IOC Report
BKG#SGN2106728.PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
BKG#SGN2106728.PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp5779.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKG#SGN2106728.PDF.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eDnxmGWzJ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1p2awkjv.ak2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hvnzv503.kgs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kokkn5tx.1eq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_moeippkc.0oq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spio0q4i.pq1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tmrbabsa.hh2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vdp1yt0x.gcn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yv1yxft0.g02.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6F75.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp"
malicious
C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
malicious
C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
malicious
C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
malicious
C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp"
malicious
C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
"C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
malicious
C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
"C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://r3.o.lencr.org0
unknown
https://api.ipify.org
unknown
http://flexwelltour.com
unknown
http://r3.i.lencr.org/0L
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://mail.flexwelltour.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://x1.i.len
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.flexwelltour.com
unknown
malicious
flexwelltour.com
94.199.200.238
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
94.199.200.238
flexwelltour.com
Turkey
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BKG#SGN2106728_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\eDnxmGWzJ_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BjTxJte_RASMANCS
FileDirectory
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
31C1000
trusted library allocation
page read and write
malicious
31F4000
trusted library allocation
page read and write
malicious
30C4000
trusted library allocation
page read and write
malicious
3091000
trusted library allocation
page read and write
malicious
3C58000
trusted library allocation
page read and write
malicious
31EC000
trusted library allocation
page read and write
malicious
30BC000
trusted library allocation
page read and write
malicious
3431000
trusted library allocation
page read and write
malicious
46D0000
trusted library allocation
page read and write
malicious
347A000
trusted library allocation
page read and write
malicious
2F8C000
trusted library allocation
page read and write
malicious
2F94000
trusted library allocation
page read and write
malicious
399F000
trusted library allocation
page read and write
malicious
2F61000
trusted library allocation
page read and write
malicious
3482000
trusted library allocation
page read and write
malicious
12A0000
trusted library allocation
page execute and read and write
5610000
heap
page read and write
13F4000
trusted library allocation
page read and write
6D0F000
stack
page read and write
7C77000
trusted library allocation
page read and write
78DC000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
1325000
trusted library allocation
page read and write
E72000
trusted library allocation
page read and write
168B000
trusted library allocation
page execute and read and write
5C7F000
stack
page read and write
6A8E000
stack
page read and write
43E000
remote allocation
page execute and read and write
5A7D000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
2E3F000
stack
page read and write
5ABE000
stack
page read and write
7C37000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
2C48000
heap
page read and write
83B3000
heap
page read and write
3020000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
E33000
trusted library allocation
page execute and read and write
1279000
trusted library allocation
page read and write
694E000
stack
page read and write
5C8E000
stack
page read and write
3020000
heap
page read and write
29C3000
trusted library allocation
page read and write
10D8000
heap
page read and write
5552000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page execute and read and write
138E000
stack
page read and write
70B0000
trusted library allocation
page read and write
304E000
stack
page read and write
78A3000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
507E000
stack
page read and write
2F4F000
trusted library allocation
page read and write
4431000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
4549000
trusted library allocation
page read and write
6DDF000
stack
page read and write
707E000
stack
page read and write
4171000
trusted library allocation
page read and write
526F000
stack
page read and write
7C43000
trusted library allocation
page read and write
E0E000
stack
page read and write
1158000
stack
page read and write
5490000
trusted library allocation
page execute and read and write
30CF000
trusted library allocation
page read and write
1937000
heap
page read and write
8AE0000
trusted library allocation
page read and write
7BD7000
trusted library allocation
page read and write
59DC000
stack
page read and write
3416000
trusted library allocation
page read and write
2B10000
heap
page read and write
12F9000
stack
page read and write
167A000
trusted library allocation
page execute and read and write
7690000
heap
page read and write
3205000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
1380000
heap
page read and write
37F4000
trusted library allocation
page read and write
4DB0000
heap
page read and write
6AE5000
heap
page read and write
11B0000
heap
page read and write
785A000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
792D000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
2F8E000
stack
page read and write
50E0000
heap
page read and write
78A7000
trusted library allocation
page read and write
2760000
heap
page execute and read and write
6AA2000
heap
page read and write
5732000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
980000
heap
page read and write
A1F000
heap
page read and write
31F0000
heap
page read and write
5150000
heap
page read and write
7846000
trusted library allocation
page read and write
AFA000
heap
page read and write
5422000
trusted library allocation
page read and write
1344000
heap
page read and write
792F000
trusted library allocation
page read and write
12B0000
heap
page read and write
2FA5000
trusted library allocation
page read and write
990000
heap
page read and write
1422000
trusted library allocation
page read and write
5660000
heap
page execute and read and write
50A0000
trusted library allocation
page read and write
667E000
stack
page read and write
2F3E000
stack
page read and write
C67D000
stack
page read and write
149E000
stack
page read and write
303D000
stack
page read and write
7924000
trusted library allocation
page read and write
EB6000
trusted library allocation
page execute and read and write
8149000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
761E000
stack
page read and write
7850000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
4F16000
trusted library allocation
page read and write
1195000
heap
page read and write
7A0E000
stack
page read and write
13E0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
13E6000
heap
page read and write
1320000
trusted library allocation
page read and write
7841000
trusted library allocation
page read and write
74D0000
heap
page read and write
5A70000
trusted library allocation
page read and write
177B000
stack
page read and write
14B8000
heap
page read and write
10F7000
stack
page read and write
6B7D000
stack
page read and write
1730000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
18E4000
heap
page read and write
6D97000
trusted library allocation
page read and write
9DE000
stack
page read and write
2DCC000
stack
page read and write
56BF000
stack
page read and write
5A90000
heap
page read and write
10B7000
heap
page read and write
7BFB000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
756D000
stack
page read and write
7BC6000
trusted library allocation
page read and write
131A000
heap
page read and write
170A000
trusted library allocation
page execute and read and write
1281000
trusted library allocation
page read and write
7C14000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
1717000
trusted library allocation
page execute and read and write
80B3000
trusted library allocation
page read and write
38E5000
trusted library allocation
page read and write
4A0C000
stack
page read and write
163E000
stack
page read and write
34E5000
trusted library allocation
page read and write
6AC0000
heap
page read and write
4D60000
trusted library allocation
page read and write
AC2000
heap
page read and write
592E000
stack
page read and write
15A5000
trusted library allocation
page execute and read and write
1040000
heap
page read and write
C28E000
stack
page read and write
12A0000
trusted library allocation
page read and write
1292000
trusted library allocation
page read and write
78B8000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
6D39000
trusted library allocation
page read and write
6ADB000
heap
page read and write
6D25000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
1320000
heap
page read and write
12DE000
stack
page read and write
55F7000
heap
page read and write
768B000
stack
page read and write
7C01000
trusted library allocation
page read and write
86E0000
heap
page read and write
556E000
stack
page read and write
323E000
stack
page read and write
583E000
stack
page read and write
121E000
stack
page read and write
6A60000
heap
page read and write
6B69000
trusted library allocation
page read and write
1323000
heap
page read and write
7897000
trusted library allocation
page read and write
E4D000
trusted library allocation
page execute and read and write
3474000
trusted library allocation
page read and write
1712000
trusted library allocation
page read and write
660E000
stack
page read and write
125C000
stack
page read and write
2F9F000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
6C0E000
stack
page read and write
6F7E000
stack
page read and write
783C000
trusted library allocation
page read and write
54E4000
heap
page read and write
7240000
trusted library allocation
page execute and read and write
8490000
trusted library allocation
page read and write
647D000
unkown
page read and write
5360000
trusted library allocation
page execute and read and write
8CA0000
heap
page read and write
5034000
trusted library allocation
page read and write
6D80000
heap
page read and write
7C8D000
trusted library allocation
page read and write
1338000
heap
page read and write
8873000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
EAD000
trusted library allocation
page execute and read and write
5620000
trusted library allocation
page read and write
4409000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
2F40000
heap
page read and write
6BB6000
heap
page read and write
DFA000
stack
page read and write
623F000
stack
page read and write
58EE000
stack
page read and write
128C000
stack
page read and write
4D90000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
4ECE000
stack
page read and write
35A0000
heap
page read and write
DA8000
heap
page read and write
86AE000
stack
page read and write
30E4000
trusted library allocation
page read and write
41D8000
trusted library allocation
page read and write
7C81000
trusted library allocation
page read and write
7C39000
trusted library allocation
page read and write
A35000
heap
page read and write
760000
heap
page read and write
5470000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
7C61000
trusted library allocation
page read and write
786E000
trusted library allocation
page read and write
5760000
heap
page read and write
12C4000
heap
page read and write
5A87000
trusted library allocation
page read and write
30D0000
heap
page execute and read and write
7962000
trusted library allocation
page read and write
16ED000
trusted library allocation
page execute and read and write
4F18000
trusted library allocation
page read and write
6EFE000
stack
page read and write
77AE000
stack
page read and write
7BA9000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
7938000
trusted library allocation
page read and write
6669000
heap
page read and write
4C70000
trusted library allocation
page execute and read and write
CA1E000
stack
page read and write
D5F000
stack
page read and write
3199000
trusted library allocation
page read and write
142B000
trusted library allocation
page execute and read and write
69D2000
heap
page read and write
7852000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
13F4000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
CCA000
stack
page read and write
8F8F000
stack
page read and write
3060000
heap
page read and write
4EE0000
heap
page read and write
7C87000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
12B5000
heap
page read and write
5090000
heap
page read and write
78F3000
trusted library allocation
page read and write
9C9000
heap
page read and write
7C69000
trusted library allocation
page read and write
130A000
heap
page read and write
68FE000
stack
page read and write
65B0000
trusted library allocation
page read and write
13BC000
stack
page read and write
16A0000
trusted library allocation
page read and write
6BAE000
stack
page read and write
764E000
stack
page read and write
25CE000
stack
page read and write
13B0000
heap
page read and write
2F9E000
unkown
page read and write
4E20000
trusted library allocation
page read and write
7C89000
trusted library allocation
page read and write
72CD000
stack
page read and write
6AD7000
trusted library allocation
page read and write
1170000
heap
page read and write
7C7D000
trusted library allocation
page read and write
5B6E000
stack
page read and write
5747000
trusted library allocation
page read and write
6BB0000
heap
page read and write
7BC4000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
71AC000
stack
page read and write
55F0000
heap
page read and write
164C000
stack
page read and write
6BC0000
trusted library allocation
page read and write
7879000
trusted library allocation
page read and write
653F000
stack
page read and write
5140000
trusted library allocation
page read and write
2BEE000
stack
page read and write
5070000
heap
page execute and read and write
5C80000
heap
page read and write
752C000
stack
page read and write
1363000
heap
page read and write
2D10000
heap
page read and write
4D67000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
1260000
heap
page execute and read and write
2DF0000
trusted library allocation
page read and write
2AA9000
stack
page read and write
680E000
stack
page read and write
83AE000
stack
page read and write
10EF000
heap
page read and write
778C000
stack
page read and write
541D000
trusted library allocation
page read and write
4165000
trusted library allocation
page read and write
7E52000
trusted library allocation
page read and write
6D7D000
stack
page read and write
13FD000
trusted library allocation
page execute and read and write
1437000
trusted library allocation
page execute and read and write
7863000
trusted library allocation
page read and write
7C52000
trusted library allocation
page read and write
A97000
heap
page read and write
634B000
stack
page read and write
1310000
trusted library allocation
page read and write
4DCA000
trusted library allocation
page read and write
5153000
heap
page read and write
6D30000
trusted library allocation
page read and write
4C71000
trusted library allocation
page read and write
C3FD000
stack
page read and write
607E000
stack
page read and write
30DA000
trusted library allocation
page read and write
670E000
stack
page read and write
EEE000
heap
page read and write
2B5E000
unkown
page read and write
7903000
trusted library allocation
page read and write
12F0000
heap
page read and write
3421000
trusted library allocation
page read and write
3090000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
15A0000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
56D0000
heap
page read and write
B8B000
heap
page read and write
7832000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
274C000
stack
page read and write
5C00000
trusted library allocation
page read and write
159A000
trusted library allocation
page execute and read and write
55CE000
trusted library allocation
page read and write
78CE000
stack
page read and write
2F1D000
stack
page read and write
7918000
trusted library allocation
page read and write
1040000
trusted library allocation
page execute and read and write
828E000
stack
page read and write
70C0000
trusted library allocation
page execute and read and write
6E7E000
stack
page read and write
709C000
stack
page read and write
5A6E000
stack
page read and write
6A3E000
stack
page read and write
7882000
trusted library allocation
page read and write
3290000
heap
page read and write
2E20000
heap
page execute and read and write
6EA7000
trusted library allocation
page read and write
13F3000
trusted library allocation
page execute and read and write
1573000
trusted library allocation
page execute and read and write
86C0000
heap
page read and write
17C7000
heap
page read and write
5570000
trusted library allocation
page read and write
2DBE000
stack
page read and write
4D5B000
trusted library allocation
page read and write
DA0000
heap
page read and write
5552000
trusted library allocation
page read and write
1435000
trusted library allocation
page execute and read and write
2BFA000
heap
page read and write
152D000
heap
page read and write
30C0000
trusted library allocation
page read and write
12E0000
heap
page read and write
3041000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
A00000
heap
page read and write
4041000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
156E000
heap
page read and write
93AE000
stack
page read and write
18CC000
stack
page read and write
140D000
trusted library allocation
page execute and read and write
1432000
trusted library allocation
page read and write
165D000
trusted library allocation
page execute and read and write
30B4000
trusted library allocation
page read and write
84AE000
stack
page read and write
156B000
heap
page read and write
55A0000
heap
page execute and read and write
5100000
heap
page execute and read and write
1580000
trusted library allocation
page read and write
7968000
trusted library allocation
page read and write
10ED000
stack
page read and write
6E80000
trusted library allocation
page read and write
EC2000
trusted library allocation
page read and write
84DE000
stack
page read and write
37D9000
trusted library allocation
page read and write
533E000
stack
page read and write
65D0000
heap
page read and write
554D000
trusted library allocation
page read and write
8C3E000
stack
page read and write
4380000
trusted library allocation
page read and write
94AE000
stack
page read and write
597C000
stack
page read and write
80A0000
trusted library allocation
page execute and read and write
7BD9000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
5A20000
heap
page read and write
92AE000
stack
page read and write
1672000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
2755000
trusted library allocation
page read and write
3834000
trusted library allocation
page read and write
5A43000
heap
page read and write
71F0000
heap
page read and write
4448000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
1900000
heap
page read and write
3F11000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
EF0000
heap
page execute and read and write
2750000
trusted library allocation
page read and write
55D0000
heap
page read and write
1349000
heap
page read and write
8AE000
stack
page read and write
4148000
trusted library allocation
page read and write
85AE000
stack
page read and write
40CA000
trusted library allocation
page read and write
5600000
heap
page read and write
6E3E000
stack
page read and write
A0E000
heap
page read and write
637E000
stack
page read and write
E55000
heap
page read and write
64BC000
stack
page read and write
13E0000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
2C3D000
stack
page read and write
7960000
trusted library allocation
page read and write
1066000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
12A5000
heap
page read and write
6950000
heap
page read and write
2BF1000
trusted library allocation
page read and write
4D71000
trusted library allocation
page read and write
F3E000
stack
page read and write
76AD000
stack
page read and write
55F0000
heap
page read and write
1381000
heap
page read and write
1290000
heap
page read and write
7080000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
4301000
trusted library allocation
page read and write
8170000
heap
page read and write
4FF7000
trusted library allocation
page read and write
2DF0000
heap
page read and write
6B92000
heap
page read and write
5070000
trusted library allocation
page read and write
795A000
trusted library allocation
page read and write
FF5000
heap
page read and write
1430000
trusted library allocation
page read and write
1078000
heap
page read and write
C18E000
stack
page read and write
312B000
trusted library allocation
page read and write
1706000
trusted library allocation
page execute and read and write
796C000
trusted library allocation
page read and write
863C000
stack
page read and write
C53D000
stack
page read and write
7C5F000
trusted library allocation
page read and write
18D0000
trusted library allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
517E000
stack
page read and write
5546000
trusted library allocation
page read and write
7C6D000
trusted library allocation
page read and write
75DE000
stack
page read and write
7C22000
trusted library allocation
page read and write
130F000
heap
page read and write
7F760000
trusted library allocation
page execute and read and write
33E1000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
5520000
trusted library allocation
page read and write
7C85000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
70D0000
heap
page read and write
7C66000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
137D000
heap
page read and write
5A7E000
stack
page read and write
A40000
trusted library allocation
page read and write
BF4D000
stack
page read and write
7871000
trusted library allocation
page read and write
7947000
trusted library allocation
page read and write
77AE000
stack
page read and write
66CF000
stack
page read and write
4D54000
trusted library allocation
page read and write
552E000
trusted library allocation
page read and write
166D000
trusted library allocation
page execute and read and write
2895000
trusted library allocation
page read and write
142E000
stack
page read and write
7989000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
F73000
heap
page read and write
4199000
trusted library allocation
page read and write
697E000
stack
page read and write
71D0000
heap
page read and write
7BE6000
trusted library allocation
page read and write
270E000
stack
page read and write
6BC0000
trusted library allocation
page read and write
7250000
heap
page read and write
6ACE000
stack
page read and write
1676000
trusted library allocation
page execute and read and write
6E95000
trusted library allocation
page read and write
78C7000
trusted library allocation
page read and write
698E000
stack
page read and write
A0A000
heap
page read and write
1450000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
2A6D000
stack
page read and write
13F0000
trusted library allocation
page read and write
6BB9000
heap
page read and write
6FF0000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
12BA000
heap
page read and write
5E90000
heap
page read and write
14FB000
heap
page read and write
6D1D000
stack
page read and write
7CA6000
trusted library allocation
page read and write
A76000
trusted library allocation
page execute and read and write
55B0000
trusted library allocation
page read and write
83B6000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
5DBE000
stack
page read and write
1290000
heap
page read and write
105F000
heap
page read and write
31E8000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
6CCD000
trusted library allocation
page read and write
14A7000
heap
page read and write
12C0000
trusted library allocation
page read and write
7CA2000
trusted library allocation
page read and write
7878000
trusted library allocation
page read and write
55B0000
heap
page read and write
4E4E000
stack
page read and write
70FE000
stack
page read and write
34EB000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
6A8E000
stack
page read and write
3030000
heap
page read and write
1264000
trusted library allocation
page read and write
13E3000
heap
page read and write
53AE000
stack
page read and write
A7A000
trusted library allocation
page execute and read and write
5546000
trusted library allocation
page read and write
F22000
heap
page read and write
6E30000
trusted library allocation
page execute and read and write
6D27000
trusted library allocation
page read and write
2C3F000
unkown
page read and write
2DFE000
stack
page read and write
856000
heap
page read and write
69D5000
heap
page read and write
64FE000
stack
page read and write
4250000
trusted library allocation
page read and write
766E000
stack
page read and write
6DBE000
unkown
page read and write
7FA0000
heap
page read and write
3924000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
795E000
trusted library allocation
page read and write
66BD000
stack
page read and write
4ED0000
heap
page execute and read and write
16D0000
trusted library allocation
page read and write
6F30000
heap
page read and write
6BB3000
heap
page read and write
11B5000
heap
page read and write
990000
heap
page read and write
87ED000
stack
page read and write
2E50000
heap
page read and write
1480000
heap
page read and write
553E000
trusted library allocation
page read and write
386F000
trusted library allocation
page read and write
4EE3000
heap
page read and write
2DEC000
stack
page read and write
6E7E000
stack
page read and write
C62C000
stack
page read and write
2E70000
heap
page read and write
703E000
stack
page read and write
1780000
trusted library allocation
page read and write
15D7000
heap
page read and write
2B60000
heap
page read and write
6E9D000
trusted library allocation
page read and write
11F0000
heap
page read and write
86D0000
heap
page read and write
1330000
heap
page read and write
4D64000
trusted library allocation
page read and write
EEA000
heap
page read and write
719C000
stack
page read and write
6EF0000
heap
page read and write
1574000
trusted library allocation
page read and write
4AD5000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
AC6000
heap
page read and write
69FE000
heap
page read and write
7F200000
trusted library allocation
page execute and read and write
C8DB000
stack
page read and write
620E000
stack
page read and write
171B000
trusted library allocation
page execute and read and write
16FD000
trusted library allocation
page execute and read and write
1668000
trusted library allocation
page read and write
DC6000
trusted library allocation
page read and write
754E000
stack
page read and write
12AF000
heap
page read and write
4E70000
trusted library allocation
page read and write
9AF000
stack
page read and write
2FEF000
unkown
page read and write
7FC5000
heap
page read and write
C9DC000
stack
page read and write
3034000
heap
page read and write
DC0000
trusted library allocation
page read and write
14A0000
heap
page read and write
F14000
heap
page read and write
1416000
trusted library allocation
page execute and read and write
1457000
heap
page read and write
701E000
stack
page read and write
7869000
trusted library allocation
page read and write
78DA000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
44E3000
trusted library allocation
page read and write
7905000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
6E1C000
stack
page read and write
4870000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
2E9E000
stack
page read and write
7FBE000
heap
page read and write
333F000
trusted library allocation
page read and write
794E000
trusted library allocation
page read and write
C400000
heap
page read and write
30B0000
trusted library allocation
page read and write
5056000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
C77E000
stack
page read and write
160C000
unkown
page read and write
131F000
trusted library allocation
page read and write
6F06000
trusted library allocation
page read and write
EDE000
stack
page read and write
69DE000
heap
page read and write
1660000
trusted library allocation
page read and write
333B000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
7C6F000
trusted library allocation
page read and write
148E000
stack
page read and write
7190000
heap
page read and write
7C2A000
trusted library allocation
page read and write
14F0000
heap
page read and write
7B90000
trusted library allocation
page read and write
7BFF000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
293A000
stack
page read and write
2DF0000
trusted library allocation
page read and write
71FF000
stack
page read and write
6CC5000
trusted library allocation
page read and write
E93000
trusted library allocation
page execute and read and write
1427000
trusted library allocation
page execute and read and write
4BE0000
trusted library allocation
page execute and read and write
7C7B000
trusted library allocation
page read and write
6D7E000
stack
page read and write
7CAA000
trusted library allocation
page read and write
E7B000
trusted library allocation
page execute and read and write
E34000
trusted library allocation
page read and write
D80000
heap
page read and write
794A000
trusted library allocation
page read and write
1470000
heap
page read and write
5737000
trusted library allocation
page read and write
787D000
trusted library allocation
page read and write
2E4F000
unkown
page read and write
7C12000
trusted library allocation
page read and write
56AC000
stack
page read and write
798F000
trusted library allocation
page read and write
7FA3000
heap
page read and write
670D000
stack
page read and write
9DE000
stack
page read and write
827E000
stack
page read and write
143B000
trusted library allocation
page execute and read and write
5370000
heap
page read and write
477C000
trusted library allocation
page read and write
142A000
trusted library allocation
page execute and read and write
7000000
trusted library allocation
page execute and read and write
5B5E000
stack
page read and write
5430000
trusted library allocation
page read and write
7C24000
trusted library allocation
page read and write
866E000
stack
page read and write
4890000
trusted library allocation
page execute and read and write
667D000
stack
page read and write
572E000
trusted library allocation
page read and write
1425000
trusted library allocation
page execute and read and write
5790000
heap
page execute and read and write
A82000
trusted library allocation
page read and write
4295000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
2FF0000
heap
page read and write
1270000
heap
page read and write
7C6B000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
2FCF000
stack
page read and write
8B3B000
stack
page read and write
F20000
heap
page read and write
1110000
heap
page read and write
2897000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
14FE000
stack
page read and write
670E000
stack
page read and write
1077000
heap
page read and write
58FE000
stack
page read and write
13CF000
stack
page read and write
4D82000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
67FE000
stack
page read and write
536E000
stack
page read and write
73DE000
stack
page read and write
716E000
stack
page read and write
624F000
stack
page read and write
2C40000
heap
page read and write
5400000
trusted library section
page read and write
645F000
heap
page read and write
A42000
heap
page read and write
7C26000
trusted library allocation
page read and write
45E5000
trusted library allocation
page read and write
4C37000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
4D7D000
trusted library allocation
page read and write
168C000
stack
page read and write
638D000
stack
page read and write
5BBF000
stack
page read and write
1138000
stack
page read and write
8320000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
2DF4000
trusted library allocation
page read and write
7F90000
heap
page read and write
31DF000
stack
page read and write
2F48000
heap
page read and write
117E000
stack
page read and write
765E000
stack
page read and write
1687000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
1590000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
794C000
trusted library allocation
page read and write
128D000
trusted library allocation
page read and write
50F0000
trusted library allocation
page execute and read and write
55D1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
6FAF000
stack
page read and write
2E10000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
5524000
trusted library allocation
page read and write
7C59000
trusted library allocation
page read and write
1170000
heap
page read and write
1060000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
153F000
heap
page read and write
26CE000
stack
page read and write
2B80000
heap
page read and write
657E000
stack
page read and write
7922000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
6CD7000
trusted library allocation
page read and write
445A000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
840000
heap
page read and write
CC5E000
stack
page read and write
1577000
heap
page read and write
5570000
heap
page read and write
5402000
trusted library allocation
page read and write
6D2D000
trusted library allocation
page read and write
7C79000
trusted library allocation
page read and write
577E000
stack
page read and write
3529000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
8390000
heap
page read and write
7B98000
trusted library allocation
page read and write
3478000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
680E000
stack
page read and write
7C28000
trusted library allocation
page read and write
29EE000
unkown
page read and write
2D8E000
stack
page read and write
7F8C000
stack
page read and write
790B000
trusted library allocation
page read and write
648F000
stack
page read and write
1392000
heap
page read and write
A9E000
heap
page read and write
13F0000
trusted library allocation
page read and write
A6D000
trusted library allocation
page execute and read and write
7901000
trusted library allocation
page read and write
69BE000
stack
page read and write
4DC0000
trusted library allocation
page read and write
55BE000
stack
page read and write
5051000
trusted library allocation
page read and write
2BCF000
unkown
page read and write
1930000
heap
page read and write
726C000
stack
page read and write
6D40000
trusted library allocation
page execute and read and write
837B000
stack
page read and write
DE9000
heap
page read and write
2D0E000
unkown
page read and write
6E20000
trusted library allocation
page read and write
DC8000
stack
page read and write
305D000
trusted library allocation
page read and write
572C000
stack
page read and write
5030000
trusted library allocation
page read and write
CF7000
stack
page read and write
736C000
stack
page read and write
1653000
trusted library allocation
page execute and read and write
1790000
heap
page read and write
6F7000
stack
page read and write
83A0000
heap
page read and write
31A7000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
1450000
heap
page read and write
5430000
trusted library allocation
page execute and read and write
3FA000
stack
page read and write
937000
stack
page read and write
2C3B000
trusted library allocation
page read and write
1048000
heap
page read and write
78E0000
trusted library allocation
page read and write
16E4000
trusted library allocation
page read and write
77CD000
stack
page read and write
E50000
heap
page read and write
8393000
trusted library allocation
page read and write
6AE7000
heap
page read and write
908E000
stack
page read and write
1700000
heap
page read and write
65CE000
stack
page read and write
127E000
trusted library allocation
page read and write
706E000
stack
page read and write
810C000
stack
page read and write
78A5000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
12F8000
heap
page read and write
4E10000
trusted library allocation
page execute and read and write
8AD0000
trusted library allocation
page execute and read and write
8140000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
4468000
trusted library allocation
page read and write
A98000
heap
page read and write
53FE000
stack
page read and write
3908000
trusted library allocation
page read and write
7470000
heap
page read and write
5F3F000
stack
page read and write
CB1F000
stack
page read and write
2EA9000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
C52C000
stack
page read and write
106B000
heap
page read and write
16E3000
trusted library allocation
page execute and read and write
28D2000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
7985000
trusted library allocation
page read and write
1552000
heap
page read and write
DC4000
trusted library allocation
page read and write
78DE000
trusted library allocation
page read and write
2E30000
heap
page read and write
E3D000
trusted library allocation
page execute and read and write
552E000
stack
page read and write
2F46000
trusted library allocation
page read and write
1797000
heap
page read and write
7C4E000
trusted library allocation
page read and write
AD0000
heap
page read and write
5930000
heap
page execute and read and write
348D000
trusted library allocation
page read and write
7931000
trusted library allocation
page read and write
785F000
trusted library allocation
page read and write
12B5000
trusted library allocation
page read and write
29F0000
heap
page read and write
95CE000
stack
page read and write
48DD000
stack
page read and write
7200000
trusted library allocation
page read and write
798D000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
1702000
trusted library allocation
page read and write
919000
stack
page read and write
33A0000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
308C000
stack
page read and write
55DD000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
17C0000
heap
page read and write
31DB000
trusted library allocation
page read and write
15E0000
trusted library allocation
page execute and read and write
55BB000
trusted library allocation
page read and write
1190000
heap
page read and write
693E000
stack
page read and write
1422000
trusted library allocation
page read and write
3964000
trusted library allocation
page read and write
850000
heap
page read and write
4F10000
trusted library allocation
page read and write
797F000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
29A0000
heap
page read and write
12AF000
trusted library allocation
page read and write
13FE000
stack
page read and write
1070000
heap
page read and write
7855000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
784B000
trusted library allocation
page read and write
7964000
trusted library allocation
page read and write
58CE000
stack
page read and write
684D000
stack
page read and write
A40000
heap
page read and write
55D3000
heap
page read and write
97AE000
stack
page read and write
2DD0000
trusted library allocation
page read and write
327F000
stack
page read and write
A87000
trusted library allocation
page execute and read and write
31BD000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
15AB000
trusted library allocation
page execute and read and write
5AAE000
stack
page read and write
71AE000
stack
page read and write
4164000
trusted library allocation
page read and write
1330000
heap
page read and write
32BD000
trusted library allocation
page read and write
1506000
heap
page read and write
83A000
stack
page read and write
7CAE000
trusted library allocation
page read and write
177E000
stack
page read and write
5C10000
trusted library allocation
page read and write
1410000
heap
page read and write
7CA0000
trusted library allocation
page read and write
7907000
trusted library allocation
page read and write
A9F000
heap
page read and write
630E000
stack
page read and write
59EE000
stack
page read and write
2BF0000
heap
page read and write
7490000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
58E0000
trusted library allocation
page execute and read and write
526E000
stack
page read and write
503B000
trusted library allocation
page read and write
7BFD000
trusted library allocation
page read and write
6B8E000
stack
page read and write
78D8000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
687D000
stack
page read and write
3F39000
trusted library allocation
page read and write
40EA000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
647E000
stack
page read and write
7B82000
trusted library allocation
page read and write
4069000
trusted library allocation
page read and write
4500000
trusted library allocation
page read and write
1450000
heap
page read and write
71E0000
trusted library allocation
page execute and read and write
1508000
heap
page read and write
5B7C000
stack
page read and write
E66000
trusted library allocation
page execute and read and write
17BC000
stack
page read and write
34A1000
trusted library allocation
page read and write
2F50000
heap
page read and write
41DF000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
E77000
trusted library allocation
page execute and read and write
A5D000
trusted library allocation
page execute and read and write
DDF000
trusted library allocation
page read and write
7CA8000
trusted library allocation
page read and write
790D000
stack
page read and write
7837000
trusted library allocation
page read and write
85EE000
stack
page read and write
4D69000
trusted library allocation
page read and write
585E000
stack
page read and write
141A000
trusted library allocation
page execute and read and write
5120000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
5E5B000
heap
page read and write
5B50000
heap
page read and write
2CC0000
heap
page read and write
744E000
stack
page read and write
64CE000
stack
page read and write
7C8B000
trusted library allocation
page read and write
71C0000
trusted library allocation
page execute and read and write
3F78000
trusted library allocation
page read and write
4E8E000
stack
page read and write
1326000
heap
page read and write
5062000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
7FDE0000
trusted library allocation
page execute and read and write
31BF000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
4597000
trusted library allocation
page read and write
4CEC000
stack
page read and write
6B29000
heap
page read and write
5D8F000
stack
page read and write
6F3E000
stack
page read and write
7FDF0000
trusted library allocation
page execute and read and write
D90000
trusted library allocation
page execute and read and write
1460000
trusted library allocation
page execute and read and write
14E4000
heap
page read and write
6D36000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
6B0E000
heap
page read and write
C14F000
stack
page read and write
5BEE000
stack
page read and write
6CD0000
trusted library allocation
page read and write
8C90000
heap
page read and write
7A0000
unkown
page readonly
7981000
trusted library allocation
page read and write
5870000
heap
page execute and read and write
6D20000
heap
page read and write
5B4E000
stack
page read and write
5ADE000
stack
page read and write
5570000
heap
page read and write
2F8A000
trusted library allocation
page read and write
1699000
heap
page read and write
6FDC000
stack
page read and write
30A0000
trusted library allocation
page read and write
7CAC000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
4109000
trusted library allocation
page read and write
18E0000
heap
page read and write
86AE000
stack
page read and write
2D7E000
stack
page read and write
1340000
heap
page read and write
BF50000
heap
page read and write
7BB6000
trusted library allocation
page read and write
1654000
trusted library allocation
page read and write
6622000
heap
page read and write
51DE000
stack
page read and write
40E9000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4630000
trusted library allocation
page read and write
5A2D000
stack
page read and write
657C000
stack
page read and write
3799000
trusted library allocation
page read and write
7C7F000
trusted library allocation
page read and write
588E000
stack
page read and write
6EBF000
stack
page read and write
2E4F000
trusted library allocation
page read and write
7BE8000
trusted library allocation
page read and write
67BF000
stack
page read and write
30CF000
trusted library allocation
page read and write
15A7000
trusted library allocation
page execute and read and write
7983000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
4F5E000
stack
page read and write
A54000
trusted library allocation
page read and write
7987000
trusted library allocation
page read and write
83B9000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
14E6000
heap
page read and write
6EA0000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
5E40000
heap
page read and write
2EF0000
heap
page read and write
66BB000
stack
page read and write
EE0000
heap
page read and write
6DA0000
trusted library allocation
page execute and read and write
28FD000
stack
page read and write
71A0000
trusted library allocation
page read and write
7864000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
96CE000
stack
page read and write
3010000
trusted library allocation
page read and write
2FF0000
heap
page read and write
9F0000
heap
page read and write
56D4000
heap
page read and write
1682000
trusted library allocation
page read and write
2C7A000
stack
page read and write
1707000
heap
page read and write
EE0000
trusted library allocation
page read and write
7B71000
trusted library allocation
page read and write
5590000
heap
page read and write
6F2D000
stack
page read and write
EBA000
trusted library allocation
page execute and read and write
7C83000
trusted library allocation
page read and write
15D0000
heap
page read and write
56F0000
trusted library allocation
page execute and read and write
126B000
trusted library allocation
page read and write
56E0000
trusted library section
page read and write
AD2000
heap
page read and write
633E000
stack
page read and write
52F0000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
78F1000
trusted library allocation
page read and write
38AA000
trusted library allocation
page read and write
A53000
trusted library allocation
page execute and read and write
65CD000
stack
page read and write
6E97000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
4C10000
heap
page read and write
548C000
stack
page read and write
50AE000
stack
page read and write
5B1E000
stack
page read and write
6D30000
trusted library allocation
page read and write
5CBE000
stack
page read and write
5752000
trusted library allocation
page read and write
6FEC000
stack
page read and write
73CE000
stack
page read and write
860000
heap
page read and write
56C0000
trusted library section
page read and write
15AE000
stack
page read and write
6CC0000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
59FE000
stack
page read and write
6F10000
trusted library allocation
page execute and read and write
7FD10000
trusted library allocation
page execute and read and write
554D000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
F70000
heap
page read and write
7958000
trusted library allocation
page read and write
A30000
heap
page read and write
E20000
trusted library allocation
page read and write
5900000
heap
page read and write
A72000
trusted library allocation
page read and write
5048000
trusted library allocation
page read and write
584E000
stack
page read and write
76A0000
heap
page read and write
7BF9000
trusted library allocation
page read and write
C410000
heap
page read and write
7A2000
unkown
page readonly
74B0000
heap
page read and write
FF0000
heap
page read and write
673D000
stack
page read and write
788A000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
798B000
trusted library allocation
page read and write
51DC000
stack
page read and write
1610000
heap
page execute and read and write
14D7000
heap
page read and write
7945000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
633E000
stack
page read and write
6D20000
trusted library allocation
page read and write
7887000
trusted library allocation
page read and write
C76F000
stack
page read and write
6BC9000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
2FEC000
stack
page read and write
9C0000
heap
page read and write
33D0000
heap
page execute and read and write
13F3000
trusted library allocation
page execute and read and write
86B0000
heap
page read and write
31EA000
trusted library allocation
page read and write
5BFE000
stack
page read and write
5C70000
heap
page read and write
27A2000
trusted library allocation
page read and write
105A000
stack
page read and write
6BBE000
stack
page read and write
53FE000
trusted library allocation
page read and write
3085000
trusted library allocation
page read and write
1596000
trusted library allocation
page execute and read and write
103A000
stack
page read and write
DE0000
heap
page read and write
6CAF000
stack
page read and write
7230000
trusted library allocation
page read and write
6D20000
heap
page read and write
2F11000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
317C000
trusted library allocation
page read and write
1690000
heap
page read and write
5416000
trusted library allocation
page read and write
3493000
trusted library allocation
page read and write
1426000
trusted library allocation
page execute and read and write
31E6000
trusted library allocation
page read and write
1064000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
16C0000
trusted library allocation
page execute and read and write
614E000
stack
page read and write
1030000
heap
page read and write
159F000
heap
page read and write
980000
heap
page read and write
C66D000
stack
page read and write
862E000
stack
page read and write
12E0000
heap
page read and write
788C000
trusted library allocation
page read and write
795C000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
6D37000
trusted library allocation
page read and write
769A000
heap
page read and write
45A6000
trusted library allocation
page read and write
14A0000
trusted library allocation
page execute and read and write
4F9E000
stack
page read and write
552B000
trusted library allocation
page read and write
838E000
stack
page read and write
55E2000
trusted library allocation
page read and write
41A4000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
13FD000
trusted library allocation
page execute and read and write
2FAE000
stack
page read and write
612E000
stack
page read and write
329A000
heap
page read and write
694F000
stack
page read and write
4D77000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
1286000
trusted library allocation
page read and write
4E00000
heap
page read and write
A34000
heap
page read and write
6BBC000
heap
page read and write
2845000
trusted library allocation
page read and write
1323000
heap
page read and write
C3BD000
stack
page read and write
505D000
trusted library allocation
page read and write
622E000
stack
page read and write
94B8000
heap
page read and write
5CEE000
stack
page read and write
7BB8000
trusted library allocation
page read and write
46D6000
trusted library allocation
page read and write
10A0000
trusted library allocation
page execute and read and write
34E7000
trusted library allocation
page read and write
ECB000
trusted library allocation
page execute and read and write
6BD0000
trusted library allocation
page execute and read and write
1565000
heap
page read and write
352B000
trusted library allocation
page read and write
683E000
stack
page read and write
1340000
heap
page read and write
78BA000
trusted library allocation
page read and write
6D7E000
stack
page read and write
1420000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
82AE000
stack
page read and write
1920000
trusted library allocation
page read and write
6440000
heap
page read and write
153E000
stack
page read and write
5C7A000
heap
page read and write
796E000
trusted library allocation
page read and write
EC7000
trusted library allocation
page execute and read and write
83D0000
heap
page read and write
2FA0000
heap
page read and write
15A1000
heap
page read and write
342D000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
504E000
trusted library allocation
page read and write
643E000
stack
page read and write
6EED000
stack
page read and write
589C000
stack
page read and write
3171000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
6BFE000
stack
page read and write
5C20000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
E94000
trusted library allocation
page read and write
7480000
heap
page read and write
18F0000
trusted library allocation
page read and write
140D000
trusted library allocation
page execute and read and write
FA4000
heap
page read and write
165E000
stack
page read and write
125C000
stack
page read and write
2EAD000
stack
page read and write
53BE000
stack
page read and write
486F000
stack
page read and write
7F0C0000
trusted library allocation
page execute and read and write
5A4F000
heap
page read and write
4D6E000
trusted library allocation
page read and write
1592000
trusted library allocation
page read and write
10DE000
stack
page read and write
279E000
trusted library allocation
page read and write
EB2000
trusted library allocation
page read and write
6CFE000
stack
page read and write
38C9000
trusted library allocation
page read and write
740E000
stack
page read and write
4D50000
trusted library allocation
page read and write
4D23000
trusted library allocation
page read and write
2D1B000
heap
page read and write
11F5000
heap
page read and write
C63E000
stack
page read and write
94B0000
heap
page read and write
88A0000
trusted library section
page read and write
C4BE000
stack
page read and write
7C8F000
trusted library allocation
page read and write
14B0000
heap
page read and write
15C0000
trusted library allocation
page read and write
2EEA000
stack
page read and write
12F0000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
73B0000
heap
page read and write
144E000
stack
page read and write
7909000
trusted library allocation
page read and write
CB5E000
stack
page read and write
72AE000
stack
page read and write
30D0000
heap
page read and write
1367000
heap
page read and write
458A000
trusted library allocation
page read and write
FB9000
stack
page read and write
7873000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
55C2000
trusted library allocation
page read and write
637C000
stack
page read and write
5A80000
trusted library allocation
page read and write
6966000
heap
page read and write
7F2E0000
trusted library allocation
page execute and read and write
4BF0000
trusted library allocation
page read and write
1180000
heap
page read and write
2A61000
trusted library allocation
page read and write
572B000
trusted library allocation
page read and write
5E3E000
stack
page read and write
5650000
trusted library allocation
page read and write
A8B000
trusted library allocation
page execute and read and write
793E000
trusted library allocation
page read and write
339E000
stack
page read and write
7966000
trusted library allocation
page read and write
7CA4000
trusted library allocation
page read and write
65ED000
heap
page read and write
4FC0000
heap
page read and write
149E000
stack
page read and write
38A1000
trusted library allocation
page read and write
12ED000
stack
page read and write
30E1000
trusted library allocation
page read and write
6994000
heap
page read and write
1715000
trusted library allocation
page execute and read and write
10DC000
heap
page read and write
718D000
stack
page read and write
3BF9000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
7F090000
trusted library allocation
page execute and read and write
40A9000
trusted library allocation
page read and write
11C0000
heap
page read and write
14DA000
heap
page read and write
4FBC000
trusted library allocation
page read and write
4F07000
trusted library allocation
page read and write
6CC7000
trusted library allocation
page read and write
12C7000
heap
page read and write
103E000
stack
page read and write
115B000
stack
page read and write
5F7E000
stack
page read and write
2F0E000
stack
page read and write
705E000
stack
page read and write
742B000
stack
page read and write
58EC000
stack
page read and write
43B3000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
1298000
heap
page read and write
6ABE000
stack
page read and write
10C1000
heap
page read and write
56D0000
trusted library allocation
page read and write
10E0000
trusted library allocation
page execute and read and write
1075000
heap
page read and write
E6A000
trusted library allocation
page execute and read and write
684E000
stack
page read and write
796A000
trusted library allocation
page read and write
54E0000
heap
page read and write
7C4C000
trusted library allocation
page read and write
There are 1364 hidden memdumps, click here to show them.