusted library allocation
page read and write
31F4000
trusted library allocation
page read and write
52DC000
stack
page read and write
5B0000
heap
page read and write
292F000
stack
page read and write
610000
heap
page read and write
D480000
heap
page read and write
50A0000
trusted library allocation
page execute and read and write
5703000
heap
page read and write
282E000
stack
page read and write
5EAE000
stack
page read and write
1470000
heap
page read and write
6147000
trusted library allocation
page read and write
902000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
790000
heap
page read and write
13F1000
heap
page read and write
31E4000
trusted library allocation
page read and write
4E0C000
stack
page read and write
4E40000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
BDE000
stack
page read and write
334D000
trusted library allocation
page read and write
179B000
heap
page read and write
5620000
trusted library allocation
page read and write
32DF000
trusted library allocation
page read and write
12A5000
heap
page read and write
5A00000
heap
page read and write
62AD000
stack
page read and write
4ADE000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
7EE60000
trusted library allocation
page execute and read and write
1650000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
4DFF000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
D00000
heap
page read and write
3175000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
126E000
stack
page read and write
4D76000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
562F000
stack
page read and write
324E000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
6840000
heap
page read and write
4A9C000
stack
page read and write
8F3000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
58EE000
stack
page read and write
57FC000
stack
page read and write
4C7C000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
6400000
heap
page read and write
4CB0000
trusted library section
page readonly
325F000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page execute and read and write
DDDE000
stack
page read and write
506E000
stack
page read and write
13E4000
heap
page read and write
50D000
stack
page read and write
60D0000
trusted library allocation
page read and write
420000
heap
page read and write
31FA000
trusted library allocation
page read and write
9B2000
heap
page read and write
1202000
trusted library allocation
page read and write
5B30000
heap
page read and write
32C1000
trusted library allocation
page read and write
C20000
heap
page read and write
D1E000
heap
page read and write
1206000
trusted library allocation
page execute and read and write
D9BB000
stack
page read and write
4C70000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
27EA000
stack
page read and write
DFA000
trusted library allocation
page execute and read and write
5DE0000
trusted library allocation
page execute and read and write
329B000
trusted library allocation
page read and write
1A60000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
9BA000
stack
page read and write
32E3000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
1017000
heap
page read and write
601E000
stack
page read and write
1620000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
C6E000
stack
page read and write
5DB0000
trusted library allocation
page read and write
D67E000
stack
page read and write
3345000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
1354000
heap
page read and write
4E20000
trusted library allocation
page read and write
D6DE000
stack
page read and write
31F8000
trusted library allocation
page read and write
332B000
trusted library allocation
page read and write
798E000
stack
page read and write
5110000
trusted library allocation
page read and write
1794000
trusted library allocation
page read and write
A220000
heap
page read and write
77FE000
stack
page read and write
3251000
trusted library allocation
page read and write
76FE000
stack
page read and write
31C0000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
5290000
trusted library allocation
page execute and read and write
293B000
heap
page read and write
31B1000
trusted library allocation
page read and write
2B4E000
unkown
page read and write
74D0000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
DABC000
stack
page read and write
5270000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
1260000
heap
page read and write
912000
trusted library allocation
page read and write
15B5000
heap
page read and write
78AE000
stack
page read and write
530C000
stack
page read and write
3329000
trusted library allocation
page read and write
DCD000
stack
page read and write
16F5000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
97A000
heap
page read and write
5140000
heap
page read and write
1460000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
50FD000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
33E5000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
52C5000
heap
page read and write
4DC000
unkown
page readonly
5940000
trusted library allocation
page read and write
6BEC000
heap
page read and write
31EA000
trusted library allocation
page read and write
1217000
trusted library allocation
page execute and read and write
712E000
stack
page read and write
5DD0000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
90A000
trusted library allocation
page execute and read and write
1263000
heap
page read and write
3237000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
E37000
heap
page read and write
3233000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
3000000
trusted library allocation
page read and write
160E000
stack
page read and write
4E10000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
31EC000
trusted library allocation
page read and write
43C9000
trusted library allocation
page read and write
6F7000
stack
page read and write
5D9E000
stack
page read and write
2E00000
trusted library allocation
page read and write
6B90000
heap
page read and write
EB7000
heap
page read and write
2CC8000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
5EDE000
stack
page read and write
8D0000
trusted library allocation
page read and write
11F8000
stack
page read and write
1000000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
72BE000
stack
page read and write
2B8F000
unkown
page read and write
50ED000
stack
page read and write
78FF000
stack
page read and write
2B78000
trusted library allocation
page read and write
FFF000
stack
page read and write
4E20000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
D42D000
stack
page read and write
1210000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
4BF5000
trusted library allocation
page read and write
59EE000
stack
page read and write
2C66000
trusted library allocation
page read and write
1707000
heap
page read and write
2E0E000
trusted library allocation
page read and write
103A000
stack
page read and write
D8AB000
stack
page read and write
3299000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
7BFE000
stack
page read and write
64B4000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
5805000
trusted library section
page readonly
2C0E000
stack
page read and write
32B1000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
331D000
trusted library allocation
page read and write
164B000
trusted library allocation
page execute and read and write
7A7F000
stack
page read and write
4B90000
trusted library allocation
page execute and read and write
4EC0000
trusted library allocation
page read and write
7270000
heap
page read and write
3283000
trusted library allocation
page read and write
4145000
trusted library allocation
page read and write
E10000
heap
page read and write
2FEC000
stack
page read and write
6530000
trusted library allocation
page read and write
3A09000
trusted library allocation
page read and write
1010000
heap
page read and write
3410000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5260000
trusted library allocation
page execute and read and write
78A000
stack
page read and write
D47D000
stack
page read and write
1613000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
C30000
trusted library allocation
page read and write
698E000
stack
page read and write
17C7000
heap
page read and write
3080000
heap
page read and write
53CE000
stack
page read and write
13BE000
heap
page read and write
5120000
heap
page read and write
8AE000
stack
page read and write
552E000
stack
page read and write
133D000
trusted library allocation
page execute and read and write
722E000
stack
page read and write
27EF000
stack
page read and write
D7BE000
stack
page read and write
6BD4000
heap
page read and write
16B0000
heap
page read and write
77F0000
trusted library allocation
page read and write
7F310000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
1486000
trusted library allocation
page execute and read and write
60F0000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
5558000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
624C000
trusted library allocation
page read and write
4B8D000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
D9ED000
stack
page read and write
32CF000
trusted library allocation
page read and write
1346000
trusted library allocation
page execute and read and write
2FAF000
stack
page read and write
3259000
trusted library allocation
page read and write
DED000
trusted library allocation
page execute and read and write
5890000
heap
page read and write
BFD000
trusted library allocation
page execute and read and write
2E12000
trusted library allocation
page read and write
1614000
trusted library allocation
page read and write
1240000
heap
page read and write
47DB000
stack
page read and write
3177000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
2AF0000
heap
page read and write
C03000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
1454000
trusted library allocation
page read and write
C45000
heap
page read and write
1260000
heap
page read and write
162D000
trusted library allocation
page execute and read and write
1002000
trusted library allocation
page read and write
1733000
heap
page read and write
720000
heap
page read and write
4E50000
trusted library allocation
page execute and read and write
77E000
stack
page read and write
4BA0000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
2D80000
heap
page execute and read and write
161D000
trusted library allocation
page execute and read and write
3197000
trusted library allocation
page read and write
5B20000
heap
page read and write
D70F000
stack
page read and write
93CD000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
614E000
stack
page read and write
8F0000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
4E10000
heap
page read and write
3295000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
3297000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
2560000
heap
page read and write
52C0000
heap
page read and write
1340000
trusted library allocation
page read and write
16AE000
stack
page read and write
DC3E000
stack
page read and write
3A49000
trusted library allocation
page read and write
50DE000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
5114000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
B5E000
stack
page read and write
1610000
trusted library allocation
page read and write
74E2000
heap
page read and write
57A000
stack
page read and write
8FD000
trusted library allocation
page execute and read and write
1342000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
58E000
unkown
page read and write
32BD000
trusted library allocation
page read and write
2AF8000
heap
page read and write
A11000
heap
page read and write
52A0000
trusted library section
page read and write
3235000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
1A00000
trusted library allocation
page execute and read and write
3199000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
1636000
trusted library allocation
page execute and read and write
3F99000
trusted library allocation
page read and write
5240000
heap
page execute and read and write
DAEE000
stack
page read and write
3367000
trusted library allocation
page read and write
4E01000
trusted library allocation
page read and write
5C70000
heap
page read and write
DC9E000
stack
page read and write
4B65000
trusted library allocation
page read and write
1622000
trusted library allocation
page read and write
E44000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
31C4000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
5C60000
heap
page read and write
3017000
trusted library allocation
page read and write
772E000
stack
page read and write
325D000
trusted library allocation
page read and write
7695000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
1015000
heap
page read and write
DA5C000
stack
page read and write
31B7000
trusted library allocation
page read and write
76A0000
trusted library allocation
page execute and read and write
3247000
trusted library allocation
page read and write
11F8000
heap
page read and write
32CD000
trusted library allocation
page read and write
32B9000
trusted library allocation
page read and write
3315000
trusted library allocation
page read and write
2C86000
trusted library allocation
page read and write
57C0000
trusted library allocation
page execute and read and write
DD3E000
stack
page read and write
7F2B0000
trusted library allocation
page execute and read and write
7F8E0000
trusted library allocation
page execute and read and write
50F1000
trusted library allocation
page read and write
12E0000
heap
page read and write
53C8000
trusted library allocation
page read and write
4165000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
58AB000
heap
page read and write
63B7000
heap
page read and write
26C0000
trusted library allocation
page read and write
324D000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
60F000
stack
page read and write
4A1C000
stack
page read and write
50F0000
heap
page read and write
2FC0000
heap
page execute and read and write
A45000
heap
page read and write
4E90000
trusted library allocation
page read and write
5870000
trusted library section
page readonly
31B5000
trusted library allocation
page read and write
6260000
trusted library allocation
page execute and read and write
324B000
trusted library allocation
page read and write
50EE000
trusted library allocation
page read and write
60D4000
trusted library allocation
page read and write
C1A000
trusted library allocation
page execute and read and write
36E1000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
1700000
heap
page read and write
E46000
trusted library allocation
page read and write
6FBE000
stack
page read and write
330F000
trusted library allocation
page read and write
4FC0000
heap
page read and write
3050000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
5F1D000
stack
page read and write
57B0000
trusted library allocation
page read and write
50D6000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
D8E000
stack
page read and write
327F000
trusted library allocation
page read and write
621E000
stack
page read and write
6510000
trusted library allocation
page execute and read and write
4109000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
1450000
heap
page read and write
C40000
heap
page read and write
E50000
heap
page read and write
4191000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
1220000
heap
page read and write
5CE000
stack
page read and write
61DE000
stack
page read and write
32E5000
trusted library allocation
page read and write
4CD0000
heap
page read and write
16FC000
stack
page read and write
DE0000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
A0F000
heap
page read and write
5A90000
trusted library allocation
page read and write
2725000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
4E80000
heap
page execute and read and write
60C6000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
2C10000
heap
page read and write
3293000
trusted library allocation
page read and write
317E000
trusted library allocation
page read and write
11E3000
trusted library allocation
page execute and read and write
705A000
heap
page read and write
DAFE000
stack
page read and write
4DF2000
trusted library allocation
page read and write
4F4C000
stack
page read and write
A070000
trusted library section
page read and write
BE0000
heap
page read and write
1480000
trusted library allocation
page read and write
1A20000
trusted library allocation
page read and write
528C000
stack
page read and write
788E000
stack
page read and write
4293000
trusted library allocation
page read and write
9F9000
heap
page read and write
3263000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
100B000
trusted library allocation
page execute and read and write
5B1C000
stack
page read and write
6E70000
heap
page read and write
2E50000
heap
page read and write
D5DD000
stack
page read and write
5950000
heap
page read and write
970000
heap
page read and write
1600000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
4EDE000
trusted library allocation
page read and write
BF3000
trusted library allocation
page execute and read and write
2D0F000
unkown
page read and write
2DF0000
heap
page read and write
1330000
trusted library allocation
page read and write
70E0000
heap
page read and write
D22D000
stack
page read and write
930000
heap
page read and write
6BBE000
stack
page read and write
7BBE000
stack
page read and write
32B7000
trusted library allocation
page read and write
4E06000
trusted library allocation
page read and write
62B7000
trusted library allocation
page read and write
EA3000
heap
page read and write
1642000
trusted library allocation
page read and write
F90000
heap
page read and write
178E000
stack
page read and write
16F0000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
D9AC000
stack
page read and write
5804000
trusted library allocation
page read and write
4FD0000
heap
page read and write
2B6F000
stack
page read and write
5A80000
trusted library allocation
page read and write
57AE000
stack
page read and write
972000
heap
page read and write
2E44000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
7240000
trusted library section
page read and write
29A1000
trusted library allocation
page read and write
4ECB000
trusted library allocation
page read and write
6A7E000
stack
page read and write
32CB000
trusted library allocation
page read and write
7ABE000
stack
page read and write
3239000
trusted library allocation
page read and write
160D000
trusted library allocation
page execute and read and write
FC7000
stack
page read and write
660E000
stack
page read and write
161D000
trusted library allocation
page execute and read and write
1A13000
heap
page read and write
39E1000
trusted library allocation
page read and write
900000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
163B000
trusted library allocation
page execute and read and write
32C7000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
17D000
stack
page read and write
2DCC000
stack
page read and write
DD3000
trusted library allocation
page execute and read and write
4EC0000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
1A30000
heap
page read and write
326F000
trusted library allocation
page read and write
2980000
heap
page read and write
15F0000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
64D0000
trusted library allocation
page execute and read and write
1736000
heap
page read and write
2985000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
6BA2000
heap
page read and write
3060000
heap
page execute and read and write
31C2000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
6FF0000
heap
page read and write
70FE000
stack
page read and write
C10000
trusted library allocation
page read and write
4A83000
trusted library allocation
page read and write
8ACE000
stack
page read and write
2CB2000
trusted library allocation
page read and write
54CC000
stack
page read and write
D52D000
stack
page read and write
5A2E000
stack
page read and write
327B000
trusted library allocation
page read and write
51DB000
stack
page read and write
400000
remote allocation
page execute and read and write
3287000
trusted library allocation
page read and write
6972000
heap
page read and write
5B40000
heap
page read and write
C8E000
stack
page read and write
6CE000
unkown
page read and write
2CF0000
heap
page read and write
324F000
trusted library allocation
page read and write
2F6E000
stack
page read and write
5880000
heap
page read and write
F38000
stack
page read and write
4EC4000
trusted library allocation
page read and write
1647000
trusted library allocation
page execute and read and write
17A0000
trusted library allocation
page read and write
E3E000
stack
page read and write
56F4000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
1180000
heap
page read and write
322F000
trusted library allocation
page read and write
2CFA000
heap
page read and write
83A0000
heap
page read and write
3271000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
32BF000
trusted library allocation
page read and write
D71D000
stack
page read and write
6740000
trusted library allocation
page execute and read and write
EA5000
heap
page read and write
97E000
heap
page read and write
15C0000
heap
page read and write
576E000
stack
page read and write
4CB4000
trusted library section
page readonly
3351000
trusted library allocation
page read and write
9B0000
heap
page read and write
31AD000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
D2E000
stack
page read and write
32EF000
trusted library allocation
page read and write
859E000
stack
page read and write
1275000
heap
page read and write
56F0000
heap
page read and write
884B000
stack
page read and write
58A0000
heap
page read and write
4D62000
trusted library allocation
page read and write
4E25000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
A57000
heap
page read and write
D46E000
stack
page read and write
1319000
heap
page read and write
39E9000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
67CE000
stack
page read and write
3CA000
stack
page read and write
62B0000
trusted library allocation
page read and write
64CC000
trusted library allocation
page read and write
E00000
heap
page read and write
334B000
trusted library allocation
page read and write
64E0000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
60F0000
heap
page read and write
14D0000
heap
page read and write
50F6000
trusted library allocation
page read and write
6CBF000
stack
page read and write
4E6F000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
2930000
heap
page read and write
A40000
heap
page read and write
1630000
trusted library allocation
page read and write
5BEE000
stack
page read and write
330D000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
4CF9000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
4FC3000
heap
page read and write
5A40000
heap
page read and write
42C6000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
1328000
heap
page read and write
4E70000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
1492000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
126B000
heap
page read and write
1482000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
510B000
stack
page read and write
28DD000
stack
page read and write
4EA000
unkown
page readonly
2A30000
heap
page read and write
D60E000
stack
page read and write
B9E000
stack
page read and write
566C000
stack
page read and write
1632000
trusted library allocation
page read and write
50EA000
trusted library allocation
page read and write
91B000
trusted library allocation
page execute and read and write
6DBD000
stack
page read and write
2970000
trusted library allocation
page read and write
D530000
heap
page read and write
4E80000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
4E83000
heap
page read and write
5B5E000
stack
page read and write
1790000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
6390000
heap
page read and write
32D9000
trusted library allocation
page read and write
70F000
unkown
page read and write
15B0000
heap
page read and write
31AB000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
61F8000
trusted library allocation
page read and write
5E48000
heap
page read and write
120A000
trusted library allocation
page execute and read and write
410000
unkown
page readonly
325B000
trusted library allocation
page read and write
4FAE000
stack
page read and write
D8BE000
stack
page read and write
26B5000
trusted library allocation
page read and write
11F0000
heap
page read and write
3269000
trusted library allocation
page read and write
D37D000
stack
page read and write
31A5000
trusted library allocation
page read and write
1626000
trusted library allocation
page execute and read and write
957000
heap
page read and write
1200000
trusted library allocation
page read and write
3215000
trusted library allocation
page read and write
4EF2000
trusted library allocation
page read and write
7E0000
heap
page read and write
437E000
trusted library allocation
page read and write
13B0000
heap
page read and write
720000
heap
page read and write
6B12000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
63E8000
heap
page read and write
3223000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
1B9000
stack
page read and write
5A2E000
heap
page read and write
291A000
stack
page read and write
63F7000
heap
page read and write
5E00000
heap
page read and write
7250000
trusted library section
page read and write
85DE000
stack
page read and write
57AE000
stack
page read and write
5B70000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
5F47000
trusted library allocation
page read and write
74E0000
trusted library allocation
page execute and read and write
31D2000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
29CE000
unkown
page read and write
13A6000
trusted library allocation
page read and write
727E000
heap
page read and write
41F7000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
13B8000
heap
page read and write
1610000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
149B000
trusted library allocation
page execute and read and write
639A000
heap
page read and write
63A0000
heap
page read and write
500000
heap
page read and write
64C0000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
E20000
heap
page read and write
32B3000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page execute and read and write
15C0000
heap
page read and write
FEB000
stack
page read and write
6730000
heap
page read and write
2550000
trusted library allocation
page read and write
12AE000
stack
page read and write
77B0000
trusted library allocation
page read and write
5DAB000
stack
page read and write
11E4000
trusted library allocation
page read and write
566E000
stack
page read and write
4EED000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
9A4000
heap
page read and write
6121000
heap
page read and write
E50000
heap
page read and write
E2E000
stack
page read and write
2C4F000
stack
page read and write
D230000
heap
page read and write
323D000
trusted library allocation
page read and write
D330000
trusted library allocation
page execute and read and write
66D0000
heap
page read and write
331F000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
12F0000
heap
page read and write
148A000
trusted library allocation
page execute and read and write
2BC0000
heap
page read and write
2941000
trusted library allocation
page read and write
7750000
trusted library allocation
page execute and read and write
7610000
trusted library allocation
page read and write
29D0000
heap
page read and write
54E000
unkown
page read and write
D33000
heap
page read and write
FAE000
stack
page read and write
917000
trusted library allocation
page execute and read and write
2FF5000
trusted library allocation
page read and write
B6F000
stack
page read and write
86DE000
stack
page read and write
A22E000
heap
page read and write
6240000
trusted library allocation
page read and write
E1E000
heap
page read and write
15AE000
stack
page read and write
D29000
heap
page read and write
4CE6000
trusted library allocation
page read and write
D08000
heap
page read and write
A1E000
heap
page read and write
69CE000
stack
page read and write
1796000
trusted library allocation
page read and write
3C29000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
1212000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
74EE000
stack
page read and write
333B000
trusted library allocation
page read and write
A23000
heap
page read and write
145D000
trusted library allocation
page execute and read and write
56A0000
trusted library allocation
page read and write
4EB0000
heap
page execute and read and write
1380000
trusted library allocation
page execute and read and write
4FE0000
heap
page read and write
59A0000
heap
page execute and read and write
1680000
heap
page read and write
4F10000
trusted library allocation
page read and write
13D7000
heap
page read and write
7480000
heap
page read and write
3243000
trusted library allocation
page read and write
59F0000
heap
page read and write
D325000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
631E000
stack
page read and write
33BF000
stack
page read and write
2E2D000
trusted library allocation
page read and write
894C000
stack
page read and write
8BCE000
stack
page read and write
1453000
trusted library allocation
page execute and read and write
5110000
trusted library section
page readonly
5F3E000
stack
page read and write
269D000
trusted library allocation
page read and write
6E2D000
stack
page read and write
4E80000
heap
page read and write
31EE000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
2DF3000
heap
page read and write
2696000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
2990000
heap
page read and write
36E9000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
F60000
heap
page execute and read and write
73C0000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
705E000
heap
page read and write
5945000
trusted library allocation
page read and write
2691000
trusted library allocation
page read and write
540E000
stack
page read and write
654E000
stack
page read and write
32D5000
trusted library allocation
page read and write
1660000
trusted library allocation
page execute and read and write
322B000
trusted library allocation
page read and write
94F000
heap
page read and write
56B0000
trusted library allocation
page execute and read and write
5945000
trusted library allocation
page read and write
E35000
heap
page read and write
1270000
heap
page read and write
4B80000
trusted library allocation
page read and write
E57000
heap
page read and write
332D000
trusted library allocation
page read and write
ECA000
stack
page read and write
1005000
trusted library allocation
page execute and read and write
E08000
heap
page read and write
325D000
trusted library allocation
page read and write
4199000
trusted library allocation
page read and write
1215000
trusted library allocation
page execute and read and write
D81E000
stack
page read and write
32E1000
trusted library allocation
page read and write
9C0000
heap
page read and write
3207000
trusted library allocation
page read and write
4101000
trusted library allocation
page read and write
1226000
heap
page read and write
12F8000
heap
page read and write
5960000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
1658000
trusted library allocation
page read and write
4E12000
trusted library allocation
page read and write
3335000
trusted library allocation
page read and write
3C8A000
trusted library allocation
page read and write
3205000
trusted library allocation
page read and write
64C8000
trusted library allocation
page read and write
774E000
stack
page read and write
1230000
trusted library allocation
page read and write
13A3000
heap
page read and write
135B000
trusted library allocation
page execute and read and write
7692000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
906000
trusted library allocation
page execute and read and write
2FDF000
trusted library allocation
page read and write
56A2000
trusted library allocation
page read and write
130E000
heap
page read and write
F37000
trusted library allocation
page execute and read and write
2DE0000
trusted library allocation
page read and write
DD4000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
24CD000
stack
page read and write
555E000
stack
page read and write
3F71000
trusted library allocation
page read and write
1A50000
trusted library allocation
page read and write
2E60000
heap
page read and write
31C6000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
CF9000
stack
page read and write
2E1E000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
5108000
trusted library allocation
page read and write
7F670000
trusted library allocation
page execute and read and write
F32000
trusted library allocation
page read and write
C00000
heap
page read and write
1007000
trusted library allocation
page execute and read and write
3004000
trusted library allocation
page read and write
6980000
heap
page read and write
50E2000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
DCDE000
stack
page read and write
4E70000
heap
page read and write
3291000
trusted library allocation
page read and write
7EE30000
trusted library allocation
page execute and read and write
2C04000
trusted library allocation
page read and write
4EC2000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
634E000
stack
page read and write
There are 1319 hidden memdumps, click here to show them.